Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft office web apps 2010 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2020-0901
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft 365 Apps -
8.8
CVSSv3
CVE-2020-1494
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logg...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2013
Microsoft Excel 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
8.8
CVSSv3
CVE-2020-1495
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logg...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Office 2013
Microsoft Excel 2010
Microsoft Office Online Server -
Microsoft Office 2016
Microsoft Sharepoint Enterprise Server 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
8.8
CVSSv3
CVE-2020-1496
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logg...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2013
Microsoft Office 2010
Microsoft Excel 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
8.8
CVSSv3
CVE-2020-1498
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logg...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
1 Article
8.8
CVSSv3
CVE-2020-1583
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker cou...
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2013
Microsoft Office Web Apps 2010
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Office Online Server -
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Server 2019
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
1 Article
8.8
CVSSv3
CVE-2020-1446
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1447, CVE-2020-1448.
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2013
Microsoft Office Web Apps 2010
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Word Rt 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Sharepoint Enterprise Server 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Sharepoint Server 2019
Microsoft Office Online Server 1.0
Microsoft 365 Apps -
1 Github repository
8.8
CVSSv3
CVE-2020-1447
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2013
Microsoft Office Web Apps 2010
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Word Rt 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Sharepoint Enterprise Server 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Sharepoint Server 2019
Microsoft Office Online Server 1.0
Microsoft 365 Apps -
8.8
CVSSv3
CVE-2019-0585
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, M...
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office 2010
Microsoft Office Word Viewer -
Microsoft Word Automation Services -
Microsoft Office Web Apps Server 2010
Microsoft Word 2010
Microsoft Office Online Server -
Microsoft Office 2016
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Sharepoint Server 2019
Microsoft Sharepoint Server 2013
Microsoft Sharepoint Server 2016
1 Article
8.8
CVSSv3
CVE-2018-8504
A remote code execution vulnerability exists in Microsoft Word software when the software fails to properly handle objects in Protected View, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Microsoft SharePoint Server, Office 365 ProPlus, Microsof...
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2010
Microsoft Office 2013
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Word 2010
Microsoft Office 2016
Microsoft Office 365 Proplus -
Microsoft Office 2019
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
6
NEXT »