Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2013-11-06 |
Product | Office | Last view | 2016-09-14 |
Version | 2010 | Type | Application |
Update | sp2 | ||
Edition | x86 | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:office |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
6.5 | 2016-09-14 | CVE-2016-0141 | The Visual Basic macros in Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2016 export a certificate-store private key during a document-save operation, which allows attackers to obtain sensitive information via unspecified vectors, aka "Microsoft Information Disclosure Vulnerability." |
7.8 | 2016-08-09 | CVE-2016-3318 | Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability." |
7.8 | 2016-08-09 | CVE-2016-3317 | Microsoft Office 2010 SP2, Word 2007 SP3, Word 2010 SP2, Word for Mac 2011, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability." |
7.8 | 2016-08-09 | CVE-2016-3313 | Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, 2013 RT SP1, and 2016, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted file, aka "Microsoft Office Memory Corruption Vulnerability." |
5.5 | 2016-06-15 | CVE-2016-3234 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to obtain sensitive information from process memory via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability." |
7.8 | 2016-05-10 | CVE-2016-0198 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
7.8 | 2016-03-09 | CVE-2016-0134 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, and Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
7.8 | 2016-02-10 | CVE-2016-0056 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
7.8 | 2016-02-10 | CVE-2016-0053 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
7.8 | 2016-02-10 | CVE-2016-0052 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps Server 2013 SP1, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-0022. |
4.3 | 2016-01-13 | CVE-2016-0012 | Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Microsoft Office ASLR Bypass." |
7.8 | 2016-01-13 | CVE-2016-0010 | Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, Excel 2016 for Mac, PowerPoint 2016 for Mac, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6172 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2016, Word 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted email message processed by Outlook, aka "Microsoft Office RCE Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6124 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6118 | Microsoft Office 2007 SP3 and Office 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6106 | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
9.3 | 2015-08-14 | CVE-2015-1642 | Microsoft Office 2007 SP3, 2010 SP2, and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." |
9.3 | 2015-06-09 | CVE-2015-1760 | Microsoft Office Compatibility Pack SP3, Office 2010 SP2, Office 2013 SP1, and Office 2013 RT SP1 allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
9.3 | 2015-04-14 | CVE-2015-1650 | Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." |
9.3 | 2015-04-14 | CVE-2015-1649 | Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." |
9.3 | 2015-04-14 | CVE-2015-1641 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." |
9.3 | 2015-02-10 | CVE-2015-0064 | Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Automation Services in SharePoint Server 2010, Web Applications 2010 SP2, Word Viewer, and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Office Remote Code Execution Vulnerability." |
9.3 | 2015-02-10 | CVE-2015-0063 | Microsoft Excel 2007 SP3; the proofing tools in Office 2010 SP2; Excel 2010 SP2; Excel 2013 Gold, SP1, and RT; Excel Viewer; and Office Compatibility Pack SP3 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Excel Remote Code Execution Vulnerability." |
4.3 | 2015-02-10 | CVE-2014-6362 | Use-after-free vulnerability in Microsoft Office 2007 SP3, 2010 SP2, and 2013 Gold and SP1 allows remote attackers to bypass the ASLR protection mechanism via a crafted document, aka "Microsoft Office Component Use After Free Vulnerability." |
9.3 | 2014-12-10 | CVE-2014-6364 | Use-after-free vulnerability in Microsoft Office 2007 SP3; 2010 SP2; 2013 Gold, SP1, and SP2; and 2013 RT Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
52% (13) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
16% (4) | CWE-399 | Resource Management Errors |
12% (3) | CWE-200 | Information Exposure |
8% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
4% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
4% (1) | CWE-20 | Improper Input Validation |
4% (1) | CWE-19 | Data Handling |
ExploitDB Exploits
id | Description |
---|---|
30011 | Microsoft Tagged Image File Format (TIFF) Integer Overflow |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-B-0071 | Multiple Vulnerabilities in Microsoft Office (MS15-059) Severity: Category II - VMSKEY: V0060957 |
2015-A-0090 | Multiple Vulnerabilities in Microsoft Office (MS15-033) Severity: Category II - VMSKEY: V0059895 |
2015-A-0037 | Multiple Remote Code Execution Vulnerabilities in Microsoft Office (MS15-012) Severity: Category II - VMSKEY: V0058751 |
2015-B-0018 | Microsoft Office Security Feature Bypass Vulnerability (MS15-013) Severity: Category II - VMSKEY: V0058757 |
2014-A-0187 | Microsoft Office Remote Code Execution Vulnerability (MS14-082) Severity: Category II - VMSKEY: V0057707 |
2014-B-0058 | Multiple Vulnerabilities in Microsoft Office Severity: Category II - VMSKEY: V0050431 |
2014-B-0057 | Microsoft Common Control Security Feature Bypass Vulnerability Severity: Category II - VMSKEY: V0050451 |
2013-B-0135 | Microsoft Office Security Bypass Vulnerability Severity: Category II - VMSKEY: V0042585 |
2013-A-0225 | Microsoft GDI Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0042593 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49049 - Type : FILE-OFFICE - Revision : 1 |
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49048 - Type : FILE-OFFICE - Revision : 1 |
2017-10-17 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 44364 - Type : FILE-OFFICE - Revision : 2 |
2017-10-17 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 44363 - Type : FILE-OFFICE - Revision : 2 |
2017-03-14 | Microsoft Internet Explorer array proto chain manipulation memory corruption ... RuleID : 41562 - Type : BROWSER-IE - Revision : 3 |
2017-03-14 | Microsoft Internet Explorer array proto chain manipulation memory corruption ... RuleID : 41561 - Type : BROWSER-IE - Revision : 3 |
2017-03-14 | Microsoft Internet Explorer use asm memory corruption attempt RuleID : 41556 - Type : BROWSER-IE - Revision : 2 |
2017-03-14 | Microsoft Internet Explorer use asm memory corruption attempt RuleID : 41555 - Type : BROWSER-IE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader CLSID ASLR bypass download attempt RuleID : 40635 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly CLSID ASLR bypass download attempt RuleID : 40634 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader CLSID ASLR bypass download attempt RuleID : 40633 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly CLSID ASLR bypass download attempt RuleID : 40632 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded wrLoader ASLR bypass download attempt RuleID : 40631 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader ASLR bypass download attempt RuleID : 40630 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 40629 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 40628 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF WRLoader CLSID ASLR bypass download attempt RuleID : 40627 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF WRLoader ASLR bypass download attempt RuleID : 40626 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF WRAssembly CLSID ASLR bypass download attempt RuleID : 40625 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded wrLoader ASLR bypass download attempt RuleID : 40624 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader ASLR bypass download attempt RuleID : 40623 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF WRLoader CLSID ASLR bypass download attempt RuleID : 40622 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF WRLoader ASLR bypass download attempt RuleID : 40621 - Type : FILE-OFFICE - Revision : 2 |
2016-12-06 | Microsoft Office RTF WRAssembly CLSID ASLR bypass download attempt RuleID : 40620 - Type : FILE-OFFICE - Revision : 2 |
2016-09-08 | Microsoft Office mso.dll out of bounds memory access attempt RuleID : 39838 - Type : FILE-OFFICE - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-09-14 | Name: An application installed on the remote host is affected by multiple vulnerabi... File: smb_nt_ms16-107.nasl - Type: ACT_GATHER_INFO |
2016-08-10 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms16-099.nasl - Type: ACT_GATHER_INFO |
2016-06-15 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms16-070.nasl - Type: ACT_GATHER_INFO |
2016-05-11 | Name: An application installed on the remote Mac OS X host is affected by multiple ... File: macosx_ms16-054_office.nasl - Type: ACT_GATHER_INFO |
2016-05-10 | Name: An application installed on the remote Windows host is affected by multiple r... File: smb_nt_ms16-054.nasl - Type: ACT_GATHER_INFO |
2016-03-17 | Name: An application installed on the remote Mac OS X host is affected by a remote ... File: macosx_ms16-029_office.nasl - Type: ACT_GATHER_INFO |
2016-03-08 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-029.nasl - Type: ACT_GATHER_INFO |
2016-02-22 | Name: An application installed on the remote Mac OS X host is affected by multiple ... File: macosx_ms16-015_office.nasl - Type: ACT_GATHER_INFO |
2016-02-09 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-015.nasl - Type: ACT_GATHER_INFO |
2016-01-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-004.nasl - Type: ACT_GATHER_INFO |
2016-01-12 | Name: An application installed on the remote Mac OS X host is affected by multiple ... File: macosx_ms16-004_office.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-131.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: A multimedia application framework installed on the remote Mac OS X host is a... File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-08-12 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO |
2015-06-09 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-059.nasl - Type: ACT_GATHER_INFO |
2015-04-14 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-033.nasl - Type: ACT_GATHER_INFO |
2015-04-14 | Name: An application installed on the remote Mac OS X host is affected by multiple ... File: macosx_ms15-033_office_2011.nasl - Type: ACT_GATHER_INFO |
2015-02-10 | Name: The remote Windows host is affected by a security bypass vulnerability. File: smb_nt_ms15-013.nasl - Type: ACT_GATHER_INFO |
2015-02-10 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-012.nasl - Type: ACT_GATHER_INFO |
2014-12-09 | Name: The remote Windows host is affected by a remote code execution vulnerability. File: smb_nt_ms14-082.nasl - Type: ACT_GATHER_INFO |
2014-05-14 | Name: The remote Windows host is affected by a security feature bypass vulnerability. File: smb_nt_ms14-024.nasl - Type: ACT_GATHER_INFO |
2014-05-14 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms14-023.nasl - Type: ACT_GATHER_INFO |
2013-12-11 | Name: The remote Windows host has a remote code execution vulnerability. File: smb_nt_ms13-096.nasl - Type: ACT_GATHER_INFO |
2013-12-11 | Name: The remote Windows host is affected by a security feature bypass vulnerability. File: smb_nt_ms13-106.nasl - Type: ACT_GATHER_INFO |