Show filters
96 Total Results
Displaying 91-96 of 96
Sort by:
Attacker Value
Unknown

CVE-2004-0848

Disclosure Date: February 08, 2005 (last updated February 22, 2025)
Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
0
Attacker Value
Unknown

CVE-2004-0200

Disclosure Date: September 28, 2004 (last updated February 22, 2025)
Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.
0
Attacker Value
Unknown

CVE-2004-0573

Disclosure Date: September 28, 2004 (last updated February 22, 2025)
Buffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
0
Attacker Value
Unknown

CVE-2003-0820

Disclosure Date: December 15, 2003 (last updated February 22, 2025)
Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
0
Attacker Value
Unknown

CVE-2003-0821

Disclosure Date: December 15, 2003 (last updated February 22, 2025)
Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
0
Attacker Value
Unknown

CVE-2003-0664

Disclosure Date: October 20, 2003 (last updated February 22, 2025)
Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows attackers to bypass the macro security model and automatically execute arbitrary macros via a malicious document.
0