All the vulnerabilites related to microsoft - access
cve-2013-3156
Vulnerability from cvelistv5
Published
2013-09-11 10:00
Modified
2024-08-06 16:00
Severity ?
EPSS score ?
Summary
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access File Format Memory Corruption Vulnerability."
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18442 | vdb-entry, signature, x_refsource_OVAL | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/ncas/alerts/TA13-253A | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:00:10.050Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:18442", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18442" }, { "name": "MS13-074", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access File Format Memory Corruption Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "oval:org.mitre.oval:def:18442", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18442" }, { "name": "MS13-074", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2013-3156", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access File Format Memory Corruption Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:18442", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18442" }, { "name": "MS13-074", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2013-3156", "datePublished": "2013-09-11T10:00:00", "dateReserved": "2013-04-17T00:00:00", "dateUpdated": "2024-08-06T16:00:10.050Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3157
Vulnerability from cvelistv5
Published
2013-09-11 10:00
Modified
2024-08-06 16:00
Severity ?
EPSS score ?
Summary
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3155.
References
▼ | URL | Tags |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/ncas/alerts/TA13-253A | third-party-advisory, x_refsource_CERT | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18664 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:00:10.120Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MS13-074", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "name": "oval:org.mitre.oval:def:18664", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18664" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3155." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "MS13-074", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "name": "oval:org.mitre.oval:def:18664", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18664" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2013-3157", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3155." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MS13-074", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "name": "oval:org.mitre.oval:def:18664", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18664" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2013-3157", "datePublished": "2013-09-11T10:00:00", "dateReserved": "2013-04-17T00:00:00", "dateUpdated": "2024-08-06T16:00:10.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-6357
Vulnerability from cvelistv5
Published
2007-12-15 01:00
Modified
2024-08-07 16:02
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944.
References
▼ | URL | Tags |
---|---|---|
http://osvdb.org/44150 | vdb-entry, x_refsource_OSVDB | |
http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012 | x_refsource_MISC | |
http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment | x_refsource_MISC | |
http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9052538&source=rss_topic17 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T16:02:36.179Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "44150", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/44150" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.computerworld.com/action/article.do?command=viewArticleBasic\u0026articleId=9052538\u0026source=rss_topic17" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-12-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-11-15T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "44150", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/44150" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.computerworld.com/action/article.do?command=viewArticleBasic\u0026articleId=9052538\u0026source=rss_topic17" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6357", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "44150", "refsource": "OSVDB", "url": "http://osvdb.org/44150" }, { "name": "http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012", "refsource": "MISC", "url": "http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012" }, { "name": "http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment", "refsource": "MISC", "url": "http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment" }, { "name": "http://www.computerworld.com/action/article.do?command=viewArticleBasic\u0026articleId=9052538\u0026source=rss_topic17", "refsource": "MISC", "url": "http://www.computerworld.com/action/article.do?command=viewArticleBasic\u0026articleId=9052538\u0026source=rss_topic17" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6357", "datePublished": "2007-12-15T01:00:00", "dateReserved": "2007-12-14T00:00:00", "dateUpdated": "2024-08-07T16:02:36.179Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-0814
Vulnerability from cvelistv5
Published
2010-07-14 18:31
Modified
2024-08-07 00:59
Severity ?
EPSS score ?
Summary
The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka "Access ActiveX Control Vulnerability."
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11907 | vdb-entry, signature, x_refsource_OVAL | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/cas/techalerts/TA10-194A.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:59:39.416Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:11907", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11907" }, { "name": "MS10-044", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "name": "TA10-194A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka \"Access ActiveX Control Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "oval:org.mitre.oval:def:11907", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11907" }, { "name": "MS10-044", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "name": "TA10-194A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2010-0814", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka \"Access ActiveX Control Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:11907", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11907" }, { "name": "MS10-044", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "name": "TA10-194A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2010-0814", "datePublished": "2010-07-14T18:31:00", "dateReserved": "2010-03-02T00:00:00", "dateUpdated": "2024-08-07T00:59:39.416Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0419
Vulnerability from cvelistv5
Published
2000-07-12 04:00
Modified
2024-08-08 05:14
Severity ?
EPSS score ?
Summary
The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/bid/1197 | vdb-entry, x_refsource_BID | |
http://www.microsoft.com/technet/support/kb.asp?ID=262767 | vendor-advisory, x_refsource_MSKB | |
http://www.cert.org/advisories/CA-2000-07.html | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:14:21.483Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MS00-034", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034" }, { "name": "1197", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1197" }, { "name": "Q262767", "tags": [ "vendor-advisory", "x_refsource_MSKB", "x_transferred" ], "url": "http://www.microsoft.com/technet/support/kb.asp?ID=262767" }, { "name": "CA-2000-07", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2000-07.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "The Office 2000 UA ActiveX Control is marked as \"safe for scripting,\" which allows remote attackers to conduct unauthorized activities via the \"Show Me\" function in Office Help, aka the \"Office 2000 UA Control\" vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MS00-034", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034" }, { "name": "1197", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1197" }, { "name": "Q262767", "tags": [ "vendor-advisory", "x_refsource_MSKB" ], "url": "http://www.microsoft.com/technet/support/kb.asp?ID=262767" }, { "name": "CA-2000-07", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2000-07.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0419", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Office 2000 UA ActiveX Control is marked as \"safe for scripting,\" which allows remote attackers to conduct unauthorized activities via the \"Show Me\" function in Office Help, aka the \"Office 2000 UA Control\" vulnerability." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MS00-034", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034" }, { "name": "1197", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1197" }, { "name": "Q262767", "refsource": "MSKB", "url": "http://www.microsoft.com/technet/support/kb.asp?ID=262767" }, { "name": "CA-2000-07", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2000-07.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0419", "datePublished": "2000-07-12T04:00:00", "dateReserved": "2000-06-14T00:00:00", "dateUpdated": "2024-08-08T05:14:21.483Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2003-0665
Vulnerability from cvelistv5
Published
2003-09-04 04:00
Modified
2024-08-08 01:58
Severity ?
EPSS score ?
Summary
Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/8536 | vdb-entry, x_refsource_BID | |
http://www.kb.cert.org/vuls/id/992132 | third-party-advisory, x_refsource_CERT-VN | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038 | vendor-advisory, x_refsource_MS | |
http://secunia.com/advisories/9668 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:58:11.311Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "8536", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/8536" }, { "name": "VU#992132", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/992132" }, { "name": "MS03-038", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038" }, { "name": "9668", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/9668" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "8536", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/8536" }, { "name": "VU#992132", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/992132" }, { "name": "MS03-038", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038" }, { "name": "9668", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/9668" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0665", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "8536", "refsource": "BID", "url": "http://www.securityfocus.com/bid/8536" }, { "name": "VU#992132", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/992132" }, { "name": "MS03-038", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038" }, { "name": "9668", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/9668" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0665", "datePublished": "2003-09-04T04:00:00", "dateReserved": "2003-08-07T00:00:00", "dateUpdated": "2024-08-08T01:58:11.311Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2007-0671
Vulnerability from cvelistv5
Published
2007-02-03 01:00
Modified
2024-08-07 12:26
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T12:26:54.332Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ADV-2007-0463", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/0463" }, { "name": "oval:org.mitre.oval:def:301", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A301" }, { "name": "31901", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/31901" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.microsoft.com/technet/security/advisory/932553.mspx" }, { "name": "VU#613740", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/613740" }, { "name": "1017584", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017584" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.avertlabs.com/research/blog/?p=191" }, { "name": "24008", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/24008" }, { "name": "TA07-044A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "name": "MS07-015", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "name": "office-unspecified-code-execution(32178)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32178" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vil.nai.com/vil/content/v_141393.htm" }, { "name": "22383", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/22383" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "ADV-2007-0463", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/0463" }, { "name": "oval:org.mitre.oval:def:301", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A301" }, { "name": "31901", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/31901" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.microsoft.com/technet/security/advisory/932553.mspx" }, { "name": "VU#613740", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/613740" }, { "name": "1017584", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017584" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.avertlabs.com/research/blog/?p=191" }, { "name": "24008", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/24008" }, { "name": "TA07-044A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "name": "MS07-015", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "name": "office-unspecified-code-execution(32178)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32178" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vil.nai.com/vil/content/v_141393.htm" }, { "name": "22383", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/22383" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2007-0671", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "ADV-2007-0463", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/0463" }, { "name": "oval:org.mitre.oval:def:301", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A301" }, { "name": "31901", "refsource": "OSVDB", "url": "http://osvdb.org/31901" }, { "name": "http://www.microsoft.com/technet/security/advisory/932553.mspx", "refsource": "CONFIRM", "url": "http://www.microsoft.com/technet/security/advisory/932553.mspx" }, { "name": "VU#613740", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/613740" }, { "name": "1017584", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017584" }, { "name": "http://www.avertlabs.com/research/blog/?p=191", "refsource": "MISC", "url": "http://www.avertlabs.com/research/blog/?p=191" }, { "name": "24008", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/24008" }, { "name": "TA07-044A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "name": "MS07-015", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "name": "office-unspecified-code-execution(32178)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32178" }, { "name": "http://vil.nai.com/vil/content/v_141393.htm", "refsource": "MISC", "url": "http://vil.nai.com/vil/content/v_141393.htm" }, { "name": "22383", "refsource": "BID", "url": "http://www.securityfocus.com/bid/22383" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2007-0671", "datePublished": "2007-02-03T01:00:00", "dateReserved": "2007-02-02T00:00:00", "dateUpdated": "2024-08-07T12:26:54.332Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2006-3877
Vulnerability from cvelistv5
Published
2006-10-10 22:00
Modified
2024-08-07 18:48
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified "crafted file," a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T18:48:39.412Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20325", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/20325" }, { "name": "SSRT061264", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "name": "VU#205948", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/205948" }, { "name": "oval:org.mitre.oval:def:568", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A568" }, { "name": "TA07-044A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "name": "HPSBST02161", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "name": "MS07-015", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "name": "ADV-2006-3977", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/3977" }, { "name": "oval:org.mitre.oval:def:220", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A220" }, { "name": "MS06-058", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058" }, { "name": "29448", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/29448" }, { "name": "1017030", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1017030" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-10-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified \"crafted file,\" a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-17T20:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "20325", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/20325" }, { "name": "SSRT061264", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "name": "VU#205948", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/205948" }, { "name": "oval:org.mitre.oval:def:568", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A568" }, { "name": "TA07-044A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "name": "HPSBST02161", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "name": "MS07-015", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "name": "ADV-2006-3977", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/3977" }, { "name": "oval:org.mitre.oval:def:220", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A220" }, { "name": "MS06-058", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058" }, { "name": "29448", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/29448" }, { "name": "1017030", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1017030" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2006-3877", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified \"crafted file,\" a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20325", "refsource": "BID", "url": "http://www.securityfocus.com/bid/20325" }, { "name": "SSRT061264", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "name": "VU#205948", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/205948" }, { "name": "oval:org.mitre.oval:def:568", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A568" }, { "name": "TA07-044A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "name": "HPSBST02161", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "name": "MS07-015", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "name": "ADV-2006-3977", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/3977" }, { "name": "oval:org.mitre.oval:def:220", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A220" }, { "name": "MS06-058", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058" }, { "name": "29448", "refsource": "OSVDB", "url": "http://www.osvdb.org/29448" }, { "name": "1017030", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1017030" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2006-3877", "datePublished": "2006-10-10T22:00:00", "dateReserved": "2006-07-26T00:00:00", "dateUpdated": "2024-08-07T18:48:39.412Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2010-1881
Vulnerability from cvelistv5
Published
2010-07-14 18:31
Modified
2024-08-07 01:35
Severity ?
EPSS score ?
Summary
The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka "ACCWIZ.dll Uninitialized Variable Vulnerability."
References
▼ | URL | Tags |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/cas/techalerts/TA10-194A.html | third-party-advisory, x_refsource_CERT | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11756 | vdb-entry, signature, x_refsource_OVAL |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:35:54.161Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MS10-044", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "name": "TA10-194A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "name": "oval:org.mitre.oval:def:11756", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11756" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-13T00:00:00", "descriptions": [ { "lang": "en", "value": "The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka \"ACCWIZ.dll Uninitialized Variable Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "MS10-044", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "name": "TA10-194A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "name": "oval:org.mitre.oval:def:11756", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11756" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2010-1881", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka \"ACCWIZ.dll Uninitialized Variable Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MS10-044", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "name": "TA10-194A", "refsource": "CERT", "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "name": "oval:org.mitre.oval:def:11756", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11756" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2010-1881", "datePublished": "2010-07-14T18:31:00", "dateReserved": "2010-05-11T00:00:00", "dateUpdated": "2024-08-07T01:35:54.161Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-0903
Vulnerability from cvelistv5
Published
2018-03-14 17:00
Modified
2024-09-17 01:50
Severity ?
EPSS score ?
Summary
Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Access Remote Code Execution Vulnerability".
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1040503 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/103315 | vdb-entry, x_refsource_BID | |
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Microsoft Corporation | Microsoft Access |
Version: Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:44:11.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1040503", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040503" }, { "name": "103315", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103315" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Microsoft Access", "vendor": "Microsoft Corporation", "versions": [ { "status": "affected", "version": "Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run" } ] } ], "datePublic": "2018-03-14T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka \"Microsoft Access Remote Code Execution Vulnerability\"." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-15T09:57:02", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "1040503", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040503" }, { "name": "103315", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103315" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "DATE_PUBLIC": "2018-03-14T00:00:00", "ID": "CVE-2018-0903", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Microsoft Access", "version": { "version_data": [ { "version_value": "Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run" } ] } } ] }, "vendor_name": "Microsoft Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka \"Microsoft Access Remote Code Execution Vulnerability\"." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "1040503", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040503" }, { "name": "103315", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103315" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2018-0903", "datePublished": "2018-03-14T17:00:00Z", "dateReserved": "2017-12-01T00:00:00", "dateUpdated": "2024-09-17T01:50:53.121Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0760
Vulnerability from cvelistv5
Published
2020-04-15 15:12
Modified
2024-08-04 06:11
Severity ?
EPSS score ?
Summary
A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991.
References
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Microsoft Project |
Version: 2013 Service Pack 1 (32-bit editions) Version: 2013 Service Pack 1 (64-bit editions) Version: 2016 (32-bit edition) Version: 2016 (64-bit edition) Version: 2010 Service Pack 2 (32-bit editions) Version: 2010 Service Pack 2 (64-bit editions) |
||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:11:05.570Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Microsoft Project", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" }, { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" } ] }, { "product": "Microsoft Office", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2019 for 32-bit editions" }, { "status": "affected", "version": "2019 for 64-bit editions" }, { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2013 RT Service Pack 1" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" } ] }, { "product": "Office 365 ProPlus", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "32-bit Systems" }, { "status": "affected", "version": "64-bit Systems" } ] }, { "product": "Microsoft Excel", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2013 RT Service Pack 1" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" } ] }, { "product": "Microsoft PowerPoint", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2013 RT Service Pack 1" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" } ] }, { "product": "Microsoft Visio", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" } ] }, { "product": "Microsoft Word", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2013 RT Service Pack 1" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" } ] }, { "product": "Microsoft Publisher 2016 (32-bit edition)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "unspecified" } ] }, { "product": "Microsoft Publisher 2016 (64-bit edition)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "unspecified" } ] }, { "product": "Microsoft Access", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" } ] }, { "product": "Microsoft Outlook", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" }, { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" }, { "status": "affected", "version": "2013 RT Service Pack 1" }, { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" } ] }, { "product": "Microsoft Publisher 2013 Service Pack 1 (32-bit editions)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "unspecified" } ] }, { "product": "Microsoft Publisher 2013 Service Pack 1 (64-bit editions)", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "unspecified" } ] }, { "product": "Microsoft Publisher", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2010 Service Pack 2 (64-bit editions)" }, { "status": "affected", "version": "2010 Service Pack 2 (32-bit editions)" } ] } ], "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka \u0027Microsoft Office Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0991." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-04-15T15:12:40", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2020-0760", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Microsoft Project", "version": { "version_data": [ { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" }, { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" } ] } }, { "product_name": "Microsoft Office", "version": { "version_data": [ { "version_value": "2019 for 32-bit editions" }, { "version_value": "2019 for 64-bit editions" }, { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2013 RT Service Pack 1" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" } ] } }, { "product_name": "Office 365 ProPlus", "version": { "version_data": [ { "version_value": "32-bit Systems" }, { "version_value": "64-bit Systems" } ] } }, { "product_name": "Microsoft Excel", "version": { "version_data": [ { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2013 RT Service Pack 1" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" } ] } }, { "product_name": "Microsoft PowerPoint", "version": { "version_data": [ { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2013 RT Service Pack 1" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" } ] } }, { "product_name": "Microsoft Visio", "version": { "version_data": [ { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" } ] } }, { "product_name": "Microsoft Word", "version": { "version_data": [ { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2013 RT Service Pack 1" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" } ] } }, { "product_name": "Microsoft Publisher 2016 (32-bit edition)", "version": { "version_data": [ { "version_value": "" } ] } }, { "product_name": "Microsoft Publisher 2016 (64-bit edition)", "version": { "version_data": [ { "version_value": "" } ] } }, { "product_name": "Microsoft Access", "version": { "version_data": [ { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" } ] } }, { "product_name": "Microsoft Outlook", "version": { "version_data": [ { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" }, { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" }, { "version_value": "2013 RT Service Pack 1" }, { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" } ] } }, { "product_name": "Microsoft Publisher 2013 Service Pack 1 (32-bit editions)", "version": { "version_data": [ { "version_value": "" } ] } }, { "product_name": "Microsoft Publisher 2013 Service Pack 1 (64-bit editions)", "version": { "version_data": [ { "version_value": "" } ] } }, { "product_name": "Microsoft Publisher", "version": { "version_data": [ { "version_value": "2010 Service Pack 2 (64-bit editions)" }, { "version_value": "2010 Service Pack 2 (32-bit editions)" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka \u0027Microsoft Office Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0991." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760", "refsource": "MISC", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-0760", "datePublished": "2020-04-15T15:12:40", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-08-04T06:11:05.570Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-1582
Vulnerability from cvelistv5
Published
2020-08-17 19:13
Modified
2024-08-04 06:39
Severity ?
EPSS score ?
References
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Microsoft | Microsoft Access 2013 Service Pack 1 (32-bit editions) |
Version: 15.0.0 < publication cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:* |
||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:39:10.451Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Microsoft Access 2013 Service Pack 1 (32-bit editions)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "15.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Microsoft Access 2013 Service Pack 1 (64-bit editions)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "15.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Microsoft Office 2019", "vendor": "Microsoft", "versions": [ { "lessThan": "https://aka.ms/OfficeSecurityReleases", "status": "affected", "version": "19.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Microsoft 365 Apps for Enterprise", "vendor": "Microsoft", "versions": [ { "lessThan": "https://aka.ms/OfficeSecurityReleases", "status": "affected", "version": "16.0.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Microsoft Access 2016 (32-bit edition)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "16.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*" ], "platforms": [ "Unknown" ], "product": "Microsoft Access 2016 (64-bit edition)", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "16.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:*:*" ], "platforms": [ "32-bit Systems", "x64-based Systems" ], "product": "Microsoft Access 2010 Service Pack 2", "vendor": "Microsoft", "versions": [ { "lessThan": "publication", "status": "affected", "version": "13.0.0.0", "versionType": "custom" } ] } ], "datePublic": "2020-08-11T07:00:00+00:00", "descriptions": [ { "lang": "en-US", "value": "A remote code execution vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Access. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.\nThe security update addresses the vulnerability by correcting how Microsoft Access handles objects in memory.\n" } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en-US", "type": "Impact" } ] } ], "providerMetadata": { "dateUpdated": "2024-05-29T16:33:21.166Z", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582" } ], "title": "Microsoft Access Remote Code Execution Vulnerability" } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2020-1582", "datePublished": "2020-08-17T19:13:50", "dateReserved": "2019-11-04T00:00:00", "dateUpdated": "2024-08-04T06:39:10.451Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-1200
Vulnerability from cvelistv5
Published
2008-03-06 21:00
Modified
2024-09-16 16:13
Severity ?
EPSS score ?
Summary
Unspecified vulnerability in Microsoft Access allows remote user-assisted attackers to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026.
References
▼ | URL | Tags |
---|---|---|
http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx | x_refsource_MISC | |
http://www.securityfocus.com/bid/28087 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T08:17:33.813Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx" }, { "name": "28087", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28087" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Microsoft Access allows remote user-assisted attackers to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2008-03-06T21:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx" }, { "name": "28087", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28087" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-1200", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Unspecified vulnerability in Microsoft Access allows remote user-assisted attackers to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx", "refsource": "MISC", "url": "http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx" }, { "name": "28087", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28087" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-1200", "datePublished": "2008-03-06T21:00:00Z", "dateReserved": "2008-03-06T00:00:00Z", "dateUpdated": "2024-09-16T16:13:50.116Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-8312
Vulnerability from cvelistv5
Published
2018-07-11 00:00
Modified
2024-08-05 06:54
Severity ?
EPSS score ?
Summary
A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka "Microsoft Access Remote Code Execution Vulnerability." This affects Microsoft Access, Microsoft Office.
References
▼ | URL | Tags |
---|---|---|
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/104645 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1041254 | vdb-entry, x_refsource_SECTRACK |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | Microsoft | Microsoft Access |
Version: 2013 Service Pack 1 (32-bit editions) Version: 2013 Service Pack 1 (64-bit editions) Version: 2016 (32-bit edition) Version: 2016 (64-bit edition) |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:54:35.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312" }, { "name": "104645", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104645" }, { "name": "1041254", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1041254" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Microsoft Access", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2013 Service Pack 1 (32-bit editions)" }, { "status": "affected", "version": "2013 Service Pack 1 (64-bit editions)" }, { "status": "affected", "version": "2016 (32-bit edition)" }, { "status": "affected", "version": "2016 (64-bit edition)" } ] }, { "product": "Microsoft Office", "vendor": "Microsoft", "versions": [ { "status": "affected", "version": "2016 Click-to-Run (C2R) for 32-bit editions" }, { "status": "affected", "version": "2016 Click-to-Run (C2R) for 64-bit editions" } ] } ], "datePublic": "2018-07-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka \"Microsoft Access Remote Code Execution Vulnerability.\" This affects Microsoft Access, Microsoft Office." } ], "problemTypes": [ { "descriptions": [ { "description": "Remote Code Execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-11T09:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312" }, { "name": "104645", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104645" }, { "name": "1041254", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1041254" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2018-8312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Microsoft Access", "version": { "version_data": [ { "version_value": "2013 Service Pack 1 (32-bit editions)" }, { "version_value": "2013 Service Pack 1 (64-bit editions)" }, { "version_value": "2016 (32-bit edition)" }, { "version_value": "2016 (64-bit edition)" } ] } }, { "product_name": "Microsoft Office", "version": { "version_data": [ { "version_value": "2016 Click-to-Run (C2R) for 32-bit editions" }, { "version_value": "2016 Click-to-Run (C2R) for 64-bit editions" } ] } } ] }, "vendor_name": "Microsoft" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka \"Microsoft Access Remote Code Execution Vulnerability.\" This affects Microsoft Access, Microsoft Office." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Remote Code Execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312" }, { "name": "104645", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104645" }, { "name": "1041254", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041254" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2018-8312", "datePublished": "2018-07-11T00:00:00", "dateReserved": "2018-03-14T00:00:00", "dateUpdated": "2024-08-05T06:54:35.302Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2008-3068
Vulnerability from cvelistv5
Published
2008-07-07 23:00
Modified
2024-08-07 09:21
Severity ?
EPSS score ?
Summary
Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T09:21:34.955Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt" }, { "name": "3978", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3978" }, { "name": "20080709 Re: Unauthorized reading confirmation from Outlook", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/494101/100/0/threaded" }, { "name": "28548", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/28548" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt" }, { "name": "1019736", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019736" }, { "name": "1019738", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019738" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt" }, { "name": "1019737", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1019737" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.cynops.de/techzone/http_over_x509.html" }, { "name": "20080703 Unauthorized reading confirmation from Outlook", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/493947/100/0/threaded" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2008-07-03T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-11T19:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt" }, { "name": "3978", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3978" }, { "name": "20080709 Re: Unauthorized reading confirmation from Outlook", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/494101/100/0/threaded" }, { "name": "28548", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/28548" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt" }, { "name": "1019736", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019736" }, { "name": "1019738", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019738" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt" }, { "name": "1019737", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1019737" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.cynops.de/techzone/http_over_x509.html" }, { "name": "20080703 Unauthorized reading confirmation from Outlook", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/493947/100/0/threaded" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-3068", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt", "refsource": "MISC", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt" }, { "name": "3978", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3978" }, { "name": "20080709 Re: Unauthorized reading confirmation from Outlook", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/494101/100/0/threaded" }, { "name": "28548", "refsource": "BID", "url": "http://www.securityfocus.com/bid/28548" }, { "name": "https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt", "refsource": "MISC", "url": "https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt" }, { "name": "https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt", "refsource": "MISC", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt" }, { "name": "https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt", "refsource": "MISC", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt" }, { "name": "1019736", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019736" }, { "name": "1019738", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019738" }, { "name": "https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt", "refsource": "MISC", "url": "https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt" }, { "name": "https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt", "refsource": "MISC", "url": "https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt" }, { "name": "1019737", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1019737" }, { "name": "https://www.cynops.de/techzone/http_over_x509.html", "refsource": "MISC", "url": "https://www.cynops.de/techzone/http_over_x509.html" }, { "name": "20080703 Unauthorized reading confirmation from Outlook", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/493947/100/0/threaded" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-3068", "datePublished": "2008-07-07T23:00:00", "dateReserved": "2008-07-07T00:00:00", "dateUpdated": "2024-08-07T09:21:34.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0364
Vulnerability from cvelistv5
Published
2000-02-04 05:00
Modified
2024-08-01 16:34
Severity ?
EPSS score ?
Summary
Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data.
References
▼ | URL | Tags |
---|---|---|
http://marc.info/?l=bugtraq&m=91816470220259&w=2 | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:34:51.833Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "19990204 Microsoft Access 97 Stores Database Password as Plaintext", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=91816470220259\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-10-17T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "19990204 Microsoft Access 97 Stores Database Password as Plaintext", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=91816470220259\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0364", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "19990204 Microsoft Access 97 Stores Database Password as Plaintext", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=91816470220259\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0364", "datePublished": "2000-02-04T05:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:34:51.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-0788
Vulnerability from cvelistv5
Published
2002-03-09 05:00
Modified
2024-08-08 05:28
Severity ?
EPSS score ?
Summary
The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/5322 | vdb-entry, x_refsource_XF | |
http://www.securityfocus.com/bid/1566 | vdb-entry, x_refsource_BID | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-071 | vendor-advisory, x_refsource_MS | |
http://www.securityfocus.com/templates/archive.pike?list=1&msg=398EB9CA.27E03A9C%40nat.bg | mailing-list, x_refsource_BUGTRAQ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:28:41.566Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "word-mail-merge(5322)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5322" }, { "name": "1566", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1566" }, { "name": "MS00-071", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-071" }, { "name": "20000807 MS Word and MS Access vulnerability - executing arbitrary programs, may be exploited by IE/Outlook", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=398EB9CA.27E03A9C%40nat.bg" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-08-07T00:00:00", "descriptions": [ { "lang": "en", "value": "The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2002-02-26T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "word-mail-merge(5322)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5322" }, { "name": "1566", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1566" }, { "name": "MS00-071", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-071" }, { "name": "20000807 MS Word and MS Access vulnerability - executing arbitrary programs, may be exploited by IE/Outlook", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=398EB9CA.27E03A9C%40nat.bg" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-0788", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "word-mail-merge(5322)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5322" }, { "name": "1566", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1566" }, { "name": "MS00-071", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-071" }, { "name": "20000807 MS Word and MS Access vulnerability - executing arbitrary programs, may be exploited by IE/Outlook", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=398EB9CA.27E03A9C@nat.bg" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-0788", "datePublished": "2002-03-09T05:00:00", "dateReserved": "2000-09-19T00:00:00", "dateUpdated": "2024-08-08T05:28:41.566Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-2503
Vulnerability from cvelistv5
Published
2015-11-11 11:00
Modified
2024-08-06 05:17
Severity ?
EPSS score ?
Summary
Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Microsoft Office Elevation of Privilege Vulnerability."
References
▼ | URL | Tags |
---|---|---|
http://www.securitytracker.com/id/1034117 | vdb-entry, x_refsource_SECTRACK | |
http://www.securitytracker.com/id/1034122 | vdb-entry, x_refsource_SECTRACK | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116 | vendor-advisory, x_refsource_MS | |
http://www.securitytracker.com/id/1034119 | vdb-entry, x_refsource_SECTRACK |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T05:17:27.099Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "1034117", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034117" }, { "name": "1034122", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034122" }, { "name": "MS15-116", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116" }, { "name": "1034119", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034119" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka \"Microsoft Office Elevation of Privilege Vulnerability.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "1034117", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034117" }, { "name": "1034122", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034122" }, { "name": "MS15-116", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116" }, { "name": "1034119", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1034119" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2015-2503", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka \"Microsoft Office Elevation of Privilege Vulnerability.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "1034117", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034117" }, { "name": "1034122", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034122" }, { "name": "MS15-116", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116" }, { "name": "1034119", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034119" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2015-2503", "datePublished": "2015-11-11T11:00:00", "dateReserved": "2015-03-19T00:00:00", "dateUpdated": "2024-08-06T05:17:27.099Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-3155
Vulnerability from cvelistv5
Published
2013-09-11 10:00
Modified
2024-08-06 16:00
Severity ?
EPSS score ?
Summary
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3157.
References
▼ | URL | Tags |
---|---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18624 | vdb-entry, signature, x_refsource_OVAL | |
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074 | vendor-advisory, x_refsource_MS | |
http://www.us-cert.gov/ncas/alerts/TA13-253A | third-party-advisory, x_refsource_CERT |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T16:00:10.166Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:18624", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18624" }, { "name": "MS13-074", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-09-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3157." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-12T19:57:01", "orgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "shortName": "microsoft" }, "references": [ { "name": "oval:org.mitre.oval:def:18624", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18624" }, { "name": "MS13-074", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@microsoft.com", "ID": "CVE-2013-3155", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3157." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:18624", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18624" }, { "name": "MS13-074", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "name": "TA13-253A", "refsource": "CERT", "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" } ] } } } }, "cveMetadata": { "assignerOrgId": "f38d906d-7342-40ea-92c1-6c4a2c6478c8", "assignerShortName": "microsoft", "cveId": "CVE-2013-3155", "datePublished": "2013-09-11T10:00:00", "dateReserved": "2013-04-17T00:00:00", "dateUpdated": "2024-08-06T16:00:10.166Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2000-10-20 04:00
Modified
2024-11-20 23:33
Severity ?
Summary
The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "matchCriteriaId": "90D7BA07-3BCA-41CF-B5D3-341E912650A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*", "matchCriteriaId": "AEBFF713-0884-43BF-9AB8-777664FD64AF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands." } ], "id": "CVE-2000-0788", "lastModified": "2024-11-20T23:33:17.367", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1566" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=398EB9CA.27E03A9C%40nat.bg" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-071" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5322" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1566" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/templates/archive.pike?list=1\u0026msg=398EB9CA.27E03A9C%40nat.bg" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-071" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5322" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-15 12:57
Modified
2024-11-21 01:15
Severity ?
Summary
The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka "ACCWIZ.dll Uninitialized Variable Vulnerability."
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "456719D5-93AD-4020-B17D-6E4B83F0FEDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The FieldList ActiveX control in the Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 does not properly interact with the memory-access approach used by Internet Explorer and Office during instantiation, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an HTML document that references this control along with crafted persistent storage data, aka \"ACCWIZ.dll Uninitialized Variable Vulnerability.\"" }, { "lang": "es", "value": "El control FieldList ActiveX en Microsoft Access Wizard Controls en ACCWIZ.dll en Microsoft Office Access 2003 SP3 no interact\u00faa correctamente con el acceso a memoria empleado por Internet Explorer y Office durante la instanciaci\u00f3n, el cual permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un documento HTML que hace referencia a este control junto con el almacenamiento de datos persistentes manipulado, tambi\u00e9n conocido como vulnerabilidad \"ACCWIZ.DLL variable sin inicializar\"." } ], "id": "CVE-2010-1881", "lastModified": "2024-11-21T01:15:23.430", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-15T12:57:20.470", "references": [ { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11756" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-04-15 15:15
Modified
2024-11-21 04:54
Severity ?
Summary
A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991.
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | access | 2010 | |
microsoft | access | 2013 | |
microsoft | access | 2016 | |
microsoft | excel | 2010 | |
microsoft | excel | 2013 | |
microsoft | excel | 2016 | |
microsoft | office | 2010 | |
microsoft | office | 2013 | |
microsoft | office | 2013 | |
microsoft | office | 2016 | |
microsoft | office | 2019 | |
microsoft | office_365_proplus | - | |
microsoft | outlook | 2010 | |
microsoft | outlook | 2013 | |
microsoft | outlook | 2013 | |
microsoft | outlook | 2016 | |
microsoft | powerpoint | 2010 | |
microsoft | powerpoint | 2013 | |
microsoft | powerpoint | 2013 | |
microsoft | powerpoint | 2016 | |
microsoft | project | 2010 | |
microsoft | project | 2013 | |
microsoft | project | 2016 | |
microsoft | publisher | 2010 | |
microsoft | publisher | 2013 | |
microsoft | publisher | 2016 | |
microsoft | visio | 2010 | |
microsoft | visio | 2013 | |
microsoft | visio | 2016 | |
microsoft | word | 2010 | |
microsoft | word | 2013 | |
microsoft | word | 2013 | |
microsoft | word | 2016 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "7122C5BF-C7C8-4B20-AACF-03F0ED83A7A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "3E995599-F698-4E73-9401-4CA47FADFCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*", "matchCriteriaId": "0E42DC73-F1D0-47CD-BED8-DB2C6E044E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "E36D981E-E56D-46C7-9486-FC691A75C497", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "3A062169-527E-43DA-8AE0-FD4FBA1B2A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "081DE1E3-4622-4C32-8B9C-9AEC1CD20638", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:-:*:*:*", "matchCriteriaId": "552E1557-D6FA-45DD-9B52-E13ACDBB8A62", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "F7DDFFB8-2337-4DD7-8120-56CC8EF134B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*", "matchCriteriaId": "E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "matchCriteriaId": "C5282C83-86B8-442D-851D-B54E88E8B1F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_365_proplus:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA035812-F35A-43F1-9A8D-EE02201AA10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "F9A115C1-45EB-4688-AD7C-C1854850EE9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*", "matchCriteriaId": "8D513A61-6427-4F85-AADF-99D6F223AF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*", "matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "9CCB2D72-B779-4772-8F72-7177E3F47A92", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:-:*:*:*", "matchCriteriaId": "F7F40F5A-E53D-430A-B3CA-8836288FE47E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "36A1FA52-BFBD-4C88-9CBE-B68E55C75726", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*", "matchCriteriaId": "C971A8FC-3897-496D-BB9A-9E6C8A03AEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "39EA4DCC-AA3F-4E3B-8754-BF79B2FD8657", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "33E26FF2-B80D-4C64-B9D5-ED0DE4BF3B1F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2016:*:*:*:*:*:*:*", "matchCriteriaId": "5AA3A3C2-DB00-4095-B445-5A5041EB3194", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "78E9611F-1DE1-4FB2-9C70-16602FFC73C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "EB39B6EE-BC01-4D21-A3D8-CDDA268C55FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:*:*", "matchCriteriaId": "AB3AA120-CE06-40A3-ADC4-C42077509287", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "ED0408B6-4FB5-45E9-AD27-301FC383152D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "87EBA8C7-E317-4EFD-B1AA-DD6A8B0DFDCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*", "matchCriteriaId": "89229922-0836-4CC2-AED2-107C3142D0EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:-:*:*:*", "matchCriteriaId": "D7A48E44-F01A-40AD-B8AF-8FE368248003", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka \u0027Microsoft Office Remote Code Execution Vulnerability\u0027. This CVE ID is unique from CVE-2020-0991." }, { "lang": "es", "value": "Hay una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota cuando Microsoft Office carga inapropiadamente bibliotecas de tipos arbitrarios, tambi\u00e9n se conoce como \"Microsoft Office Remote Code Execution Vulnerability\". Este ID de CVE es diferente de CVE-2020-0991." } ], "id": "CVE-2020-0760", "lastModified": "2024-11-21T04:54:09.390", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-04-15T15:15:13.777", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0760" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-14 17:29
Modified
2024-11-21 03:39
Severity ?
Summary
Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka "Microsoft Access Remote Code Execution Vulnerability".
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://www.securityfocus.com/bid/103315 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | http://www.securitytracker.com/id/1040503 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103315 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040503 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "7122C5BF-C7C8-4B20-AACF-03F0ED83A7A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "3E995599-F698-4E73-9401-4CA47FADFCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*", "matchCriteriaId": "0E42DC73-F1D0-47CD-BED8-DB2C6E044E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*", "matchCriteriaId": "E74CB3D6-B0D7-4A6C-ABAA-170C7710D856", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016, and Microsoft Office 2016 Click-to-Run allow a remote code execution vulnerability due to how objects are handled in memory, aka \"Microsoft Access Remote Code Execution Vulnerability\"." }, { "lang": "es", "value": "Microsoft Access 2010 SP2, Microsoft Access 2013 SP1, Microsoft Access 2016 y Microsoft Office 2016 Click-to-Run permiten una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo debido a la forma en la que se gestionan los objetos en la memoria. Esto tambi\u00e9n se conoce como \"Microsoft Access Remote Code Execution Vulnerability\"." } ], "id": "CVE-2018-0903", "lastModified": "2024-11-21T03:39:11.890", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-14T17:29:02.230", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103315" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040503" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103315" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040503" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0903" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-12-15 01:46
Modified
2024-11-21 00:39
Severity ?
Summary
Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D0896FF-FF7D-4AC2-B38D-8FED10E17767", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Microsoft Office Access allows remote, user-assisted attackers to execute arbitrary code via a crafted Microsoft Access Database (.mdb) file. NOTE: due to the lack of details as of 20071210, it is not clear whether this issue is the same as CVE-2007-6026 or CVE-2005-0944." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en Microsoft Office Access permite a atacantes remotos con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de archivos Microsoft Access Database (.mdb) manipulados. NOTA: Debido a la falta de detalles como en 20071210, no est\u00e1 claro si esta cuesti\u00f3n es la misma que la CVE-2007-6026 o CVE-2005-0944." } ], "id": "CVE-2007-6357", "lastModified": "2024-11-21T00:39:57.297", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-12-15T01:46:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://osvdb.org/44150" }, { "source": "cve@mitre.org", "url": "http://www.computerworld.com/action/article.do?command=viewArticleBasic\u0026articleId=9052538\u0026source=rss_topic17" }, { "source": "cve@mitre.org", "url": "http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012" }, { "source": "cve@mitre.org", "url": "http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/44150" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.computerworld.com/action/article.do?command=viewArticleBasic\u0026articleId=9052538\u0026source=rss_topic17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.informationweek.com/shared/printableArticle.jhtml?articleID=204802012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.us-cert.gov/current/index.html#microsoft_access_database_file_attachment" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-01-01 05:00
Modified
2024-11-20 23:28
Severity ?
Summary
Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
fms_inc. | total_vb_sourcebook | 6.0 | |
microsoft | access | 97 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:fms_inc.:total_vb_sourcebook:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "95B0AEB7-A2C2-4C4D-88F7-AACF456965F6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:97:*:*:*:*:*:*:*", "matchCriteriaId": "561C0480-2B14-43E0-B187-06092D9A2D83", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data." } ], "id": "CVE-1999-0364", "lastModified": "2024-11-20T23:28:33.710", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-01-01T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=91816470220259\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=91816470220259\u0026w=2" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-11 00:29
Modified
2024-11-21 04:13
Severity ?
Summary
A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka "Microsoft Access Remote Code Execution Vulnerability." This affects Microsoft Access, Microsoft Office.
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://www.securityfocus.com/bid/104645 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | http://www.securitytracker.com/id/1041254 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/104645 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1041254 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "3E995599-F698-4E73-9401-4CA47FADFCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*", "matchCriteriaId": "0E42DC73-F1D0-47CD-BED8-DB2C6E044E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2016:*:*:*:click-to-run:*:*:*", "matchCriteriaId": "E74CB3D6-B0D7-4A6C-ABAA-170C7710D856", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability exists when Microsoft Access fails to properly handle objects in memory, aka \"Microsoft Access Remote Code Execution Vulnerability.\" This affects Microsoft Access, Microsoft Office." }, { "lang": "es", "value": "Existe una vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo cuando Microsoft Access no gestiona correctamente objetos en la memoria. Esto tambi\u00e9n se conoce como \"Microsoft Access Remote Code Execution Vulnerability\". Esto afecta a Microsoft Access y Microsoft Office" } ], "id": "CVE-2018-8312", "lastModified": "2024-11-21T04:13:36.120", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-11T00:29:02.180", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104645" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041254" }, { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1041254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-8312" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-11 14:03
Modified
2024-11-21 01:53
Severity ?
Summary
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access File Format Memory Corruption Vulnerability."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "AAB5D3AF-369A-48A0-BFA1-9F0D1ACE1F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp1:*:*:*:*:x64:*", "matchCriteriaId": "1507945F-C584-4F2D-94A8-3C213523268C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp1:*:*:*:x86:*:*", "matchCriteriaId": "188E754E-1E65-4A92-9E9D-65422146D941", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:x64:*", "matchCriteriaId": "4C9D3BDE-A302-4A14-8A4C-574AB0DEC634", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:x86:*:*", "matchCriteriaId": "F1B074BB-C83E-4740-AFCD-EC6D7EA0E24B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:*:*:*:*:*:x64:*", "matchCriteriaId": "F70E3224-7E43-4E8A-BA34-580AAF820ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:*:*:*:*:x86:*:*", "matchCriteriaId": "3DC0C952-3F1E-4A01-8801-02E8AD2DD0E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access File Format Memory Corruption Vulnerability.\"" }, { "lang": "es", "value": "Microsoft Access 2007 SP3, 2010 SP1 y SP2, y 2013 en Microsoft Office permite a un atacante remoto ejecutar c\u00f3digo a discrecci\u00f3n o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un archivo Access manipulado, tambien conocida como \"Vulnerabilidad de Corrupci\u00f3n de Memoria en Formato de Archivo Access\"." } ], "id": "CVE-2013-3156", "lastModified": "2024-11-21T01:53:05.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-09-11T14:03:48.093", "references": [ { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18442" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-11 14:03
Modified
2024-11-21 01:53
Severity ?
Summary
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3157.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "AAB5D3AF-369A-48A0-BFA1-9F0D1ACE1F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp1:*:*:*:*:x64:*", "matchCriteriaId": "1507945F-C584-4F2D-94A8-3C213523268C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp1:*:*:*:x86:*:*", "matchCriteriaId": "188E754E-1E65-4A92-9E9D-65422146D941", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:x64:*", "matchCriteriaId": "4C9D3BDE-A302-4A14-8A4C-574AB0DEC634", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:x86:*:*", "matchCriteriaId": "F1B074BB-C83E-4740-AFCD-EC6D7EA0E24B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:*:*:*:*:*:x64:*", "matchCriteriaId": "F70E3224-7E43-4E8A-BA34-580AAF820ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:*:*:*:*:x86:*:*", "matchCriteriaId": "3DC0C952-3F1E-4A01-8801-02E8AD2DD0E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3157." }, { "lang": "es", "value": "Microsoft Access 2007 SP3, 2010 SP1 y SP2, y 2013 en Microsoft Office permite a atacantes remotos \nejecutar c\u00f3digo arbritrario o provocar una denegaci\u00f3n de \nservicio (corrupci\u00f3n de memoria) a trav\u00e9s de un fichero Access manipulado. Aka \"Access Memory Corruption Vulnerability\", una vulnerabilidad diferente de CVE-2013-3157." } ], "id": "CVE-2013-3155", "lastModified": "2024-11-21T01:53:05.750", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-09-11T14:03:48.083", "references": [ { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18624" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18624" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-02-03 01:28
Modified
2024-11-21 00:26
Severity ?
Summary
Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | access | 2000 | |
microsoft | access | 2002 | |
microsoft | access | 2003 | |
microsoft | excel | 2000 | |
microsoft | excel | 2002 | |
microsoft | excel | 2003 | |
microsoft | excel | 2004 | |
microsoft | excel_viewer | 2003 | |
microsoft | frontpage | 2000 | |
microsoft | frontpage | 2002 | |
microsoft | frontpage | 2003 | |
microsoft | infopath | 2003 | |
microsoft | office | 2000 | |
microsoft | office | 2003 | |
microsoft | office | 2004 | |
microsoft | office | xp | |
microsoft | onenote | 2003 | |
microsoft | outlook | 2000 | |
microsoft | outlook | 2002 | |
microsoft | outlook | 2003 | |
microsoft | powerpoint | 2000 | |
microsoft | powerpoint | 2002 | |
microsoft | powerpoint | 2003 | |
microsoft | powerpoint | 2004 | |
microsoft | project | 2000 | |
microsoft | project | 2002 | |
microsoft | project | 2003 | |
microsoft | publisher | 2000 | |
microsoft | publisher | 2002 | |
microsoft | publisher | 2003 | |
microsoft | visio | 2002 | |
microsoft | visio | 2003 | |
microsoft | word | 2000 | |
microsoft | word | 2002 | |
microsoft | word | 2003 | |
microsoft | word_viewer | 2003 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "matchCriteriaId": "90D7BA07-3BCA-41CF-B5D3-341E912650A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2002:*:*:*:*:*:*:*", "matchCriteriaId": "83DFFFF4-EA09-48C5-A600-A62C1A1A7360", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2003:*:*:*:*:*:*:*", "matchCriteriaId": "EC4AE5AF-C83E-4802-B75C-0058742A4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*", "matchCriteriaId": "F55D42D5-7371-47C2-BF55-B7F51C19B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*", "matchCriteriaId": "082D3262-87E3-4245-AD9C-02BE0871FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*", "matchCriteriaId": "5F79E0AB-7081-4F97-BFE4-9AF84F643B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2004:*:mac:*:*:*:*:*", "matchCriteriaId": "CE1A1218-8033-4F3C-B8D7-7D1D61A273E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "FDB0020C-A804-4003-B411-1AC7A6E7193E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*", "matchCriteriaId": "D2C6629C-BF53-49A1-B32C-A828CA0A0500", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2002:*:*:*:*:*:*:*", "matchCriteriaId": "6548F837-A687-4EEF-B754-DAA834B34FA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:*", "matchCriteriaId": "3C79FEE1-70A3-4A48-BE7B-0D18F0A5FA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:*", "matchCriteriaId": "345BC07E-1558-4C27-BF1A-C13547D175FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:*", "matchCriteriaId": "36BA88A3-A31F-4F90-8913-67D5BC00E72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*", "matchCriteriaId": "D52F17AB-2C87-4C1A-91B5-267ABBCF5844", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:*", "matchCriteriaId": "3FE6EAE0-5A8F-4A97-950B-879379A3C0F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*", "matchCriteriaId": "C3189982-F780-4AC2-9663-E6D4DF9DD319", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*", "matchCriteriaId": "3E392539-ABF6-4B5C-AEC3-C54B51E0DB70", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2002:*:*:*:*:*:*:*", "matchCriteriaId": "711D9CC0-31B8-4511-A9F3-CA328A02ED84", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*", "matchCriteriaId": "F5611EFD-2C7C-47BA-83E5-947EA00D8E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2004:*:mac:*:*:*:*:*", "matchCriteriaId": "794FCFBF-2D55-4ECE-825E-180616DB35FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2000:sr1:*:*:*:*:*:*", "matchCriteriaId": "6F0EF69E-52BA-4D7C-B470-CB4A92DA7EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*", "matchCriteriaId": "9B14AE8E-1BFF-4458-87CC-357957F18F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*", "matchCriteriaId": "34EFAEFE-2BDE-4111-91F5-E9F75ADFA920", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2000:*:*:*:*:*:*:*", "matchCriteriaId": "95648599-D3B3-4043-821C-D385FB7A77CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2002:*:*:*:*:*:*:*", "matchCriteriaId": "99ED878A-CFC5-4FD5-A403-EB16CC4F8BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2003:*:*:*:*:*:*:*", "matchCriteriaId": "617E8BE3-8AD0-42FC-BDEE-6B1F120AE512", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*", "matchCriteriaId": "511E22C6-DB04-44A0-906D-F432DD42CA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*", "matchCriteriaId": "AEBFF713-0884-43BF-9AB8-777664FD64AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*", "matchCriteriaId": "2D90B1E1-23CD-4595-AD78-DA1758E9896D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*", "matchCriteriaId": "379C2A4A-78EF-473D-954B-F5DD76C3D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "1889A686-9565-4958-99BB-2EC24ABDF272", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks." }, { "lang": "es", "value": "Una vulnerabilidad no especificada en Microsoft Excel 2000, XP, 2003 y 2004 para Mac, y posiblemente otros productos de Office, permite a atacantes asistidos por el usuario ejecutar c\u00f3digo arbitrario por medio de vectores de ataque desconocidos, como es demostrado por el archivo Exploit-MSExcel.h en ataques de d\u00eda cero dirigidos." } ], "id": "CVE-2007-0671", "lastModified": "2024-11-21T00:26:27.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-02-03T01:28:00.000", "references": [ { "source": "secure@microsoft.com", "url": "http://osvdb.org/31901" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24008" }, { "source": "secure@microsoft.com", "url": "http://securitytracker.com/id?1017584" }, { "source": "secure@microsoft.com", "url": "http://vil.nai.com/vil/content/v_141393.htm" }, { "source": "secure@microsoft.com", "url": "http://www.avertlabs.com/research/blog/?p=191" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/613740" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.microsoft.com/technet/security/advisory/932553.mspx" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/22383" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0463" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "source": "secure@microsoft.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32178" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A301" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/31901" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/24008" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017584" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vil.nai.com/vil/content/v_141393.htm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.avertlabs.com/research/blog/?p=191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/613740" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.microsoft.com/technet/security/advisory/932553.mspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/22383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2007/0463" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32178" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A301" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-09-11 14:03
Modified
2024-11-21 01:53
Severity ?
Summary
Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka "Access Memory Corruption Vulnerability," a different vulnerability than CVE-2013-3155.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "AAB5D3AF-369A-48A0-BFA1-9F0D1ACE1F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp1:*:*:*:*:x64:*", "matchCriteriaId": "1507945F-C584-4F2D-94A8-3C213523268C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp1:*:*:*:x86:*:*", "matchCriteriaId": "188E754E-1E65-4A92-9E9D-65422146D941", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:x64:*", "matchCriteriaId": "4C9D3BDE-A302-4A14-8A4C-574AB0DEC634", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:x86:*:*", "matchCriteriaId": "F1B074BB-C83E-4740-AFCD-EC6D7EA0E24B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:*:*:*:*:*:x64:*", "matchCriteriaId": "F70E3224-7E43-4E8A-BA34-580AAF820ED3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:*:*:*:*:x86:*:*", "matchCriteriaId": "3DC0C952-3F1E-4A01-8801-02E8AD2DD0E4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, 2010 SP1 and SP2, and 2013 in Microsoft Office allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Access file, aka \"Access Memory Corruption Vulnerability,\" a different vulnerability than CVE-2013-3155." }, { "lang": "es", "value": "Microsoft Access 2007 SP3, 2010 SP1 y SP2, y 2013 en Microsoft Office permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) a trav\u00e9s de un fichero Access manipulado, tambi\u00e9n conocido como \"Vulnerabilidad de corrupci\u00f3n de memoria Access\", una vulnerabilidad diferente a CVE-2013-3155." } ], "id": "CVE-2013-3157", "lastModified": "2024-11-21T01:53:05.970", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2013-09-11T14:03:48.100", "references": [ { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/ncas/alerts/TA13-253A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-074" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18664" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-03-06 21:44
Modified
2024-11-21 00:43
Severity ?
Summary
Unspecified vulnerability in Microsoft Access allows remote user-assisted attackers to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "matchCriteriaId": "90D7BA07-3BCA-41CF-B5D3-341E912650A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:jet:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "7D19C4A6-8BDB-4397-9C51-8C9AC2B5D4FE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in Microsoft Access allows remote user-assisted attackers to execute arbitrary code via a crafted .MDB file, possibly related to Jet Engine (msjet40.dll). NOTE: this is probably a different issue than CVE-2007-6026." }, { "lang": "es", "value": "Vulnerabilidad sin especificar en Microsoft Access permite a atacantes remotos asistidos por el usuario ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un archivo .MDB manipulado, posiblemente relacionado con Jet Engine (msjet40.dll). NOTA: probablemente este sea un problema diferente a CVE-2007-6026." } ], "id": "CVE-2008-1200", "lastModified": "2024-11-21T00:43:55.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2008-03-06T21:44:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://pandalabs.pandasecurity.com/archive/New-MS-Access-exploit.aspx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28087" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2003-10-20 04:00
Modified
2024-11-20 23:45
Severity ?
Summary
Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:97:*:*:*:*:*:*:*", "matchCriteriaId": "561C0480-2B14-43E0-B187-06092D9A2D83", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "matchCriteriaId": "90D7BA07-3BCA-41CF-B5D3-341E912650A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2000:sp1:*:*:*:*:*:*", "matchCriteriaId": "A0D4E612-C69D-43F8-8799-56081AFDE506", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2000:sp2:*:*:*:*:*:*", "matchCriteriaId": "511853E6-780A-4BA9-A611-D208A32F480D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2000:sp3:*:*:*:*:*:*", "matchCriteriaId": "E9C3AF12-4033-4762-9833-17B98F32403A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2002:*:*:*:*:*:*:*", "matchCriteriaId": "83DFFFF4-EA09-48C5-A600-A62C1A1A7360", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2002:sp1:*:*:*:*:*:*", "matchCriteriaId": "F1FC803B-68D8-45E2-8D52-A7C1FB3524DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "AD7DDC24-6DFA-46AB-96D9-B4DDA663FCD2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the ActiveX control for Microsoft Access Snapshot Viewer for Access 97, 2000, and 2002 allows remote attackers to execute arbitrary code via long parameters to the control." } ], "id": "CVE-2003-0665", "lastModified": "2024-11-20T23:45:15.997", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-10-20T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/9668" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/992132" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/8536" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/9668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/992132" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/8536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2003/ms03-038" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2006-10-10 22:07
Modified
2024-11-21 00:14
Severity ?
Summary
Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified "crafted file," a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | access | 2000 | |
microsoft | access | 2002 | |
microsoft | access | 2003 | |
microsoft | excel | 2000 | |
microsoft | excel | 2002 | |
microsoft | excel | 2003 | |
microsoft | excel_viewer | 2003 | |
microsoft | frontpage | 2000 | |
microsoft | frontpage | 2002 | |
microsoft | frontpage | 2003 | |
microsoft | infopath | 2003 | |
microsoft | office | 2000 | |
microsoft | office | 2003 | |
microsoft | office | 2004 | |
microsoft | office | xp | |
microsoft | onenote | 2003 | |
microsoft | outlook | 2000 | |
microsoft | outlook | 2002 | |
microsoft | outlook | 2003 | |
microsoft | powerpoint | 2000 | |
microsoft | powerpoint | 2002 | |
microsoft | powerpoint | 2003 | |
microsoft | powerpoint | 2004 | |
microsoft | project | 2000 | |
microsoft | project | 2002 | |
microsoft | project | 2003 | |
microsoft | publisher | 2000 | |
microsoft | publisher | 2002 | |
microsoft | publisher | 2003 | |
microsoft | visio | 2002 | |
microsoft | visio | 2003 | |
microsoft | word | 2000 | |
microsoft | word | 2002 | |
microsoft | word | 2003 | |
microsoft | word_viewer | 2003 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "matchCriteriaId": "90D7BA07-3BCA-41CF-B5D3-341E912650A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2002:*:*:*:*:*:*:*", "matchCriteriaId": "83DFFFF4-EA09-48C5-A600-A62C1A1A7360", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2003:*:*:*:*:*:*:*", "matchCriteriaId": "EC4AE5AF-C83E-4802-B75C-0058742A4997", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*", "matchCriteriaId": "F55D42D5-7371-47C2-BF55-B7F51C19B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2002:*:*:*:*:*:*:*", "matchCriteriaId": "082D3262-87E3-4245-AD9C-02BE0871FA3B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*", "matchCriteriaId": "5F79E0AB-7081-4F97-BFE4-9AF84F643B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "FDB0020C-A804-4003-B411-1AC7A6E7193E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*", "matchCriteriaId": "D2C6629C-BF53-49A1-B32C-A828CA0A0500", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2002:*:*:*:*:*:*:*", "matchCriteriaId": "6548F837-A687-4EEF-B754-DAA834B34FA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:*", "matchCriteriaId": "3C79FEE1-70A3-4A48-BE7B-0D18F0A5FA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:*", "matchCriteriaId": "345BC07E-1558-4C27-BF1A-C13547D175FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*", "matchCriteriaId": "4891122F-AD7F-45E6-98C6-833227916F6B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2003:sp2:*:*:*:*:*:*", "matchCriteriaId": "07D3F3E4-93FB-481A-94D9-075E726697C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2004:*:mac:*:*:*:*:*", "matchCriteriaId": "9409A9BD-1E9B-49B8-884F-8FE569D8AA25", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*", "matchCriteriaId": "79BA1175-7F02-4435-AEA6-1BA8AADEB7EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:*", "matchCriteriaId": "36BA88A3-A31F-4F90-8913-67D5BC00E72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*", "matchCriteriaId": "D52F17AB-2C87-4C1A-91B5-267ABBCF5844", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2002:*:*:*:*:*:*:*", "matchCriteriaId": "3FE6EAE0-5A8F-4A97-950B-879379A3C0F8", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*", "matchCriteriaId": "C3189982-F780-4AC2-9663-E6D4DF9DD319", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*", "matchCriteriaId": "3E392539-ABF6-4B5C-AEC3-C54B51E0DB70", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2002:*:*:*:*:*:*:*", "matchCriteriaId": "711D9CC0-31B8-4511-A9F3-CA328A02ED84", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*", "matchCriteriaId": "F5611EFD-2C7C-47BA-83E5-947EA00D8E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2004:*:mac:*:*:*:*:*", "matchCriteriaId": "794FCFBF-2D55-4ECE-825E-180616DB35FD", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2000:sr1:*:*:*:*:*:*", "matchCriteriaId": "6F0EF69E-52BA-4D7C-B470-CB4A92DA7EAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*", "matchCriteriaId": "9B14AE8E-1BFF-4458-87CC-357957F18F8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*", "matchCriteriaId": "34EFAEFE-2BDE-4111-91F5-E9F75ADFA920", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2000:*:*:*:*:*:*:*", "matchCriteriaId": "95648599-D3B3-4043-821C-D385FB7A77CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2002:*:*:*:*:*:*:*", "matchCriteriaId": "99ED878A-CFC5-4FD5-A403-EB16CC4F8BC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2003:*:*:*:*:*:*:*", "matchCriteriaId": "617E8BE3-8AD0-42FC-BDEE-6B1F120AE512", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*", "matchCriteriaId": "D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*", "matchCriteriaId": "511E22C6-DB04-44A0-906D-F432DD42CA5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*", "matchCriteriaId": "AEBFF713-0884-43BF-9AB8-777664FD64AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2002:*:*:*:*:*:*:*", "matchCriteriaId": "2D90B1E1-23CD-4595-AD78-DA1758E9896D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2003:*:*:*:*:*:*:*", "matchCriteriaId": "379C2A4A-78EF-473D-954B-F5DD76C3D6CF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word_viewer:2003:*:*:*:*:*:*:*", "matchCriteriaId": "1889A686-9565-4958-99BB-2EC24ABDF272", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Unspecified vulnerability in PowerPoint in Microsoft Office 2000, Office 2002, Office 2003, Office 2004 for Mac, and Office v.X for Mac allows user-assisted attackers to execute arbitrary code via an unspecified \"crafted file,\" a different vulnerability than CVE-2006-3435, CVE-2006-4694, and CVE-2006-3876." }, { "lang": "es", "value": "Vulnerabilidad no especificada en PowerPoint en Microsoft Office 2000, Office 2002, Office 2003, Office 2004 para Mac, y Office v.X para Mac permite a atacantes con la intervenci\u00f3n del usuario ejecutar c\u00f3digo de su elecci\u00f3n mediante un \"fichero artesanal\" no especificado, una vulnerabilidad diferente que CVE-2006-3435, CVE-2006-4694, y CVE-2006-3876." } ], "id": "CVE-2006-3877", "lastModified": "2024-11-21T00:14:37.363", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2006-10-10T22:07:00.000", "references": [ { "source": "secure@microsoft.com", "url": "http://securitytracker.com/id?1017030" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/205948" }, { "source": "secure@microsoft.com", "url": "http://www.osvdb.org/29448" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "source": "secure@microsoft.com", "url": "http://www.securityfocus.com/bid/20325" }, { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "source": "secure@microsoft.com", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3977" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A220" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A568" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1017030" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/205948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/29448" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/449179/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/20325" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA07-044A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/3977" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2006/ms06-058" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2007/ms07-015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A220" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A568" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-11-11 11:59
Modified
2024-11-21 02:27
Severity ?
Summary
Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Microsoft Office Elevation of Privilege Vulnerability."
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | http://www.securitytracker.com/id/1034117 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | http://www.securitytracker.com/id/1034119 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | http://www.securitytracker.com/id/1034122 | Third Party Advisory, VDB Entry | |
secure@microsoft.com | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034117 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034119 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1034122 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116 |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "AAB5D3AF-369A-48A0-BFA1-9F0D1ACE1F95", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "7122C5BF-C7C8-4B20-AACF-03F0ED83A7A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "3E995599-F698-4E73-9401-4CA47FADFCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*", "matchCriteriaId": "0E42DC73-F1D0-47CD-BED8-DB2C6E044E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "94F5E2F8-0D37-4FCC-B55A-9F09C421272C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*", "matchCriteriaId": "5E01525C-A3AB-4AB7-82F9-B91E4D552FD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x86:*", "matchCriteriaId": "E28626D8-AF3A-487F-BAAB-3955E44D2A35", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "F564117D-450D-45C4-9688-AF35F630A8A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "3A062169-527E-43DA-8AE0-FD4FBA1B2A9B", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:*:*", "matchCriteriaId": "09BF0981-749E-470B-A7AC-95AD087797EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "4C919D14-520A-4C10-850F-14AA80BF4B4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "DA2DE6A4-A857-4BE3-B7EA-3C3A6B05DFF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "C1273DC0-2188-4D5C-963D-761683B93A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:lync:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "8B854E18-7CB0-43F7-9EBF-E356FA176B2F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_2007_ime:sp3:*:*:ja:*:*:*:*", "matchCriteriaId": "ABB6C9AE-3F75-4F94-A295-A5A31A2BE0F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "83434795-4772-48E2-B604-9AAC6ECDE0B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "18AE1481-1E92-42F9-9E2E-C9C19353E580", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "FE03F7A7-90F4-4D41-9529-B36937CD94D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "BBB1E19F-6870-429A-AB66-D7BBF3845AA2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2016:*:*:*:*:*:*:*", "matchCriteriaId": "80F1EA3D-FD2D-4CB2-A93A-DFAD3187AFC3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:pinyin_ime:2010:*:*:*:*:*:*:*", "matchCriteriaId": "B73F56F0-4983-48F8-A34B-CBA8B023AE62", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "AE2E98C5-71A4-4014-AFC4-5438FEC196D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "9CCB2D72-B779-4772-8F72-7177E3F47A92", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "BA6E71BA-0EBA-40EE-8B81-92C6DECE8DB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "36A1FA52-BFBD-4C88-9CBE-B68E55C75726", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*", "matchCriteriaId": "C971A8FC-3897-496D-BB9A-9E6C8A03AEA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "904623F9-BEC4-4D9C-AC7E-AFBFFDF928CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2016:*:*:*:*:*:*:*", "matchCriteriaId": "5AA3A3C2-DB00-4095-B445-5A5041EB3194", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project_server:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "0B02D845-F95D-44D7-AB4C-2E464C3AB783", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project_server:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "597153BC-B8A7-45E5-AE3F-D897FAE4C7FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "8AB29E20-496D-4CDA-918B-40E4ABB3ECBD", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "78E9611F-1DE1-4FB2-9C70-16602FFC73C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "EB39B6EE-BC01-4D21-A3D8-CDDA268C55FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2016:*:*:*:*:*:*:*", "matchCriteriaId": "AB3AA120-CE06-40A3-ADC4-C42077509287", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:skype_for_business:2016:*:*:*:*:*:*:*", "matchCriteriaId": "D499807D-91F3-447D-B9F0-D612898C9339", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "387D78BD-2368-4525-BFC2-52149585E1F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "ED0408B6-4FB5-45E9-AD27-301FC383152D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "87EBA8C7-E317-4EFD-B1AA-DD6A8B0DFDCC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio:2016:*:*:*:*:*:*:*", "matchCriteriaId": "89229922-0836-4CC2-AED2-107C3142D0EA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*", "matchCriteriaId": "7D006508-BFB0-4F21-A361-3DA644F51D8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "24EEDAD9-9656-4B21-82E4-D60B83777492", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "32E1400A-836A-4E48-B2CD-2B0A9A8241BA", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:*:*", "matchCriteriaId": "4DA042D4-B14E-4DDF-8423-DFB255679EFE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka \"Microsoft Office Elevation of Privilege Vulnerability.\"" }, { "lang": "es", "value": "Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japon\u00e9s) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016 y Lync 2013 SP1 permiten a atacantes remotos eludir un mecanismo de protecci\u00f3n sandbox y obtener privilegios a trav\u00e9s de una p\u00e1gina web manipulada a la que se accede con Internet Explorer, seg\u00fan lo demostrado por una transici\u00f3n de Low Integrity a Medium Integrity, tambi\u00e9n conocida como \u0027Microsoft Office Elevation of Privilege Vulnerability\u0027." } ], "id": "CVE-2015-2503", "lastModified": "2024-11-21T02:27:30.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-11-11T11:59:18.423", "references": [ { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034117" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034119" }, { "source": "secure@microsoft.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034122" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-116" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-07-15 12:57
Modified
2024-11-21 01:13
Severity ?
Summary
The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka "Access ActiveX Control Vulnerability."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "456719D5-93AD-4020-B17D-6E4B83F0FEDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2003:sp3:*:*:*:*:*:*", "matchCriteriaId": "A332D04D-CC8C-4F68-A261-BA2F2D8EAD1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2007:sp1:*:*:*:*:*:*", "matchCriteriaId": "5573A8DA-9B5F-428B-BB53-8DB01142F09A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2007:sp2:*:*:*:*:*:*", "matchCriteriaId": "D76A195E-7046-48D4-832D-DB82B7D6B0DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "matchCriteriaId": "69E6B9EB-D3F7-4C57-BF2F-61664E5C2C7D", "vulnerable": false }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp2:*:*:*:*:*:*", "matchCriteriaId": "08AF794A-435D-4171-9DBB-EB7FAED96DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Microsoft Access Wizard Controls in ACCWIZ.dll in Microsoft Office Access 2003 SP3 and 2007 SP1 and SP2 do not properly interact with the memory-allocation approach used by Internet Explorer during instantiation, which allows remote attackers to execute arbitrary code via a web site that references multiple ActiveX controls, as demonstrated by the ImexGrid and FieldList controls, aka \"Access ActiveX Control Vulnerability.\"" }, { "lang": "es", "value": "El Microsoft Access Wizard Controls en ACCWIZ.dll en Microsoft Office Access 2003 SP3 y 2007 SP1 y SP2 no interact\u00faa correctamente con la asignaci\u00f3n de memoria usada por Internet Explorer durante la instanciaci\u00f3n, el cual permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante un sitio web que referencia m\u00faltiples controles ActiveX, como lo demuestra los controles ImexGrid y FieldList, tambi\u00e9n conocido como \"Vulnerabilidad de control de acceso ActiveX\"." } ], "id": "CVE-2010-0814", "lastModified": "2024-11-21T01:13:00.883", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-07-15T12:57:20.207", "references": [ { "source": "secure@microsoft.com", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "source": "secure@microsoft.com", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.us-cert.gov/cas/techalerts/TA10-194A.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2010/ms10-044" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11907" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2008-07-07 23:41
Modified
2024-11-21 00:48
Severity ?
Summary
Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
microsoft | access | 2007 | |
microsoft | excel | 2003 | |
microsoft | excel | 2007 | |
microsoft | frontpage | 2003 | |
microsoft | groove | 2007 | |
microsoft | infopath | 2003 | |
microsoft | infopath | 2007 | |
microsoft | office | 2007 | |
microsoft | office | 2007 | |
microsoft | office_communicator | 2007 | |
microsoft | onenote | 2003 | |
microsoft | outlook | 2003 | |
microsoft | outlook | 2007 | |
microsoft | powerpoint | 2003 | |
microsoft | powerpoint | 2007 | |
microsoft | project_professional | 2007 | |
microsoft | project_standard | 2007 | |
microsoft | publisher | 2003 | |
microsoft | publisher | 2007 | |
microsoft | sharepoint_designer | 2007 | |
microsoft | visio_professional | 2007 | |
microsoft | visio_standard | 2007 | |
microsoft | windows_live_mail | 2008 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1B4D3093-F17C-4BCF-8F4A-F15057C55F82", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2003:*:*:*:*:*:*:*", "matchCriteriaId": "5F79E0AB-7081-4F97-BFE4-9AF84F643B9A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2007:*:*:*:*:*:*:*", "matchCriteriaId": "5A70D659-F648-4870-852A-4E86D1F4B646", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2003:*:*:*:*:*:*:*", "matchCriteriaId": "3C79FEE1-70A3-4A48-BE7B-0D18F0A5FA7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:groove:2007:*:*:*:*:*:*:*", "matchCriteriaId": "355F60DB-EC9A-4054-8023-BD16D5723C9F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2003:*:*:*:*:*:*:*", "matchCriteriaId": "345BC07E-1558-4C27-BF1A-C13547D175FC", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:infopath:2007:*:*:*:*:*:*:*", "matchCriteriaId": "A007966C-7620-4625-AD2B-6A147577EB54", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2007:*:*:*:*:*:*:*", "matchCriteriaId": "828219FA-E694-46DA-93B0-BE2EC5BBF61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2007:sp1:*:*:*:*:*:*", "matchCriteriaId": "69E6B9EB-D3F7-4C57-BF2F-61664E5C2C7D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office_communicator:2007:*:*:*:*:*:*:*", "matchCriteriaId": "61116145-828F-479D-9267-76BAB633B23E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:onenote:2003:*:*:*:*:*:*:*", "matchCriteriaId": "36BA88A3-A31F-4F90-8913-67D5BC00E72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2003:*:*:*:*:*:*:*", "matchCriteriaId": "C3189982-F780-4AC2-9663-E6D4DF9DD319", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:*", "matchCriteriaId": "D789259A-034E-40BB-9DFF-76B3104B212F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2003:*:*:*:*:*:*:*", "matchCriteriaId": "F5611EFD-2C7C-47BA-83E5-947EA00D8E6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2007:*:*:*:*:*:*:*", "matchCriteriaId": "A947639C-B1D3-4297-B4BB-AD799C979BE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project_professional:2007:*:*:*:*:*:*:*", "matchCriteriaId": "1C58C5D7-B6F0-4C95-A305-ED37629E2A5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project_standard:2007:*:*:*:*:*:*:*", "matchCriteriaId": "E8D468F3-894D-409E-A7CE-EAA5919362E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2003:*:*:*:*:*:*:*", "matchCriteriaId": "617E8BE3-8AD0-42FC-BDEE-6B1F120AE512", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:publisher:2007:*:*:*:*:*:*:*", "matchCriteriaId": "190A4DF4-EA93-4E18-BA96-7A7AC48831F0", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:sharepoint_designer:2007:*:*:*:*:*:*:*", "matchCriteriaId": "7E057F77-9197-4BC9-A0A1-A71850F59D70", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio_professional:2007:*:*:*:*:*:*:*", "matchCriteriaId": "F9A72192-B10A-4E42-AE68-FE1CB8DA573F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:visio_standard:2007:*:*:*:*:*:*:*", "matchCriteriaId": "9D837BA2-BAC0-4B72-A1DD-CB4A1CA5A347", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:windows_live_mail:2008:*:*:*:*:*:*:*", "matchCriteriaId": "AD3CA537-AAF9-4356-AE7E-0AC14E5AFADF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension." }, { "lang": "es", "value": "Microsoft Crypto API 5.131.2600.2180 hasta la 6.0, como las usadas en Outlook, Windows Live Mail, y Office 2007, realiza una lista de revocaci\u00f3n de certificado (CRL) utilizando una URL arbitraria de un certificado incluido en (1) mensaje de correo electr\u00f3nico S/MIME o (2) documento firmado, lo que permite a atacantes remotos conseguir tiempos de lectura y direcciones IP de recipientes, y resultados de escaneo de puerto, a trav\u00e9s de \r\nun certificado manipulado con una extensi\u00f3n de de una Authority Information Access (AIA).\r\n" } ], "id": "CVE-2008-3068", "lastModified": "2024-11-21T00:48:20.853", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-07-07T23:41:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3978" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/493947/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/494101/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/28548" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019736" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019737" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1019738" }, { "source": "cve@mitre.org", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt" }, { "source": "cve@mitre.org", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt" }, { "source": "cve@mitre.org", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt" }, { "source": "cve@mitre.org", "url": "https://www.cynops.de/techzone/http_over_x509.html" }, { "source": "cve@mitre.org", "url": "https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt" }, { "source": "cve@mitre.org", "url": "https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt" }, { "source": "cve@mitre.org", "url": "https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3978" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/493947/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/494101/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/28548" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019736" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1019738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-002.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-003.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.cynops.de/advisories/AKLINK-SA-2008-004.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.cynops.de/techzone/http_over_x509.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.klink.name/security/aklink-sa-2008-002-outlook-smime.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.klink.name/security/aklink-sa-2008-003-live-mail-smime.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.klink.name/security/aklink-sa-2008-004-office2007-signatures.txt" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-05-11 04:00
Modified
2024-11-20 23:32
Severity ?
Summary
The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*", "matchCriteriaId": "90D7BA07-3BCA-41CF-B5D3-341E912650A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*", "matchCriteriaId": "F55D42D5-7371-47C2-BF55-B7F51C19B61E", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*", "matchCriteriaId": "D2C6629C-BF53-49A1-B32C-A828CA0A0500", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*", "matchCriteriaId": "A9A82D13-513C-46FA-AF51-0582233E230A", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*", "matchCriteriaId": "D52F17AB-2C87-4C1A-91B5-267ABBCF5844", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:photodraw_2000:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "FFE1D04D-8B79-4401-9225-F15EDEBDDFC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*", "matchCriteriaId": "3E392539-ABF6-4B5C-AEC3-C54B51E0DB70", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*", "matchCriteriaId": "3F09162C-01F0-4056-94D3-995713F92AE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*", "matchCriteriaId": "AEBFF713-0884-43BF-9AB8-777664FD64AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:works:2000:*:*:*:*:*:*:*", "matchCriteriaId": "78389936-D2E5-4A3A-8E7A-AA42FFAD832B", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Office 2000 UA ActiveX Control is marked as \"safe for scripting,\" which allows remote attackers to conduct unauthorized activities via the \"Show Me\" function in Office Help, aka the \"Office 2000 UA Control\" vulnerability." } ], "id": "CVE-2000-0419", "lastModified": "2024-11-20T23:32:27.737", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-05-11T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2000-07.html" }, { "source": "cve@mitre.org", "url": "http://www.microsoft.com/technet/support/kb.asp?ID=262767" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/1197" }, { "source": "cve@mitre.org", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.cert.org/advisories/CA-2000-07.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.microsoft.com/technet/support/kb.asp?ID=262767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/1197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-08-17 19:15
Modified
2024-11-21 05:10
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
A remote code execution vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Access. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.
The security update addresses the vulnerability by correcting how Microsoft Access handles objects in memory.
References
▼ | URL | Tags | |
---|---|---|---|
secure@microsoft.com | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582 | Patch, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "7122C5BF-C7C8-4B20-AACF-03F0ED83A7A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "3E995599-F698-4E73-9401-4CA47FADFCBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*", "matchCriteriaId": "0E42DC73-F1D0-47CD-BED8-DB2C6E044E2D", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:*:*", "matchCriteriaId": "C5282C83-86B8-442D-851D-B54E88E8B1F1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A remote code execution vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.\nExploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Access. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file.\nThe security update addresses the vulnerability by correcting how Microsoft Access handles objects in memory.\n" }, { "lang": "es", "value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota en el software Microsoft Access cuando el software presenta un fallo al manejar apropiadamente objetos en memoria, tambi\u00e9n se conoce como \"Microsoft Access Remote Code Execution Vulnerability\"." } ], "id": "CVE-2020-1582", "lastModified": "2024-11-21T05:10:53.643", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "secure@microsoft.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Secondary" } ] }, "published": "2020-08-17T19:15:21.523", "references": [ { "source": "secure@microsoft.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1582" } ], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }