The Microsoft Office Snapshot Viewer ActiveX control in snapview.ocx 10.0.5529.0, as distributed in the standalone Snapshot Viewer and Microsoft Office Access 2000 through 2003, allows remote attackers to download arbitrary files to a client machine via a crafted HTML document or e-mail message, probably involving use of the SnapshotPath and CompressedPath properties and the PrintSnapshot method. NOTE: this can be leveraged for code execution by writing to a Startup folder.
https://services.google.com/fh/files/misc/m-trends-2024.pdf
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6120
https://exchange.xforce.ibmcloud.com/vulnerabilities/43613
http://www.vupen.com/english/advisories/2008/2012/references
http://www.us-cert.gov/cas/techalerts/TA08-225A.html
http://www.us-cert.gov/cas/techalerts/TA08-189A.html
http://www.securitytracker.com/id?1020433
http://www.securityfocus.com/bid/30114
http://www.microsoft.com/technet/security/advisory/955179.mspx
http://www.kb.cert.org/vuls/id/837785
http://www.exploit-db.com/exploits/6124