Product:

Word

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 219
Date Id Summary Products Score Patch Annotated
2024-02-13 CVE-2024-21379 Microsoft Word Remote Code Execution Vulnerability 365_apps, Office, Office_long_term_servicing_channel, Word 7.8
2021-07-16 CVE-2021-34452 Microsoft Word Remote Code Execution Vulnerability 365_apps, Office, Word 7.8
2024-02-13 CVE-2024-20673 Microsoft Office Remote Code Execution Vulnerability Excel, Office, Powerpoint, Publisher, Skype_for_business, Visio, Word 7.8
2020-08-17 CVE-2020-1503 An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain... 365_apps, Office, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server, Word 5.5
2020-08-17 CVE-2020-1583 An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain... 365_apps, Office, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server, Word 8.8
2020-09-11 CVE-2020-1218 <p>A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.</p> <p>To exploit the vulnerability, a user must open a specially crafted file with an... 365_apps, Office, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8
2020-10-16 CVE-2020-16933 <p>A security feature bypass vulnerability exists in Microsoft Word software when it fails to properly handle .LNK files. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user.</p> <p>To exploit the vulnerability, a user must open a specially crafted file with an... 365_apps, Office, Windows_10, Windows_7, Windows_8\.1, Windows_rt_8\.1, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2019, Word 7.0
2020-11-11 CVE-2020-17020 Microsoft Word Security Feature Bypass Vulnerability 365_apps, Office, Word 3.3
2021-01-12 CVE-2021-1715 Microsoft Word Remote Code Execution Vulnerability 365_apps, Office, Office_online_server, Office_web_apps, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8
2021-01-12 CVE-2021-1716 Microsoft Word Remote Code Execution Vulnerability 365_apps, Office, Office_online_server, Office_web_apps, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8