Page 10 of 53 results (0.007 seconds)

CVSS: 9.3EPSS: 8%CPEs: 35EXPL: 0

Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified "crafted file," a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876. Vulnerabilidad no especificada en PowerPoint en Microsoft Office 2000, Office 2002, Office 2003, Office 2004 para Mac, y Office v.X para Mac permite a atacantes con la intervención del usuario ejecutar código de su elección mediante un "fichero artesanal" no especificado, una vulnerabilidad diferente que CVE-2006-3435, CVE-2006-4694, y CVE-2006-3876. • http://securitytracker.com/id?1017030 http://www.kb.cert.org/vuls/id/205948 http://www.osvdb.org/29448 http://www.securityfocus.com/archive/1/449179/100/0/threaded http://www.securityfocus.com/bid/20325 http://www.us-cert.gov/cas/techalerts/TA07-044A.html http://www.vupen.com/english/advisories/2006/3977 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015 https& • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 7.5EPSS: 1%CPEs: 13EXPL: 0

Unspecified vulnerability in Microsoft PowerPoint 2000 through 2003, possibly a buffer overflow, allows user-assisted remote attackers to execute arbitrary commands via a malformed record in the BIFF file format used in a PPT file, a different issue than CVE-2006-1540, aka "Microsoft PowerPoint Malformed Record Vulnerability." Vulnerabilidad no especificada en Microsoft PowerPoint 2000 hasta 2003, posiblemenet un desbordamiento de búfer, permite a atacantes remotos con intervención del usuario ejecutar comandos de su elección mediante un registro mal formado en el formato de archivo BIFF utilizado en un archivo PPT, un problema distinto de CVE-2006-1540, también conocido como "Vulnerabilidad de Registro Mal Formado de Microsoft PowerPoint" ("Microsoft PowerPoint Malformed Record Vulnerability"). • http://securityreason.com/securityalert/1342 http://securitytracker.com/id?1016657 http://secway.org/advisory/AD20060808.txt http://www.kb.cert.org/vuls/id/884252 http://www.securityfocus.com/archive/1/442592/100/0/threaded http://www.securityfocus.com/bid/19341 http://www.us-cert.gov/cas/techalerts/TA06-220A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-048 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3 •

CVSS: 5.1EPSS: 38%CPEs: 5EXPL: 0

mso.dll, as used by Microsoft PowerPoint 2000 through 2003, allows user-assisted attackers to execute arbitrary commands via a malformed shape container in a PPT file that leads to memory corruption, as exploited by Trojan.PPDropper.B, a different issue than CVE-2006-1540 and CVE-2006-3493. mso.dll, usado por Microsoft PowerPoint 2000 a 2003, permite a atacantes remotos con la complicidad del usuario ejecutar órdenes de su elección mediante la configuración de la forma malformado en un fichero PPT , lo que causa una corrupción de memoria, explotado por Trojan.PPDropper.B, un asunto diferente que CVE-2006-1540 y CVE-2006-3493. • http://blogs.securiteam.com/?p=508 http://isc.sans.org/diary.php?storyid=1484 http://secunia.com/advisories/21040 http://securityresponse.symantec.com/avcenter/venc/data/trojan.ppdropper.b.html http://securitytracker.com/id?1016496 http://www.kb.cert.org/vuls/id/936945 http://www.osvdb.org/27324 http://www.securityfocus.com/archive/1/440137/100/0/threaded http://www.securityfocus.com/archive/1/440255/100/0/threaded http://www.securityfocus.com/archive/1/440532/10 •

CVSS: 7.6EPSS: 42%CPEs: 13EXPL: 0

Unspecified vulnerability in Microsoft PowerPoint in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP1 and SP2, Office 2004 for Mac, and v. X for Mac allows user-assisted attackers to execute arbitrary code via a PowerPoint document with a malformed record, which triggers memory corruption. • http://secunia.com/advisories/20633 http://securitytracker.com/id?1016287 http://www.kb.cert.org/vuls/id/190089 http://www.osvdb.org/26435 http://www.securityfocus.com/bid/18382 http://www.us-cert.gov/cas/techalerts/TA06-164A.html http://www.vupen.com/english/advisories/2006/2325 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-028 https://exchange.xforce.ibmcloud.com/vulnerabilities/26784 https://oval.cisecurity.org/repository/search/definition/ov •

CVSS: 7.5EPSS: 48%CPEs: 22EXPL: 0

Buffer overflow in Microsoft Office XP allows remote attackers to execute arbitrary code via a link with a URL file location containing long inputs after (1) "%00 (null byte) in .doc filenames or (2) "%0a" (carriage return) in .rtf filenames. • http://www.kb.cert.org/vuls/id/416001 http://www.us-cert.gov/cas/techalerts/TA05-039A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-005 https://exchange.xforce.ibmcloud.com/vulnerabilities/19107 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2348 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2738 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A40 •