Summary
Detail | |||
---|---|---|---|
Vendor | Microsoft | First view | 2003-10-20 |
Product | Visio | Last view | 2024-02-13 |
Version | 2010 | Type | |
Update | |||
Edition | |||
Language | |||
Sofware Edition | |||
Target Software | |||
Target Hardware | |||
Other |
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.8 | 2024-02-13 | CVE-2024-20673 | Microsoft Office Remote Code Execution Vulnerability |
7.1 | 2023-01-10 | CVE-2023-21741 | Microsoft Office Visio Information Disclosure Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21737 | Microsoft Office Visio Remote Code Execution Vulnerability |
7.8 | 2023-01-10 | CVE-2023-21736 | Microsoft Office Visio Remote Code Execution Vulnerability |
7.8 | 2022-12-13 | CVE-2022-44695 | Microsoft Office Visio Remote Code Execution Vulnerability |
7.8 | 2022-09-13 | CVE-2022-38010 | Microsoft Office Visio Remote Code Execution Vulnerability |
7 | 2021-03-11 | CVE-2021-27055 | Microsoft Visio Security Feature Bypass Vulnerability |
8.8 | 2020-04-15 | CVE-2020-0760 | A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991. |
7.8 | 2016-09-14 | CVE-2016-3364 | Microsoft Visio 2016 allows remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." |
7.8 | 2016-06-15 | CVE-2016-3235 | Microsoft Visio 2007 SP3, Visio 2010 SP2, Visio 2013 SP1, Visio 2016, Visio Viewer 2007 SP3, and Visio Viewer 2010 mishandle library loading, which allows local users to gain privileges via a crafted application, aka "Microsoft Office OLE DLL Side Loading Vulnerability." |
4.3 | 2016-01-13 | CVE-2016-0012 | Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka "Microsoft Office ASLR Bypass." |
9.3 | 2015-11-11 | CVE-2015-2503 | Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Microsoft Office Elevation of Privilege Vulnerability." |
9.3 | 2015-10-13 | CVE-2015-2557 | Buffer overflow in Microsoft Visio 2007 SP3 and 2010 SP2 allows remote attackers to execute arbitrary code via crafted UML data in an Office document, aka "Microsoft Office Memory Corruption Vulnerability." |
4.3 | 2015-08-14 | CVE-2015-2423 | Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Visio 2013 RT SP1, Word 2013 RT SP1, and Internet Explorer 7 through 11 allow remote attackers to gain privileges and obtain sensitive information via a crafted command-line parameter to an Office application or Notepad, as demonstrated by a transition from Low Integrity to Medium Integrity, aka "Unsafe Command Line Parameter Passing Vulnerability." |
4.3 | 2013-05-14 | CVE-2013-1301 | Microsoft Visio 2003 SP3 2007 SP3, and 2010 SP1 allows remote attackers to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, aka "XML External Entities Resolution Vulnerability." |
9.3 | 2013-03-12 | CVE-2013-0079 | Microsoft Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file that triggers incorrect memory allocation, aka "Visio Viewer Tree Object Type Confusion Vulnerability." |
9.3 | 2012-08-14 | CVE-2012-1888 | Buffer overflow in Microsoft Visio 2010 SP1 and Visio Viewer 2010 SP1 allows remote attackers to execute arbitrary code via a crafted Visio file, aka "Visio DXF File Format Buffer Overflow Vulnerability." |
9.3 | 2011-08-10 | CVE-2011-1979 | Microsoft Visio 2003 SP3 and 2007 SP2 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "Move Around the Block RCE Vulnerability." |
9.3 | 2011-08-10 | CVE-2011-1972 | Microsoft Visio 2003 SP3, 2007 SP2, and 2010 Gold and SP1 does not properly validate objects in memory during Visio file parsing, which allows remote attackers to execute arbitrary code via a crafted file, aka "pStream Release RCE Vulnerability." |
9.3 | 2011-02-10 | CVE-2011-0093 | ELEMENTS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 does not properly parse structures during the opening of a Visio file, which allows remote attackers to execute arbitrary code via a file containing a malformed structure, aka "Visio Data Type Memory Corruption Vulnerability." |
9.3 | 2011-02-10 | CVE-2011-0092 | The LZW stream decompression functionality in ORMELEMS.DLL in Microsoft Visio 2002 SP2, 2003 SP3, and 2007 SP2 allows remote attackers to execute arbitrary code via a Visio file with a malformed VisioDocument stream that triggers an exception handler that accesses an object that has not been fully initialized, which triggers memory corruption, aka "Visio Object Memory Corruption Vulnerability." |
9.3 | 2010-08-27 | CVE-2010-3148 | Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka "Microsoft Visio Insecure Library Loading Vulnerability." |
7.6 | 2010-05-06 | CVE-2010-1681 | Buffer overflow in VISIODWG.DLL before 10.0.6880.4 in Microsoft Office Visio allows user-assisted remote attackers to execute arbitrary code via a crafted DXF file, a different vulnerability than CVE-2010-0254 and CVE-2010-0256. |
7.6 | 2010-04-14 | CVE-2010-0256 | Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 and SP2 does not properly calculate unspecified indexes associated with Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Visio Index Calculation Memory Corruption Vulnerability." |
7.6 | 2010-04-14 | CVE-2010-0254 | Microsoft Office Visio 2002 SP2, 2003 SP3, and 2007 SP1 and SP2 does not properly validate attributes in Visio files, which allows remote attackers to execute arbitrary code via a crafted file, aka "Visio Attribute Validation Memory Corruption Vulnerability." |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
25% (9) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
25% (9) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
14% (5) | CWE-399 | Resource Management Errors |
14% (5) | CWE-189 | Numeric Errors |
8% (3) | CWE-200 | Information Exposure |
5% (2) | CWE-264 | Permissions, Privileges, and Access Controls |
5% (2) | CWE-20 | Improper Input Validation |
Oval Markup Language : Definitions
OvalID | Name |
---|---|
oval:org.mitre.oval:def:4307 | GDI+ JPEG Parsing Engine Buffer Overflow (VS.NET 2002) |
oval:org.mitre.oval:def:4216 | GDI+ JPEG Parsing Engine Buffer Overflow (IE6) |
oval:org.mitre.oval:def:4003 | GDI+ JPEG Parsing Engine Buffer Overflow (Windows XP) |
oval:org.mitre.oval:def:3881 | GDI+ JPEG Parsing Engine Buffer Overflow (Office XP,SP2) |
oval:org.mitre.oval:def:3810 | GDI+ JPEG Parsing Engine Buffer Overflow (Project 2003) |
oval:org.mitre.oval:def:3320 | GDI+ JPEG Parsing Engine Buffer Overflow Microsoft Office Visio Pro 2003 |
oval:org.mitre.oval:def:3082 | GDI+ JPEG Parsing Engine Buffer Overflow (Visio Pro 2002) |
oval:org.mitre.oval:def:3038 | GDI+ JPEG Parsing Engine Buffer Overflow (Project 2002,SP1) |
oval:org.mitre.oval:def:2706 | GDI+ JPEG Parsing Engine Buffer Overflow (Office 2003) |
oval:org.mitre.oval:def:1721 | GDI+ JPEG Parsing Engine Buffer Overflow (VS.NET 2003) |
oval:org.mitre.oval:def:1105 | GDI+ JPEG Parsing Engine Buffer Overflow (Server 2003) |
oval:org.mitre.oval:def:4022 | Office XP URL Buffer Overflow |
oval:org.mitre.oval:def:2738 | Microsoft Office Visio Professional URL Buffer Overflow |
oval:org.mitre.oval:def:2348 | Windows Project Professional URL Buffer Overflow |
oval:org.mitre.oval:def:1538 | Win2K/XP,SP1 DDS Library Shape Control Buffer Overflow |
oval:org.mitre.oval:def:1535 | Win2k,SP4 DDS Library Shape Control Buffer Overflow |
oval:org.mitre.oval:def:1468 | WinXP,SP2 DDS Library Shape Control Buffer Overflow |
oval:org.mitre.oval:def:1464 | Server 2003,SP1 DDS Library Shape Control Buffer Overflow |
oval:org.mitre.oval:def:1454 | Server 2003 DDS Library Shape Control Buffer Overflow |
oval:org.mitre.oval:def:1155 | WinXP,SP1 (64-bit) DDS Library Shape Control Buffer Overflow |
oval:org.mitre.oval:def:632 | Office Malformed Record Memory Corruption Vulnerability |
oval:org.mitre.oval:def:568 | PowerPoint Malformed Record Memory Corruption Vulnerability |
oval:org.mitre.oval:def:220 | Microsoft PowerPoint Malformed Record Memory Corruption Vulnerability |
oval:org.mitre.oval:def:301 | Excel Malformed Record Vulnerability |
oval:org.mitre.oval:def:1925 | Version Number Memory Corruption Vulnerability |
SAINT Exploits
Description | Link |
---|---|
Microsoft Visio DXF file insertion buffer overflow | More info here |
Microsoft Office Art Property Table Memory Corruption | More info here |
Open Source Vulnerability Database (OSVDB)
id | Description |
---|---|
74398 | Microsoft Visio Move Around the Block Visio File Handling Remote Code Execution |
74397 | Microsoft Visio pStream Release Visio File Handling Remote Code Execution |
70829 | Microsoft Visio Unspecified Data Type Handling Memory Corruption Remote Code ... |
70828 | Microsoft Visio LZW Stream Decompression Exception Remote Code Execution |
67546 | Microsoft Visio Path Subversion Arbitrary DLL Injection Code Execution |
64446 | Microsoft Office Visio VISIODWG.DLL Crafted DXF File Handling Overflow |
63742 | Microsoft Office Visio Unspecified Index Calculation Memory Corruption |
63741 | Microsoft Office Visio Unspecified Attribute Validation Memory Corruption |
58869 | Microsoft Office Malformed Object Handling Memory Corruption Arbitrary Code E... |
58868 | Microsoft Multiple Products GDI+ PNG Image Handling Integer Overflow |
58867 | Microsoft Multiple Products GDI+ .NET API Code Execution Privilege Escalation |
58866 | Microsoft Multiple Products GDI+ TIFF Image Handling Memory Corruption Arbitr... |
58865 | Microsoft Multiple Products GDI+ TIFF Image Handling Overflow |
58864 | Microsoft Multiple Products GDI+ PNG Image Handling Heap Overflow |
58863 | Microsoft Multiple Products GDI+ WMF Image Handling Overflow |
51836 | Microsoft Office Visio File Opening Memory Functions Arbitrary Code Execution |
51835 | Microsoft Office Visio Object Data Memory Functions Arbitrary Code Execution |
51834 | Microsoft Office Visio File Opening Object Data Handling Arbitrary Code Execu... |
47969 | Microsoft Multiple Products GDI+ BMP Integer Calculation Overflow |
47968 | Microsoft Multiple Products GDI+ WMF Image Handling Overflow |
47967 | Microsoft Multiple Products GDI+ GIF Image Handling Arbitrary Code Execution |
47966 | Microsoft Multiple Products GDI+ EMF File Handling Memory Corruption |
47965 | Microsoft Multiple Products GDI+ VML Gradient Size Handling Overflow |
44170 | Microsoft Visio DXF File Handling Memory Validation Arbitrary Code Execution |
44169 | Microsoft Visio Object Header Data Handling Arbitrary Code Execution |
ExploitDB Exploits
id | Description |
---|---|
14944 | MOAUB #8 - Microsoft Office Visio DXF File Stack based Overflow |
OpenVAS Exploits
id | Description |
---|---|
2012-08-15 | Name : Microsoft Office Visio/Viewer Remote Code Execution Vulnerability (2733918) File : nvt/secpod_ms12-059.nasl |
2011-08-11 | Name : Microsoft Visio Remote Code Execution Vulnerabilities (2560978) File : nvt/secpod_ms11-060.nasl |
2011-07-13 | Name : Microsoft Visio Remote Code Execution Vulnerability (2560847) File : nvt/secpod_ms11-055.nasl |
2011-02-09 | Name : Microsoft Visio Remote Code Execution Vulnerabilities (2451879) File : nvt/secpod_ms11-008.nasl |
2011-01-18 | Name : Microsoft Products GDI Plus Remote Code Execution Vulnerabilities (954593) File : nvt/gb_ms08-052.nasl |
2010-09-29 | Name : Microsoft Office Products Insecure Library Loading Vulnerability File : nvt/secpod_ms_office_prdts_insecure_lib_load_vuln.nasl |
2010-04-14 | Name : Microsoft Visio Remote Code Execution Vulnerabilities (980094) File : nvt/secpod_ms10-028.nasl |
2009-10-21 | Name : Microsoft Products GDI Plus Code Execution Vulnerabilities (957488) File : nvt/secpod_ms09-062.nasl |
2009-02-11 | Name : Vulnerabilities in Microsoft Office Visio Could Allow Remote Code Execution (... File : nvt/secpod_ms09-005.nasl |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2015-A-0188 | Cumulative Security Update for Microsoft Internet Explorer (MS15-079) Severity: Category I - VMSKEY: V0061297 |
2015-A-0194 | Multiple Vulnerabilities in Microsoft Office (MS15-081) Severity: Category II - VMSKEY: V0061307 |
2015-A-0197 | Microsoft Command Line Parameter Information Disclosure Vulnerability (MS15-088) Severity: Category II - VMSKEY: V0061313 |
2013-B-0052 | Microsoft Visio Information Disclosure Vulnerability Severity: Category II - VMSKEY: V0037941 |
2013-B-0028 | Microsoft Visio Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0037412 |
2011-B-0097 | Multiple Vulnerabilities in Microsoft Office Visio Severity: Category II - VMSKEY: V0029776 |
2011-A-0098 | Microsoft Visio Remote Code Execution Vulnerability Severity: Category II - VMSKEY: V0029387 |
2009-A-0099 | Multiple Vulnerabilities in Microsoft GDI+ Severity: Category I - VMSKEY: V0021759 |
2008-T-0053 | WinZip gdiplus.dll Microsoft Module Unspecified Security Vulnerability Severity: Category II - VMSKEY: V0017532 |
2008-T-0012 | Microsoft Visio Remote Code Execution Vulnerabilities Severity: Category II - VMSKEY: V0015942 |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Microsoft Multiple Products malformed PNG detected tEXt overflow attempt RuleID : 6700 - Type : FILE-IMAGE - Revision : 20 |
2019-08-27 | Microsoft Windows GDI+ interlaced PNG file parsing heap overflow attempt RuleID : 50798 - Type : FILE-IMAGE - Revision : 1 |
2017-08-23 | Microsoft Internet Explorer GDI VML gradient size heap overflow attempt RuleID : 43622 - Type : BROWSER-IE - Revision : 1 |
2014-01-10 | Microsoft Internet Explorer WMI ASDI Extension ActiveX object access RuleID : 4236 - Type : BROWSER-PLUGINS - Revision : 16 |
2014-01-10 | Microsoft Internet Explorer Helper Object for Java ActiveX object access RuleID : 4235 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer MSVTDGridCtrl7 ActiveX object access RuleID : 4234 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Visual Database Tools Query Designer v7.0 ActiveX... RuleID : 4233 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer SysTray Invoker ActiveX object access RuleID : 4232 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer SysTray ActiveX object access RuleID : 4231 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Search Assistant UI ActiveX object access RuleID : 4230 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer MSAPP Export Support for Office Access ActiveX ob... RuleID : 4229 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Windows Start Menu ActiveX object access RuleID : 4228 - Type : BROWSER-PLUGINS - Revision : 14 |
2014-01-10 | Microsoft Internet Explorer Network Connections ActiveX object access RuleID : 4227 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer DocHost User Interface Handler ActiveX object access RuleID : 4226 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Repository ActiveX object access RuleID : 4225 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer VideoPort ActiveX object access RuleID : 4224 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer OpenCable Class ActiveX object access RuleID : 4223 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer Outllib.dll ActiveX object access RuleID : 4222 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer ProxyStub Dispatch ActiveX object access RuleID : 4221 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Windows Network and Dial-Up Connections ActiveX object access RuleID : 4220 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Windows Network Connections Tray ActiveX object access RuleID : 4219 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Microsoft Windows Visual Basic WebClass ActiveX object access RuleID : 4218 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Office Services on the Web Free/Busy ActiveX object access RuleID : 4217 - Type : BROWSER-PLUGINS - Revision : 14 |
2014-01-10 | Microsoft Internet Explorer CLSID_CComAcctImport ActiveX object access RuleID : 4216 - Type : BROWSER-PLUGINS - Revision : 15 |
2014-01-10 | Microsoft Internet Explorer HTML Popup Window ActiveX object access RuleID : 4215 - Type : BROWSER-PLUGINS - Revision : 15 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2016-09-14 | Name: An application installed on the remote host is affected by multiple vulnerabi... File: smb_nt_ms16-107.nasl - Type: ACT_GATHER_INFO |
2016-06-15 | Name: An application installed on the remote Windows host is affected by multiple v... File: smb_nt_ms16-070.nasl - Type: ACT_GATHER_INFO |
2016-01-12 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms16-004.nasl - Type: ACT_GATHER_INFO |
2015-11-10 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-116.nasl - Type: ACT_GATHER_INFO |
2015-10-13 | Name: The remote Windows host is affected by multiple vulnerabilities. File: smb_nt_ms15-110.nasl - Type: ACT_GATHER_INFO |
2015-08-12 | Name: The remote Windows host is affected by multiple remote code execution vulnera... File: smb_nt_ms15-081.nasl - Type: ACT_GATHER_INFO |
2015-08-11 | Name: The remote Windows host is affected by an information disclosure vulnerability. File: smb_nt_ms15-088.nasl - Type: ACT_GATHER_INFO |
2015-08-11 | Name: The remote host has a web browser installed that is affected by multiple vuln... File: smb_nt_ms15-079.nasl - Type: ACT_GATHER_INFO |
2014-03-10 | Name: Arbitrary code can be executed on the remote host through the Microsoft GDI r... File: smb_kb957488.nasl - Type: ACT_GATHER_INFO |
2013-05-15 | Name: The remote Visio install is affected by an information disclosure vulnerability. File: smb_nt_ms13-044.nasl - Type: ACT_GATHER_INFO |
2013-03-12 | Name: Arbitrary code can be executed on the remote Windows host through Visio or Vi... File: smb_nt_ms13-023.nasl - Type: ACT_GATHER_INFO |
2012-08-15 | Name: Arbitrary code can be executed on the remote Windows host through Visio or Vi... File: smb_nt_ms12-059.nasl - Type: ACT_GATHER_INFO |
2011-08-09 | Name: Arbitrary code can be executed on the remote Windows host through Visio. File: smb_nt_ms11-060.nasl - Type: ACT_GATHER_INFO |
2011-07-12 | Name: Arbitrary code can be executed on the remote Windows host through Visio. File: smb_nt_ms11-055.nasl - Type: ACT_GATHER_INFO |
2011-02-08 | Name: Arbitrary code can be executed on the remote Windows host through Visio. File: smb_nt_ms11-008.nasl - Type: ACT_GATHER_INFO |
2010-04-13 | Name: Arbitrary code can be executed on the remote Windows host through Visio. File: smb_nt_ms10-028.nasl - Type: ACT_GATHER_INFO |
2009-10-15 | Name: Arbitrary code can be executed on the remote host through the Microsoft GDI r... File: smb_nt_ms09-062.nasl - Type: ACT_GATHER_INFO |
2009-02-11 | Name: Arbitrary code can be executed on the remote host through Visio. File: smb_nt_ms09-005.nasl - Type: ACT_GATHER_INFO |
2008-09-10 | Name: Arbitrary code can be executed on the remote host through the Microsoft GDI r... File: smb_nt_ms08-052.nasl - Type: ACT_GATHER_INFO |
2008-04-08 | Name: Arbitrary code can be executed on the remote host through Visio. File: smb_nt_ms08-019.nasl - Type: ACT_GATHER_INFO |
2007-06-14 | Name: Arbitrary code can be executed on the remote host through Visio. File: smb_nt_ms07-030.nasl - Type: ACT_GATHER_INFO |
2007-02-13 | Name: An application installed on the remote Mac OS X host is affected by multiple ... File: macosx_ms_office_feb2006.nasl - Type: ACT_GATHER_INFO |
2007-02-13 | Name: Arbitrary code can be executed on the remote host through Microsoft Office. File: smb_nt_ms07-015.nasl - Type: ACT_GATHER_INFO |
2006-10-11 | Name: An application installed on the remote Mac OS X host is affected by multiple ... File: macosx_ms_office_oct2006.nasl - Type: ACT_GATHER_INFO |
2006-10-10 | Name: Arbitrary code can be executed on the remote host through Microsoft Office. File: smb_nt_ms06-062.nasl - Type: ACT_GATHER_INFO |