Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2013-05-14 |
Product | Word Viewer | Last view | 2019-03-05 |
Version | - | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:microsoft:word_viewer |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
5.5 | 2019-03-05 | CVE-2019-0540 | A security feature bypass vulnerability exists when Microsoft Office does not validate URLs.An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials, aka 'Microsoft Office Security Feature Bypass Vulnerability'. |
7.8 | 2018-10-10 | CVE-2018-8432 | A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka "Microsoft Graphics Components Remote Code Execution Vulnerability." This affects Windows 7, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft Excel Viewer, Microsoft PowerPoint Viewer, Windows Server 2019, Windows Server 2008 R2, Windows 10, Windows Server 2008. |
7.8 | 2017-03-16 | CVE-2017-0108 | The Windows Graphics Component in Microsoft Office 2007 SP3; 2010 SP2; and Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Live Meeting 2007; Silverlight 5; Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; and Windows 7 SP1 allows remote attackers to execute arbitrary code via a crafted web site, aka "Graphics Component Remote Code Execution Vulnerability." This vulnerability is different from that described in CVE-2017-0014. |
7.8 | 2016-12-20 | CVE-2016-7298 | Microsoft Office 2007 SP3, Office 2010 SP2, Word Viewer, Office for Mac 2011, and Office 2016 for Mac allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." |
6.5 | 2016-11-10 | CVE-2016-7233 | Microsoft Word 2007, Office 2010 SP2, Word 2010 SP2, Word for Mac 2011, Excel for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2013 SP1, and Office Web Apps 2010 SP2 allow remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via a crafted Office document, aka "Microsoft Office Information Disclosure Vulnerability." |
9.8 | 2016-10-13 | CVE-2016-7182 | The Graphics component in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows attackers to execute arbitrary code via a crafted True Type font, aka "True Type Font Parsing Elevation of Privilege Vulnerability." |
7.8 | 2016-10-13 | CVE-2016-3396 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "GDI+ Remote Code Execution Vulnerability." |
5.5 | 2016-10-13 | CVE-2016-3263 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3262. |
5.5 | 2016-10-13 | CVE-2016-3262 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; and Live Meeting 2007 Console allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "GDI+ Information Disclosure Vulnerability," a different vulnerability than CVE-2016-3263. |
5.5 | 2016-10-13 | CVE-2016-3209 | Graphics Device Interface (aka GDI or GDI+) in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT 8.1; Windows 10 Gold, 1511, and 1607; Office 2007 SP3; Office 2010 SP2; Word Viewer; Skype for Business 2016; Lync 2013 SP1; Lync 2010; Lync 2010 Attendee; Live Meeting 2007 Console; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4.5.2, and 4.6; and Silverlight 5 allows remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "True Type Font Parsing Information Disclosure Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6108 | The Windows font library in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2 SP1; Windows 7 SP1; Windows 8; Windows 8.1; Windows Server 2012 Gold and R2; Windows RT Gold and 8.1; Office 2007 SP3; Office 2010 SP2; Word Viewer; .NET Framework 3.0 SP2, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, and 4.6; Skype for Business 2016; Lync 2010; Lync 2013 SP1; Live Meeting 2007 Console; and Silverlight 5 allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
9.3 | 2015-12-09 | CVE-2015-6107 | The Windows font library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10 Gold and 1511, Office 2007 SP3, Office 2010 SP2, Word Viewer, Skype for Business 2016, Lync 2010, Lync 2013 SP1, and Live Meeting 2007 Console allows remote attackers to execute arbitrary code via a crafted embedded font, aka "Graphics Memory Corruption Vulnerability." |
9.3 | 2014-12-10 | CVE-2014-6357 | Use-after-free vulnerability in Microsoft Office 2010 SP2, Office 2013 Gold and SP1, Office 2013 RT Gold and SP1, Office for Mac 2011, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 Gold and SP1, and Office Web Apps 2010 SP2 and 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka "Use After Free Word Remote Code Execution Vulnerability." |
9.3 | 2013-05-14 | CVE-2013-1335 | Microsoft Word 2003 SP3 and Word Viewer allow remote attackers to execute arbitrary code via crafted shape data in a Word document, aka "Word Shape Corruption Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
33% (4) | CWE-200 | Information Exposure |
33% (4) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
8% (1) | CWE-601 | URL Redirection to Untrusted Site ('Open Redirect') |
8% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
8% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
8% (1) | CWE-20 | Improper Input Validation |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-A-0190 | Microsoft Word and Office Remote Code Execution Vulnerability (MS14-081) Severity: Category II - VMSKEY: V0057701 |
Snort® IPS/IDS
Date | Description |
---|---|
2017-04-12 | Microsoft Windows Uniscribe privilege escalation attempt RuleID : 41933 - Type : FILE-OTHER - Revision : 2 |
2017-04-12 | Microsoft Windows Uniscribe privilege escalation attempt RuleID : 41932 - Type : FILE-OTHER - Revision : 2 |
2016-12-06 | Microsoft Office Word wwlib out of bounds read attempt RuleID : 40680 - Type : FILE-OFFICE - Revision : 3 |
2016-12-06 | Microsoft Office Word wwlib out of bounds read attempt RuleID : 40679 - Type : FILE-OFFICE - Revision : 3 |
2016-11-11 | Microsoft Windows Win32k.sys sbit_Embolden use after free attempt RuleID : 40428 - Type : OS-WINDOWS - Revision : 2 |
2016-11-11 | Microsoft Windows Win32k.sys sbit_Embolden use after free attempt RuleID : 40427 - Type : OS-WINDOWS - Revision : 2 |
2016-11-11 | Microsoft Windows GDI+ EMF buffer overread attempt RuleID : 40426 - Type : OS-WINDOWS - Revision : 2 |
2016-11-11 | Microsoft Windows GDI+ EMF buffer overread attempt RuleID : 40425 - Type : OS-WINDOWS - Revision : 3 |
2016-11-08 | Microsoft Windows malformed TrueType file RCVT out of bounds read attempt RuleID : 40409 - Type : FILE-OTHER - Revision : 2 |
2016-11-08 | Microsoft Windows malformed TrueType file RCVT out of bounds read attempt RuleID : 40408 - Type : FILE-OTHER - Revision : 2 |
2016-09-08 | Microsoft Windows GDI emf file integer overflow attempt RuleID : 39825 - Type : OS-WINDOWS - Revision : 4 |
2016-09-08 | Microsoft Windows GDI emf file integer overflow attempt RuleID : 39824 - Type : OS-WINDOWS - Revision : 5 |
2016-03-14 | Microsoft Office Word gdiplus integer overflow attempt RuleID : 36965 - Type : FILE-OFFICE - Revision : 2 |
2016-03-14 | Microsoft Office Word gdiplus integer overflow attempt RuleID : 36964 - Type : FILE-OFFICE - Revision : 2 |
2015-01-08 | Microsoft Office RTF object use after free attempt RuleID : 32708 - Type : FILE-OFFICE - Revision : 2 |
2015-01-08 | Microsoft Office RTF object use after free attempt RuleID : 32707 - Type : FILE-OFFICE - Revision : 2 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-10-22 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_oct_office.nasl - Type: ACT_GATHER_INFO |
2017-03-17 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17-013.nasl - Type: ACT_GATHER_INFO |
2016-12-14 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macosx_ms16-148_office.nasl - Type: ACT_GATHER_INFO |
2016-12-14 | Name: An application installed on the remote host is affected by multiple vulnerabi... File: smb_nt_ms16-148.nasl - Type: ACT_GATHER_INFO |
2016-11-16 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macosx_ms16-133_office.nasl - Type: ACT_GATHER_INFO |
2016-11-08 | Name: An application installed on the remote host is affected by multiple vulnerabi... File: smb_nt_ms16-133.nasl - Type: ACT_GATHER_INFO |
2016-10-12 | Name: A multimedia application framework installed on the remote macOS or Mac OS X ... File: macosx_ms16-120.nasl - Type: ACT_GATHER_INFO |
2016-10-12 | Name: The remote host is affected by multiple vulnerabilities. File: smb_nt_ms16-120.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: A multimedia application framework installed on the remote Mac OS X host is a... File: macosx_ms15-128.nasl - Type: ACT_GATHER_INFO |
2015-12-08 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms15-128.nasl - Type: ACT_GATHER_INFO |
2014-12-09 | Name: An application installed on the remote Mac OS X host is affected by a remote ... File: macosx_ms14-081.nasl - Type: ACT_GATHER_INFO |
2014-12-09 | Name: The remote host is affected by multiple remote code execution vulnerabilities. File: smb_nt_ms14-081.nasl - Type: ACT_GATHER_INFO |
2013-05-15 | Name: A Microsoft Office component installed on the remote host is affected by a co... File: smb_nt_ms13-043.nasl - Type: ACT_GATHER_INFO |