2.1
CVSSv2

CVE-2019-1402

Published: 12/11/2019 Updated: 14/11/2019
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
CVSS v3 Base Score: 5.5 | Impact Score: 3.6 | Exploitability Score: 1.8
VMScore: 188
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An information disclosure vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Information Disclosure Vulnerability'.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft office 2010

microsoft office 2013

microsoft office 2016

microsoft office 2019

microsoft office 365 -

Github Repositories

The latest workaround for the "Query is corrupt" error introduced with CVE-2019-1402

CorruptQueryAccessWorkaround: Query '' is corrupt The latest workaround for the Query is corrupt error introduced with CVE-2019-1402 in MS Access There are other workarounds out there that need to be applied on an administrative level, eg by uninstalling the erroneous update In contrast to those, the intention of the one provided here is to work by automatically a

The latest workaround for the "Query is corrupt" error introduced with CVE-2019-1402

CorruptQueryAccessWorkaround: Query '' is corrupt The latest workaround for the Query is corrupt error introduced with CVE-2019-1402 in MS Access There are other workarounds out there that need to be applied on an administrative level, eg by uninstalling the erroneous update In contrast to those, the intention of the one provided here is to work by automatically a

Recent Articles

Microsoft Patch Tuesday – November 2019
Symantec Threat Intelligence Blog • Ratheesh PM • 15 Nov 2024

This month the vendor has patched 75 vulnerabilities, 14 of which are rated Critical.

Posted: 15 Nov, 201922 Min ReadThreat Intelligence SubscribeMicrosoft Patch Tuesday – November 2019This month the vendor has patched 75 vulnerabilities, 14 of which are rated Critical.As always, customers are advised to follow these security best practices: Install vendor patches as soon as they are available. Run all software with the least privileges required while still maintaining functionality. Avoid handling files from unknown or questiona...