6 results (0.006 seconds)

CVSS: 7.0EPSS: 0%CPEs: 4EXPL: 0

Microsoft Office Graphics Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios en Microsoft Office Graphics • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36565 • CWE-416: Use After Free •

CVSS: 7.5EPSS: 61%CPEs: 41EXPL: 3

Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the "COM Object Instantiation Memory Corruption vulnerability." • https://www.exploit-db.com/exploits/26167 http://isc.sans.org/diary.php?date=2005-08-18 http://secunia.com/advisories/16480 http://secunia.com/advisories/17172 http://secunia.com/advisories/17223 http://secunia.com/advisories/17509 http://securityreason.com/securityalert/72 http://securitytracker.com/id?1014727 http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf http://www.kb.cert.org/vuls/id/740372 http://www.kb.cert.org/vuls/id/898241 http://www& • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 4%CPEs: 15EXPL: 0

Buffer overflow in various Microsoft applications for Macintosh allows remote attackers to cause a denial of service (crash) or execute arbitrary code by invoking the file:// directive with a large number of / characters, which affects Internet Explorer 5.1, Outlook Express 5.0 through 5.0.2, Entourage v. X and 2001, PowerPoint v. X, 2001, and 98, and Excel v. X and 2001 for Macintosh. Desbordamiento de buffer en varias aplicaciones de Microsoft para Macintosht permite a atacantes remotos causar una denegación de servicio (caída) o ejecutar código arbitrario invocando la directiva file:// con un número grande de caracteres /. • http://marc.info/?l=bugtraq&m=101897994314015&w=2 http://www.iss.net/security_center/static/8850.php http://www.osvdb.org/5357 http://www.securityfocus.com/bid/4517 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-019 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

Buffer overflow in the conversion utilities for Japanese, Korean and Chinese Word 5 documents allows an attacker to execute commands, aka the "Malformed Conversion Data" vulnerability. • http://www.securityfocus.com/bid/946 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-002 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Microsoft Office 98, Macintosh Edition, does not properly initialize the disk space used by Office 98 files and effectively inserts data from previously deleted files into the Office file, which could allow attackers to obtain sensitive information. • http://support.microsoft.com/support/kb/articles/q189/5/29.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/1780 •