Page 15 of 76 results (0.046 seconds)

CVSS: 7.5EPSS: 28%CPEs: 27EXPL: 0

Microsoft Excel 97, 2000, and 2002 allows remote attackers to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model. Microsoft Excel 97, 2000 y 2002 permite a atacantes remotos ejecutar código arbitrario mediante una hoja de cálculo con una macro XLM (Excel 4) que evita el modelo de seguridad de macros. • http://www.securityfocus.com/bid/9010 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-050 https://exchange.xforce.ibmcloud.com/vulnerabilities/13681 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A636 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A675 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A695 •

CVSS: 7.5EPSS: 10%CPEs: 27EXPL: 0

Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote attackers to execute arbitrary code via a buffer overflow attack. Micrososft Word 97, 98(J), 2000 y 2002, y Micrososft Works Suites 2001 a 2004, no comprueban adecuadamente la longitud de valor de datos "Macro Names", lo que podría permitir a atacantes remotos ejecutar código arbitrario mediante un ataque de desbordamiento de búfer. • http://archives.neohapsis.com/archives/bugtraq/2003-10/0163.html http://www.security.nnov.ru/search/document.asp?docid=5243 http://www.securityfocus.com/bid/8835 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-050 https://exchange.xforce.ibmcloud.com/vulnerabilities/13682 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A336 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A585 https://oval.cisecur •

CVSS: 7.5EPSS: 0%CPEs: 16EXPL: 0

Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows attackers to bypass the macro security model and automatically execute arbitrary macros via a malicious document. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-035 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A188 •

CVSS: 5.0EPSS: 2%CPEs: 18EXPL: 3

Microsoft Word and Excel allow remote attackers to steal sensitive information via certain field codes that insert the information when the document is returned to the attacker, as demonstrated in Word using (1) INCLUDETEXT or (2) INCLUDEPICTURE, aka "Flaw in Word Fields and Excel External Updates Could Lead to Information Disclosure." Microsoft Word y Excel permite a atacantes remotos robar información sensible mediante ciertos códigos de campo que insertan la información cuando el documento es devuelto al atacante, como ha sido demostrado en Word usando INCLUDETEXT o INCLUDEPICTURE, tambien conocido como "Fallo en campos de Word y actualizaciones externas de Excel podría conducir a revelamiento de Información" • https://www.exploit-db.com/exploits/21812 https://www.exploit-db.com/exploits/21764 http://marc.info/?l=bugtraq&m=103040003014999&w=2 http://marc.info/?l=bugtraq&m=103252858816401&w=2 http://www.iss.net/security_center/static/10008.php http://www.iss.net/security_center/static/10155.php http://www.kb.cert.org/vuls/id/899713 http://www.microsoft.com/technet/treeview/default.asp?url=/Technet/security/topics/secword.asp http://www.securityfocus.com/bid/5586 htt •

CVSS: 7.5EPSS: 15%CPEs: 6EXPL: 0

Microsoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote attackers to execute arbitrary scripts via an email that the user forwards or replies to. Microsoft Outlook 2000 y 2002, cuando están configurados para usar Microsoft Word como editor de correo, no bloquea secuencias de comandos (scripts) en usjo mientras se editan mensajes en HTML o Formato de Texto Enriquecido (RTF), lo que podría permitir a atacantes remotos ejecutar scripts arbitrarios mediante un correo electrónico que el usuario reenvia o al que responde. • http://marc.info/?l=bugtraq&m=101760380418890&w=2 http://online.securityfocus.com/archive/1/265621 http://www.iss.net/security_center/static/8708.php http://www.securityfocus.com/bid/4397 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2002/ms02-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A205 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A429 •