Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
visual basic vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-2959
Buffer overflow in a certain ActiveX control (vb6skit.dll) in Microsoft Visual Basic Enterprise Edition 6.0 SP6 might allow remote malicious users to execute arbitrary code via a long lpstrLinkPath argument to the fCreateShellLink function.
Microsoft Visual Basic Enterprise Edition 6.0
1 EDB exploit
NA
CVE-2008-1092
Buffer overflow in msjet40.dll prior to 4.0.9505.0 in Microsoft Jet Database Engine allows remote malicious users to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008. NOTE: as of 20080513, Microsoft has stated that this is the same issue as C...
Microsoft Word 2007 Sp1
Microsoft Word 2000
Microsoft Word 2003 Sp3
Microsoft Word 2007
Microsoft Word 2002
Microsoft Word 2003
NA
CVE-2007-0065
Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote malicious users to execute arbitrary code via a crafted script request.
Microsoft Office
Microsoft Visual Basic 6.0
NA
CVE-2008-0392
Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote malicious users to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.
Microsoft Visual Basic 6.0
1 EDB exploit
NA
CVE-2007-6026
Stack-based buffer overflow in Microsoft msjet40.dll 4.0.8618.0 (aka Microsoft Jet Engine), as used by Access 2003 in Microsoft Office 2003 SP3, allows user-assisted malicious users to execute arbitrary code via a crafted MDB file database file containing a column structure with ...
Microsoft Jet 4.0.8618.0
Microsoft Office 2003
Microsoft Windows Xp
Microsoft Windows 2003 Server
Microsoft Windows Nt 4.0
Microsoft Windows 2000
1 EDB exploit
NA
CVE-2007-4776
Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote malicious users to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage sc...
Microsoft Visual Basic 6.0
3 EDB exploits
NA
CVE-2007-3041
Unspecified vulnerability in the pdwizard.ocx ActiveX object for Internet Explorer 5.01, 6 SP1, and 7 allows remote malicious users to execute arbitrary code via unknown vectors related to Microsoft Visual Basic 6 objects and memory corruption, aka "ActiveX Object Memory Cor...
Microsoft Internet Explorer 5.01
Microsoft Internet Explorer 6
Microsoft Internet Explorer 7
NA
CVE-2007-2223
Microsoft XML Core Services (MSXML) 3.0 up to and including 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a (1) TextNode or (2) XMLDOM object, which causes an integer overflow that leads to a buffer overflow.
Microsoft Xml Core Services 3.0
Microsoft Xml Core Services 6.0
Microsoft Xml Core Services 4.0
Microsoft Xml Core Services 5.0
1 EDB exploit
NA
CVE-2007-2224
Object linking and embedding (OLE) Automation, as used in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Office 2004 for Mac, and Visual Basic 6.0 allows remote malicious users to execute arbitrary code via the substringData method on a TextNode object, which causes...
Microsoft Office 2004
Microsoft Visual Basic 6.0
NA
CVE-2007-3145
Visual truncation vulnerability in Galeon 2.0.1 allows remote malicious users to spoof the address bar and possibly conduct phishing attacks via a long hostname, which is truncated after a certain number of characters, as demonstrated by a phishing attack using HTTP Basic Authent...
Galeon Galeon Browser 2.0.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »