Page 15 of 80 results (0.010 seconds)

CVSS: 5.1EPSS: 2%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by creating a hyperlink on a drawing shape in a source workbook that points to a destination workbook containing an autoexecute macro, aka "Hyperlinked Excel Workbook Macro Bypass." El modelo de seguridad de macros en Microsoft Excel 2000 y 2002 para Windows permite a atacantes remotos ejecutar código creando un hiperenlace o dibujando una forma en un libro fuente que apunta a un libro destino que contiene un macro de autoejecución. También conocida como "Evitación de Macro de Libro de Excel hiperenlazado". • http://www.osvdb.org/5175 http://www.securityfocus.com/bid/5064 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 https://exchange.xforce.ibmcloud.com/vulnerabilities/9398 •

CVSS: 5.1EPSS: 3%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code by attaching an inline macro to an object within an Excel workbook, aka the "Excel Inline Macros Vulnerability." El Modelo de Seguridad de Macros en Microsoft Excel 2000 y 2002 para Windows permite a atacantes remotos ejecutar código adjuntando una macro inline a un objeto dentro de un libro de trabajo de Excel. También conocida como "Vulnerabilidad de Macros inline de Excel". • http://www.iss.net/security_center/static/9397.php http://www.securityfocus.com/bid/5063 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 •

CVSS: 7.5EPSS: 6%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code in the Local Computer zone by embedding HTML scripts within an Excel workbook that contains an XSL stylesheet, aka "Excel XSL Stylesheet Script Execution". El Modelo de Seguridad de Macros en Microsoft Excel 2000 y 2002 permite a atacantes remotos ejecutar código en la zona Ordenador Local incrustando scripts HTML en un libro Excel que contiene una hoja de estilos XLS. También conocido como "Ejecución de Script en hoja de estilo XLS en Excel" • http://marc.info/?l=ntbugtraq&m=102256054320377&w=2 http://www.guninski.com/ex%24el2.html http://www.iss.net/security_center/static/9399.php http://www.securityfocus.com/bid/4821 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 •

CVSS: 7.5EPSS: 3%CPEs: 7EXPL: 0

The Windows Media Active Playlist in Microsoft Windows Media Player 7.1 stores information in a well known location on the local file system, allowing attackers to execute HTML scripts in the Local Computer zone, aka "Media Playback Script Invocation". • http://www.iss.net/security_center/static/9422.php http://www.securityfocus.com/bid/5110 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Vulnerability in (1) Microsoft Excel 2002 and earlier and (2) Microsoft PowerPoint 2002 and earlier allows attackers to bypass macro restrictions and execute arbitrary commands by modifying the data stream in the document. • http://online.securityfocus.com/archive/1/218802 http://www.cert.org/advisories/CA-2001-28.html http://www.kb.cert.org/vuls/id/287067 http://www.securityfocus.com/bid/3402 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-050 https://exchange.xforce.ibmcloud.com/vulnerabilities/7223 •