Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2010-10-13 |
Product | Office Web Apps | Last view | 2023-02-14 |
Version | 2013 | Type | |
Update | sp1 | ||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
9.8 | 2023-02-14 | CVE-2023-21716 | Microsoft Word Remote Code Execution Vulnerability |
5.5 | 2022-02-09 | CVE-2022-22716 | Microsoft Excel Information Disclosure Vulnerability |
8.8 | 2022-01-11 | CVE-2022-21840 | Microsoft Office Remote Code Execution Vulnerability |
7.8 | 2021-12-15 | CVE-2021-43256 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-09-15 | CVE-2021-38655 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-04-13 | CVE-2021-28453 | Microsoft Word Remote Code Execution Vulnerability |
7.8 | 2021-03-11 | CVE-2021-27057 | Microsoft Office Remote Code Execution Vulnerability |
7.8 | 2021-03-11 | CVE-2021-27054 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-03-11 | CVE-2021-27053 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-02-25 | CVE-2021-24070 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-02-25 | CVE-2021-24069 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-02-25 | CVE-2021-24068 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-02-25 | CVE-2021-24067 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2021-01-12 | CVE-2021-1716 | Microsoft Word Remote Code Execution Vulnerability |
7.8 | 2021-01-12 | CVE-2021-1715 | Microsoft Word Remote Code Execution Vulnerability |
7.8 | 2020-12-10 | CVE-2020-17129 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2020-12-10 | CVE-2020-17128 | Microsoft Excel Remote Code Execution Vulnerability |
5.5 | 2020-12-10 | CVE-2020-17126 | Microsoft Excel Information Disclosure Vulnerability |
7.8 | 2020-12-10 | CVE-2020-17125 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2020-12-10 | CVE-2020-17123 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2020-12-10 | CVE-2020-17122 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2020-11-11 | CVE-2020-17065 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2020-11-11 | CVE-2020-17064 | Microsoft Excel Remote Code Execution Vulnerability |
7.8 | 2020-10-16 | CVE-2020-16932 | A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory. |
7.8 | 2020-10-16 | CVE-2020-16931 | A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
44% (28) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
12% (8) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
9% (6) | CWE-125 | Out-of-bounds Read |
6% (4) | CWE-416 | Use After Free |
6% (4) | CWE-200 | Information Exposure |
4% (3) | CWE-787 | Out-of-bounds Write |
3% (2) | CWE-399 | Resource Management Errors |
3% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
3% (2) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
3% (2) | CWE-20 | Improper Input Validation |
1% (1) | CWE-284 | Access Control (Authorization) Issues |
1% (1) | CWE-254 | Security Features |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:7322 | Word Stack Overflow Vulnerability |
oval:org.mitre.oval:def:12907 | SharePoint Remote File Disclosure Vulnerability |
oval:org.mitre.oval:def:15589 | XSS scriptresx.ashx Vulnerability - MS12-050 |
oval:org.mitre.oval:def:15265 | SharePoint Search Scope Vulnerability - MS12-050 |
oval:org.mitre.oval:def:15544 | SharePoint Script in Username Vulnerability - MS12-050 |
oval:org.mitre.oval:def:14976 | Vulnerability in HTML Sanitization Component Could Allow Elevation of Privile... |
oval:org.mitre.oval:def:16073 | Word RTF 'listoverridecount' Remote Code Execution Vulnerability - MS12-079 |
oval:org.mitre.oval:def:16599 | Vulnerability in HTML sanitization component could allow elevation of privile... |
oval:org.mitre.oval:def:18950 | Microsoft Office Memory Corruption Vulnerability (CVE-2013-1315) - MS13-073 |
oval:org.mitre.oval:def:18543 | Microsoft Office Memory Corruption Vulnerability (CVE-2013-1315) MS13-073 (Ma... |
oval:org.mitre.oval:def:18333 | Microsoft Office memory corruption vulnerability (CVE-2013-1315) - MS13-067 |
oval:org.mitre.oval:def:19040 | MAC disabled vulnerability in Microsoft SharePoint and Microsoft Exchange Ser... |
oval:org.mitre.oval:def:18988 | Denial of service vulnerability in Microsoft SharePoint (CVE-2013-3847) - MS1... |
oval:org.mitre.oval:def:18749 | Word Memory Corruption Vulnerability (CVE-2013-3847) - MS13-072 |
oval:org.mitre.oval:def:18800 | Denial of service vulnerability in Microsoft SharePoint (CVE-2013-3848) - MS1... |
oval:org.mitre.oval:def:18281 | Word Memory Corruption Vulnerability (CVE-2013-3848) - MS13-072 |
oval:org.mitre.oval:def:19100 | Denial of service vulnerability in Microsoft SharePoint (CVE-2013-3849) - MS1... |
oval:org.mitre.oval:def:18774 | Word Memory Corruption Vulnerability (CVE-2013-3849) - MS13-072 |
oval:org.mitre.oval:def:18942 | Word memory corruption vulnerability in Microsoft SharePoint (CVE-2013-3857) ... |
oval:org.mitre.oval:def:18741 | Word Memory Corruption Vulnerability (CVE-2013-3857) - MS13-072 |
oval:org.mitre.oval:def:18801 | Memory corruption vulnerability in Microsoft SharePoint (CVE-2013-3858) - MS1... |
oval:org.mitre.oval:def:18709 | Word Memory Corruption Vulnerability (CVE-2013-3858) - MS13-072 |
oval:org.mitre.oval:def:19132 | Microsoft Excel Memory Corruption Vulnerability (CVE-2013-3889) - MS13-084, M... |
oval:org.mitre.oval:def:18901 | Remote code execution vulnerability in Microsoft Office for Mac 2011 (CVE-201... |
oval:org.mitre.oval:def:18991 | Parameter injection vulnerability in Microsoft SharePoint (CVE-2013-3895) - M... |
SAINT Exploits
Description | Link |
---|---|
Microsoft Word RTF Object Confusion | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
75392 | Microsoft SharePoint XML File Arbitrary File Disclosure |
75381 | Microsoft SharePoint XML / XSL File Handling Unspecified Arbitrary File Discl... |
68581 | Microsoft Office Word File Unspecified Structure Handling Stack Overflow |
ExploitDB Exploits
id | Description |
---|---|
32793 | MS14-017 Microsoft Word RTF Object Confusion |
17873 | File disclosure via XEE in SharePoint 2007/2010 and DotNetNuke < 6 |
OpenVAS Exploits
id | Description |
---|---|
2012-12-12 | Name : Microsoft Office Word Remote Code Execution Vulnerability (2780642) File : nvt/secpod_ms12-079.nasl |
2012-10-10 | Name : Microsoft Products HTML Sanitisation Component XSS Vulnerability (2741517) File : nvt/secpod_ms12-066.nasl |
2012-07-11 | Name : Microsoft SharePoint Multiple Privilege Elevation Vulnerabilities (2695502) File : nvt/secpod_ms12-050.nasl |
2011-09-14 | Name : Microsoft SharePoint Multiple Privilege Escalation Vulnerabilities (2451858) File : nvt/secpod_ms11-074.nasl |
2010-10-13 | Name : Microsoft Office Word Remote Code Execution Vulnerabilities (2293194) File : nvt/secpod_ms10-079.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0090 | Multiple Vulnerabilities in Microsoft Office (MS15-033) Severity: Category II - VMSKEY: V0059895 |
2014-A-0049 | Multiple Vulnerabilities in Microsoft Office Severity: Category II - VMSKEY: V0048675 |
2014-A-0006 | Multiple Vulnerabilities in Microsoft Office and Web Apps Severity: Category II - VMSKEY: V0043406 |
2013-B-0136 | Microsoft SharePoint Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0042583 |
2013-A-0231 | Multiple Vulnerabilities in Microsoft Exchange Server Severity: Category I - VMSKEY: V0042592 |
2013-B-0114 | Multiple Vulnerabilities in Microsoft Office Excel Severity: Category II - VMSKEY: V0040757 |
2013-B-0116 | Microsoft SharePoint Remote Code Execution Vulnerabilities Severity: Category II - VMSKEY: V0040765 |
2013-A-0178 | Multiple Vulnerabilities in Microsoft Office Severity: Category II - VMSKEY: V0040289 |
2013-A-0174 | Multiple Remote Code Execution Vulnerabilities in Microsoft SharePoint Server Severity: Category II - VMSKEY: V0040292 |
2013-A-0171 | Multiple Remote Code Execution Vulnerabilities in Microsoft Excel Severity: Category I - VMSKEY: V0040295 |
2013-A-0083 | Microsoft Office HTML Sanitization Privilege Escalation Vulnerability Severity: Category II - VMSKEY: V0037613 |
2012-A-0194 | Microsoft Office Word Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0035492 |
2011-B-0115 | Multiple Vulnerabilities in Microsoft Office SharePoint Severity: Category II - VMSKEY: V0030239 |
2010-A-0145 | Multiple Vulnerabilities in Microsoft Office Word Severity: Category II - VMSKEY: V0025510 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-07-23 | Microsoft Office Excel malicious cce value following a PtgMemFunc token RuleID : 50462 - Type : FILE-OFFICE - Revision : 1 |
2019-07-23 | Microsoft Office Excel malicious cce value following a PtgMemFunc token RuleID : 50461 - Type : FILE-OFFICE - Revision : 1 |
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49049 - Type : FILE-OFFICE - Revision : 1 |
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49048 - Type : FILE-OFFICE - Revision : 1 |
2019-01-15 | Microsoft Office Powerpoint use after free attempt RuleID : 48602 - Type : FILE-OFFICE - Revision : 2 |
2019-01-15 | Microsoft Office Powerpoint use after free attempt RuleID : 48601 - Type : FILE-OFFICE - Revision : 2 |
2018-12-14 | Microsoft Office directory entry remote code execution attempt RuleID : 48379 - Type : FILE-OFFICE - Revision : 1 |
2018-12-14 | Microsoft Office directory entry remote code execution attempt RuleID : 48378 - Type : FILE-OFFICE - Revision : 1 |
2018-06-07 | Microsoft Office Outlook HTML acronym tag memory corruption attempt RuleID : 46602 - Type : FILE-OFFICE - Revision : 3 |
2018-06-07 | Microsoft Office Outlook HTML acronym tag memory corruption attempt RuleID : 46601 - Type : FILE-OFFICE - Revision : 3 |
2018-05-10 | Microsoft Office Excel graphics remote code execution attempt RuleID : 46183 - Type : FILE-OFFICE - Revision : 1 |
2018-05-10 | Microsoft Office Excel graphics remote code execution attempt RuleID : 46182 - Type : FILE-OFFICE - Revision : 1 |
2018-04-11 | Microsoft Office RTF listoverride memory corruption attempt RuleID : 45880 - Type : FILE-OFFICE - Revision : 2 |
2018-04-11 | Microsoft Office RTF listoverride memory corruption attempt RuleID : 45879 - Type : FILE-OFFICE - Revision : 2 |
2018-02-08 | Microsoft Office Word memory corruption exploit attempt RuleID : 45403 - Type : FILE-OFFICE - Revision : 3 |
2018-02-08 | Microsoft Office Word memory corruption exploit attempt RuleID : 45402 - Type : FILE-OFFICE - Revision : 3 |
2017-11-16 | Microsoft Office Word docx object type confusion attempt RuleID : 44586 - Type : FILE-OFFICE - Revision : 3 |
2017-11-16 | Microsoft Office Word docx object type confusion attempt RuleID : 44585 - Type : FILE-OFFICE - Revision : 3 |
2017-10-17 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 44364 - Type : FILE-OFFICE - Revision : 2 |
2017-10-17 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 44363 - Type : FILE-OFFICE - Revision : 2 |
2017-07-11 | Microsoft Office Word 2016 use after free attempt RuleID : 43160 - Type : FILE-OFFICE - Revision : 5 |
2017-07-11 | Microsoft Office Word 2016 use after free attempt RuleID : 43159 - Type : FILE-OFFICE - Revision : 5 |
2017-04-14 | Microsoft Office Word out of bounds read attempt RuleID : 41982 - Type : FILE-OFFICE - Revision : 3 |
2017-04-14 | Microsoft Office Word out of bounds read attempt RuleID : 41981 - Type : FILE-OFFICE - Revision : 3 |
2017-04-12 | Microsoft Office Word 2010 use-after-free memory corruption vulnerability att... RuleID : 41965 - Type : FILE-OFFICE - Revision : 4 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2018-12-13 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_dec_office.nasl - Type: ACT_GATHER_INFO |
2018-03-13 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macos_ms18_mar_office.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: An application installed on the remote Windows host is affected by multiple r... File: smb_nt_ms17_oct_office_web.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The Microsoft Sharepoint Server installation on the remote host is affected b... File: smb_nt_ms17_oct_office_sharepoint.nasl - Type: ACT_GATHER_INFO |
2017-10-11 | Name: The Microsoft Office Products are affected by multiple vulnerabilities. File: smb_nt_ms17_oct_office.nasl - Type: ACT_GATHER_INFO |
2017-10-10 | Name: The Microsoft Office Products are missing a security update. File: smb_nt_ms17_oct_word_viewer.nasl - Type: ACT_GATHER_INFO |
2017-10-10 | Name: Microsoft Office Compatibility Pack SP3 is affected by a remote code executio... File: smb_nt_ms17_oct_office_compatibility.nasl - Type: ACT_GATHER_INFO |
2017-09-13 | Name: An application installed on the remote Windows host is affected by multiple r... File: smb_nt_ms17_sep_office_web.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Excel Products are affected by multiple vulnerabilities. File: smb_nt_ms17_sep_excel.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macosx_ms17_sep_office.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_4038777.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Office Products are affected by multiple vulnerabilities. File: smb_nt_ms17_sep_office.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: Microsoft Office Compatibility Pack SP3 is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_office_compatibility.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Office Products are affected by multiple vulnerabilities. File: smb_nt_ms17_sep_office_viewers.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Powerpoint Products are affected by multiple vulnerabilities. File: smb_nt_ms17_sep_powerpoint.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Sharepoint Server installation on the remote host is affected b... File: smb_nt_ms17_sep_office_sharepoint.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The Microsoft Skype for Business or Microsoft Lync or Microsoft Live Meeting ... File: smb_nt_ms17_sep_skype.nasl - Type: ACT_GATHER_INFO |
2017-09-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms17_sep_win2008.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms17_jun_office_web.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms17_jun_office_sharepoint.nasl - Type: ACT_GATHER_INFO |
2017-06-14 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms17_jun_office.nasl - Type: ACT_GATHER_INFO |
2017-06-13 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macosx_ms17_june_office.nasl - Type: ACT_GATHER_INFO |
2017-05-19 | Name: An application installed on the remote macOS or Mac OS X host is affected by ... File: macosx_ms17_may_office.nasl - Type: ACT_GATHER_INFO |
2017-05-10 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms17_may_office.nasl - Type: ACT_GATHER_INFO |
2017-04-12 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms17_apr_office.nasl - Type: ACT_GATHER_INFO |