Product:

Office_web_apps

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 106
Date Id Summary Products Score Patch Annotated
2022-01-11 CVE-2022-21840 Microsoft Office Remote Code Execution Vulnerability Excel, Office, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server 8.8
2021-01-12 CVE-2021-1715 Microsoft Word Remote Code Execution Vulnerability 365_apps, Office, Office_online_server, Office_web_apps, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8
2021-01-12 CVE-2021-1716 Microsoft Word Remote Code Execution Vulnerability 365_apps, Office, Office_online_server, Office_web_apps, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8
2014-03-25 CVE-2014-1761 Microsoft Word 2003 SP3, 2007 SP3, 2010 SP1 and SP2, 2013, and 2013 RT; Word Viewer; Office Compatibility Pack SP3; Office for Mac 2011; Word Automation Services on SharePoint Server 2010 SP1 and SP2 and 2013; Office Web Apps 2010 SP1 and SP2; and Office Web Apps Server 2013 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, as exploited in the wild in March 2014. Office, Office_compatibility_pack, Office_web_apps, Office_web_apps_server, Sharepoint_server, Word, Word_viewer 7.8
2015-04-14 CVE-2015-1641 Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word for Mac 2011, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, and Office Web Apps Server 2010 SP2 and 2013 SP1 allow remote attackers to execute arbitrary code via a crafted RTF document, aka "Microsoft Office Memory Corruption Vulnerability." Office, Office_compatibility_pack, Office_web_apps, Outlook, Sharepoint_server, Word 7.8
2012-12-12 CVE-2012-2539 Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer; Office Compatibility Pack SP2 and SP3; and Office Web Apps 2010 SP1 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted RTF data, aka "Word RTF 'listoverridecount' Remote Code Execution Vulnerability." Office_compatibility_pack, Office_web_apps, Office_word_viewer, Sharepoint_server, Word 7.8
2019-08-14 CVE-2019-1201 A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of... Office, Office_365_proplus, Office_online_server, Office_web_apps, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8
2023-02-14 CVE-2023-21716 Microsoft Word Remote Code Execution Vulnerability Office, Office_long_term_servicing_channel, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_foundation, Sharepoint_server, Word 9.8
2020-08-17 CVE-2020-1503 An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain... 365_apps, Office, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server, Word 5.5
2020-08-17 CVE-2020-1583 An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain... 365_apps, Office, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server, Word 8.8