This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Microsoft First view 2014-10-15
Product Word Web Apps Last view 2015-08-14
Version 2010 Type Application
Update sp2  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:microsoft:word_web_apps

Activity : Overall

Related : CVE

  Date Alert Description
9.3 2015-08-14 CVE-2015-2468

Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office for Mac 2011, Office for Mac 2016, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Word Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability."

9.3 2014-10-15 CVE-2014-4117

Microsoft Office 2007 SP3, Word 2007 SP3, Office 2010 SP1 and SP2, Word 2010 SP1 and SP2, Office for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP1 and SP2, and Word Web Apps 2010 Gold, SP1, and SP2 allow remote attackers to execute arbitrary code via crafted properties in a Word document, aka "Microsoft Word File Format Vulnerability."

CWE : Common Weakness Enumeration

%idName
50% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
50% (1) CWE-20 Improper Input Validation

Information Assurance Vulnerability Management (IAVM)

id Description
2015-A-0194 Multiple Vulnerabilities in Microsoft Office (MS15-081)
Severity: Category II - VMSKEY: V0061307

Snort® IPS/IDS

Date Description
2019-03-26 Microsoft Office Word styleWithEffects use-after-free attempt
RuleID : 49254 - Type : FILE-OFFICE - Revision : 4
2019-03-26 Microsoft Office Word styleWithEffects use-after-free attempt
RuleID : 49253 - Type : FILE-OFFICE - Revision : 4
2015-09-10 Microsoft Office Word mso.dll use-after-free attempt
RuleID : 35506 - Type : FILE-OFFICE - Revision : 2
2015-09-10 Microsoft Office Word mso.dll use-after-free attempt
RuleID : 35505 - Type : FILE-OFFICE - Revision : 2
2015-08-04 Microsoft Office Word nested tblStylePr element use after free attempt
RuleID : 35021 - Type : FILE-OFFICE - Revision : 3
2015-08-04 Microsoft Office Word nested tblStylePr element use after free attempt
RuleID : 35020 - Type : FILE-OFFICE - Revision : 4
2015-08-04 Microsoft Office Word nested tblStylePr element use after free attempt
RuleID : 35019 - Type : FILE-OFFICE - Revision : 3
2015-08-04 Microsoft Office Word nested tblStylePr element use after free attempt
RuleID : 35018 - Type : FILE-OFFICE - Revision : 3
2014-11-16 Microsoft Office Word styleWithEffects use-after-free attempt
RuleID : 32148 - Type : FILE-OFFICE - Revision : 4
2014-11-16 Microsoft Office Word styleWithEffects use-after-free attempt
RuleID : 32147 - Type : FILE-OFFICE - Revision : 4

Nessus® Vulnerability Scanner

id Description
2015-08-12 Name: An application installed on the remote Mac OS X host is affected by multiple ...
File: macosx_ms15-081_office_2011.nasl - Type: ACT_GATHER_INFO
2015-08-12 Name: The remote Windows host is affected by multiple remote code execution vulnera...
File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO
2014-10-15 Name: An application installed on the remote Mac OS X host is affected by a remote ...
File: macosx_ms14-061.nasl - Type: ACT_GATHER_INFO
2014-10-15 Name: The remote host is affected by a remote code execution vulnerability.
File: smb_nt_ms14-061.nasl - Type: ACT_GATHER_INFO