Page 19 of 173 results (0.017 seconds)

CVSS: 9.3EPSS: 96%CPEs: 8EXPL: 1

Buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Excel spreadsheet, related to improper validation of record information, aka "Excel Buffer Overrun Vulnerability." Desbordamiento de búfer en Microsoft Excel 2002 SP3, 2003 SP3 y SP2 2007, Office 2004 y 2008 para Mac, Open XML Format Converter para Mac, Excel Viewer Service Pack 2, y el paquete de compatibilidad de Office para Word, Excel y PowerPoint 2007 Service Pack 2, permite a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código de su elección mediante a través de una hoja de cálculo Excel manipulada,ralacionado con la validación incorrecta de la información almacenada tambien conocida como "Vulnerabilidad de saturación de búfer en Excel". • https://www.exploit-db.com/exploits/17643 http://osvdb.org/72924 http://securityreason.com/securityalert/8330 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-045 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12451 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 96%CPEs: 10EXPL: 0

Integer signedness error in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via an XLS file with a large record size, aka "Excel Heap Overflow Vulnerability." Un error en la propiedad signedness de un entero en Excel 2002 SP3, 2003 SP3, 2007 SP2, y 2010; Office 2004 y 2008 para Mac; Open XML File Format Converter para Mac; Excel Viewer SP2; y Office Compatibility Pack para Word, Excel y PowerPoint 2007 File Formats SP2, de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo XLS con un gran tamaño de registro, también se conoce como "Excel Heap Overflow Vulnerability." • http://osvdb.org/71759 http://secunia.com/advisories/39122 http://secunia.com/secunia_research/2011-32 http://www.securityfocus.com/bid/47235 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12034 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 96%CPEs: 10EXPL: 0

Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted 400h substream in an Excel file, which triggers a stack-based buffer overflow, aka "Excel Integer Overrun Vulnerability." Un desbordamiento de enteros en Excel 2002 SP3, 2003 SP3, 2007 SP2, y 2010; Office 2004 y 2008 para Mac; Open XML File Format Converter para Mac; Excel Viewer SP2; y Office Compatibility Pack para Word, Excel, y PowerPoint 2007 File Formats SP2, de Microsoft , permite a los atacantes remotos ejecutar código arbitrario por medio de una subcorriente 400h diseñada en un archivo de Excel, que desencadena un desbordamiento de búfer en la región stack de la memoria, también se conoce como "Excel Integer Overrun Vulnerability." • http://osvdb.org/71758 http://secunia.com/advisories/39122 http://secunia.com/secunia_research/2011-31 http://www.securityfocus.com/bid/47201 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12612 • CWE-189: Numeric Errors •

CVSS: 10.0EPSS: 93%CPEs: 1EXPL: 0

Use-after-free vulnerability in Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allows remote attackers to execute arbitrary code via malformed shape data in the Office drawing file format, aka "Microsoft Office Graphic Object Dereferencing Vulnerability." Vulnerabilidad uso después de liberación en Microsoft Excel 2007 permite a atacantes remotos ejecutar código de su elección a través de datos de formas con formato incorrecto en el formato de archivo de dibujo de Office. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Excel 2007. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the application's support for the office drawing file format. When parsing shape data within a particular container, the application will add a reference to an object to a linked list. • http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-microsoft http://secunia.com/advisories/43216 http://secunia.com/advisories/44015 http://www.securitytracker.com/id?1025343 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0942 http://zerodayinitiative.com/advisories/ZDI-11-043 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg. • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 93%CPEs: 6EXPL: 1

Stack-based buffer overflow in Microsoft Excel 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via vectors related to an axis properties record, and improper incrementing of an array index, aka "Excel Array Indexing Vulnerability." Desbordamiento de búfer basado en pila en Microsoft Office Excel permite a atacantes remotos ejecutar código de su elección a través de vectores relacionados con un registro de propiedades de eje, y el incremento indebido de un índice de matriz. This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the application's usage of a specific field used for incrementing an index used in an array. Due to the application failing to verify the usage of the index into the array, the application will copy the contents of the specified element into a statically sized buffer on the stack. • https://www.exploit-db.com/exploits/17227 http://dvlabs.tippingpoint.com/blog/2011/02/07/zdi-disclosure-microsoft http://secunia.com/advisories/39122 http://secunia.com/advisories/43232 http://securityreason.com/securityalert/8231 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 http://zerodayinitiative.com/advisories/ZDI-11-042 https://docs.microsoft.com/en-us/security-updates/securityb • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •