Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft word 2002 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-1143
Microsoft Word and Excel allow remote malicious users to steal sensitive information via certain field codes that insert the information when the document is returned to the attacker, as demonstrated in Word using (1) INCLUDETEXT or (2) INCLUDEPICTURE, aka "Flaw in Word Fiel...
Microsoft Excel 2002
Microsoft Word 2000
Microsoft Word
Microsoft Word 97
Microsoft Word 98
Microsoft Word 2002
Microsoft Word 2001
2 EDB exploits
NA
CVE-2003-0664
Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows malicious users to bypass the macro security model and automatically execute arbitrary macros via a malicious document.
Microsoft Word 98
Microsoft Word 2000
Microsoft Word 2002
Microsoft Works 2001
Microsoft Works 2002
Microsoft Works 2003
Microsoft Word 97
NA
CVE-2002-1056
Microsoft Outlook 2000 and 2002, when configured to use Microsoft Word as the email editor, does not block scripts that are used while editing email messages in HTML or Rich Text Format (RTF), which could allow remote malicious users to execute arbitrary scripts via an email that...
Microsoft Outlook 2000
Microsoft Outlook 2002
Microsoft Word 2000
Microsoft Word 2002
NA
CVE-2003-0820
Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote malicious users to execute arbitrary code via a buffer overflow attack.
Microsoft Word 98
Microsoft Word 2000
Microsoft Works 2001
Microsoft Works 2002
Microsoft Word 97
Microsoft Word 2002
Microsoft Works 2003
Microsoft Works 2004
NA
CVE-2003-0821
Microsoft Excel 97, 2000, and 2002 allows remote malicious users to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
Microsoft Word 97
Microsoft Word 98
Microsoft Word 2000
Microsoft Works 2004
Microsoft Word 2002
Microsoft Works 2001
Microsoft Works 2002
Microsoft Works 2003
NA
CVE-2005-0558
Buffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote malicious users to execute arbitrary code via a crafted document.
Microsoft Word 2002
Microsoft Word 2003
Microsoft Word 2000
NA
CVE-2005-0564
Stack-based buffer overflow in Microsoft Word 2000 and Word 2002, and Microsoft Works Suites 2000 through 2004, might allow remote malicious users to execute arbitrary code via a .doc file with long font information.
Microsoft Word 2000
Microsoft Word 2002
NA
CVE-2010-1903
Microsoft Office Word 2002 SP3 and 2003 SP3, and Office Word Viewer, allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a malformed record in a Word file, aka "Word HTML Linked Objects Memory Corruption Vulnerability....
Microsoft Word 2002
Microsoft Word 2003
Microsoft Office Word Viewer
NA
CVE-2008-1092
Buffer overflow in msjet40.dll prior to 4.0.9505.0 in Microsoft Jet Database Engine allows remote malicious users to execute arbitrary code via a crafted Word file, as exploited in the wild in March 2008. NOTE: as of 20080513, Microsoft has stated that this is the same issue as C...
Microsoft Word 2007 Sp1
Microsoft Word 2000
Microsoft Word 2003 Sp3
Microsoft Word 2007
Microsoft Word 2002
Microsoft Word 2003
NA
CVE-2010-3221
Microsoft Word 2002 SP3 and 2003 SP3, Office 2004 for Mac, and Word Viewer do not properly handle a malformed record during parsing of a Word document, which allows remote malicious users to execute arbitrary code via a crafted document that triggers memory corruption, aka "...
Microsoft Office 2004
Microsoft Word 2002
Microsoft Word 2003
Microsoft Word Viewer
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
brute force
CVE-2024-24908
open redirect
CVE-2024-31497
CVE-2023-45866
CVE-2024-4135
CVE-2024-25523
cache poisoning
CVE-2024-4649
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »