Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
office 2012 vulnerabilities and exploits
(subscribe to this query)
935
VMScore
CVE-2013-3934
Stack-based buffer overflow in Kingsoft Writer 2012 8.1.0.3030, as used in Kingsoft Office 2013 prior to 9.1.0.4256, allows remote malicious users to execute arbitrary code via a long font name in a WPS file.
Kingsoft Office 2012 8.1.0.3385
Kingsoft Writer 2012 8.1.0.3030
1 EDB exploit
828
VMScore
CVE-2012-0167
Heap-based buffer overflow in the Office GDI+ library in Microsoft Office 2003 SP3 and 2007 SP2 and SP3 allows remote malicious users to execute arbitrary code via a crafted EMF image in an Office document, aka "GDI+ Heap Overflow Vulnerability."
Microsoft Office 2007
Microsoft Office 2003
828
VMScore
CVE-2012-2524
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Computer Graphics Metafile (CGM) file, aka "CGM File Format Memory Corruption Vulnerability."
Microsoft Office 2007
Microsoft Office 2010
1000
VMScore
CVE-2012-4886
Stack-based buffer overflow in wpsio.dll in Kingsoft WPS Office 2012 possibly 8.1.0.3238 allows remote malicious users to execute arbitrary code via a long BSTR string.
Kingsoft Office 2012 8.1.0.3238
1 EDB exploit
828
VMScore
CVE-2012-0165
GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2 and Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1 does not properly validate record types in EMF images, which allows remote malicious users to execute arbitrary code via a crafted image, aka "GDI+ Record Typ...
Microsoft Windows Server 2008 -
Microsoft Office 2003
Microsoft Office 2007
Microsoft Windows Vista -
Microsoft Office 2010
828
VMScore
CVE-2012-1885
Heap-based buffer overflow in Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Office 2008 and 2011 for Mac; and Office Compatibility Pack SP2 and SP3 allows remote malicious users to execute arbitrary code via a crafted spreadsheet, aka "Excel SerAuxErrBar Heap Ove...
Microsoft Excel 2007
Microsoft Excel 2010
Microsoft Office 2008
Microsoft Excel 2003
Microsoft Office 2011
Microsoft Office Compatibility Pack
383
VMScore
CVE-2012-4900
Corel WordPerfect Office X6 16.0.0.388 has a DoS Vulnerability via untrusted pointer dereference
Corel Wordperfect Office X6 16.0.0.388
Corel Wordperfect Office X6 16.0.0.429
614
VMScore
CVE-2012-1854
Untrusted search path vulnerability in VBE6.dll in Microsoft Office 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Microsoft Visual Basic for Applications (VBA); and Summit Microsoft Visual Basic for Applications SDK allows local users to gain privileges via a Trojan horse DL...
Microsoft Office 2010
Microsoft Office 2003
Microsoft Visual Basic For Applications
Microsoft Visual Basic For Applications Sdk
Microsoft Office 2007
828
VMScore
CVE-2012-2539
Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word R...
Microsoft Office Word Viewer
Microsoft Office Compatibility Pack
Microsoft Office Web Apps 2010
Microsoft Word 2003
Microsoft Word 2007
Microsoft Word 2010
828
VMScore
CVE-2012-1847
Microsoft Excel 2003 SP3, 2007 SP2 and SP3, and 2010 Gold and SP1; Office 2008 and 2011 for Mac; Excel Viewer; and Office Compatibility Pack SP2 and SP3 do not properly handle memory during the opening of files, which allows remote malicious users to execute arbitrary code via a ...
Microsoft Office 2011
Microsoft Excel Viewer
Microsoft Excel 2010
Microsoft Office 2008
Microsoft Excel 2003
Microsoft Office Compatibility Pack
Microsoft Excel 2007
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »