CVE-2010-0483

N/A Unknown
Published: March 03, 2010 Modified: April 29, 2026
View on NVD

Description

vbscript.dll in VBScript 5.1, 5.6, 5.7, and 5.8 in Microsoft Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2, when Internet Explorer is used, allows user-assisted remote attackers to execute arbitrary code by referencing a (1) local pathname, (2) UNC share pathname, or (3) WebDAV server with a crafted .hlp file in the fourth argument (aka helpfile argument) to the MsgBox function, leading to code execution involving winhlp32.exe when the F1 key is pressed, aka "VBScript Help Keypress Vulnerability."

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://isec.pl/vulnerabilities10.html
Source: secure@microsoft.com
Exploit
http://secunia.com/advisories/38727
Source: secure@microsoft.com
Vendor Advisory
http://securitytracker.com/id?1023668
Source: secure@microsoft.com
http://www.kb.cert.org/vuls/id/612021
Source: secure@microsoft.com
US Government Resource
http://www.microsoft.com/technet/security/advisory/981169.mspx
Source: secure@microsoft.com
Vendor Advisory
http://www.osvdb.org/62632
Source: secure@microsoft.com
http://www.securityfocus.com/bid/38463
Source: secure@microsoft.com
Exploit
http://www.us-cert.gov/cas/techalerts/TA10-103A.html
Source: secure@microsoft.com
US Government Resource
http://www.vupen.com/english/advisories/2010/0485
Source: secure@microsoft.com
Vendor Advisory
http://blogs.technet.com/msrc/archive/2010/03/01/security-advisory-981169-released.aspx
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://isec.pl/vulnerabilities/isec-0027-msgbox-helpfile-ie.txt
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://isec.pl/vulnerabilities10.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://secunia.com/advisories/38727
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1023668
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/612021
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.microsoft.com/technet/security/advisory/981169.mspx
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.osvdb.org/62632
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/38463
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit
http://www.theregister.co.uk/2010/03/01/ie_code_execution_bug/
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA10-103A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2010/0485
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/56558
Source: af854a3a-2127-422b-91ae-364da2661108

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
82.0%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

microsoft