How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
Opening a specially crafted Microsoft Office file could result in
arbitrary code execution.
The remote Windows host does not include ClickOnce application file
types in the Windows Packager unsafe file type list.
An attacker could leverage this issue to execute arbitrary code in the
context of the current user on the affected host if he can trick the
user into opening a Microsoft Office file with a malicious ClickOnce
application embedded in it.
See also :
Microsoft has released a set of patches for Windows XP, 2003, Vista,
2008, 7, and 2008 R2.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.7
Public Exploit Available : true
Family: Windows : Microsoft Bulletins
Nessus Plugin ID: 57473 ()
Bugtraq ID: 51284
CVE ID: CVE-2012-0013
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.