Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.805090
Categoría:Windows : Microsoft Bulletins
Título:Microsoft Office Word Multiple Remote Code Execution Vulnerabilities (3080790)
Resumen:This host is missing an important security; update according to Microsoft Bulletin MS15-081.
Descripción:Summary:
This host is missing an important security
update according to Microsoft Bulletin MS15-081.

Vulnerability Insight:
Flaws are due to improper handling of files
in the memory.

Vulnerability Impact:
Successful exploitation will allow remote
attackers to run arbitrary code in the context of the current user and
to perform actions in the security context of the current user.

Affected Software/OS:
- Microsoft Word 2007 Service Pack 3 and prior

- Microsoft Word 2010 Service Pack 2 and prior

- Microsoft Word 2013 Service Pack 1 and prior

Solution:
The vendor has released updates. Please see the references for more information.

CVSS Score:
9.3

CVSS Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2015-2423
Microsoft Security Bulletin: MS15-079
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-079
Microsoft Security Bulletin: MS15-081
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-081
Microsoft Security Bulletin: MS15-088
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-088
http://www.securitytracker.com/id/1033237
http://www.securitytracker.com/id/1033239
http://www.securitytracker.com/id/1033248
Common Vulnerability Exposure (CVE) ID: CVE-2015-2468
https://www.exploit-db.com/exploits/37912/
Common Vulnerability Exposure (CVE) ID: CVE-2015-2469
https://www.exploit-db.com/exploits/37910/
CopyrightCopyright (C) 2015 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.