{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T14:57:24.060","vulnerabilities":[{"cve":{"id":"CVE-2019-0801","sourceIdentifier":"secure@microsoft.com","published":"2019-04-09T21:29:00.957","lastModified":"2024-11-21T04:17:18.350","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote code execution vulnerability exists when Microsoft Office fails to properly handle certain files.To exploit the vulnerability, an attacker would have to convince a user to open a specially crafted URL file that points to an Excel or PowerPoint file that was also downloaded.The update addresses the vulnerability by correcting how Office handles these files., aka 'Office Remote Code Execution Vulnerability'."},{"lang":"es","value":"Existe una vulnerabilidad de ejecución remota de código en Microsoft Office, cuando maneja de forma incorrecta ciertos archivos. Para explotar la vulnerabilidad, un atacante tendría que convencer a un usuario de que abra un archivo URL especialmente diseñado que apunte a un archivo de Excel o PowerPoint que también se haya descargado. La actualización soluciona la vulnerabilidad corrigiendo la forma en que Office maneja estos archivos, también conocida como \"Office Remote Code Execution Vulnerability\""}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-19"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2010:sp2:*:*:*:*:*:*","matchCriteriaId":"081DE1E3-4622-4C32-8B9C-9AEC1CD20638"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2013:sp1:*:*:*:*:*:*","matchCriteriaId":"120690A6-E0A1-4E36-A35A-C87109ECC064"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2013:sp1:*:*:rt:*:*:*","matchCriteriaId":"F7DDFFB8-2337-4DD7-8120-56CC8EF134B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:*:*","matchCriteriaId":"E0B3B0BC-C7C6-4687-AD72-DCA29FF9AE3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*","matchCriteriaId":"FF177984-A906-43FA-BF60-298133FBBD6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_365_proplus:*:*:*:*:*:*:*:*","matchCriteriaId":"94A9F645-7A3A-44E1-B9E6-14E128746785"}]}]}],"references":[{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0801","source":"secure@microsoft.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-19-358/","source":"secure@microsoft.com"},{"url":"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0801","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://www.zerodayinitiative.com/advisories/ZDI-19-358/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}