Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x64:*", "matchCriteriaId": "5E01525C-A3AB-4AB7-82F9-B91E4D552FD7", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:excel:2010:sp2:*:*:*:*:x86:*", "matchCriteriaId": "E28626D8-AF3A-487F-BAAB-3955E44D2A35", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "F564117D-450D-45C4-9688-AF35F630A8A7", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:excel:2013:sp1:*:*:rt:*:*:*", "matchCriteriaId": "3A062169-527E-43DA-8AE0-FD4FBA1B2A9B", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:excel_for_mac:2011:*:*:*:*:*:*:*", "matchCriteriaId": "0FF929F6-6551-4358-AFBE-3495E8DC7BFA", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:excel_for_mac:2016:*:*:*:*:*:*:*", "matchCriteriaId": "0C6BEA4C-18FE-48D1-86AB-670833528150", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2010:sp2:*:*:*:*:*:*", "matchCriteriaId": "9A57C675-05A9-4BC2-AE95-7CA5CA6B1F73", "vulnerable": true}, {"criteria": "cpe:2.3:a:microsoft:sharepoint_server:2013:sp1:*:*:*:*:*:*", "matchCriteriaId": "16F33176-442C-4EFF-8EA0-C640D203B939", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "Use-after-free vulnerability in Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel for Mac 2011, Excel 2016 for Mac, and Excel Services on SharePoint Server 2010 SP2 and 2013 SP1 allows remote attackers to execute arbitrary code via a crafted calculatedColumnFormula object in an Office document, aka \"Microsoft Office Memory Corruption Vulnerability.\""}, {"lang": "es", "value": "Vulnerabilidad de uso despu\u00e9s de liberaci\u00f3n de memoria en Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel para Mac 2011, Excel 2016 para Mac y Excel Services en SharePoint Server 2010 SP2 y 2013 SP1 permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto calculatedColumnFormula manipulado en un documento Office, tambi\u00e9n conocida como 'Microsoft Office Memory Corruption Vulnerability'."}], "evaluatorComment": "<a href=\"http://cwe.mitre.org/data/definitions/416.html\">CWE-416: Use After Free</a>", "id": "CVE-2015-2555", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true}]}, "published": "2015-10-14T01:59:10.060", "references": [{"source": "secure@microsoft.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1033803"}, {"source": "secure@microsoft.com", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-517"}, {"source": "secure@microsoft.com", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-110"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.securitytracker.com/id/1033803"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory", "VDB Entry"], "url": "http://www.zerodayinitiative.com/advisories/ZDI-15-517"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/2015/ms15-110"}], "sourceIdentifier": "secure@microsoft.com", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "NVD-CWE-Other"}], "source": "nvd@nist.gov", "type": "Primary"}]}