CVE-2006-1043 – Microsoft Visual Studio 6.0 sp6 - '.dbp' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-2006-1043
Stack-based buffer overflow in Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0 allows user-assisted attackers to execute arbitrary code via a long DataProject field in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln). • https://www.exploit-db.com/exploits/1555 http://secunia.com/advisories/19081 http://securitytracker.com/id?1015721 http://www.frsirt.com/exploits/20060305.ms-visual-dbp.c.php http://www.osvdb.org/23711 http://www.securityfocus.com/archive/1/426767/100/0/threaded http://www.securityfocus.com/archive/1/426830/100/0/threaded http://www.securityfocus.com/bid/16953 http://www.vupen.com/english/advisories/2006/0825 https://exchange.xforce.ibmcloud.com/vulnerabilities/25148 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2001-0153
https://notcve.org/view.php?id=CVE-2001-0153
Buffer overflow in VB-TSQL debugger object (vbsdicli.exe) in Visual Studio 6.0 Enterprise Edition allows remote attackers to execute arbitrary commands. • http://razor.bindview.com/publish/advisories/adv_vbtsql.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-018 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •
CVE-2000-0162
https://notcve.org/view.php?id=CVE-2000-0162
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011 •