Page 7 of 35 results (0.014 seconds)

CVSS: 6.8EPSS: 16%CPEs: 1EXPL: 2

Stack-based buffer overflow in rcdll.dll in msdev.exe in Visual C++ (MSVC) in Microsoft Visual Studio 6.0 SP6 allows user-assisted remote attackers to execute arbitrary code via a long file path in the "1 TYPELIB MOVEABLE PURE" option in an RC file. Desbordamiento de búfer basado en pila en rcdll.dll en msdev.exe de Visual C++ (MSVC) en Microsoft Visual Studio 6.0 SP6 permite a atacantes remotos con la complicidad del usuario ejecutar código de su elección mediante una ruta de fichero larga en la opción "1 TYPELIB MOVEABLE PURE" de un fichero RC. • http://osvdb.org/31607 http://secunia.com/advisories/23856 http://securityreason.com/securityalert/2172 http://www.anspi.pl/~porkythepig/visualization/rc-kupiekrowe.cpp http://www.securityfocus.com/archive/1/457646/100/0/threaded http://www.vupen.com/english/advisories/2007/0296 https://exchange.xforce.ibmcloud.com/vulnerabilities/31665 •

CVSS: 7.5EPSS: 15%CPEs: 2EXPL: 2

Microsoft Visual Studio 6.0 allows remote attackers to cause a denial of service (memory corruption) and possibly execute arbitrary code by instantiating certain Visual Studio 6.0 ActiveX COM Objects in Internet Explorer, including (1) tcprops.dll, (2) fp30wec.dll, (3) mdt2db.dll, (4) mdt2qd.dll, and (5) vi30aut.dll. Microsoft Visual Studio 6.0 permite a atacantes remotos provocar una denegación de servicio (corrupción de memoria) y posiblemente ejecutar código arbitrario instanciando objetos Visual Studio 6.0 ActiveX COM en Internet Explorer, incluyendo (1) tcprops.dll, (2) fp30wec.dll, (3) mdt2db.dll, (4) mdt2qd.dll, y (5) vi30aut.dll. • https://www.exploit-db.com/exploits/28401 http://securityreason.com/securityalert/1473 http://www.securityfocus.com/archive/1/443499/100/100/threaded http://www.securityfocus.com/bid/19572 http://www.xsec.org/index.php?module=releases&act=view&type=1&id=15 •

CVSS: 5.1EPSS: 96%CPEs: 7EXPL: 3

Stack-based buffer overflow in Microsoft Visual Studio 6.0 and Microsoft Visual InterDev 6.0 allows user-assisted attackers to execute arbitrary code via a long DataProject field in a (1) Visual Studio Database Project File (.dbp) or (2) Visual Studio Solution (.sln). • https://www.exploit-db.com/exploits/1555 http://secunia.com/advisories/19081 http://securitytracker.com/id?1015721 http://www.frsirt.com/exploits/20060305.ms-visual-dbp.c.php http://www.osvdb.org/23711 http://www.securityfocus.com/archive/1/426767/100/0/threaded http://www.securityfocus.com/archive/1/426830/100/0/threaded http://www.securityfocus.com/bid/16953 http://www.vupen.com/english/advisories/2006/0825 https://exchange.xforce.ibmcloud.com/vulnerabilities/25148 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Buffer overflow in VB-TSQL debugger object (vbsdicli.exe) in Visual Studio 6.0 Enterprise Edition allows remote attackers to execute arbitrary commands. • http://razor.bindview.com/publish/advisories/adv_vbtsql.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2001/ms01-018 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 5.1EPSS: 0%CPEs: 9EXPL: 0

The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011 •