Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2003-0820
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Word/Excel 远程任意代码可执行漏洞(MS03-050)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Word和Excel是流行的文字编辑软件。 Microsoft Word和Excel对宏处理存在安全问题,远程攻击者可以利用这个漏洞构建恶意文档,诱使用户访问,以用户权限增加、更改、删除文件数据、与WEB站点交互或格式化驱动盘。 - 在Microsoft Excel存在安全漏洞可允许恶意代码执行。Excel在读取宏指令前检查数据表的时存在问题。如果成功利用这个漏洞。攻击者可以构建恶意文件绕过宏安全模型。如果恶意数据表被打开,这个漏洞就允许嵌入文件的宏自动被执行,而无视宏安全是否设置。恶
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2003-0820
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2003-0820
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2003-0820

No comments yet


Leave a comment