Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft office system vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2020-16954
<p>A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current us...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
9.3
CVSSv2
CVE-2020-16957
<p>A remote code execution vulnerability exists when the Microsoft Office Access Connectivity Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system.</p> <p>An attack...
Microsoft Office 2019
Microsoft 365 Apps -
6.8
CVSSv2
CVE-2020-16930
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current use...
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft 365 Apps -
9.3
CVSSv2
CVE-2020-16947
<p>A remote code execution vulnerability exists in Microsoft Outlook software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the targeted user. If the targeted...
Microsoft Outlook 2016
Microsoft Office 2019
Microsoft 365 Apps -
3 Github repositories
1 Article
6.8
CVSSv2
CVE-2020-1193
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current use...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
6.8
CVSSv2
CVE-2020-1332
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current use...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
6.8
CVSSv2
CVE-2020-1335
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current use...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office Web Apps 2013
Microsoft Office 2013
Microsoft Office 2010
Microsoft Excel 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft Sharepoint Server 2019
Microsoft Office Online Server 1.0
Microsoft 365 Apps -
1 Article
6.8
CVSSv2
CVE-2020-1594
<p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current use...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
9.3
CVSSv2
CVE-2020-1563
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is log...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
9.3
CVSSv2
CVE-2020-1581
An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. An attacker who successfully exploited the vulnerability could elevate privileges. The attacker would need to already have the ability to execut...
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2013
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
privilege escalation
CVE-2024-20696
CVE-2024-29829
CVE-2024-33999
CVE-2024-35646
physical
CVE-2024-24919
CVE-2024-31030
local users
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »