{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T17:18:44.756","vulnerabilities":[{"cve":{"id":"CVE-2015-1649","sourceIdentifier":"secure@microsoft.com","published":"2015-04-14T20:59:11.767","lastModified":"2025-04-12T10:46:40.837","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Use-after-free vulnerability in Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps Server 2010 SP2 allows remote attackers to execute arbitrary code via a crafted Office document, aka \"Microsoft Office Component Use After Free Vulnerability.\""},{"lang":"es","value":"Vulnerabilidad de uso después de liberación en Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, y Office Web Apps Server 2010 SP2 permite a atacantes remotos ejecutar código arbitrario a través de un documento de Office manipulado, también conocido como 'vulnerabilidad del uso después de liberación de componentes de Microsoft Office.'"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2010:sp2:x64:*:*:*:*:*","matchCriteriaId":"69998A67-CB15-4217-8AD6-43F9BA3C6454"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2010:sp2:x86:*:*:*:*:*","matchCriteriaId":"349E9084-8116-43E9-8B19-CA521C96660D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_compatibility_pack:*:sp3:*:*:*:*:*:*","matchCriteriaId":"44BC7B7B-7191-431C-8CAE-83B3F0EFF03E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_web_apps:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"A8235774-4B57-4793-BE26-2CDE67532EDD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_web_apps:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"B3C3FC9A-D8E5-493A-A575-C831A9A28815"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"16F33176-442C-4EFF-8EA0-C640D203B939"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2007:sp3:*:*:*:*:*:*","matchCriteriaId":"7D006508-BFB0-4F21-A361-3DA644F51D8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"24EEDAD9-9656-4B21-82E4-D60B83777492"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2013:sp1:*:*:rt:*:*:*","matchCriteriaId":"45E21528-4B0F-4A6F-82AD-DF7FDBF67C8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word_viewer:*:*:*:*:*:*:*:*","matchCriteriaId":"D79B6572-E7DF-4CC2-B70B-9B31BE1B6A81"}]}]}],"references":[{"url":"http://www.securitytracker.com/id/1032104","source":"secure@microsoft.com"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033","source":"secure@microsoft.com"},{"url":"http://www.securitytracker.com/id/1032104","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-033","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>"}}]}