Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft windows help vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-0908
The Utility Manager in Microsoft Windows 2000 executes winhlp32.exe with system privileges, which allows local users to execute arbitrary code via a "Shatter" style attack using a Windows message that accesses the context sensitive help button in the GUI, as demonstrate...
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2004-0474
Help Center (HelpCtr.exe) may allow remote malicious users to read or execute arbitrary files via an "http://" or "file://" argument to the topic parameter in an hcp:// URL. NOTE: since the initial report of this problem, several researchers have been unable t...
Microsoft Windows Xp
1 EDB exploit
NA
CVE-2005-1983
Stack-based buffer overflow in the Plug and Play (PnP) service for Microsoft Windows 2000 and Windows XP Service Pack 1 allows remote malicious users to execute arbitrary code via a crafted packet, and local users to gain privileges via a malicious application, as exploited by th...
Microsoft Windows Xp
Microsoft Windows 2000
4 EDB exploits
7.8
CVSSv3
CVE-2004-0213
Utility Manager in Windows 2000 launches winhlp32.exe while Utility Manager is running with raised privileges, which allows local users to gain system privileges via a "Shatter" style attack that sends a Windows message to cause Utility Manager to launch winhlp32 by dir...
Microsoft Windows 2000 -
4 EDB exploits
NA
CVE-2002-1327
Buffer overflow in the Windows Shell function in Microsoft Windows XP allows remote malicious users to execute arbitrary code via an .MP3 or .WMA audio file with a corrupt custom attribute, aka "Unchecked Buffer in Windows Shell Could Enable System Compromise."
Microsoft Windows Xp
NA
CVE-2010-0483
vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote malicious users to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, o...
Microsoft Windows 2000
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Xp -
Microsoft Windows Server 2003
2 EDB exploits
NA
CVE-2004-0985
Internet Explorer 6.x on Windows XP SP2 allows remote malicious users to execute arbitrary code, as demonstrated using a document with a draggable file type such as .xml, .doc, .py, .cdf, .css, .pdf, or .ppt, and using ADODB.Connection and ADODB.recordset to write to a .hta file ...
Microsoft Ie 6.0
NA
CVE-2006-3357
Heap-based buffer overflow in HTML Help ActiveX control (hhctrl.ocx) in Microsoft Internet Explorer 6.0 allows remote malicious users to cause a denial of service (application crash) and possibly execute arbitrary code by repeatedly setting the Image field of an Internet.HHCtrl.1...
Microsoft Internet Explorer 6.0
7.8
CVSSv3
CVE-2019-1201
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. ...
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2010
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Office Web Apps Server 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Office Online Server -
Microsoft Sharepoint Enterprise Server 2013
Microsoft Office 2016
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Sharepoint Server 2019
2 Articles
NA
CVE-2005-1219
Buffer overflow in the Microsoft Color Management Module for Windows allows remote malicious users to execute arbitrary code via an image with crafted ICC profile format tags.
Microsoft Image Color Management
2 EDB exploits
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
NEXT »