Page 26 of 306 results (0.010 seconds)

CVSS: 9.3EPSS: 96%CPEs: 5EXPL: 2

Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted HLink record in an Excel file, aka "Excel Buffer Overwrite Vulnerability." Excel 2002 SP3 y 2003 SP3, Office 2004 y 2008 para Mac, y Open XML File Format Converter para Mac, de Microsoft, permiten a los atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) por medio de un registro HLink en un archivo Excel, también se conoce como "Excel Buffer Overwrite Vulnerability." • https://www.exploit-db.com/exploits/35573 https://github.com/Sunqiz/CVE-2011-0104-reproduction http://osvdb.org/71761 http://secunia.com/advisories/39122 http://www.checkpoint.com/defense/advisories/public/2011/cpai-31-Mard.html http://www.securityfocus.com/bid/47245 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 https://docs.microsoft.com/en-us/security-updates/securitybulletin • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 96%CPEs: 10EXPL: 0

Integer signedness error in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via an XLS file with a large record size, aka "Excel Heap Overflow Vulnerability." Un error en la propiedad signedness de un entero en Excel 2002 SP3, 2003 SP3, 2007 SP2, y 2010; Office 2004 y 2008 para Mac; Open XML File Format Converter para Mac; Excel Viewer SP2; y Office Compatibility Pack para Word, Excel y PowerPoint 2007 File Formats SP2, de Microsoft, permite a los atacantes remotos ejecutar código arbitrario por medio de un archivo XLS con un gran tamaño de registro, también se conoce como "Excel Heap Overflow Vulnerability." • http://osvdb.org/71759 http://secunia.com/advisories/39122 http://secunia.com/secunia_research/2011-32 http://www.securityfocus.com/bid/47235 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12034 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 92%CPEs: 5EXPL: 0

Microsoft Excel 2002 SP3 and 2003 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted record information in an Excel file, aka "Excel Memory Corruption Vulnerability." Microsoft Excel 2002 SP3 y 2003 SP3, Office 2004 y 2008 para Mac, y Open XML File Format Converter para Mac permite a atacantes remotos ejecutar código de su elección o provocar una denegación de servicio (corrupción de memoria) a través de información manipulada del registro en un archivo Excel, también conocido como "Excel Memory Corruption Vulnerability." • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=901 http://osvdb.org/71760 http://secunia.com/advisories/39122 http://www.securityfocus.com/bid/47244 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12616 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 21%CPEs: 3EXPL: 0

Untrusted search path vulnerability in Microsoft Office XP SP3, Office 2003 SP3, and Office 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Office Component Insecure Library Loading Vulnerability." Vulnerabilidad de búsqueda de ruta no confiable en Microsoft Office XP SP3, Office 2003 SP3 y Office 2007 SP2 permite a usuarios locales conseguir privilegios a través de un troyano DLL en el directorio de trabajo actual, como lo demuestra un directorio que contiene un archivo. docx, también conocida como "Vulnerabilidad de carga de librería insegura de Office. " • http://osvdb.org/71767 http://secunia.com/advisories/44015 http://www.fortiguard.com/advisory/FGA-2011-13.html http://www.securityfocus.com/bid/47246 http://www.securitytracker.com/id?1025343 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0942 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12655 •

CVSS: 9.3EPSS: 96%CPEs: 10EXPL: 0

Integer underflow in Microsoft Excel 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 allows remote attackers to execute arbitrary code via a crafted 400h substream in an Excel file, which triggers a stack-based buffer overflow, aka "Excel Integer Overrun Vulnerability." Un desbordamiento de enteros en Excel 2002 SP3, 2003 SP3, 2007 SP2, y 2010; Office 2004 y 2008 para Mac; Open XML File Format Converter para Mac; Excel Viewer SP2; y Office Compatibility Pack para Word, Excel, y PowerPoint 2007 File Formats SP2, de Microsoft , permite a los atacantes remotos ejecutar código arbitrario por medio de una subcorriente 400h diseñada en un archivo de Excel, que desencadena un desbordamiento de búfer en la región stack de la memoria, también se conoce como "Excel Integer Overrun Vulnerability." • http://osvdb.org/71758 http://secunia.com/advisories/39122 http://secunia.com/secunia_research/2011-31 http://www.securityfocus.com/bid/47201 http://www.securitytracker.com/id?1025337 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0940 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-021 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12612 • CWE-189: Numeric Errors •