CVE-2019-1201

Severity
7.8HIGH
EPSS
11.3%
top 6.47%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 14
Latest updateMay 24

Description

A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsof

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages21 packages

CVEListV5microsoft/microsoft_word_201616.0.1publication
CVEListV5microsoft/microsoft_word_2010_service_pack_213.0.0.0publication
CVEListV5microsoft/microsoft_word_2013_service_pack_115.0.1publication
NVDmicrosoft/word2010, 2013, 2016+2
CVEListV5microsoft/office_365_proplus16.0.0publication

Patches

🔴Vulnerability Details

2
GHSA
GHSA-mhjc-pqhq-cf8c: A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote2022-05-24
CVEList
Microsoft Word Remote Code Execution Vulnerability2019-08-14

📋Vendor Advisories

2
Microsoft
Microsoft Word Remote Code Execution Vulnerability2019-08-13
Red Hat
jenkins-plugin-blueocean: Blue Ocean did not require CSRF tokens (SECURITY-1201)2019-01-28

💬Community

1
Bugzilla
CVE-2019-1003012 jenkins-plugin-blueocean: Blue Ocean did not require CSRF tokens (SECURITY-1201)2019-01-29