Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft publisher 2013 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2013-1321
Microsoft Publisher 2003 SP3 does not properly check the data type of an unspecified return value, which allows remote malicious users to execute arbitrary code via a crafted Publisher file, aka "Publisher Return Value Validation Vulnerability."
Microsoft Publisher 2003
10
CVSSv2
CVE-2013-1322
Microsoft Publisher 2003 SP3 does not properly check table range data, which allows remote malicious users to execute arbitrary code via a crafted Publisher file, aka "Publisher Invalid Range Check Vulnerability."
Microsoft Publisher 2003
9.3
CVSSv2
CVE-2013-1323
Microsoft Publisher 2003 SP3 does not properly handle NULL values for unspecified data items, which allows remote malicious users to execute arbitrary code via a crafted Publisher file, aka "Publisher Incorrect NULL Value Handling Vulnerability."
Microsoft Publisher 2003
9.3
CVSSv2
CVE-2013-1327
Integer signedness error in Microsoft Publisher 2003 SP3 allows remote malicious users to execute arbitrary code via a crafted Publisher file that triggers an improper memory allocation, aka "Publisher Signed Integer Vulnerability."
Microsoft Publisher 2003
9.3
CVSSv2
CVE-2013-1329
Integer signedness error in Microsoft Publisher 2003 SP3 allows remote malicious users to execute arbitrary code via a crafted Publisher file that triggers a buffer underflow, aka "Publisher Buffer Underflow Vulnerability."
Microsoft Publisher 2003
4.3
CVSSv2
CVE-2022-29107
Microsoft Office Security Feature Bypass Vulnerability
Microsoft Word 2013
Microsoft 365 Apps -
Microsoft Office 2019
Microsoft Office 2021
Microsoft Word 2016
Microsoft Publisher 2016
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-3400
deserialization
CVE-2024-21788
CVE-2023-42433
CVE-2024-21841
CVE-2024-22095
local file inclusion
memory leak
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2