Page 71 of 551 results (0.013 seconds)

CVSS: 9.3EPSS: 80%CPEs: 14EXPL: 0

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold and SP1, Word 2013 RT Gold and SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, and Web Apps Server 2013 Gold and SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold y SP1, Word 2013 RT Gold y SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold y SP1, Web Applications 2010 SP2, y Web Apps Server 2013 Gold y SP1 permiten a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un documento RTF manipulado, también conocido como 'vulnerabilidad de la corrupción de memoria de Microsoft Office.' • http://www.securitytracker.com/id/1031896 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-022 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 95%CPEs: 9EXPL: 1

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Automation Services in SharePoint Server 2010, Web Applications 2010 SP2, Word Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Office Remote Code Execution Vulnerability." Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Automation Services en SharePoint Server 2010, Web Applications 2010 SP2, Word Viewer, y Office Compatibility Pack SP3 permiten a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un documento Office manipulado, también conocido como 'vulnerabilidad de la ejecución de código remoto de Office.' Microsoft Office 2007 suffers from a stack-based buffer overflow vulnerability when handling a malformed document. • https://www.exploit-db.com/exploits/37967 http://secunia.com/advisories/62808 http://www.securityfocus.com/bid/72463 http://www.securitytracker.com/id/1031720 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-012 • CWE-399: Resource Management Errors •

CVSS: 9.3EPSS: 34%CPEs: 9EXPL: 0

Microsoft Excel 2007 SP3; the proofing tools in Office 2010 SP2; Excel 2010 SP2; Excel 2013 Gold, SP1, and RT; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Excel Remote Code Execution Vulnerability." Microsoft Excel 2007 SP3; las herramientas de pruebas en Office 2010 SP2; Excel 2010 SP2; Excel 2013 Gold, SP1, y RT; Excel Viewer; y Office Compatibility Pack SP3 permiten a atacantes remotos ejecutar código arbitrario o causar una denegación de servicio (corrupción de memoria) a través de un documento Office manipulado, también conocido como 'vulnerabilidad de la ejecución de código remoto de Excel.' • http://secunia.com/advisories/62808 http://www.securityfocus.com/bid/72460 http://www.securitytracker.com/id/1031720 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-012 https://exchange.xforce.ibmcloud.com/vulnerabilities/100439 • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 6%CPEs: 5EXPL: 0

Use-after-free vulnerability in Microsoft Office 2007 SP3, 2010 SP2, and 2013 Gold and SP1 allows remote attackers to bypass the ASLR protection mechanism via a crafted document, aka "Microsoft Office Component Use After Free Vulnerability." Vulnerabilidad de uso después de liberación en Microsoft Office 2007 SP3, 2010 SP2, y 2013 Gold y SP1 permite a atacantes remotos evadir el mecanismo de protección ASLR a través de un documento manipulado, también conocido como 'vulnerabilidad de uso después de liberación de componentes de Microsoft Office.' • http://www.securityfocus.com/bid/72467 http://www.securitytracker.com/id/1031721 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-013 •

CVSS: 9.3EPSS: 22%CPEs: 3EXPL: 0

Array index error in Microsoft Word 2007 SP3, Word 2010 SP2, and Office Compatibility Pack SP3 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Invalid Index Remote Code Execution Vulnerability." Error en el indice del array en Microsoft Word 2007 SP3, Word 2010 SP2, y Office Compatibility Pack SP3 permite a atacantes remotos ejecutar código arbitrario a través de un documento Office manipulado, también conocido como 'vulnerabilidad de la ejecución de código remoto en indice inválido.' • https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-081 • CWE-94: Improper Control of Generation of Code ('Code Injection') •