{"uuid": "d91c03b4-ff78-4d41-b2e0-3e7bf8518d1f", "vulnerability": {"vulnId": "CVE-2018-0798", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "d91c03b4-ff78-4d41-b2e0-3e7bf8518d1f"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: Microsoft Office Memory Corruption Vulnerability | Affected: Microsoft / Office | Description: Microsoft Office contains a memory corruption vulnerability due to the way objects are handled in memory. Successful exploitation allows for remote code execution in the context of the current user. This vulnerability is known to be chained with CVE-2018-0802. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2018-0798"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-787"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Office", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "Microsoft", "vulnerabilityName": "Microsoft Office Memory Corruption Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2018-0798", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2018-0798"}]}
