Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft office 2003 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2008-0118
Unspecified vulnerability in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, Excel Viewer 2003 up to SP3, and Office 2004 for Mac allows user-assisted remote malicious users to execute arbitrary code via a crafted Office document that triggers memory corruption from an "allocat...
Microsoft Office 2000
Microsoft Office Xp
Microsoft Office 2003
Microsoft Office 2004
2 EDB exploits
NA
CVE-2013-0082
Microsoft Office 2003 SP3 and 2007 SP3 allows remote malicious users to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "WPD File Format Memory Corruption Vulnerability."
Microsoft Office 2003
Microsoft Office 2007
NA
CVE-2006-3868
Unspecified vulnerability in Microsoft Office XP and 2003 allows remote user-assisted malicious users to execute arbitrary code via a malformed Smart Tag.
Microsoft Office 2003
Microsoft Office Xp
NA
CVE-2012-0167
Heap-based buffer overflow in the Office GDI+ library in Microsoft Office 2003 SP3 and 2007 SP2 and SP3 allows remote malicious users to execute arbitrary code via a crafted EMF image in an Office document, aka "GDI+ Heap Overflow Vulnerability."
Microsoft Office 2007
Microsoft Office 2003
NA
CVE-2013-1325
Heap-based buffer overflow in Microsoft Office 2003 SP3 and 2007 SP3 allows remote malicious users to execute arbitrary code via a crafted WordPerfect document (.wpd) file, aka "Word Heap Overwrite Vulnerability."
Microsoft Office 2007
Microsoft Office 2003
NA
CVE-2013-1331
Buffer overflow in Microsoft Office 2003 SP3 and Office 2011 for Mac allows remote malicious users to execute arbitrary code via crafted PNG data in an Office document, leading to improper memory allocation, aka "Office Buffer Overflow Vulnerability."
Microsoft Office 2011
Microsoft Office 2003
NA
CVE-2011-1980
Untrusted search path vulnerability in Microsoft Office 2003 SP3 and 2007 SP2 allows local users to gain privileges via a Trojan horse DLL in the current working directory, as demonstrated by a directory that contains a .doc, .ppt, or .xls file, aka "Office Component Insecur...
Microsoft Office 2007
Microsoft Office 2003
NA
CVE-2009-0562
The Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2003 SP3, Office XP Web Components SP3, Office 2003 Web Components SP3, Office 2003 Web Components SP1 for the 2007 Microsoft Office System, Internet Security and Acceleration (ISA) Server 2004 SP3 and 2...
Microsoft Office 2003
Microsoft Office Xp
Microsoft Office Web Components Xp
Microsoft Isa Server 2004
Microsoft Isa Server 2006
Microsoft Office Web Components 2003
Microsoft Office -
Microsoft Office Web Components 2000
1 Article
NA
CVE-2009-1534
Buffer overflow in the Office Web Components ActiveX Control in Microsoft Office XP SP3, Office 2000 Web Components SP3, Office XP Web Components SP3, BizTalk Server 2002, and Visual Studio .NET 2003 SP1 allows remote malicious users to execute arbitrary code via crafted property...
Microsoft Isa Server 2004
Microsoft Office 2003
Microsoft Office Xp
Microsoft Isa Server 2006
Microsoft Office Web Components 2003
Microsoft Office Web Components 2000
Microsoft Office Web Components Xp
Microsoft Office -
1 EDB exploit
NA
CVE-2006-0028
Unspecified vulnerability in Microsoft Excel 2000, 2002, and 2003, in Microsoft Office 2000 SP3 and other packages, allows user-assisted malicious users to execute arbitrary code via a BIFF parsing format file containing malformed BOOLERR records that lead to memory corruption, p...
Microsoft Office 2000
Microsoft Office 2003
Microsoft Office 2004
Microsoft Excel 2004
Microsoft Excel X
Microsoft Excel 2000
Microsoft Excel 2002
Microsoft Excel 2003
Microsoft Office V.x
Microsoft Office Xp
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
CVE-2024-35649
stored XSS
CVE-2022-28654
CVE-2020-35153
CVE-2024-27348
CVE-2022-28652
local users
CVE-2017-3506
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »