Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft visual basic 5.0 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2003-0347
Heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 up to and including 6.3 allows remote malicious users to execute arbitrary code via a document with a long ID parameter.
Microsoft Visual Basic 6.3
Microsoft Visual Basic 5.0
Microsoft Project 2000
Microsoft Office 2000
Microsoft Visio 2002
Microsoft Project 2002
Microsoft Office Xp
Microsoft Visual Basic 6.2
1 EDB exploit
9.3
CVSSv2
CVE-2007-2223
Microsoft XML Core Services (MSXML) 3.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 6.0
Microsoft Xml Core Services 5.0
1 EDB exploit
7.5
CVSSv2
CVE-1999-0354
Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious e...
Microsoft Word 97
Microsoft Internet Explorer 4.0
Microsoft Internet Explorer 5.0
4.6
CVSSv2
CVE-1999-0384
The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.
Microsoft Visual Basic 5.0
Microsoft Office 98
Microsoft Project 98
Microsoft Outlook 98
Microsoft Windows Nt
Microsoft Windows 2000
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-6267
XML injection
CVE-2024-37673
CVE-2024-6266
CVE-2024-30078
arbitrary
CVE-2024-36886
CVE-2024-5346
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started