Page 7 of 36 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

Microsoft Outlook for Mac 2011 allows remote attackers to spoof web content via a crafted email with specific HTML tags, aka "Microsoft Browser Spoofing Vulnerability." Microsoft Outlook para Mac 2011 permite a atacantes remotos suplantar contenido web a través de un correo electrónico manipulado con etiquetas HTML específicas, vulnerabilidad también conocido como "Microsoft Browser Spoofing Vulnerability". • http://www.securityfocus.com/bid/97463 http://www.securitytracker.com/id/1038242 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0207 •

CVSS: 5.5EPSS: 0%CPEs: 4EXPL: 1

Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP2, Microsoft Outlook 2013 SP1, and Microsoft Outlook 2016 allow remote attackers to bypass the Office Protected View via a specially crafted document, aka "Microsoft Office Security Feature Bypass Vulnerability." Microsoft Outlook 2007 SP3, Microsoft Outlook 2010 SP1 y Microsoft Outlook 2016 permiten a los atacantes remotos eludir Office Protected View a través de un documento especialmente manipulado, vulnerabilidad también conocida como "Microsoft Office Security Feature Bypass Vulnerability". • https://github.com/ryhanson/CVE-2017-0204 http://www.securityfocus.com/bid/97458 http://www.securitytracker.com/id/1038227 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0204 •

CVSS: 6.5EPSS: 1%CPEs: 4EXPL: 0

Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, Outlook 2016, and Outlook 2016 for Mac do not properly implement RFC 2046, which allows remote attackers to bypass virus or spam detection via crafted MIME data in an e-mail attachment, aka "Microsoft Office Spoofing Vulnerability." Microsoft Outlook 2007 SP3, Outlook 2010 SP2, Outlook 2013 SP1, Outlook 2013 RT SP1, Outlook 2016 y Outlook 2016 para Mac no implementa adecuadamente el RFC 2046, lo que permite a atacantes remotos eludir la detección de virus o spam a través de datos MIME manipulados en un archivo adjunto de un e-mail, vulnerabilidad también conocida como "Microsoft Office Spoofing Vulnerability". • http://www.securityfocus.com/bid/92831 http://www.securitytracker.com/id/1036785 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-107 • CWE-284: Improper Access Control •

CVSS: 9.3EPSS: 70%CPEs: 4EXPL: 0

Microsoft Outlook 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." Microsoft Outlook 2010 SP2, 2013 SP1, 2013 RT SP1 y 2016 permite a atacantes remotos ejecutar código arbitrario a través de un documento de Office manipulado, también conocida como "Microsoft Office Memory Corruption Vulnerability". • http://www.securityfocus.com/bid/91574 http://www.securitytracker.com/id/1036274 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-088 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 9.3EPSS: 89%CPEs: 12EXPL: 0

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 y 2013 SP1, y Office Web Apps Server 2010 SP2 y 2013 SP1 permiten a atacantes remotos ejecutar código arbitrario a través de un documento RTF manipulado, también conocido como 'vulnerabilidad de corrupción de memoria de Microsoft Office.' Microsoft Office contains a memory corruption vulnerability due to failure to properly handle rich text format files in memory. Successful exploitation allows for remote code execution in the context of the current user. • http://www.securityfocus.com/bid/73995 http://www.securitytracker.com/id/1032104 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033 • CWE-787: Out-of-bounds Write •