Page 3 of 316 results (0.008 seconds)

CVSS: 7.8EPSS: 1%CPEs: 3EXPL: 0

16 Jul 2021 — Microsoft Word Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Word • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-34452 •

CVSS: 7.8EPSS: 3%CPEs: 7EXPL: 0

11 May 2021 — Microsoft Office Graphics Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Office Graphics • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31180 •

CVSS: 5.5EPSS: 8%CPEs: 13EXPL: 0

11 May 2021 — Microsoft Office Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Microsoft Office • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31178 • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 7.8EPSS: 3%CPEs: 13EXPL: 0

11 May 2021 — Microsoft Office Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Office. Este ID de CVE es diferente de CVE-2021-31175, CVE-2021-31176, CVE-2021-31179 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XLS files. The is... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31177 • CWE-416: Use After Free •

CVSS: 7.8EPSS: 2%CPEs: 14EXPL: 0

13 Apr 2021 — Microsoft Word Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Word This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DOC files. The issue results from the lack of validating the existence of an object prior to performi... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28453 •

CVSS: 9.3EPSS: 2%CPEs: 14EXPL: 0

12 Jan 2021 — Microsoft Word Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Microsoft Word. Este ID de CVE es diferente de CVE-2021-1715 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1716 •

CVSS: 9.3EPSS: 1%CPEs: 15EXPL: 0

12 Jan 2021 — Microsoft Word Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Microsoft Word. Este ID de CVE es diferente de CVE-2021-1716 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DOC files. The issue results from the lack of proper va... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1715 • CWE-787: Out-of-bounds Write •

CVSS: 5.5EPSS: 1%CPEs: 7EXPL: 0

11 Nov 2020 — Microsoft Word Security Feature Bypass Vulnerability Vulnerabilidad de Omisión de la Característica de Seguridad de Microsoft Word Security • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17020 •

CVSS: 8.8EPSS: 2%CPEs: 28EXPL: 0

16 Oct 2020 —

A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.

To exploit the vulnerability, a user must open a specially crafted file with an affected version of Mi... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16933 •

CVSS: 8.8EPSS: 2%CPEs: 16EXPL: 0

11 Sep 2020 —

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.

To exploit the vulnerability, a user must open a specially crafted file with an affected version ... • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1218 •