This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2013-05-14
Product Word Viewer Last view 2019-03-05
Version - Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:word_viewer

Activity : Overall

Related : CVE

  Date Alert Description
5.5 2019-03-05 CVE-2019-0540

A security feature bypass vulnerability exists when Microsoft Office does not validate URLs.An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials, aka 'Microsoft Office Security Feature Bypass Vulnerability'.

7.8 2018-10-10 CVE-2018-8432

A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka "Microsoft Graphics Components Remote Code Execution Vulnerability." This affects Windows 7, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft Excel Viewer, Microsoft PowerPoint Viewer, Windows Server 2019, Windows Server 2008 R2, Windows 10, Windows Server 2008.

7.8 2017-03-16 CVE-2017-0108

The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014.

7.8 2016-12-20 CVE-2016-7298

Microsoft Office 2007 SP3, Office 2010 SP2, Word Viewer, Office for Mac 2011, and Office 2016 for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."

6.5 2016-11-10 CVE-2016-7233

Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2013 SP1, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability."

9.8 2016-10-13 CVE-2016-7182

The Graphics component in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows attackers to execute arbitrary code via a crafted True Type font, aka "True Type Font Parsing Elevation of Privilege Vulnerability."

7.8 2016-10-13 CVE-2016-3396

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "GDI+ Remote Code Execution Vulnerability."

5.5 2016-10-13 CVE-2016-3263

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3262.

5.5 2016-10-13 CVE-2016-3262

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3263.

5.5 2016-10-13 CVE-2016-3209

Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; Live Meeting 2007 Console; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4.5.2, and 4.6; and Silverlight 5 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "True Type Font Parsing Information Disclosure Vulnerability."

9.3 2015-12-09 CVE-2015-6108

The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2015-12-09 CVE-2015-6107

The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10 Gold and 1511, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability."

9.3 2014-12-10 CVE-2014-6357

Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability."

9.3 2013-05-14 CVE-2013-1335

Microsoft Word 2003 SP3 and Word Viewer allow remote attackers to execute arbitrary code via crafted shape data in a Word document, aka "Word Shape Corruption Vulnerability."

CWE : Common Weakness Enumeration

%idName
33% (4) CWE-200 Information Exposure
33% (4) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (1) CWE-601 URL Redirection to Untrusted Site ('Open Redirect')
8% (1) CWE-264 Permissions, Privileges, and Access Controls
8% (1) CWE-94 Failure to Control Generation of Code ('Code Injection')
8% (1) CWE-20 Improper Input Validation

Information Assurance Vulnerability Management (IAVM)

id Description
2014-A-0190 Microsoft Word and Office Remote Code Execution Vulnerability (MS14-081)
Severity: Category II - VMSKEY: V0057701

Snort® IPS/IDS

Date Description
2017-04-12 Microsoft Windows Uniscribe privilege escalation attempt
RuleID : 41933 - Type : FILE-OTHER - Revision : 2
2017-04-12 Microsoft Windows Uniscribe privilege escalation attempt
RuleID : 41932 - Type : FILE-OTHER - Revision : 2
2016-12-06 Microsoft Office Word wwlib out of bounds read attempt
RuleID : 40680 - Type : FILE-OFFICE - Revision : 3
2016-12-06 Microsoft Office Word wwlib out of bounds read attempt
RuleID : 40679 - Type : FILE-OFFICE - Revision : 3
2016-11-11 Microsoft Windows Win32k.sys sbit_Embolden use after free attempt
RuleID : 40428 - Type : OS-WINDOWS - Revision : 2
2016-11-11 Microsoft Windows Win32k.sys sbit_Embolden use after free attempt
RuleID : 40427 - Type : OS-WINDOWS - Revision : 2
2016-11-11 Microsoft Windows GDI+ EMF buffer overread attempt
RuleID : 40426 - Type : OS-WINDOWS - Revision : 2
2016-11-11 Microsoft Windows GDI+ EMF buffer overread attempt
RuleID : 40425 - Type : OS-WINDOWS - Revision : 2
2016-11-08 Microsoft Windows malformed TrueType file RCVT out of bounds read attempt
RuleID : 40409 - Type : FILE-OTHER - Revision : 2
2016-11-08 Microsoft Windows malformed TrueType file RCVT out of bounds read attempt
RuleID : 40408 - Type : FILE-OTHER - Revision : 2
2016-09-08 Microsoft Windows GDI emf file integer overflow attempt
RuleID : 39825 - Type : OS-WINDOWS - Revision : 4
2016-09-08 Microsoft Windows GDI emf file integer overflow attempt
RuleID : 39824 - Type : OS-WINDOWS - Revision : 4
2016-03-14 Microsoft Office Word gdiplus integer overflow attempt
RuleID : 36965 - Type : FILE-OFFICE - Revision : 2
2016-03-14 Microsoft Office Word gdiplus integer overflow attempt
RuleID : 36964 - Type : FILE-OFFICE - Revision : 2
2015-01-08 Microsoft Office RTF object use after free attempt
RuleID : 32708 - Type : FILE-OFFICE - Revision : 2
2015-01-08 Microsoft Office RTF object use after free attempt
RuleID : 32707 - Type : FILE-OFFICE - Revision : 2

Nessus® Vulnerability Scanner

id Description
2018-10-22 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO
2017-03-17 Name: The remote Windows host is affected by multiple vulnerabilities.
File: smb_nt_ms17-013.nasl - Type: ACT_GATHER_INFO
2016-12-14 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macosx_ms16-148_office.nasl - Type: ACT_GATHER_INFO
2016-12-14 Name: An application installed on the remote host is affected by multiple vulnerabi...
File: smb_nt_ms16-148.nasl - Type: ACT_GATHER_INFO
2016-11-16 Name: An application installed on the remote macOS or Mac OS X host is affected by ...
File: macosx_ms16-133_office.nasl - Type: ACT_GATHER_INFO
2016-11-08 Name: An application installed on the remote host is affected by multiple vulnerabi...
File: smb_nt_ms16-133.nasl - Type: ACT_GATHER_INFO
2016-10-12 Name: A multimedia application framework installed on the remote macOS or Mac OS X ...
File: macosx_ms16-120.nasl - Type: ACT_GATHER_INFO
2016-10-12 Name: The remote host is affected by multiple vulnerabilities.
File: smb_nt_ms16-120.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: A multimedia application framework installed on the remote Mac OS X host is a...
File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO
2015-12-08 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: An application installed on the remote Mac OS X host is affected by a remote ...
File: macosx_ms14-081.nasl - Type: ACT_GATHER_INFO
2014-12-09 Name: The remote host is affected by multiple remote code execution vulnerabilities.
File: smb_nt_ms14-081.nasl - Type: ACT_GATHER_INFO
2013-05-15 Name: A Microsoft Office component installed on the remote host is affected by a co...
File: smb_nt_ms13-043.nasl - Type: ACT_GATHER_INFO