Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
office web apps vulnerabilities and exploits
(subscribe to this query)
828
VMScore
CVE-2020-1498
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logg...
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
1 Article
383
VMScore
CVE-2020-1503
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker cou...
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2013
Microsoft Office Web Apps 2010
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Office Online Server -
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Server 2019
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
1 Article
383
VMScore
CVE-2020-1583
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker cou...
Microsoft Word 2013
Microsoft Word 2016
Microsoft Office Web Apps 2013
Microsoft Office Web Apps 2010
Microsoft Sharepoint Server 2010
Microsoft Office 2010
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Office Online Server -
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Server 2019
Microsoft Office 2019
Microsoft 365 Apps -
Microsoft Office 2016
1 Article
828
VMScore
CVE-2020-1483
A remote code execution vulnerability exists in Microsoft Outlook when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on w...
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 2019
Microsoft 365 Apps -
1 Article
383
VMScore
CVE-2020-1342
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from...
Microsoft 365 Apps -
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office Online Server -
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Sharepoint Server 2010
Microsoft Sharepoint Server 2019
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
605
VMScore
CVE-2020-1446
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1447, CVE-2020-1448.
Microsoft 365 Apps -
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office Online Server 1.0
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Sharepoint Server 2010
Microsoft Sharepoint Server 2019
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word Rt 2013
1 Github repository
605
VMScore
CVE-2020-1447
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1448.
Microsoft 365 Apps -
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office Online Server 1.0
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Sharepoint Server 2010
Microsoft Sharepoint Server 2019
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word Rt 2013
383
VMScore
CVE-2020-1442
A spoofing vulnerability exists when an Office Web Apps server does not properly sanitize a specially crafted request, aka 'Office Web Apps XSS Vulnerability'.
Microsoft Office Online Server -
Microsoft Office Web Apps 2013
383
VMScore
CVE-2020-1445
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1342.
Microsoft 365 Apps -
Microsoft Office 2010
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office Online Server -
Microsoft Office Web Apps 2010
Microsoft Office Web Apps 2013
Microsoft Sharepoint Enterprise Server 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
605
VMScore
CVE-2020-1448
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1446, CVE-2020-1447.
Microsoft Office 2019
Microsoft Office Online Server 1.0
Microsoft Office Web Apps 2013
Microsoft Sharepoint Enterprise Server 2016
Microsoft Sharepoint Server 2019
Microsoft Word 2013
Microsoft Word 2016
Microsoft Word Rt 2013
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »