Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft office 2019 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-33158
Microsoft Excel Remote Code Execution Vulnerability
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2021
Microsoft Office -
9.3
CVSSv2
CVE-2020-0851
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0850, CVE-2020-0852, CVE-2020-0855, CVE-2020-0892.
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
1 Article
9.3
CVSSv2
CVE-2019-0822
A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka 'Microsoft Graphics Components Remote Code Execution Vulnerability'.
Microsoft Office 365 Proplus
Microsoft Office 2019
Microsoft Office 2016
1 Article
9.3
CVSSv2
CVE-2018-8574
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Excel. This CVE...
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
2.1
CVSSv2
CVE-2019-1463
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1400.
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
1 Article
6.8
CVSSv2
CVE-2019-0824
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2...
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 365 Proplus
Microsoft Office 2010
1 Article
6.8
CVSSv2
CVE-2019-0826
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0823, CVE-2...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 365 Proplus
Microsoft Office 2016
Microsoft Office 2019
1 Article
9.3
CVSSv2
CVE-2019-0946
A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory, aka 'Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0945, CVE-2...
Microsoft Office 2016
Microsoft Office 365 Proplus
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2019
1 Article
2.1
CVSSv2
CVE-2019-1400
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1463.
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
1 Article
9.3
CVSSv2
CVE-2018-8587
A remote code execution vulnerability exists in Microsoft Outlook software when it fails to properly handle objects in memory, aka "Microsoft Outlook Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Outlook.
Microsoft Office 365 Proplus -
Microsoft Office 2010
Microsoft Office 2019
Microsoft Office 2013
Microsoft Office 2016
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »