Executive Summary
This Alert is flagged as TOP 25 Common Weakness Enumeration from CWE/SANS. For more information, you can read this.
Informations | |||
---|---|---|---|
Name | CVE-2015-1639 | First vendor Publication | 2015-04-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:N/I:P/A:N) | |||
---|---|---|---|
Cvss Base Score | 4.3 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cross-site scripting (XSS) vulnerability in Microsoft Office for Mac 2011 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Outlook App for Mac XSS Vulnerability." |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1639 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:28538 | |||
Oval ID: | oval:org.mitre.oval:def:28538 | ||
Title: | Microsoft Outlook App for Mac XSS vulnerability – CVE-2015-1639 (MS15-033) (Mac OS X) | ||
Description: | Cross-site scripting (XSS) vulnerability in Microsoft Office for Mac 2011 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors, aka "Microsoft Outlook App for Mac XSS Vulnerability." | ||
Family: | macos | Class: | vulnerability |
Reference(s): | CVE-2015-1639 | Version: | 3 |
Platform(s): | Apple Mac OS X Apple Mac OS X Server | Product(s): | Microsoft Office 2011 for Mac |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2015-04-16 | IAVM : 2015-A-0090 - Multiple Vulnerabilities in Microsoft Office (MS15-033) Severity : Category II - VMSKEY : V0059895 |
Snort® IPS/IDS
Date | Description |
---|---|
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49049 - Revision : 1 - Type : FILE-OFFICE |
2019-03-05 | Microsoft Office XML nested num tag double-free attempt RuleID : 49048 - Revision : 1 - Type : FILE-OFFICE |
2017-10-17 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 44364 - Revision : 2 - Type : FILE-OFFICE |
2017-10-17 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 44363 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader CLSID ASLR bypass download attempt RuleID : 40635 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly CLSID ASLR bypass download attempt RuleID : 40634 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader CLSID ASLR bypass download attempt RuleID : 40633 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly CLSID ASLR bypass download attempt RuleID : 40632 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded wrLoader ASLR bypass download attempt RuleID : 40631 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader ASLR bypass download attempt RuleID : 40630 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAssembly ASLR bypass download attempt RuleID : 40629 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRAsembly ASLR bypass download attempt RuleID : 40628 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader CLSID ASLR bypass download attempt RuleID : 40627 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader ASLR bypass download attempt RuleID : 40626 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRAssembly CLSID ASLR bypass download attempt RuleID : 40625 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded wrLoader ASLR bypass download attempt RuleID : 40624 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF hex encoded WRLoader ASLR bypass download attempt RuleID : 40623 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader CLSID ASLR bypass download attempt RuleID : 40622 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRLoader ASLR bypass download attempt RuleID : 40621 - Revision : 2 - Type : FILE-OFFICE |
2016-12-06 | Microsoft Office RTF WRAssembly CLSID ASLR bypass download attempt RuleID : 40620 - Revision : 2 - Type : FILE-OFFICE |
2016-07-12 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39529-community - Revision : 4 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39529 - Revision : 4 - Type : FILE-OFFICE |
2016-07-12 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39528-community - Revision : 4 - Type : FILE-OFFICE |
2016-08-11 | Microsoft Office RTF WRAssembly ASLR bypass download attempt RuleID : 39528 - Revision : 4 - Type : FILE-OFFICE |
2016-07-12 | RTF document incorrect file magic attempt RuleID : 39527-community - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | RTF document incorrect file magic attempt RuleID : 39527 - Revision : 2 - Type : FILE-OFFICE |
2016-07-12 | RTF document incorrect file magic attempt RuleID : 39526-community - Revision : 2 - Type : FILE-OFFICE |
2016-08-11 | RTF document incorrect file magic attempt RuleID : 39526 - Revision : 2 - Type : FILE-OFFICE |
2016-04-20 | RFT document malformed header RuleID : 38581-community - Revision : 2 - Type : FILE-OFFICE |
2016-05-25 | RFT document malformed header RuleID : 38581 - Revision : 2 - Type : FILE-OFFICE |
2016-04-20 | RFT document malformed header RuleID : 38580-community - Revision : 2 - Type : FILE-OFFICE |
2016-05-25 | RFT document malformed header RuleID : 38580 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 36245 - Revision : 2 - Type : FILE-OFFICE |
2016-03-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 36244 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF out-of-bounds array access remote code execution attempt RuleID : 34094 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF out-of-bounds array access remote code execution attempt RuleID : 34093 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF double-free remote code execution attempt RuleID : 34087 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office RTF double-free remote code execution attempt RuleID : 34086 - Revision : 2 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 34067 - Revision : 3 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office XML nested num tag double-free attempt RuleID : 34066 - Revision : 3 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office Word document memory corruption attempt RuleID : 34063 - Revision : 3 - Type : FILE-OFFICE |
2015-05-14 | Microsoft Office Word document memory corruption attempt RuleID : 34062 - Revision : 4 - Type : FILE-OFFICE |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2015-04-14 | Name : An application installed on the remote Mac OS X host is affected by multiple ... File : macosx_ms15-033_office_2011.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : An application installed on the remote Mac OS X host is affected by a cross-s... File : macosx_ms15-033_outlook_for_office365.nasl - Type : ACT_GATHER_INFO |
2015-04-14 | Name : The remote host is affected by multiple remote code execution vulnerabilities. File : smb_nt_ms15-033.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Source | Url |
---|
Alert History
Date | Informations |
---|---|
2024-11-28 12:45:58 |
|
2021-05-04 12:38:38 |
|
2021-04-22 01:47:21 |
|
2020-05-23 00:44:30 |
|
2018-10-13 05:18:52 |
|
2016-06-30 21:40:46 |
|
2015-10-18 17:23:33 |
|
2015-09-17 00:22:38 |
|
2015-04-30 09:27:53 |
|
2015-04-16 05:27:04 |
|
2015-04-15 13:28:25 |
|
2015-04-15 05:28:29 |
|