Page 50 of 263 results (0.010 seconds)

CVSS: 9.3EPSS: 96%CPEs: 7EXPL: 4

Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not "validating property values with boundary checks," as exploited in the wild in August 2008, aka "Masked Edit Control Memory Corruption Vulnerability." Un desbordamiento de búfer en la región heap de la memoria en el control ActiveX de MaskedEdit en msmask32.ocx versión 6.0.81.69, y posiblemente en otras versiones anteriores a 6.0.84.18, en Visual Studio versión 6.0, Visual Basic versión 6.0, Visual Studio .NET 2002 SP1 y 2003 SP1, y Visual FoxPro versiones 8.0 SP1 y 9.0 SP1 y SP2, de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de un parámetro Mask largo, relacionado con la no "validating property values with boundary checks", como se explotó “in the wild” en Agosto de 2008, también se conoce como "Masked Edit Control Memory Corruption Vulnerability". • https://www.exploit-db.com/exploits/6244 https://www.exploit-db.com/exploits/6317 https://www.exploit-db.com/exploits/16507 http://secunia.com/advisories/31498 http://support.avaya.com/elmodocs2/security/ASA-2008-473.htm http://www.securityfocus.com/bid/30674 http://www.securitytracker.com/id?1020710 http://www.us-cert.gov/cas/techalerts/TA08-344A.html http://www.vupen.com/english/advisories/2008/2380 http://www.vupen.com/english/advisories/2008/3382 https://do • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 94%CPEs: 8EXPL: 0

Unspecified vulnerability in certain COM objects in Microsoft Office Web Components 2000 allows user-assisted remote attackers to execute arbitrary code via vectors related to DataSource that trigger memory corruption, aka "Office Web Components DataSource Vulnerability." Vulnerabilidad no especificada en determinados objetos COM de Microsoft Office Web Components 2000 permite a atacantes remotos con la complicidad del usuario ejecutar códigode su elección mediante vectores relativos a DataSource que disparan una corrupción de memoria, también conocido como "Vulnerabilidad en Office Web Components DataSource." • http://marc.info/?l=bugtraq&m=120585858807305&w=2 http://secunia.com/advisories/29328 http://www.securityfocus.com/bid/28136 http://www.securitytracker.com/id?1019581 http://www.us-cert.gov/cas/techalerts/TA08-071A.html http://www.vupen.com/english/advisories/2008/0849/references https://docs.microsoft.com/en-us/security-updates/securitybulletins/2008/ms08-017 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5327 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 5.8EPSS: 4%CPEs: 1EXPL: 1

Absolute directory traversal vulnerability in a certain ActiveX control in the VB To VSI Support Library (VBTOVSI.DLL) 1.0.0.0 in Microsoft Visual Studio 6.0 allows remote attackers to create or overwrite arbitrary files via a full pathname in the argument to the SaveAs method. NOTE: contents can be copied from local files via the Load method. Vulnerabilidad de salto de directorio absoluto en un determinado control ActiveX en la biblioteca de Soporte VB a VSI (VBTOVSI.DLL) 1.0.0.0 de Microsoft Visual Studio 6.0 permite a atacantes remotos crear o sobre-escribir ficheros de su elección mediante un nombre de ruta completo en el argumento del método SaveAs. NOTA: Los contenidos pueden ser copiados de ficheros locales mediante el método Load. • https://www.exploit-db.com/exploits/4394 http://secunia.com/advisories/26779 http://shinnai.altervista.org/exploits/txt/TXT_qwFZc3a35RLy5AGxVBjJ.html http://www.securityfocus.com/bid/25635 https://exchange.xforce.ibmcloud.com/vulnerabilities/36571 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 6.8EPSS: 90%CPEs: 2EXPL: 2

A certain ActiveX control in PDWizard.ocx 6.0.0.9782 and earlier in Microsoft Visual Studio 6.0 exposes dangerous (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, and (6) CABRunFile methods, which allows remote attackers to execute arbitrary programs and have other impacts, as demonstrated using absolute pathnames in arguments to StartProcess and SyncShell. Un determinado control ActiveX de PDWizard.ocx 6.0.0.9782 y versiones anteriores de Microsoft Visual Studio 6.0 expone métodos peligrosos (1) StartProcess, (2) SyncShell, (3) SaveAs, (4) CABDefaultURL, (5) CABFileName, y (6) CABRunFile, lo cual permite a atacantes remotos ejecutar programas de su elección y tener otros impactos, como se demuestra utilizando nombre de ruta absoluta en argumentos a StartProcess y SyncShell. • https://www.exploit-db.com/exploits/4393 http://osvdb.org/37106 http://secunia.com/advisories/26779 http://shinnai.altervista.org/exploits/txt/TXT_AZJ5bXwXvMARqwtfe97I.html http://www.securityfocus.com/bid/25638 https://exchange.xforce.ibmcloud.com/vulnerabilities/36572 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.8EPSS: 6%CPEs: 2EXPL: 1

Stack-based buffer overflow in a certain ActiveX control in VDT70.DLL in Microsoft Visual Database Tools Database Designer 7.0 for Microsoft Visual Studio 6 allows remote attackers to execute arbitrary code via a long argument to the NotSafe method. NOTE: this may overlap CVE-2007-2885 or CVE-2005-2127. Desbordamiento de búfer basado en pila en un determinado control ActiveX de VDT70.DLL en Microsoft Visual Database Tools Database Designer 7.0 para Microsoft Visual Studio 6 permite a atacantes remotos ejecutar código de su elección mediante un argumento largo para el método NotSafe. NOTA: esto podría solaparse con CVE-2007-2885 o CVE-2005-2127. • https://www.exploit-db.com/exploits/4259 http://osvdb.org/41080 •