CVE-2022-33890 DesignReview.exe could lead to memory corruption vulnerability.
This issue could be exploited by malicious users to inject their code in the context of another process.
CVE-2018-8999: Microsoft Word - Memory Corruption Remote Code Execution Vulnerability - Exploitation This issue could be exploited remotely by tricking user to open a specially crafted PCT or DWF file in Microsoft Word. A malicious user could trick other user to open a PCT or DWF file without knowing that the file is malicious. This could lead to remote code execution. This issue is currently being exploited in the wild. CVE-2018-8710: Microsoft Word - Memory Corruption Remote Code Execution Vulnerability - Exploitation This issue could be exploited by malicious users to inject their code in the context of another process. This issue is currently being exploited in the wild. CVE-2018-8798: Microsoft Word - Code Integrity Vulnerability - Exploitation This issue could be exploited by malicious users to inject their code in the context of another process. This issue is currently being exploited in the wild. CVE-2018-8799: Microsoft Word - Memory Corruption Remote Code Execution Vulnerability - Exploitation This issue could be exploited by malicious users to inject their code in the context of another process. This issue is currently being exploited in the wild. CVE-2018-8763: Microsoft Word - Out-of-bounds Write Vulnerability - Exploitation This issue could be exploited by malicious users to inject their code in the context of another process. This issue
Microsoft Office Memory Corruption Vulnerability - Exploitation This issue could be exploited by mal icous users to inject their code in the context of another process. This issue is currently being exploited in the wild.
Microsoft Word - Out-of-bounds Write Vulnerability
- Exploitation This issue could be exploited by malicious users to inject their code in the context of another process. This issue is currently being exploited in the wild.
Microsoft Word (Word) Overview
Microsoft Word is a word processing program that allows users to compose and edit text and documents, including emails, letters, articles, reports, and presentations.
Did you ever forget to close the document you were working on before leaving for lunch? Well if you did, your computer may have been compromised by malware. There are many vulnerabilities in Microsoft Word that attackers can use to hack into your computer if they know how. The five vulnerabilities mentioned in this blog post are just a few examples of what can happen if you don't keep an eye on your work. Here's some advice on how to avoid these vulnerabilities and protect your business from such attacks:
Timeline
Published on: 10/03/2022 15:15:00 UTC
Last modified on: 10/05/2022 14:04:00 UTC