Page 5 of 25 results (0.006 seconds)

CVSS: 5.1EPSS: 0%CPEs: 3EXPL: 0

Buffer overflow in the HTML interpreter in Microsoft Office 2000 allows an attacker to execute arbitrary commands via a long embedded object tag, aka the "Microsoft Office HTML Object Tag" vulnerability. • http://www.securityfocus.com/bid/1561 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-056 •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 0

Microsoft Office 2000 (Excel and PowerPoint) and PowerPoint 97 are marked as safe for scripting, which allows remote attackers to force Internet Explorer or some email clients to save files to arbitrary locations via the Visual Basic for Applications (VBA) SaveAs function, aka the "Office HTML Script" vulnerability. • http://www.securityfocus.com/bid/1399 http://www.securityfocus.com/templates/archive.pike?list=1&msg=39589349.ED9DBCAB%40nat.bg https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-049 •

CVSS: 7.5EPSS: 2%CPEs: 10EXPL: 0

The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability. • http://www.cert.org/advisories/CA-2000-07.html http://www.microsoft.com/technet/support/kb.asp?ID=262767 http://www.securityfocus.com/bid/1197 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034 •

CVSS: 7.2EPSS: 0%CPEs: 22EXPL: 0

Buffer overflow in the conversion utilities for Japanese, Korean and Chinese Word 5 documents allows an attacker to execute commands, aka the "Malformed Conversion Data" vulnerability. • http://www.securityfocus.com/bid/946 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-002 •

CVSS: 7.5EPSS: 1%CPEs: 2EXPL: 0

PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer. • http://www.microsoft.com/windows/ie/security/powerpoint.asp https://exchange.xforce.ibmcloud.com/vulnerabilities/179 •