Page 61 of 557 results (0.008 seconds)

CVSS: 7.8EPSS: 27%CPEs: 4EXPL: 0

Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Access Remote Code Execution Vulnerability". Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016 y Microsoft Office 2016 Click-to-Run permiten una vulnerabilidad de ejecución remota de código debido a la forma en la que se gestionan los objetos en la memoria. Esto también se conoce como "Microsoft Access Remote Code Execution Vulnerability". • http://www.securityfocus.com/bid/103315 http://www.securitytracker.com/id/1040503 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903 •

CVSS: 9.3EPSS: 18%CPEs: 1EXPL: 0

Microsoft Office 2016 Click-to-Run allows a remote code execution vulnerability due to how objects are handled in memory, aka "Office Remote Code Execution Vulnerability" Microsoft Office 2016 Click-to-Run permite una vulnerabilidad de ejecución remota de código debido a la forma en la que se gestionan los objetos en la memoria. Esto también se conoce como "Office Remote Code Execution Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of XLS files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. • http://www.securityfocus.com/bid/102957 http://www.securitytracker.com/id/1040367 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0841 •

CVSS: 6.5EPSS: 0%CPEs: 5EXPL: 0

Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016, and Microsoft Office 2016 Click-to-Run allow an elevation of privilege vulnerability due to how the format of incoming message is validated, aka "Microsoft Outlook Elevation of Privilege Vulnerability". Microsoft Outlook 2007, Microsoft Outlook 2010, Microsoft Outlook 2013, Microsoft Outlook 2016 y Microsoft Office 2016 Click-to-Run permiten una vulnerabilidad de elevación de privilegios debido a la forma en la que se valida el formato de los mensajes entrantes. Esto también se conoce como "Microsoft Outlook Elevation of Privilege Vulnerability". • http://www.securityfocus.com/bid/102866 http://www.securitytracker.com/id/1040382 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0850 •

CVSS: 4.3EPSS: 0%CPEs: 4EXPL: 0

Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow an information disclosure vulnerability, due to how Office initializes the affected variable, aka "Microsoft Office Information Disclosure Vulnerability". Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 y RT SP1, Microsoft Office 2016 y Microsoft Office 2016 Click-to-Run (C2R) permiten una vulnerabilidad de divulgación de información debido a la forma en la que Office inicializa la variable afectada. Esto también se conoce como "Microsoft Office Information Disclosure Vulnerability". • http://www.securityfocus.com/bid/102868 http://www.securitytracker.com/id/1040381 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0853 • CWE-665: Improper Initialization •

CVSS: 9.3EPSS: 5%CPEs: 8EXPL: 0

Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 and RT SP1, Microsoft Office 2016, and Microsoft Office 2016 Click-to-Run (C2R) allow a remote code execution vulnerability, due to how Office handles objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE is unique from CVE-2018-0852. Microsoft Office 2007 SP2, Microsoft Office Word Viewer, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1 y RT SP1, Microsoft Office 2016 y Microsoft Office 2016 Click-to-Run (C2R) permiten una vulnerabilidad de ejecución remota de código debido a la forma en la que Office gestiona los objetos en la memoria. Esto también se conoce como "Microsoft Office Memory Corruption Vulnerability". El ID de este CVE es diferente de CVE-2018-0852. • http://www.securityfocus.com/bid/102870 http://www.securitytracker.com/id/1040381 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0851 • CWE-787: Out-of-bounds Write •