CVE-2007-4776

Microsoft Visual Basic - Memory Corruption

Title source: rule

Description

Buffer overflow in Microsoft Visual Basic 6.0 and Enterprise Edition 6.0 SP6 allows user-assisted remote attackers to execute arbitrary code via a Visual Basic project (vbp) file containing a long Reference line, related to VBP_Open and OLE. NOTE: there are limited usage scenarios under which this would be a vulnerability.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubylocalwindows
https://www.exploit-db.com/exploits/16680
exploitdb WORKING POC VERIFIED
by shinnai · pythonlocalwindows
https://www.exploit-db.com/exploits/4431
exploitdb WORKING POC VERIFIED
by Koshi · perllocalwindows
https://www.exploit-db.com/exploits/4361
metasploit WORKING POC GOOD
by Koshi, MC, bcoles · rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/ms_visual_basic_vbp.rb

Scores

EPSS 0.8150
EPSS Percentile 99.2%

Details

CWE
CWE-119
Status published
Products (1)
microsoft/visual_basic 6.0 (2 CPE variants)
Published Sep 10, 2007
Tracked Since Feb 18, 2026