Msrc Microsoft Excel For Mac 2011 vulnerabilities

17 known vulnerabilities affecting msrc/microsoft_excel_for_mac_2011.

Total CVEs
17
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL1HIGH16

Vulnerabilities

Page 1 of 1
CVE-2017-8632HIGHCVSS 7.82017-09-12
CVE-2017-8632 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-8567HIGHCVSS 7.82017-09-12
CVE-2017-8567 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected
msrc
CVE-2017-8631HIGHCVSS 7.82017-09-12
CVE-2017-8631 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-0027HIGHCVSS 4.72017-03-14
CVE-2017-0027 [MEDIUM] Microsoft Excel Information Disclosure Vulnerability Microsoft Excel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacke
msrc
CVE-2016-7264HIGHCVSS 7.12016-12-13
CVE-2016-7264 [HIGH] Microsoft Excel Information Disclosure Vulnerability Microsoft Excel Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Microsoft Excel software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerability requires that a user open a specially crafted file wit
msrc
CVE-2016-7263HIGHCVSS 7.82016-12-13
CVE-2016-7263 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7234HIGHCVSS 7.82016-11-08
CVE-2016-7234 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7235HIGHCVSS 7.82016-11-08
CVE-2016-7235 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7213HIGHCVSS 7.82016-11-08
CVE-2016-7213 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7231HIGHCVSS 7.82016-11-08
CVE-2016-7231 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7229HIGHCVSS 7.82016-11-08
CVE-2016-7229 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7236HIGHCVSS 7.82016-11-08
CVE-2016-7236 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-7233HIGHCVSS 6.52016-11-08
CVE-2016-7233 [MEDIUM] Microsoft Office Information Disclosure Vulnerability Microsoft Office Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerability requires that a user open a specially crafted fil
msrc
CVE-2016-7228HIGHCVSS 7.82016-11-08
CVE-2016-7228 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-3284HIGHCVSS 7.82016-07-12
CVE-2016-3284 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-0010CRITICALCVSS 7.82016-01-12
CVE-2016-0010 [HIGH] CVE-2016-0010: Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No Impact: Remote Code Execution Exploit Status: Publicly Disclosed:No;Exploited:No
msrc
CVE-2016-0035HIGHCVSS 7.82016-01-12
CVE-2016-0035 [HIGH] CVE-2016-0035: Impact: Remote Code Execution Exploit Status: Publicly Disclosed:Yes;Exploited:No Impact: Remote Code Execution Exploit Status: Publicly Disclosed:Yes;Exploited:No
msrc