cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2016-0012,https://securityvulnerability.io/vulnerability/CVE-2016-0012,,"Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka ""Microsoft Office ASLR Bypass.""",Microsoft,"Word,Powerpoint,Excel,Visio,Office,Visual Basics",4.3,MEDIUM,0.14215999841690063,false,false,false,false,,false,false,2016-01-13T02:00:00.000Z,0 CVE-2013-3129,https://securityvulnerability.io/vulnerability/CVE-2013-3129,,"Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, and 4.5; Silverlight 5 before 5.1.20513.0; win32k.sys in the kernel-mode drivers, and GDI+, DirectWrite, and Journal, in Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows Server 2012, and Windows RT; GDI+ in Office 2003 SP3, 2007 SP3, and 2010 SP1; GDI+ in Visual Studio .NET 2003 SP1; and GDI+ in Lync 2010, 2010 Attendee, 2013, and Basic 2013 allow remote attackers to execute arbitrary code via a crafted TrueType Font (TTF) file, aka ""TrueType Font Parsing Vulnerability.""",Microsoft,".net Framework,Silverlight,Visual Studio .net,Lync,Office,Lync Basic",,,0.6194300055503845,false,false,false,false,,false,false,2013-07-10T01:00:00.000Z,0 CVE-2012-1856,https://securityvulnerability.io/vulnerability/CVE-2012-1856,,"The TabStrip ActiveX control in the Common Controls in MSCOMCTL.OCX in Microsoft Office 2003 SP3, Office 2003 Web Components SP3, Office 2007 SP2 and SP3, Office 2010 SP1, SQL Server 2000 SP4, SQL Server 2005 SP4, SQL Server 2008 SP2, SP3, R2, R2 SP1, and R2 SP2, Commerce Server 2002 SP4, Commerce Server 2007 SP2, Commerce Server 2009 Gold and R2, Host Integration Server 2004 SP1, Visual FoxPro 8.0 SP1, Visual FoxPro 9.0 SP2, and Visual Basic 6.0 Runtime allows remote attackers to execute arbitrary code via a crafted (1) document or (2) web page that triggers system-state corruption, aka ""MSCOMCTL.OCX RCE Vulnerability.""",Microsoft,"Visual Foxpro,Sql Server,Commerce Server,Office,Visual Basic,Host Integration Server,Office Web Components",8.8,HIGH,0.8687999844551086,true,false,false,true,,false,false,2012-08-15T01:00:00.000Z,0 CVE-2012-1854,https://securityvulnerability.io/vulnerability/CVE-2012-1854,,"Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka ""Visual Basic for Applications Insecure Library Loading Vulnerability,"" as exploited in the wild in July 2012.",Microsoft,"Office,Visual Basic For Applications,Visual Basic For Applications Sdk",,,0.0006300000241026282,false,false,false,false,,false,false,2012-07-10T21:00:00.000Z,0 CVE-2010-0815,https://securityvulnerability.io/vulnerability/CVE-2010-0815,,"VBE6.DLL in Microsoft Office XP SP3, Office 2003 SP3, 2007 Microsoft Office System SP1 and SP2, Visual Basic for Applications (VBA), and VBA SDK 6.3 through 6.5 does not properly search for ActiveX controls that are embedded in documents, which allows remote attackers to execute arbitrary code via a crafted document, aka ""VBE6.DLL Stack Memory Corruption Vulnerability.""",Microsoft,"Visual Basic Sdk,Visual Basic For Applications",,,0.7451199889183044,false,false,false,false,,false,false,2010-05-12T01:00:00.000Z,0 CVE-2008-4252,https://securityvulnerability.io/vulnerability/CVE-2008-4252,,"The DataGrid ActiveX control in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the ""system state,"" aka ""DataGrid Control Memory Corruption Vulnerability.""",Microsoft,"Visual Foxpro,Visual Studio .net,Visual Basic,Project,Office Frontpage",,,0.6039599776268005,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4253,https://securityvulnerability.io/vulnerability/CVE-2008-4253,,"The FlexGrid ActiveX control in Microsoft Visual Basic 6.0, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, Office FrontPage 2002 SP3, and Office Project 2003 SP3 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the ""system state,"" aka ""FlexGrid Control Memory Corruption Vulnerability.""",Microsoft,"Visual Foxpro,Visual Studio .net,Visual Basic,Project,Office Frontpage",,,0.6840500235557556,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4254,https://securityvulnerability.io/vulnerability/CVE-2008-4254,,"Multiple integer overflows in the Hierarchical FlexGrid ActiveX control (mshflxgd.ocx) in Microsoft Visual Basic 6.0 and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allow remote attackers to execute arbitrary code via crafted (1) Rows and (2) Cols properties to the (a) ExpandAll and (b) CollapseAll methods, related to access of incorrectly initialized objects and corruption of the ""system state,"" aka ""Hierarchical FlexGrid Control Memory Corruption Vulnerability.""",Microsoft,"Visual Foxpro,Visual Studio .net,Visual Basic,Project,Office Frontpage",,,0.9618499875068665,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4255,https://securityvulnerability.io/vulnerability/CVE-2008-4255,,"Heap-based buffer overflow in mscomct2.ocx (aka Windows Common ActiveX control or Microsoft Animation ActiveX control) in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2, and Office Project 2003 SP3 and 2007 Gold and SP1 allows remote attackers to execute arbitrary code via an AVI file with a crafted stream length, which triggers an ""allocation error"" and memory corruption, aka ""Windows Common AVI Parsing Overflow Vulnerability.""",Microsoft,"Visual Foxpro,Visual Studio .net,Visual Basic,Project,Office Frontpage",,,0.9411900043487549,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4256,https://securityvulnerability.io/vulnerability/CVE-2008-4256,,"The Charts ActiveX control in Microsoft Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 does not properly handle errors during access to incorrectly initialized objects, which allows remote attackers to execute arbitrary code via a crafted HTML document, related to corruption of the ""system state,"" aka ""Charts Control Memory Corruption Vulnerability.""",Microsoft,"Visual Foxpro,Visual Studio .net,Visual Basic,Project,Office Frontpage",,,0.6840500235557556,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-3704,https://securityvulnerability.io/vulnerability/CVE-2008-3704,,"Heap-based buffer overflow in the MaskedEdit ActiveX control in Msmask32.ocx 6.0.81.69, and possibly other versions before 6.0.84.18, in Microsoft Visual Studio 6.0, Visual Basic 6.0, Visual Studio .NET 2002 SP1 and 2003 SP1, and Visual FoxPro 8.0 SP1 and 9.0 SP1 and SP2 allows remote attackers to execute arbitrary code via a long Mask parameter, related to not ""validating property values with boundary checks,"" as exploited in the wild in August 2008, aka ""Masked Edit Control Memory Corruption Vulnerability.""",Microsoft,"Visual Foxpro,Visual Studio .net,Visual Studio,Visual Basic",,,0.9610099792480469,false,false,false,false,,false,false,2008-08-18T19:00:00.000Z,0 CVE-2008-2959,https://securityvulnerability.io/vulnerability/CVE-2008-2959,,Buffer overflow in a certain ActiveX control (vb6skit.dll) in Microsoft Visual Basic Enterprise Edition 6.0 SP6 might allow remote attackers to execute arbitrary code via a long lpstrLinkPath argument to the fCreateShellLink function.,Microsoft,Visual Basic Enterprise Edition,,,0.863319993019104,false,false,false,false,,false,false,2008-07-02T17:00:00.000Z,0 CVE-2007-0065,https://securityvulnerability.io/vulnerability/CVE-2007-0065,,"Heap-based buffer overflow in Object Linking and Embedding (OLE) Automation in Microsoft Windows 2000 SP4, XP SP2, Server 2003 SP1 and SP2, Vista, Office 2004 for Mac, and Visual basic 6.0 SP6 allows remote attackers to execute arbitrary code via a crafted script request.",Microsoft,"Office,Visual Basic",,,0.6153600215911865,false,false,false,false,,false,false,2008-02-12T22:00:00.000Z,0 CVE-2008-0392,https://securityvulnerability.io/vulnerability/CVE-2008-0392,,Multiple buffer overflows in Microsoft Visual Basic Enterprise Edition 6.0 SP6 allow user-assisted remote attackers to execute arbitrary code via a .dsr file with a long (1) ConnectionName or (2) CommandName line.,Microsoft,Visual Basic,,,0.7373700141906738,false,false,false,false,,false,false,2008-01-23T02:00:00.000Z,0 CVE-2007-4776,https://securityvulnerability.io/vulnerability/CVE-2007-4776,,"Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote attackers to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage scenarios under which this would be a vulnerability.",Microsoft,Visual Basic,,,0.9458000063896179,false,false,false,false,,false,false,2007-09-10T21:00:00.000Z,0 CVE-2007-2884,https://securityvulnerability.io/vulnerability/CVE-2007-2884,,Multiple stack-based buffer overflows in Microsoft Visual Basic 6 allow user-assisted remote attackers to cause a denial of service (CPU consumption) or execute arbitrary code via a Visual Basic Project (vbp) file with a long (1) Description or (2) Company Name (VersionCompanyName) field.,Microsoft,Visual Basic,,,0.21987000107765198,false,false,false,false,,false,false,2007-05-30T01:00:00.000Z,0 CVE-2006-4732,https://securityvulnerability.io/vulnerability/CVE-2006-4732,,"Unspecified vulnerability in Microsoft Visual Basic (VB) 6 has an unknown impact (""overflow"") via a project that contains a certain Click event procedure, as demonstrated using the msgbox function and the VB.Label object.",Microsoft,Visual Basic,,,0.048239998519420624,false,false,false,false,,false,false,2006-09-13T22:00:00.000Z,0 CVE-2006-3649,https://securityvulnerability.io/vulnerability/CVE-2006-3649,,"Buffer overflow in Microsoft Visual Basic for Applications (VBA) SDK 6.0 through 6.4, as used by Microsoft Office 2000 SP3, Office XP SP3, Project 2000 SR1, Project 2002 SP1, Access 2000 Runtime SP3, Visio 2002 SP2, and Works Suite 2004 through 2006, allows user-assisted attackers to execute arbitrary code via unspecified document properties that are not verified when VBA is invoked to open documents.",Microsoft,Visual Basic,,,0.49015000462532043,false,false,false,false,,false,false,2006-08-09T00:00:00.000Z,0 CVE-2004-0200,https://securityvulnerability.io/vulnerability/CVE-2004-0200,,"Buffer overflow in the JPEG (JPG) parsing engine in the Microsoft Graphic Device Interface Plus (GDI+) component, GDIPlus.dll, allows remote attackers to execute arbitrary code via a JPEG image with a small JPEG COM field length that is normalized to a large integer length before a memory copy operation.",Microsoft,"Frontpage,Visual J\# .net,Visual C\+\+,Digital Image Pro,Visual Studio .net,Project,Visual Basic,Picture It,Powerpoint,Office,Outlook,Digital Image Suite,Infopath,Publisher,Word,Excel,Visio,Greetings,Onenote,Visual C\#,Producer,.net Framework",,,0.9617199897766113,false,false,false,false,,false,false,2004-09-28T04:00:00.000Z,0 CVE-2003-0347,https://securityvulnerability.io/vulnerability/CVE-2003-0347,,Heap-based buffer overflow in VBE.DLL and VBE6.DLL of Microsoft Visual Basic for Applications (VBA) SDK 5.0 through 6.3 allows remote attackers to execute arbitrary code via a document with a long ID parameter.,Microsoft,"Visual Basic,Project,Office,Visio",,,0.9477800130844116,false,false,false,false,,false,false,2003-10-20T04:00:00.000Z,0 CVE-2001-0153,https://securityvulnerability.io/vulnerability/CVE-2001-0153,,Buffer overflow in VB-TSQL debugger object (vbsdicli.exe) in Visual Studio 6.0 Enterprise Edition allows remote attackers to execute arbitrary commands.,Microsoft,"Visual Studio,Visual Basic",,,0.06063000112771988,false,false,false,false,,false,false,2001-05-03T04:00:00.000Z,0 CVE-1999-0384,https://securityvulnerability.io/vulnerability/CVE-1999-0384,,The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.,Microsoft,"Visual Basic,Office,Project,Outlook",,,0.0004299999854993075,false,false,false,false,,false,false,1999-01-01T05:00:00.000Z,0