Page 4 of 18 results (0.005 seconds)

CVSS: 5.1EPSS: 96%CPEs: 7EXPL: 3

Stack-based buffer overflow in Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0 allows user-assisted attackers to execute arbitrary code via a long DataProject field in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln). • https://www.exploit-db.com/exploits/1555 http://secunia.com/advisories/19081 http://securitytracker.com/id?1015721 http://www.frsirt.com/exploits/20060305.ms-visual-dbp.c.php http://www.osvdb.org/23711 http://www.securityfocus.com/archive/1/426767/100/0/threaded http://www.securityfocus.com/archive/1/426830/100/0/threaded http://www.securityfocus.com/bid/16953 http://www.vupen.com/english/advisories/2006/0825 https://exchange.xforce.ibmcloud.com/vulnerabilities/25148 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in VB-TSQL debugger object (vbsdicli.exe) in Visual Studio 6.0 Enterprise Edition allows remote attackers to execute arbitrary commands. • http://razor.bindview.com/publish/advisories/adv_vbtsql.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-018 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 0%CPEs: 9EXPL: 0

The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011 •