Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
excel vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-0541
A remote code execution vulnerability exists in the way that the MSHTML engine inproperly validates input, aka "MSHTML Engine Remote Code Execution Vulnerability." This affects Microsoft Office, Microsoft Office Word Viewer, Internet Explorer 9, Internet Explorer 11, Mi...
Microsoft Internet Explorer 11
Microsoft Excel Viewer 2007
Microsoft Office 2019
Microsoft Office 365 Proplus -
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office Word Viewer -
Microsoft Internet Explorer 9
Microsoft Internet Explorer 10
1 EDB exploit
8.8
CVSSv3
CVE-2018-8502
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in Protected View, aka "Microsoft Excel Remote Code Execution Vulnerability." This affects Office 365 ProPlus, Microsoft Office, Microsoft Excel.
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 365 Proplus -
Microsoft Office 2019
Microsoft Office 2016
Microsoft Office 2013
Microsoft Excel 2010
Microsoft Office 2010
1 Article
8.8
CVSSv3
CVE-2017-2923
An exploitable heap based buffer overflow vulnerability exists in the 'read_biff_next_record function' of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this...
Freexl Project Freexl 1.0.3
Debian Debian Linux 8.0
Debian Debian Linux 9.0
8.8
CVSSv3
CVE-2017-2924
An exploitable heap-based buffer overflow vulnerability exists in the read_legacy_biff function of FreeXL 1.0.3. A specially crafted XLS file can cause a memory corruption resulting in remote code execution. An attacker can send malicious XLS file to trigger this vulnerability.
Freexl Project Freexl 1.0.3
Debian Debian Linux 8.0
Debian Debian Linux 9.0
8.8
CVSSv3
CVE-2018-1028
A remote code execution vulnerability exists when the Office graphics component improperly handles specially crafted embedded fonts, aka "Microsoft Office Graphics Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft SharePoint, Excel, Mi...
Microsoft Sharepoint Enterprise Server 2016
Microsoft Office Web Apps 2010
Microsoft Excel Services -
Microsoft Word Automation Services -
Microsoft Office 2016
Microsoft Office 2013
Microsoft Office 2013 Rt
Microsoft Office 2010
Microsoft Sharepoint Enterprise Server 2013
Microsoft Office Web Apps 2013
8.8
CVSSv3
CVE-2018-9106
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in the export feature in the Acyba AcySMS extension prior to 3.5.1 for Joomla! via a value that is mishandled in a CSV export.
Acyba Acysms
1 EDB exploit
8.8
CVSSv3
CVE-2018-9107
CSV Injection (aka Excel Macro Injection or Formula Injection) exists in the export feature in the Acyba AcyMailing extension prior to 5.9.6 for Joomla! via a value that is mishandled in a CSV export.
Acyba Acymailing
1 EDB exploit
8.8
CVSSv3
CVE-2018-7435
An issue exists in FreeXL prior to 1.0.5. There is a heap-based buffer over-read in the freexl::destroy_cell function.
Freexl Project Freexl
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
8.8
CVSSv3
CVE-2018-7436
An issue exists in FreeXL prior to 1.0.5. There is a heap-based buffer over-read in a pointer dereference of the parse_SST function.
Freexl Project Freexl
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
8.8
CVSSv3
CVE-2018-7437
An issue exists in FreeXL prior to 1.0.5. There is a heap-based buffer over-read in a memcpy call of the parse_SST function.
Freexl Project Freexl
Debian Debian Linux 8.0
Debian Debian Linux 7.0
Debian Debian Linux 9.0
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »