Microsoft works_suite 2003

CPE Details

Microsoft works_suite 2003
2003
2007-08-28
19h32 +00:00
2008-04-14
18h21 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:microsoft:works:2003:*:*:*:*:*:*:*

Informations

Vendor

microsoft

Product

works

Version

2003

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2006-0009 2006-03-14 22h00 +00:00 Buffer overflow in Microsoft Office 2000 SP3, XP SP3, and other versions and packages, allows user-assisted attackers to execute arbitrary code via a routing slip that is longer than specified by the provided length field, as exploited by malware such as TROJ_MDROPPER.BH and Trojan.PPDropper.E in attacks against PowerPoint.
5.1
CVE-2004-0848 2005-02-08 04h00 +00:00 Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames.
7.5
CVE-2004-0573 2004-09-17 02h00 +00:00 Buffer overflow in the converter for Microsoft WordPerfect 5.x on Office 2000, Office XP, Office 2003, and Works Suites 2001 through 2004 allows remote attackers to execute arbitrary code via a malicious document or website.
7.5
CVE-2003-0820 2003-11-18 04h00 +00:00 Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
7.5
CVE-2003-0821 2003-11-18 04h00 +00:00 Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
7.5
CVE-2003-0664 2003-09-04 02h00 +00:00 Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows attackers to bypass the macro security model and automatically execute arbitrary macros via a malicious document.
7.5