Microsoft Excel 2016 vulnerabilities

147 known vulnerabilities affecting microsoft/microsoft_excel_2016.

Total CVEs
147
CISA KEV
1
actively exploited
Public exploits
4
Exploited in wild
1
Severity breakdown
HIGH129MEDIUM18

Vulnerabilities

Page 7 of 8
CVE-2021-27057HIGHCVSS 7.8≥ 16.0.0.0, < publication2021-03-11
CVE-2021-27057 [HIGH] CVE-2021-27057: Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2021-24067HIGHCVSS 7.8≥ 16.0.0.0, < publication2021-02-25
CVE-2021-24067 [HIGH] CWE-416 CVE-2021-24067: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2021-24069HIGHCVSS 7.8≥ 16.0.0.0, < publication2021-02-25
CVE-2021-24069 [HIGH] CVE-2021-24069: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2021-24070HIGHCVSS 7.8≥ 16.0.0.0, < publication2021-02-25
CVE-2021-24070 [HIGH] CWE-416 CVE-2021-24070: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2021-1713HIGHCVSS 7.8≥ 16.0.0.0, < publication2021-01-12
CVE-2021-1713 [HIGH] CWE-119 CVE-2021-1713: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2021-1714HIGHCVSS 7.8≥ 16.0.0.0, < publication2021-01-12
CVE-2021-1714 [HIGH] CVE-2021-1714: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17123HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-12-10
CVE-2020-17123 [HIGH] CVE-2020-17123: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17129HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-12-10
CVE-2020-17129 [HIGH] CVE-2020-17129: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17125HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-12-10
CVE-2020-17125 [HIGH] CVE-2020-17125: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17128HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-12-10
CVE-2020-17128 [HIGH] CVE-2020-17128: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17130MEDIUMCVSS 6.5≥ 16.0.0.0, < publication2020-12-10
CVE-2020-17130 [MEDIUM] CVE-2020-17130: Microsoft Excel Security Feature Bypass Vulnerability Microsoft Excel Security Feature Bypass Vulnerability
cvelistv5nvd
CVE-2020-17126MEDIUMCVSS 5.5≥ 16.0.0.0, < publication2020-12-10
CVE-2020-17126 [MEDIUM] CVE-2020-17126: Microsoft Excel Information Disclosure Vulnerability Microsoft Excel Information Disclosure Vulnerability
cvelistv5nvd
CVE-2020-17064HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-11-11
CVE-2020-17064 [HIGH] CVE-2020-17064: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17065HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-11-11
CVE-2020-17065 [HIGH] CVE-2020-17065: Microsoft Excel Remote Code Execution Vulnerability Microsoft Excel Remote Code Execution Vulnerability
cvelistv5nvd
CVE-2020-17067HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-11-11
CVE-2020-17067 [HIGH] CVE-2020-17067: Microsoft Excel Security Feature Bypass Vulnerability Microsoft Excel Security Feature Bypass Vulnerability
cvelistv5nvd
CVE-2020-16932HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-10-16
CVE-2020-16932 [HIGH] CWE-908 CVE-2020-16932: <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of t
cvelistv5nvd
CVE-2020-16931HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-10-16
CVE-2020-16931 [HIGH] CWE-908 CVE-2020-16931: <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of t
cvelistv5nvd
CVE-2020-16929HIGHCVSS 7.8≥ 16.0.0.0, < publication2020-10-16
CVE-2020-16929 [HIGH] CWE-416 CVE-2020-16929: <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of t
cvelistv5nvd
CVE-2020-1594HIGHCVSS 8.8≥ 16.0.0.0, < publication2020-09-11
CVE-2020-1594 [HIGH] CVE-2020-1594: <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affecte
cvelistv5nvd
CVE-2020-1335HIGHCVSS 8.8≥ 16.0.0.0, < publication2020-09-11
CVE-2020-1335 [HIGH] CVE-2020-1335: <p>A remote code execution vulnerability exists in Microsoft Excel software when the software fails A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affecte
cvelistv5nvd