Page 3 of 29 results (0.017 seconds)

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 1

Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability." Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP1 y Microsoft Outlook 2016 permiten a los atacantes remotos eludir Office Protected View a través de un documento especialmente manipulado, vulnerabilidad también conocida como "Microsoft Office Security Feature Bypass Vulnerability". • https://github.com/ryhanson/CVE-2017-0204 http://www.securityfocus.com/bid/97458 http://www.securitytracker.com/id/1038227 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0204 •

CVSS: 9.3EPSS: 10%CPEs: 4EXPL: 1

Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." Microsoft Excel 2007 SP3, Microsoft Outlook 2010 SP1, Microsoft Outlook 2013 SP1 y Microsoft Outlook 2016 permiten a atacantes remotos ejecutar código arbitrario o provocar una denegación de servicio (corrupción de memoria) a través de un documento manipulado, vulnerabilidad también conocida como "Microsoft Office Memory Corruption Vulnerability". • https://github.com/ryhanson/CVE-2017-0106 http://www.securityfocus.com/bid/97413 http://www.securitytracker.com/id/1038227 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0106 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.5EPSS: 1%CPEs: 4EXPL: 0

Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, Outlook 2016, and Outlook 2016 for Mac do not properly implement RFC 2046, which allows remote attackers to bypass virus or spam detection via crafted MIME data in an e-mail attachment, aka "Microsoft Office Spoofing Vulnerability." Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, Outlook 2016 y Outlook 2016 para Mac no implementa adecuadamente el RFC 2046, lo que permite a atacantes remotos eludir la detección de virus o spam a través de datos MIME manipulados en un archivo adjunto de un e-mail, vulnerabilidad también conocida como "Microsoft Office Spoofing Vulnerability". • http://www.securityfocus.com/bid/92831 http://www.securitytracker.com/id/1036785 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-107 • CWE-284: Improper Access Control •

CVSS: 9.3EPSS: 89%CPEs: 12EXPL: 0

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 y 2013 SP1, y Office Web Apps Server 2010 SP2 y 2013 SP1 permiten a atacantes remotos ejecutar código arbitrario a través de un documento RTF manipulado, también conocido como 'vulnerabilidad de corrupción de memoria de Microsoft Office.' Microsoft Office contains a memory corruption vulnerability due to failure to properly handle rich text format files in memory. Successful exploitation allows for remote code execution in the context of the current user. • http://www.securityfocus.com/bid/73995 http://www.securitytracker.com/id/1032104 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033 • CWE-787: Out-of-bounds Write •

CVSS: 5.0EPSS: 82%CPEs: 8EXPL: 0

Microsoft Outlook 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT does not properly expand metadata contained in S/MIME certificates, which allows remote attackers to obtain sensitive network configuration and state information via a crafted certificate in an e-mail message, aka "S/MIME AIA Vulnerability." Microsoft Outlook 2007 SP3, 2010 SP1 y SP2, 2013, y 2013 RT no expande adecuadamente los metadatos contenidos en certificados S/MIME, lo que permite a atacantes remotos obtener configuración de red sensible e información de estado a través de certificados manipulados en un mensaje de e-mail, también conocido como "Vulnerabilidad de S/MIME AIA". • http://www.us-cert.gov/ncas/alerts/TA13-317A https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-094 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19239 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •