Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
microsoft office 2010 vulnerabilities and exploits
(subscribe to this query)
9.3
CVSSv2
CVE-2018-8148
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from C...
Microsoft Office 2013
Microsoft Office Compatibility Pack -
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office For Mac 2016
9.3
CVSSv2
CVE-2018-8147
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Excel. This CVE ID is unique from C...
Microsoft Excel 2013
Microsoft Office 2013
Microsoft Office Compatibility Pack -
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office For Mac 2016
5.8
CVSSv2
CVE-2016-7268
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Office Compatibility Pack SP3, Word Viewer, Word for Mac 2011, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote malicious users to obtain sensitive information from process m...
Microsoft Office Web Apps 2010
Microsoft Word Viewer
Microsoft Office Compatibility Pack
Microsoft Sharepoint Server 2010
Microsoft Word For Mac 2011
Microsoft Office 2010
Microsoft Word 2007
5
CVSSv2
CVE-2018-8310
A tampering vulnerability exists when Microsoft Outlook does not properly handle specific attachment types when rendering HTML emails, aka "Microsoft Office Tampering Vulnerability." This affects Microsoft Word, Microsoft Office.
Microsoft Office 2010
Microsoft Office 2016
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word 2010
1 Article
9.3
CVSSv2
CVE-2016-3318
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allow remote malicious users to execute arbitrary code via a crafted file, aka "Graphics Component Memory Corruption Vulnerability."
Microsoft Office 2010
Microsoft Office 2007
Microsoft Office 2013
8.5
CVSSv2
CVE-2021-27059
Microsoft Office Remote Code Execution Vulnerability
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
9.3
CVSSv2
CVE-2015-2466
Microsoft Office 2007 SP3, 2010 SP2, 2013 SP1, and 2013 RT SP1 allows remote malicious users to execute arbitrary code via a crafted template, aka "Microsoft Office Remote Code Execution Vulnerability."
Microsoft Office 2013
Microsoft Office 2007
Microsoft Office 2010
9.3
CVSSv2
CVE-2018-8158
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka "Microsoft Office Remote Code Execution Vulnerability." This affects Microsoft Office. This CVE ID is unique from CVE-2018-8157, C...
Microsoft Office 2013
Microsoft Office 2010
Microsoft Office 2016
1 Article
4.3
CVSSv2
CVE-2014-6362
Use-after-free vulnerability in Microsoft Office 2007 SP3, 2010 SP2, and 2013 Gold and SP1 allows remote malicious users to bypass the ASLR protection mechanism via a crafted document, aka "Microsoft Office Component Use After Free Vulnerability."
Microsoft Office 2007
Microsoft Office 2010
Microsoft Office 2013
9.3
CVSSv2
CVE-2014-6364
Use-after-free vulnerability in Microsoft Office 2007 SP3; 2010 SP2; 2013 Gold, SP1, and SP2; and 2013 RT Gold and SP1 allows remote malicious users to execute arbitrary code via a crafted Office document, aka "Microsoft Office Component Use After Free Vulnerability."
Microsoft Office 2013
Microsoft Office 2007
Microsoft Office 2010
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-22460
CVE-2024-4646
CVE-2024-29212
IMAP
CVE-2023-36672
CVE-2024-34547
command injection
CVE-2024-4651
stored XSS
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »