Логотип exploitDog
bind:CVE-2019-1201
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1201

Количество 4

Количество 4

nvd логотип

CVE-2019-1201

около 6 лет назад

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. Two possible email attack scenarios exist for this vulnerability: • With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered. • With the second scenario, an attacker could attach a specially crafted file to an email, send it to a user, and convince them to open it. In a web-based

CVSS3: 7.8
EPSS: Средний
msrc логотип

CVE-2019-1201

около 6 лет назад

Microsoft Word Remote Code Execution Vulnerability

EPSS: Средний
github логотип

GHSA-mhjc-pqhq-cf8c

больше 3 лет назад

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1205.

EPSS: Средний
fstec логотип

BDU:2019-02891

около 6 лет назад

Уязвимость пакетов программ Microsoft SharePoint, Microsoft Office, Office 365 и текстового редактора Microsoft Word, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1201

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. Two possible email attack scenarios exist for this vulnerability: • With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered. • With the second scenario, an attacker could attach a specially crafted file to an email, send it to a user, and convince them to open it. In a web-based

CVSS3: 7.8
12%
Средний
около 6 лет назад
msrc логотип
CVE-2019-1201

Microsoft Word Remote Code Execution Vulnerability

12%
Средний
около 6 лет назад
github логотип
GHSA-mhjc-pqhq-cf8c

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1205.

12%
Средний
больше 3 лет назад
fstec логотип
BDU:2019-02891

Уязвимость пакетов программ Microsoft SharePoint, Microsoft Office, Office 365 и текстового редактора Microsoft Word, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.8
12%
Средний
около 6 лет назад

Уязвимостей на страницу