Filtered by vendor Microsoft
Subscribe
Total
19339 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2010-3235 | 1 Microsoft | 1 Excel | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Biff Record Vulnerability." | |||||
CVE-2010-3234 | 1 Microsoft | 1 Excel | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Excel 2002 SP3 does not properly validate formula information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Formula Substream Memory Corruption Vulnerability." | |||||
CVE-2010-3233 | 1 Microsoft | 1 Excel | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Excel 2002 SP3 and 2003 SP3 does not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted .wk3 (aka Lotus 1-2-3 workbook) file, aka "Lotus 1-2-3 Workbook Parsing Vulnerability." | |||||
CVE-2010-3232 | 1 Microsoft | 5 Excel, Excel Viewer, Office and 2 more | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Excel 2003 SP3 and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Excel Viewer SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel File Format Parsing Vulnerability." | |||||
CVE-2010-3231 | 1 Microsoft | 3 Excel, Office, Open Xml File Format Converter | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Excel 2002 SP3, Office 2004 and 2008 for Mac, and Open XML File Format Converter for Mac do not properly validate record information, which allows remote attackers to execute arbitrary code via a crafted Excel document, aka "Excel Record Parsing Memory Corruption Vulnerability." | |||||
CVE-2010-3230 | 1 Microsoft | 1 Excel | 2018-10-12 | 9.3 HIGH | N/A |
Integer overflow in Microsoft Excel 2002 SP3 allows remote attackers to execute arbitrary code via an Excel document with crafted record information, aka "Excel Record Parsing Integer Overflow Vulnerability." | |||||
CVE-2010-3223 | 1 Microsoft | 1 Windows Server 2008 | 2018-10-12 | 7.5 HIGH | N/A |
The user interface in Microsoft Cluster Service (MSCS) in Microsoft Windows Server 2008 R2 does not properly set administrative-share permissions for new cluster disks that are shared as part of a failover cluster, which allows remote attackers to read or modify data on these disks via requests to the associated share, aka "Permissions on New Cluster Disks Vulnerability." | |||||
CVE-2010-3221 | 1 Microsoft | 3 Office, Word, Word Viewer | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Word 2002 SP3 and 2003 SP3, Office 2004 for Mac, and Word Viewer do not properly handle a malformed record during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Parsing Vulnerability." | |||||
CVE-2010-3220 | 1 Microsoft | 2 Office, Word | 2018-10-12 | 9.3 HIGH | N/A |
Unspecified vulnerability in Microsoft Word 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Parsing Vulnerability." | |||||
CVE-2010-3219 | 1 Microsoft | 1 Word | 2018-10-12 | 9.3 HIGH | N/A |
Array index vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Index Parsing Vulnerability." | |||||
CVE-2010-3218 | 1 Microsoft | 1 Word | 2018-10-12 | 9.3 HIGH | N/A |
Heap-based buffer overflow in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via malformed records in a Word document, aka "Word Heap Overflow Vulnerability." | |||||
CVE-2010-3217 | 1 Microsoft | 1 Word | 2018-10-12 | 9.3 HIGH | N/A |
Double free vulnerability in Microsoft Word 2002 SP3 allows remote attackers to execute arbitrary code via a Word document with crafted List Format Override (LFO) records, aka "Word Pointer Vulnerability." | |||||
CVE-2010-3216 | 1 Microsoft | 2 Office, Word | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Word 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted Word document containing bookmarks that trigger use of an invalid pointer and memory corruption, aka "Word Bookmarks Vulnerability." | |||||
CVE-2010-3215 | 1 Microsoft | 2 Office, Word | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Word 2002 SP3 and Office 2004 for Mac do not properly handle unspecified return values during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Return Value Vulnerability." | |||||
CVE-2010-3214 | 1 Microsoft | 7 Office, Office Compatibility Pack, Office Web Apps and 4 more | 2018-10-12 | 9.3 HIGH | N/A |
Stack-based buffer overflow in Microsoft Word 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; Word Viewer; Office Web Apps; and Word Web App allows remote attackers to execute arbitrary code via a crafted Word document, aka "Word Stack Overflow Vulnerability." | |||||
CVE-2010-3148 | 1 Microsoft | 1 Visio | 2018-10-12 | 9.3 HIGH | N/A |
Untrusted search path vulnerability in Microsoft Visio 2003 SP3 allows local users to gain privileges via a Trojan horse mfc71enu.dll file in the current working directory, as demonstrated by a directory that contains a .vsd, .vdx, .vst, or .vtx file, aka "Microsoft Visio Insecure Library Loading Vulnerability." | |||||
CVE-2010-3146 | 1 Microsoft | 1 Groove | 2018-10-12 | 9.3 HIGH | N/A |
Multiple untrusted search path vulnerabilities in Microsoft Groove 2007 SP2 allow local users to gain privileges via a Trojan horse (1) mso.dll or (2) GroovePerfmon.dll file in the current working directory, as demonstrated by a directory that contains a Groove vCard (.vcg) or Groove Tool Archive (.gta) file, aka "Microsoft Groove Insecure Library Loading Vulnerability." | |||||
CVE-2010-3138 | 2 Bsplayer, Microsoft | 3 Bs.player, Windows Media Player, Windows Xp | 2018-10-12 | 9.3 HIGH | N/A |
Untrusted search path vulnerability in the Indeo Codec in iac25_32.ax in Microsoft Windows XP SP3 allows local users to gain privileges via a Trojan horse iacenc.dll file in the current working directory, as demonstrated by access through BS.Player or Media Player Classic to a directory that contains a .avi, .mka, .ra, or .ram file, aka "Indeo Codec Insecure Library Loading Vulnerability." NOTE: some of these details are obtained from third party information. | |||||
CVE-2010-2750 | 1 Microsoft | 2 Office, Word | 2018-10-12 | 9.3 HIGH | N/A |
Array index error in Microsoft Word 2002 SP3 and Office 2004 for Mac allows remote attackers to execute arbitrary code via a crafted Word document that triggers memory corruption, aka "Word Index Vulnerability." | |||||
CVE-2010-2748 | 1 Microsoft | 2 Office, Word | 2018-10-12 | 9.3 HIGH | N/A |
Microsoft Word 2002 SP3 and Office 2004 for Mac do not properly check an unspecified boundary during parsing of a Word document, which allows remote attackers to execute arbitrary code via a crafted document that triggers memory corruption, aka "Word Boundary Check Vulnerability." |