Page 29 of 147 results (0.005 seconds)

CVSS: 7.5EPSS: 2%CPEs: 2EXPL: 0

The Mail Merge Tool in Microsoft Word 2002 for Windows, when Microsoft Access is present on a system, allows remote attackers to execute Visual Basic (VBA) scripts within a mail merge document that is saved in HTML format, aka a "Variant of MS00-071, Word Mail Merge Vulnerability" (CVE-2000-0788). La Herramienta de Integración de Correo (Merge Mail) en Microsoft Word 2002 para Windows, si Microsoft Access está presente en el sistema, permite a atacantes remotos ejecutar scripts de Visual Basic (VBA) en un documento integrado con correo guardado en formato HTML. También conocido como "Variante de MS00-071, Vulnerabilidad de Integración de Correo de Word" (CVE-2000-0788) • http://marc.info/?l=bugtraq&m=102139136019862&w=2 http://www.iss.net/security_center/static/9077.php http://www.securityfocus.com/bid/5066 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 •

CVSS: 7.5EPSS: 6%CPEs: 7EXPL: 0

The Macro Security Model in Microsoft Excel 2000 and 2002 for Windows allows remote attackers to execute code in the Local Computer zone by embedding HTML scripts within an Excel workbook that contains an XSL stylesheet, aka "Excel XSL Stylesheet Script Execution". El Modelo de Seguridad de Macros en Microsoft Excel 2000 y 2002 permite a atacantes remotos ejecutar código en la zona Ordenador Local incrustando scripts HTML en un libro Excel que contiene una hoja de estilos XLS. También conocido como "Ejecución de Script en hoja de estilo XLS en Excel" • http://marc.info/?l=ntbugtraq&m=102256054320377&w=2 http://www.guninski.com/ex%24el2.html http://www.iss.net/security_center/static/9399.php http://www.securityfocus.com/bid/4821 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-031 •

CVSS: 7.5EPSS: 3%CPEs: 7EXPL: 0

The Windows Media Active Playlist in Microsoft Windows Media Player 7.1 stores information in a well known location on the local file system, allowing attackers to execute HTML scripts in the Local Computer zone, aka "Media Playback Script Invocation". • http://www.iss.net/security_center/static/9422.php http://www.securityfocus.com/bid/5110 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-032 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

Web Extender Client (WEC) in Microsoft Office 2000, Windows 2000, and Windows Me does not properly process Internet Explorer security settings for NTLM authentication, which allows attackers to obtain NTLM credentials and possibly obtain the password, aka the "Web Client NTLM Authentication" vulnerability. • http://www.securityfocus.com/bid/2199 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-001 https://exchange.xforce.ibmcloud.com/vulnerabilities/5920 •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 2

When a Microsoft Office 2000 document is launched, the directory of that document is first used to locate DLL's such as riched20.dll and msi.dll, which could allow an attacker to execute arbitrary commands by inserting a Trojan Horse DLL into the same directory as the document. • https://www.exploit-db.com/exploits/20232 http://archives.neohapsis.com/archives/bugtraq/2000-09/0277.html http://archives.neohapsis.com/archives/ntbugtraq/2000-q3/0155.html http://archives.neohapsis.com/archives/win2ksecadvice/2000-q3/0117.html http://www.securityfocus.com/bid/1699 https://exchange.xforce.ibmcloud.com/vulnerabilities/5263 •