Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network.
The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treating the untrusted data as if it were trusted.
Name | Vendor | Start Version | End Version |
---|---|---|---|
365_apps | Microsoft | - (including) | - (including) |
Office | Microsoft | 2016 (including) | 2016 (including) |
Office | Microsoft | 2019 (including) | 2019 (including) |
Office_long_term_servicing_channel | Microsoft | 2021 (including) | 2021 (including) |
Office_long_term_servicing_channel | Microsoft | 2024 (including) | 2024 (including) |
Word | Microsoft | 2016 (including) | 2016 (including) |