CVE ID | Publié | Description | Score | Gravité |
---|---|---|---|---|
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 8.4 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 8.4 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Elevation of Privilege Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Denial of Service Vulnerability | 6.5 |
Moyen |
||
Microsoft Word Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Word Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Word Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 8.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Office Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Office Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Office Remote Code Execution Vulnerability | 8.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Word Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Online Server Spoofing Vulnerability | 5.3 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 8.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Office Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Word Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Office Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Word Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Word Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Information Disclosure Vulnerability | 5.5 |
Moyen |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory. |
8.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or Instant Messenger message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory. |
8.8 |
Haute |
||
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Excel functions handle objects in memory. |
5.5 |
Moyen |
||
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory. | 8.8 |
Haute |
||
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory. | 5.5 |
Moyen |
||
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory. | 5.5 |
Moyen |
||
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory. | 8.8 |
Haute |
||
An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1342. | 5.5 |
Moyen |
||
A spoofing vulnerability exists when an Office Web Apps server does not properly sanitize a specially crafted request, aka 'Office Web Apps XSS Vulnerability'. | 6.1 |
Moyen |
||
An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory, aka 'Microsoft Office Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2020-1445. | 5.5 |
Moyen |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. | 7.8 |
Haute |
||
A spoofing vulnerability exists when Office Online Server does not validate origin in cross-origin communications correctly, aka 'Microsoft Office Online Server Spoofing Vulnerability'. | 5.4 |
Moyen |
||
A spoofing vulnerability exists when Office Online does not validate origin in cross-origin communications correctly, aka 'Microsoft Office Online Spoofing Vulnerability'. | 5.4 |
Moyen |
||
An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory, aka 'Microsoft Excel Information Disclosure Vulnerability'. | 5.5 |
Moyen |
||
A spoofing vulnerability exists when Office Online does not validate origin in cross-origin communications handlers correctly, aka 'Microsoft Office Online Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-1445. | 5.4 |
Moyen |
||
A spoofing vulnerability exists when Office Online does not validate origin in cross-origin communications handlers correctly, aka 'Microsoft Office Online Spoofing Vulnerability'. This CVE ID is unique from CVE-2019-1447. | 5.4 |
Moyen |
||
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1327. | 8.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. Two possible email attack scenarios exist for this vulnerability: • With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered. • With the second scenario, an attacker could attach a specially crafted file to an email, send it to a user, and convince them to open it. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or other message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory. For users who view their emails in Outlook, the Preview Pane attack vector can be mitigated by disabling this feature. The following registry keys can be set to disable the Preview Pane in Outlook on Windows, either via manual editing of the registry or by modifying Group Policy. Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe. Outlook 2010: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Options DWORD: DisableReadingPane Value: 1 Outlook 2013: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Options DWORD: DisableReadingPane Value: 1 Outlook 2016, Outlook 2019, and Office 365 ProPlus: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Options DWORD: DisableReadingPane Value: 1 | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of Microsoft Word software. Two possible email attack scenarios exist for this vulnerability: With the first email attack scenario, an attacker could send a specially crafted email message to the user and wait for the user to click on the message. When the message renders via Microsoft Word in the Outlook Preview Pane, an attack could be triggered. With the second scenario, an attacker could attach a specially crafted file to an email, send it to a user, and convince them to open it. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) that contains a specially crafted file that is designed to exploit the vulnerability. However, an attacker would have no way to force the user to visit the website. Instead, an attacker would have to convince the user to click a link, typically by way of an enticement in an email or other message, and then convince the user to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Word handles files in memory. For users who view their emails in Outlook, the Preview Pane attack vector can be mitigated by disabling this feature. The following registry keys can be set to disable the Preview Pane in Outlook on Windows, either via manual editing of the registry or by modifying Group Policy. Note Using Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Microsoft cannot guarantee that problems resulting from the incorrect use of Registry Editor can be solved. Use Registry Editor at your own risk. For information about how to edit the registry, view the "Changing Keys and Values" Help topic in Registry Editor (Regedit.exe) or view the "Add and Delete Information in the Registry" and "Edit Registry Data" Help topics in Regedt32.exe. Outlook 2010: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Options DWORD: DisableReadingPane Value: 1 Outlook 2013: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Options DWORD: DisableReadingPane Value: 1 Outlook 2016, Outlook 2019, and Office 365 ProPlus: HKEY_CURRENT_USER\Software\Microsoft\Office\16.0\Outlook\Options DWORD: DisableReadingPane Value: 1 | 9.8 |
Critique |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1035. | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1034. | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka 'Microsoft Word Remote Code Execution Vulnerability'. | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory, aka "Microsoft Word Remote Code Execution Vulnerability." This affects Word, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft SharePoint, Microsoft Office Online Server, Microsoft Word, Microsoft SharePoint Server. | 8.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka "Microsoft PowerPoint Remote Code Execution Vulnerability." This affects Microsoft Office, Office 365 ProPlus, Microsoft PowerPoint, Microsoft SharePoint, Microsoft PowerPoint Viewer, Office Online Server, Microsoft SharePoint Server. | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Excel Services, Microsoft Excel 2007 Service Pack 3, Microsoft Excel 2010 Service Pack 2, Microsoft Excel 2013 Service Pack 1, Microsoft Excel 2013 RT Service Pack 1, Microsoft Excel 2016, Microsoft Office Web Apps 2013, Microsoft Office Compatibility Pack Service Pack 3, Microsoft Excel Web App 2013 Service Pack 1, Microsoft Excel Viewer 2007 Service Pack 3, and Office Online Server when they fail to properly handle objects in memory, aka "Microsoft Office Memory Corruption Vulnerability". This CVE ID is unique from CVE-2017-8630, CVE-2017-8632, and CVE-2017-8744. | 7.8 |
Haute |
||
A remote code execution vulnerability exists in Microsoft PowerPoint 2016, Microsoft SharePoint Enterprise Server 2016, and Office Online Server when they fail to properly handle objects in memory, aka "PowerPoint Remote Code Execution Vulnerability". This CVE ID is unique from CVE-2017-8742. | 7.8 |
Haute |
||
Microsoft Excel Services on Microsoft SharePoint Server 2010 SP1 and SP2, Microsoft Excel Web Apps 2010 SP2, Microsoft Office Web Apps 2010 SP2, Microsoft Office Web Apps Server 2013 SP1 and Office Online Server allows remote attackers to perform cross-site scripting and run script with local user privileges via a crafted request, aka "Microsoft Office XSS Elevation of Privilege Vulnerability." | 5.4 |
Moyen |
||
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Excel 2016 for Mac, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability." | 7.8 |
Haute |
||
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3365. | 7.8 |
Haute |
||
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office Memory Corruption Vulnerability," a different vulnerability than CVE-2016-3362. | 7.8 |
Haute |
||
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Viewer, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, SharePoint Server 2016, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | 7.8 |
Haute |
||
Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office 2016, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability." | 7.3 |
Haute |