Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft word 2003 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2013-3160
Microsoft Office 2003 SP3 and 2007 SP3, Word 2003 SP3 and 2007 SP3, and Word Viewer allow remote malicious users to read arbitrary files via an XML document containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) ...
Microsoft Word Viewer
Microsoft Word 2007
Microsoft Office 2007
Microsoft Word 2003
Microsoft Office 2003
NA
CVE-2003-0664
Microsoft Word 2002, 2000, 97, and 98(J) does not properly check certain properties of a document, which allows malicious users to bypass the macro security model and automatically execute arbitrary macros via a malicious document.
Microsoft Word 98
Microsoft Word 2000
Microsoft Word 2002
Microsoft Works 2001
Microsoft Works 2002
Microsoft Works 2003
Microsoft Word 97
NA
CVE-2007-1202
Word (or Word Viewer) in Microsoft Office 2000 SP3, XP SP3, 2003 SP2, 2004 for Mac, and Works Suite 2004, 2005, and 2006 does not properly parse certain rich text "property strings of certain control words," which allows user-assisted remote malicious users to trigger h...
Microsoft Word 2004
Microsoft Word Viewer 2003
Microsoft Works 2004
Microsoft Works 2005
Microsoft Word 2000
Microsoft Works 2006
Microsoft Word 2002
Microsoft Word 2003
NA
CVE-2003-0820
Microsoft Word 97, 98(J), 2000, and 2002, and Microsoft Works Suites 2001 through 2004, do not properly check the length of the "Macro names" data value, which could allow remote malicious users to execute arbitrary code via a buffer overflow attack.
Microsoft Word 98
Microsoft Word 2000
Microsoft Works 2001
Microsoft Works 2002
Microsoft Word 97
Microsoft Word 2002
Microsoft Works 2003
Microsoft Works 2004
NA
CVE-2003-0821
Microsoft Excel 97, 2000, and 2002 allows remote malicious users to execute arbitrary code via a spreadsheet with a malicious XLM (Excel 4) macro that bypasses the macro security model.
Microsoft Word 97
Microsoft Word 98
Microsoft Word 2000
Microsoft Works 2004
Microsoft Word 2002
Microsoft Works 2001
Microsoft Works 2002
Microsoft Works 2003
NA
CVE-2005-0558
Buffer overflow in Microsoft Word 2000, Word 2002, and Word 2003 allows remote malicious users to execute arbitrary code via a crafted document.
Microsoft Word 2002
Microsoft Word 2003
Microsoft Word 2000
NA
CVE-2013-1335
Microsoft Word 2003 SP3 and Word Viewer allow remote malicious users to execute arbitrary code via crafted shape data in a Word document, aka "Word Shape Corruption Vulnerability."
Microsoft Word 2003
Microsoft Word Viewer -
NA
CVE-2008-2752
Microsoft Word 2000 9.0.2812 and 2003 11.8106.8172 does not properly handle unordered lists, which allows user-assisted remote malicious users to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted .doc file. NOTE: ...
Microsoft Word 2000
Microsoft Word 2003
1 EDB exploit
NA
CVE-2013-3856
Microsoft Word 2003 SP3 and Word Viewer allow remote malicious users to execute arbitrary code or cause a denial of service (memory corruption) via a crafted Office document, aka "Word Memory Corruption Vulnerability."
Microsoft Word 2003
Microsoft Word Viewer
NA
CVE-2006-6561
Unspecified vulnerability in Microsoft Word 2000, 2002, and Word Viewer 2003 allows user-assisted remote malicious users to execute arbitrary code via a crafted DOC file that triggers memory corruption, as demonstrated via the 12122006-djtest.doc file, a different issue than CVE-...
Microsoft Office 2004
Microsoft Office Xp
Microsoft Office 2000
Microsoft Office 2003
Microsoft Works 2005
Microsoft Works 2006
Microsoft Word Viewer 2003
Microsoft Works 2004
Microsoft Word 2000
Microsoft Word 2002
Microsoft Word 2003
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5324
path traversal
CVE-2024-4743
CVE-2024-5184
TCP
CVE-2024-27822
code injection
CVE-2024-28995
CVE-2023-20938
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »