Page 45 of 343 results (0.011 seconds)

CVSS: 9.3EPSS: 16%CPEs: 3EXPL: 0

Untrusted search path vulnerability in Microsoft Office XP SP3, Office 2003 SP3, and Office 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .docx file, aka "Office Component Insecure Library Loading Vulnerability." Vulnerabilidad de búsqueda de ruta no confiable en Microsoft Office XP SP3, Office 2003 SP3 y Office 2007 SP2 permite a usuarios locales conseguir privilegios a través de un troyano DLL en el directorio de trabajo actual, como lo demuestra un directorio que contiene un archivo. docx, también conocida como "Vulnerabilidad de carga de librería insegura de Office. " • http://osvdb.org/71767 http://secunia.com/advisories/44015 http://www.fortiguard.com/advisory/FGA-2011-13.html http://www.securityfocus.com/bid/47246 http://www.securitytracker.com/id?1025343 http://www.us-cert.gov/cas/techalerts/TA11-102A.html http://www.vupen.com/english/advisories/2011/0942 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2011/ms11-023 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12655 •

CVSS: 9.3EPSS: 90%CPEs: 3EXPL: 0

Integer overflow in the PICT image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted PICT image in an Office document, aka "PICT Image Converter Integer Overflow Vulnerability." Desbordamiento de enteros en el convertidor de imágenes PICT en los filtros de gráficos en Microsoft Office XP SP3, Office 2003 SP3 y Office Converter Pack permite a atacantes remotos ejecutar código arbitrario a través de una imagen PICT manipulada en un documento de Office, también conocido como "vulnerabilidad de desbordamiento de enteros en PICT Image Converter" • http://www.securitytracker.com/id?1024887 http://www.us-cert.gov/cas/techalerts/TA10-348A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11967 • CWE-189: Numeric Errors •

CVSS: 9.3EPSS: 90%CPEs: 3EXPL: 0

Buffer overflow in the CGM image converter in the graphics filters in Microsoft Office XP SP3, Office 2003 SP3, and Office Converter Pack allows remote attackers to execute arbitrary code via a crafted CGM image in an Office document, aka "CGM Image Converter Buffer Overrun Vulnerability." Desbordamiento del búfer en el convertidor de imágenes CGM de los filtros gráficos de Microsoft Office XP SP3, Office 2003 SP3, y Office Converter Pack permite a atacantes remotos ejecutar código de su elección mediante una imagen CGM manipulada en un documento Office. También se conoce como "Vulnerabilidad de Búfer Overrun en el Convertidor de Imágenes de CGM". • http://www.securitytracker.com/id?1024887 http://www.us-cert.gov/cas/techalerts/TA10-348A.html https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-105 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12249 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 93%CPEs: 5EXPL: 0

Microsoft Office XP SP3, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Office document that triggers memory corruption, aka "MSO Large SPID Read AV Vulnerability." Microsoft Office XP SP3, Office 2004 y 2008 para Mac, Office para Mac 2011, y Open XML File Format Converter para Mac permite a atacantes remotos ejecutar código de su elección a través de un documento Office manipulado que provoca una corrupción de memoria, también conocida como "Vulnerabilidad MSO Large SPID Read AV • http://secunia.com/advisories/38521 http://secunia.com/advisories/42144 http://www.securityfocus.com/bid/44660 http://www.securitytracker.com/id?1024705 http://www.us-cert.gov/cas/techalerts/TA10-313A.html http://www.vupen.com/english/advisories/2010/2923 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11947 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 95%CPEs: 8EXPL: 0

Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 and 2008 for Mac, Office for Mac 2011, and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via an Office document containing an Office Art Drawing record with crafted msofbtSp records and unspecified flags, which triggers memory corruption, aka "Office Art Drawing Records Vulnerability." Microsoft Office XP SP3, Office 2003 SP3, Office 2007 SP2, Office 2010, Office 2004 y 2008 para Mac, Office para Mac 2011 y Open XML File Format Converter para Mac, permiten a los atacantes remotos ejecutar código arbitrario por medio de un documento de Office que contiene un registro Office Art Drawing con registros msofbtSp especialmente diseñados y flags no especificados, lo que desencadena una corrupción de memoria, también se conoce como "Office Art Drawing Records Vulnerability". • http://secunia.com/advisories/38521 http://secunia.com/advisories/42144 http://secunia.com/secunia_research/2010-4 http://www.securityfocus.com/archive/1/514699/100/0/threaded http://www.securityfocus.com/bid/44656 http://www.securitytracker.com/id?1024705 http://www.us-cert.gov/cas/techalerts/TA10-313A.html http://www.vupen.com/english/advisories/2010/2923 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-087 https://oval.cisecurity.org/repository • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •