2 results (0.003 seconds)

CVSS: 9.3EPSS: 80%CPEs: 8EXPL: 0

VBE6.DLL in Microsoft Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Visual Basic for Applications (VBA), and VBA SDK 6.3 through 6.5 does not properly search for ActiveX controls that are embedded in documents, which allows remote attackers to execute arbitrary code via a crafted document, aka "VBE6.DLL Stack Memory Corruption Vulnerability." VBE6.DLL en Microsoft Office XP SP3, Office 2003 SP3, Microsoft Office System 2007 SP1 y SP2, Visual Basic para Aplicaciones (VBA), y VBA SDK v6.3 a v6.5 no buscan correctamente los controles ActiveX que se incrustan en los documentos, lo que permite a atacantes remotos ejecutar código arbitrario mediante un documento debidamente modificado. Esta vulnerabilidad también es conocida como "Vulnerabilidad de corrupción de la pila de memoria en VBE6.DLL". • http://www.us-cert.gov/cas/techalerts/TA10-131A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-031 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7074 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.1EPSS: 58%CPEs: 4EXPL: 0

Buffer overflow in Microsoft Visual Basic for Applications (VBA) SDK 6.0 through 6.4, as used by Microsoft Office 2000 SP3, Office XP SP3, Project 2000 SR1, Project 2002 SP1, Access 2000 Runtime SP3, Visio 2002 SP2, and Works Suite 2004 through 2006, allows user-assisted attackers to execute arbitrary code via unspecified document properties that are not verified when VBA is invoked to open documents. Desbordamiento de búfer en Microsoft Visual Basic para Aplicaciones (VBA) SDK 6.0 hasta 6.4, como se usa en Microsoft Office 2000 SP3, Office XPSP3, Project 2000 SR1, Project 2002 SP1, Access 2000 Runtime SP3, Visio 2002 SP2, y Works Suite 2004 hasta 2006, permite a atacantes remotos con intervención del usuario ejecutar código de su elección mediante propiedades de documento no especificadas que no son verificadas cuando VBA es invocado para abrir documentos. • http://secunia.com/advisories/21408 http://securitytracker.com/id?1016656 http://www.kb.cert.org/vuls/id/159484 http://www.securityfocus.com/bid/19414 http://www.us-cert.gov/cas/techalerts/TA06-220A.html http://www.vupen.com/english/advisories/2006/3214 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-047 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A694 •