Page 12 of 60 results (0.006 seconds)

CVSS: 5.1EPSS: 2%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by creating a hyperlink on a drawing shape in a source workbook that points to a destination workbook containing an autoexecute macro, aka "Hyperlinked Excel Workbook Macro Bypass." El modelo de seguridad de macros en Microsoft Excel 2000 y 2002 para Windows permite a atacantes remotos ejecutar código creando un hiperenlace o dibujando una forma en un libro fuente que apunta a un libro destino que contiene un macro de autoejecución. También conocida como "Evitación de Macro de Libro de Excel hiperenlazado". • http://www.osvdb.org/5175 http://www.securityfocus.com/bid/5064 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/9398 •

CVSS: 5.1EPSS: 3%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by attaching an inline macro to an object within an Excel workbook, aka the "Excel Inline Macros Vulnerability." El Modelo de Seguridad de Macros en Microsoft Excel 2000 y 2002 para Windows permite a atacantes remotos ejecutar código adjuntando una macro inline a un objeto dentro de un libro de trabajo de Excel. También conocida como "Vulnerabilidad de Macros inline de Excel". • http://www.iss.net/security_center/static/9397.php http://www.securityfocus.com/bid/5063 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 •

CVSS: 7.5EPSS: 6%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code in the Local Computer zone by embedding HTML scripts within an Excel workbook that contains an XSL stylesheet, aka "Excel XSL Stylesheet Script Execution". El Modelo de Seguridad de Macros en Microsoft Excel 2000 y 2002 permite a atacantes remotos ejecutar código en la zona Ordenador Local incrustando scripts HTML en un libro Excel que contiene una hoja de estilos XLS. También conocido como "Ejecución de Script en hoja de estilo XLS en Excel" • http://marc.info/?l=ntbugtraq&m=102256054320377&w=2 http://www.guninski.com/ex%24el2.html http://www.iss.net/security_center/static/9399.php http://www.securityfocus.com/bid/4821 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 •

CVSS: 7.5EPSS: 3%CPEs: 7EXPL: 0

The Windows Media Active Playlist in Microsoft Windows Media Player 7.1 stores information in a well known location on the local file system, allowing attackers to execute HTML scripts in the Local Computer zone, aka "Media Playback Script Invocation". • http://www.iss.net/security_center/static/9422.php http://www.securityfocus.com/bid/5110 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 •

CVSS: 7.5EPSS: 2%CPEs: 10EXPL: 0

The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability. • http://www.cert.org/advisories/CA-2000-07.html http://www.microsoft.com/technet/support/kb.asp?ID=262767 http://www.securityfocus.com/bid/1197 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034 •