cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2012-2550,https://securityvulnerability.io/vulnerability/CVE-2012-2550,,"Microsoft Works 9 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted Word .doc file, aka ""Works Heap Vulnerability.""",Microsoft,Works,,,0.8716199994087219,false,false,false,false,,false,false,2012-10-09T21:00:00.000Z,0 CVE-2012-0177,https://securityvulnerability.io/vulnerability/CVE-2012-0177,,"Heap-based buffer overflow in the Office Works File Converter in Microsoft Office 2007 SP2, Works 9, and Works 6-9 File Converter allows remote attackers to execute arbitrary code via a crafted Works (aka .wps) file, aka ""Office WPS Converter Heap Overflow Vulnerability.""",Microsoft,"Office,Works 6-9 File Converter,Works",,,0.9521300196647644,false,false,false,false,,false,false,2012-04-10T21:00:00.000Z,0 CVE-2010-3947,https://securityvulnerability.io/vulnerability/CVE-2010-3947,,"Heap-based buffer overflow in the TIFF image converter in the graphics filters in Microsoft Office XP SP3, Office Converter Pack, and Works 9 allows remote attackers to execute arbitrary code via a crafted TIFF image in an Office document, aka ""TIFF Image Converter Heap Overflow Vulnerability.""",Microsoft,"Office Converter Pack,Office,Works",,,0.8957899808883667,false,false,false,false,,false,false,2010-12-16T19:00:00.000Z,0 CVE-2010-3950,https://securityvulnerability.io/vulnerability/CVE-2010-3950,,"The TIFF image converter in the graphics filters in Microsoft Office XP SP3, Office Converter Pack, and Works 9 does not properly convert data, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted TIFF image in an Office document, aka ""TIFF Image Converter Memory Corruption Vulnerability.""",Microsoft,"Office Converter Pack,Office,Works",,,0.8695700168609619,false,false,false,false,,false,false,2010-12-16T19:00:00.000Z,0 CVE-2009-2506,https://securityvulnerability.io/vulnerability/CVE-2009-2506,,"Integer overflow in the text converters in Microsoft Office Word 2002 SP3 and 2003 SP3; Works 8.5; Office Converter Pack; and WordPad in Windows 2000 SP4, XP SP2 and SP3, and Server 2003 SP2 allows remote attackers to execute arbitrary code via a DOC file with an invalid number of property names in the DocumentSummaryInformation stream, which triggers a heap-based buffer overflow.",Microsoft,"Windows 2000,Windows Server 2003,Windows Xp,Office Converter Pack,Office Word,Wordpad,Works",,,0.9135400056838989,false,false,false,false,,false,false,2009-12-09T18:00:00.000Z,0 CVE-2009-1533,https://securityvulnerability.io/vulnerability/CVE-2009-1533,,"Buffer overflow in the Works for Windows document converters in Microsoft Office 2000 SP3, Office XP SP3, Office 2003 SP3, Office 2007 SP1, and Works 8.5 and 9 allows remote attackers to execute arbitrary code via a crafted Works .wps file that triggers memory corruption, aka ""File Converter Buffer Overflow Vulnerability.""",Microsoft,"Office Xp,Works,Office",,,0.9135599732398987,false,false,false,false,,false,false,2009-06-10T17:37:00.000Z,0 CVE-2009-0224,https://securityvulnerability.io/vulnerability/CVE-2009-0224,,"Microsoft Office PowerPoint 2000 SP3, 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; PowerPoint Viewer 2003 and 2007 SP1 and SP2; PowerPoint in Microsoft Office 2004 for Mac and 2008 for Mac; Open XML File Format Converter for Mac; Microsoft Works 8.5 and 9.0; and Microsoft Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 do not properly validate PowerPoint files, which allows remote attackers to execute arbitrary code via multiple crafted BuildList records that include ChartBuild containers, which triggers memory corruption, aka ""Memory Corruption Vulnerability.""",Microsoft,"Open Xml File Format Converter,Powerpoint,Office Powerpoint,Office Compatibility Pack For Word Excel Ppt 2007,Office Powerpoint Viewer,Compatibility Pack Word Excel Powerpoint,Works",,,0.8255000114440918,false,false,false,false,,false,false,2009-05-12T22:00:00.000Z,0 CVE-2008-4026,https://securityvulnerability.io/vulnerability/CVE-2008-4026,,"Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a crafted Word document that contains a malformed value, which triggers memory corruption, aka ""Word Memory Corruption Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.35093000531196594,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4027,https://securityvulnerability.io/vulnerability/CVE-2008-4027,,"Double free vulnerability in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; and Office 2004 for Mac allow remote attackers to execute arbitrary code via a crafted (1) RTF file or (2) rich text e-mail message with multiple consecutive Drawing Object (""\do"") tags, which triggers a ""memory calculation error"" and memory corruption, aka ""Word RTF Object Parsing Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.8340200185775757,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4025,https://securityvulnerability.io/vulnerability/CVE-2008-4025,,"Integer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via (1) an RTF file or (2) a rich text e-mail message containing an invalid number of points for a polyline or polygon, which triggers a heap-based buffer overflow, aka ""Word RTF Object Parsing Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.4946399927139282,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4837,https://securityvulnerability.io/vulnerability/CVE-2008-4837,,"Stack-based buffer overflow in Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; and Microsoft Works 8 allow remote attackers to execute arbitrary code via a crafted Word document that contains a malformed table property, which triggers memory corruption, aka ""Word Memory Corruption Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.8016899824142456,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4024,https://securityvulnerability.io/vulnerability/CVE-2008-4024,,"Microsoft Office Word 2000 SP3 and 2002 SP3 and Office 2004 for Mac allow remote attackers to execute arbitrary code via a Word document with a crafted lcbPlcfBkfSdt field in the File Information Block (FIB), which bypasses an initialization step and triggers an ""arbitrary free,"" aka ""Word Memory Corruption Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.8269100189208984,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4031,https://securityvulnerability.io/vulnerability/CVE-2008-4031,,"Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via a malformed string in (1) an RTF file or (2) a rich text e-mail message, which triggers incorrect memory allocation and memory corruption, aka ""Word RTF Object Parsing Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.4546700119972229,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4030,https://securityvulnerability.io/vulnerability/CVE-2008-4030,,"Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1 allow remote attackers to execute arbitrary code via crafted control words in (1) an RTF file or (2) a rich text e-mail message, which triggers incorrect memory allocation and memory corruption, aka ""Word RTF Object Parsing Vulnerability,"" a different vulnerability than CVE-2008-4028.",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.4546700119972229,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-4028,https://securityvulnerability.io/vulnerability/CVE-2008-4028,,"Microsoft Office Word 2000 SP3, 2002 SP3, 2003 SP3, and 2007 Gold and SP1; Outlook 2007 Gold and SP1; Word Viewer 2003 Gold and SP3; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats Gold and SP1; Office 2004 and 2008 for Mac; and Open XML File Format Converter for Mac allow remote attackers to execute arbitrary code via crafted control words related to multiple Drawing Object tags in (1) an RTF file or (2) a rich text e-mail message, which triggers incorrect memory allocation and a heap-based buffer overflow, aka ""Word RTF Object Parsing Vulnerability,"" a different vulnerability than CVE-2008-4030.",Microsoft,"Open Xml File Format Converter,Office,Office Word Viewer,Office Compatibility Pack For Word Excel Ppt 2007,Works",,,0.8940100073814392,false,false,false,false,,false,false,2008-12-10T13:33:00.000Z,0 CVE-2008-3013,https://securityvulnerability.io/vulnerability/CVE-2008-3013,,"gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed GIF image file containing many extension markers for graphic control extensions and subsequent unknown labels, aka ""GDI+ GIF Parsing Vulnerability.""",Microsoft,"Powerpoint Viewer,Forefront Client Security,Digital Image Suite,Windows Xp,Internet Explorer,Windows Server 2008,Office,Windows Vista,Sql Server Reporting Services,Visio,Sql Server,Report Viewer,Works",,,0.9511299729347229,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2008-3014,https://securityvulnerability.io/vulnerability/CVE-2008-3014,,"Buffer overflow in gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a malformed WMF image file that triggers improper memory allocation, aka ""GDI+ WMF Buffer Overrun Vulnerability.""",Microsoft,"Forefront Client Security,Server,Digital Image Suite,Internet Explorer,Office,Sql Server Reporting Services,Windows Vista,Visio,Windows-nt,Windows Xp,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.8248999714851379,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2008-3012,https://securityvulnerability.io/vulnerability/CVE-2008-3012,,"gdiplus.dll in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 does not properly perform memory allocation, which allows remote attackers to execute arbitrary code via a malformed EMF image file, aka ""GDI+ EMF Memory Corruption Vulnerability.""",Microsoft,"Forefront Client Security,Office System,Server,Digital Image Suite,Internet Explorer,Office,Sql Server Reporting Services,Windows,Windows Vista,Visio,Windows-nt,Windows Xp,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.6925600171089172,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2008-3015,https://securityvulnerability.io/vulnerability/CVE-2008-3015,,"Integer overflow in gdiplus.dll in GDI+ in Microsoft Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via a BMP image file with a malformed BitMapInfoHeader that triggers a buffer overflow, aka ""GDI+ BMP Integer Overflow Vulnerability.""",Microsoft,"Forefront Client Security,Digital Image Suite,Office,Sql Server Reporting Services,Visio,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.7206299901008606,false,false,false,false,,false,false,2008-09-11T01:11:00.000Z,0 CVE-2007-5348,https://securityvulnerability.io/vulnerability/CVE-2007-5348,,"Integer overflow in GDI+ in Microsoft Internet Explorer 6 SP1, Windows XP SP2 and SP3, Server 2003 SP1 and SP2, Vista Gold and SP1, Server 2008, Office XP SP3, Office 2003 SP2 and SP3, 2007 Microsoft Office System Gold and SP1, Visio 2002 SP2, PowerPoint Viewer 2003, Works 8, Digital Image Suite 2006, SQL Server 2000 Reporting Services SP2, SQL Server 2005 SP2, Report Viewer 2005 SP1 and 2008, and Forefront Client Security 1.0 allows remote attackers to execute arbitrary code via an image file with crafted gradient sizes in gradient fill input, which triggers a heap-based buffer overflow related to GdiPlus.dll and VGX.DLL, aka ""GDI+ VML Buffer Overrun Vulnerability.""",Microsoft,"Forefront Client Security,Office System,Server,Digital Image Suite,Internet Explorer,Office,Sql Server Reporting Services,Windows,Windows Vista,Visio,Windows-nt,Windows Xp,Sql Server,Report Viewer,Works,Office Powerpoint Viewer",,,0.6690899729728699,false,false,false,false,,false,false,2008-09-11T01:01:00.000Z,0 CVE-2008-3460,https://securityvulnerability.io/vulnerability/CVE-2008-3460,,"WPGIMP32.FLT in Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 does not properly parse the length of a WordPerfect Graphics (WPG) file, which allows remote attackers to execute arbitrary code via a crafted WPG file, aka the ""WPG Image File Heap Corruption Vulnerability.""",Microsoft,"Office Converter Pack,Office,Works",,,0.8801699876785278,false,false,false,false,,false,false,2008-08-12T23:41:00.000Z,0 CVE-2008-3018,https://securityvulnerability.io/vulnerability/CVE-2008-3018,,"Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote attackers to execute arbitrary code via a crafted PICT file, aka the ""Malformed PICT Filter Vulnerability,"" a different vulnerability than CVE-2008-3021.",Microsoft,"Office,Office Converter Pack,Works",,,0.8287000060081482,false,false,false,false,,false,false,2008-08-12T23:41:00.000Z,0 CVE-2008-3019,https://securityvulnerability.io/vulnerability/CVE-2008-3019,,"Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of an Encapsulated PostScript (EPS) file, which allows remote attackers to execute arbitrary code via a crafted EPS file, aka the ""Malformed EPS Filter Vulnerability.""",Microsoft,"Office Converter Pack,Office,Works",,,0.9186499714851379,false,false,false,false,,false,false,2008-08-12T23:41:00.000Z,0 CVE-2008-3020,https://securityvulnerability.io/vulnerability/CVE-2008-3020,,"Microsoft Office 2000 SP3 and XP SP3; Office Converter Pack; and Works 8 do not properly parse the length of a BMP file, which allows remote attackers to execute arbitrary code via a crafted BMP file, aka the ""Malformed BMP Filter Vulnerability.""",Microsoft,"Office Converter Pack,Office,Works",,,0.8908900022506714,false,false,false,false,,false,false,2008-08-12T23:41:00.000Z,0 CVE-2008-3021,https://securityvulnerability.io/vulnerability/CVE-2008-3021,,"Microsoft Office 2000 SP3, XP SP3, and 2003 SP2; Office Converter Pack; and Works 8 do not properly parse the length of a PICT file, which allows remote attackers to execute arbitrary code via a crafted PICT file with an invalid bits_per_pixel field, aka the ""PICT Filter Parsing Vulnerability,"" a different vulnerability than CVE-2008-3018.",Microsoft,"Office Converter Pack,Office,Works",,,0.8557500243186951,false,false,false,false,,false,false,2008-08-12T23:41:00.000Z,0