This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2014-12-10
Product Office Last view 2021-03-11
Version 2010 Type Application
Update sp2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware x64  
Other *  
 
CPE Product cpe:2.3:a:microsoft:office

Activity : Overall

Related : CVE

  Date Alert Description
6.8 2021-03-11 CVE-2021-27059

Microsoft Office Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-24108, CVE-2021-27057.

7.8 2021-01-12 CVE-2021-1711

Microsoft Office Remote Code Execution Vulnerability

7.8 2020-07-14 CVE-2020-1449

A remote code execution vulnerability exists in Microsoft Project software when the software fails to check the source markup of a file, aka 'Microsoft Project Remote Code Execution Vulnerability'.

9.3 2015-09-08 CVE-2015-2545

Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote attackers to execute arbitrary code via a crafted EPS image, aka "Microsoft Office Malformed EPS File Vulnerability."

9.3 2015-08-14 CVE-2015-2470

Integer underflow in Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office for Mac 2011, and Word Viewer allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Integer Underflow Vulnerability."

9.3 2015-08-14 CVE-2015-2469

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, and Office for Mac 2011 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."

9.3 2015-08-14 CVE-2015-2431

Microsoft Office 2007 SP3 and 2010 SP2, Live Meeting 2007 Console, Lync 2010, Lync 2010 Attendee, Lync 2013 SP1, and Lync Basic 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office Graphics Library (OGL) font, aka "Microsoft Office Graphics Component Remote Code Execution Vulnerability."

9.3 2015-07-14 CVE-2015-2380

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, and Word 2013 RT SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."

9.3 2015-07-14 CVE-2015-2379

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office for Mac 2011, and Word Viewer allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."

9.3 2015-05-13 CVE-2015-1682

Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2013 RT SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office for Mac 2011, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, PowerPoint Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Excel Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, Excel Web App 2010 SP2, Office Web Apps Server 2013 SP1, SharePoint Foundation 2010 SP2, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."

9.3 2015-05-13 CVE-2015-1671

The Windows DirectWrite library, as used in Microsoft .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, and 4.5.2; Office 2007 SP3 and 2010 SP2; Live Meeting 2007 Console; Lync 2010; Lync 2010 Attendee; Lync 2013 SP1; Lync Basic 2013 SP1; Silverlight 5 before 5.1.40416.00; and Silverlight 5 Developer Runtime before 5.1.40416.00, allows remote attackers to execute arbitrary code via a crafted TrueType font, aka "TrueType Font Parsing Vulnerability."

9.3 2015-03-11 CVE-2015-0086

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 Gold and SP1, Word 2013 RT Gold and SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, and Web Apps Server 2013 Gold and SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability."

9.3 2015-03-11 CVE-2015-0085

Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."

9.3 2014-12-10 CVE-2014-6357

Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability."

CWE : Common Weakness Enumeration

%idName
40% (4) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
20% (2) CWE-20 Improper Input Validation
10% (1) CWE-399 Resource Management Errors
10% (1) CWE-346 Origin Validation Error
10% (1) CWE-189 Numeric Errors
10% (1) CWE-19 Data Handling

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0214 Multiple Vulnerabilities in Microsoft Office (MS15-099)
Severity: Category II - VMSKEY: V0061389
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307
2015-A-0196 Multiple Vulnerabilities in Microsoft Graphics Component (MS15-080)
Severity: Category II - VMSKEY: V0061311
2015-A-0163 Multiple Vulnerabilities in Microsoft Office (MS15-070)
Severity: Category II - VMSKEY: V0061121
2015-A-0103 Multiple Vulnerabilities in Microsoft Office Products (MS15-046)
Severity: Category II - VMSKEY: V0060643
2015-A-0052 Multiple Vulnerabilities in Microsoft Office (MS15-022)
Severity: Category II - VMSKEY: V0058999
2014-A-0190 Microsoft Word and Office Remote Code Execution Vulnerability (MS14-081)
Severity: Category II - VMSKEY: V0057701

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2017-09-21 Microsoft Office Word EPS filter PostScript object use after free attempt
RuleID : 44052 - Type : FILE-OFFICE - Revision : 3
2017-04-04 Microsoft Office RTF out-of-bounds memory access attempt
RuleID : 41792 - Type : FILE-OTHER - Revision : 3
2017-04-04 Microsoft Office RTF out-of-bounds memory access attempt
RuleID : 41791 - Type : FILE-OTHER - Revision : 3
2016-12-08 Microsoft Office RTF out-of-bounds memory access attempt
RuleID : 40728 - Type : FILE-OTHER - Revision : 2
2016-12-08 Microsoft Office RTF out-of-bounds memory access attempt
RuleID : 40727 - Type : FILE-OTHER - Revision : 2
2015-10-14 Microsoft Office Word EPS filter PostScript object use after free attempt
RuleID : 36027 - Type : FILE-OFFICE - Revision : 3
2015-10-14 Microsoft Office Word EPS filter PostScript object use after free attempt
RuleID : 36026 - Type : FILE-OFFICE - Revision : 3
2015-09-10 Microsoft Office Word msptls.dll integer underflow attempt
RuleID : 35512 - Type : FILE-OFFICE - Revision : 2
2015-09-10 Microsoft Office Word msptls.dll integer underflow attempt
RuleID : 35511 - Type : FILE-OFFICE - Revision : 2
2015-09-10 Microsoft Office Word wwlib.dll out of bounds read attempt
RuleID : 35510 - Type : FILE-OFFICE - Revision : 2
2015-09-10 Microsoft Office Word wwlib.dll out of bounds read attempt
RuleID : 35509 - Type : FILE-OFFICE - Revision : 2
2015-09-10 Microsoft Office Word Document invalid directory entry use after free attempt
RuleID : 35498 - Type : FILE-OFFICE - Revision : 4
2015-09-10 Microsoft Office Word Document invalid directory entry use after free attempt
RuleID : 35497 - Type : FILE-OFFICE - Revision : 4
2015-08-14 Microsoft Office Word OCX use after free attempt
RuleID : 35202 - Type : FILE-OFFICE - Revision : 2
2015-08-14 Microsoft Office Word OCX use after free attempt
RuleID : 35201 - Type : FILE-OFFICE - Revision : 2
2015-08-14 Microsoft Office Word sprmPItap heap corruption attempt
RuleID : 35191 - Type : FILE-OFFICE - Revision : 3
2015-08-14 Microsoft Office Word sprmPItap heap corruption attempt
RuleID : 35190 - Type : FILE-OFFICE - Revision : 3
2015-06-17 Microsoft Windows Win32k TrueType Font parsing out of bounds attempt
RuleID : 34441 - Type : OS-WINDOWS - Revision : 2
2015-06-17 Microsoft Windows Win32k TrueType Font parsing out of bounds attempt
RuleID : 34440 - Type : OS-WINDOWS - Revision : 2
2015-06-17 Microsoft Office Word incorrect ptCount element denial of service attempt
RuleID : 34429 - Type : FILE-OFFICE - Revision : 4
2015-06-17 Microsoft Office Word incorrect ptCount element denial of service attempt
RuleID : 34428 - Type : FILE-OFFICE - Revision : 3
2015-04-10 Microsoft Office Word incorrect schema property remote code execution attempt
RuleID : 33716 - Type : FILE-OFFICE - Revision : 3
2015-04-10 Microsoft Office Word incorrect schema property remote code execution attempt
RuleID : 33715 - Type : FILE-OFFICE - Revision : 3
2015-04-07 Microsoft Office RTF out-of-bounds memory access attempt
RuleID : 33706 - Type : FILE-OTHER - Revision : 3
2015-04-07 Microsoft Office RTF out-of-bounds memory access attempt
RuleID : 33705 - Type : FILE-OTHER - Revision : 2

Nessus® Vulnerability Scanner

id Description
2015-09-09 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-099.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: An application installed on the remote Mac OS X host is affected by multiple ...
File: macosx_ms15-081_office_2011.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms15-080.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: An application installed on the remote Mac OS X host is affected by multiple ...
File: macosx_ms15-070_office_2011.nasl - Type: ACT_GATHER_INFO
2015-07-14 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-070.nasl - Type: ACT_GATHER_INFO
2015-05-13 Name: An application installed on the remote Mac OS X host is affected by a remote ...
File: macosx_ms15-046_office_2011.nasl - Type: ACT_GATHER_INFO
2015-05-13 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms15-044.nasl - Type: ACT_GATHER_INFO
2015-05-13 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms15-046.nasl - Type: ACT_GATHER_INFO
2015-05-12 Name: A multimedia application framework installed on the remote Mac OS X host is a...
File: macosx_ms15-049.nasl - Type: ACT_GATHER_INFO
2015-03-11 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms15-022.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: An application installed on the remote Mac OS X host is affected by a remote ...
File: macosx_ms14-081.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms14-081.nasl - Type: ACT_GATHER_INFO