Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft visual basic 6.0 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2004-0380
The MHTML protocol handler in Microsoft Outlook Express 5.5 SP2 through Outlook Express 6 SP1 allows remote malicious users to bypass domain restrictions and execute arbitrary code, as demonstrated on Internet Explorer using script in a compiled help (CHM) file that references th...
Microsoft Outlook Express 5.5
Microsoft Outlook Express 6.0
3 EDB exploits
1000
VMScore
CVE-2003-0347
Heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 up to and including 6.3 allows remote malicious users to execute arbitrary code via a document with a long ID parameter.
Microsoft Office 2000
Microsoft Office Xp
Microsoft Visual Basic 6.2
Microsoft Visio 2002
Microsoft Visual Basic 5.0
Microsoft Project 2000
Microsoft Project 2002
Microsoft Visual Basic 6.3
1 EDB exploit
945
VMScore
CVE-2008-3704
Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions prior to 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows...
Microsoft Visual Foxpro 9.0
Microsoft Visual Foxpro 8.0
Microsoft Visual Studio 6.0
Microsoft Visual Basic 6.0
Microsoft Visual Studio .net 2002
Microsoft Visual Studio .net 2003
3 EDB exploits
945
VMScore
CVE-2007-4776
Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote malicious users to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage sc...
Microsoft Visual Basic 6.0
3 EDB exploits
940
VMScore
CVE-2007-2884
Multiple stack-based buffer overflows in Microsoft Visual Basic 6 allow user-assisted remote malicious users to cause a denial of service (CPU consumption) or execute arbitrary code via a Visual Basic Project (vbp) file with a long (1) Description or (2) Company Name (VersionComp...
Microsoft Visual Basic 6.0
2 EDB exploits
937
VMScore
CVE-2012-0158
The (1) ListView, (2) ListView2, (3) TreeView, and (4) TreeView2 ActiveX controls in MSCOMCTL.OCX in the Common Controls in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2003 Web Components SP3; SQL Server 2000 SP4, 2005 SP4, and 2008 SP2, SP3, and R2...
Microsoft Office 2010
Microsoft Office 2003
Microsoft Office Web Components 2003
Microsoft Office 2007
Microsoft Sql Server 2000
Microsoft Sql Server 2008
Microsoft Sql Server 2005
Microsoft Biztalk Server 2002
Microsoft Commerce Server 2002
Microsoft Commerce Server 2007
Microsoft Commerce Server 2009
Microsoft Visual Foxpro 8.0
Microsoft Visual Foxpro 9.0
Microsoft Visual Basic 6.0
1 EDB exploit
8 Github repositories
44 Articles
935
VMScore
CVE-2008-4255
Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and...
Microsoft Visual Studio .net 2002
Microsoft Visual Studio .net 2003
Microsoft Visual Basic 6.0
Microsoft Project 2007
Microsoft Office Frontpage 2002
Microsoft Project 2003
Microsoft Visual Foxpro 8.0
Microsoft Visual Foxpro 9.0
1 EDB exploit
935
VMScore
CVE-2008-2959
Buffer overflow in a certain ActiveX control (vb6skit.dll) in Microsoft Visual Basic Enterprise Edition 6.0 SP6 might allow remote malicious users to execute arbitrary code via a long lpstrLinkPath argument to the fCreateShellLink function.
Microsoft Visual Basic Enterprise Edition 6.0
1 EDB exploit
935
VMScore
CVE-2008-0392
Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote malicious users to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.
Microsoft Visual Basic 6.0
1 EDB exploit
935
VMScore
CVE-2007-2223
Microsoft XML Core Services (MSXML) 3.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 6.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 5.0
1 EDB exploit
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
firmware
CVE-2023-52866
CVE-2024-4367
CVE-2024-1721
CVE-2023-34992
XML injection
CVE-2023-52817
SQL
CVE-2023-52855
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »