Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2005-0063

EPSS 69.79% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2005-0063

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
The document processing application used by the Windows Shell in Microsoft Windows 2000, Windows XP, and Windows Server 2003 allows remote attackers to execute arbitrary code by modifying the CLSID stored in a file so that it is processed by HTML Application Host (MSHTA), as demonstrated using a Microsoft Word document.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Windows MSHTA脚本执行漏洞 (MS05-016)
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft HTML Application Host(MSHTA)是Microsoft Windows操作系统的一部分,必须这个应用才能执行.HTA文件。 Windows Shell中存在远程代码执行漏洞,起因是处理应用程序关联的方法。受影响的软件使用进程来验证哪个应用程序应加载进程。攻击者可以诱骗Windows Shell启动HTML Application Host应用程序,而该应用程序可能通常不是用于处理文件的。 成功利用这个漏洞的攻击者可以完全控制受影响的系统,然后攻击者就可以安装程序,
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2005-0063

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2005-0063

登录查看更多情报信息。

Same Patch Batch · n/a · 2005-04-13 · 39 CVEs total

CVE-2005-1098GetDataBack给本地用户证书漏洞
CVE-2005-1089DC++未明下载驱动文件附加漏洞
CVE-2005-1090Maxthon Web Browser目录遍历漏洞
CVE-2005-1091Maxthon Web Browser Plug-in API安全ID信息泄露漏洞
CVE-2005-1092Light Speed Technologies DeluxeFTP本地认证证书泄露漏洞
CVE-2005-1093针对Miranda Instant Messenger的PopUp Plus远程缓冲区溢出漏洞
CVE-2005-1094Network-Client FTP Now本地密码泄露漏洞
CVE-2005-1095Ocean12 Membership Manager Pro 跨站脚本攻击漏洞
CVE-2005-1096Ocean12 Membership Manager Pro SQL注入漏洞
CVE-2005-1097Rebrand P2P Share Spy 漏洞
CVE-2005-1088DameWare Mini Remote Control Server未明权限提升漏洞
CVE-2005-1099Salim Gasmi GLD Postfix Greylisting守护进程缓冲区溢出漏洞
CVE-2005-1100Salim Gasmi GLD Postfix Greylisting Daemon格式化字符串漏洞
CVE-2005-1101IBM Lotus Domino Server畸形POST请求远程溢出漏洞
CVE-2005-1102WordPress 多个跨站脚本攻击漏洞
CVE-2005-1103Sygate Security Agent XML安全策略文件本地绕过漏洞
CVE-2005-1104Centra 7用户信息多个HTML注入漏洞
CVE-2005-1105Sun JavaMail MimeBodyPart.getFileName目录遍历漏洞
CVE-2005-1106QuickTime for Windows 漏洞
CVE-2005-0553Microsoft IE DHTML引擎竞争条件漏洞

Showing top 20 of 39 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2005-0063

No comments yet


Leave a comment