Msrc Microsoft Office 2013 Service Pack 1 vulnerabilities

142 known vulnerabilities affecting msrc/microsoft_office_2013_service_pack_1.

Total CVEs
142
CISA KEV
11
actively exploited
Public exploits
6
Exploited in wild
12
Severity breakdown
CRITICAL1HIGH124MEDIUM16LOW1

Vulnerabilities

Page 7 of 8
CVE-2017-11882HIGHCVSS 7.8KEVPoC2017-11-14
CVE-2017-11882 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected
msrc
CVE-2017-8744HIGHCVSS 7.82017-09-12
CVE-2017-8744 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-8570HIGHCVSS 7.8KEVPoC2017-07-11
CVE-2017-8570 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-8512HIGHCVSS 8.82017-06-13
CVE-2017-8512 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-8510HIGHCVSS 8.82017-06-13
CVE-2017-8510 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-8511HIGHCVSS 7.82017-06-13
CVE-2017-8511 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-0260HIGHCVSS 7.82017-06-13
CVE-2017-0260 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Office improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
msrc
CVE-2017-8509MEDIUMCVSS 8.82017-06-13
CVE-2017-8509 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-0281HIGHCVSS 7.82017-05-09
CVE-2017-0281 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user
msrc
CVE-2017-0262HIGHCVSS 7.8KEV2017-05-09
CVE-2017-0262 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office that could be exploited when a user opens a file containing a malformed graphics image or when a user inserts a malformed graphics image into an Office file. Such a file could also be included in an email attachment. An attacker could exploit the vulnerability by constructing a specially craft
msrc
CVE-2017-0261HIGHCVSS 7.8KEV2017-05-09
CVE-2017-0261 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office that could be exploited when a user opens a file containing a malformed graphics image or when a user inserts a malformed graphics image into an Office file. Such a file could also be included in an email attachment. An attacker could exploit the vulnerability by constructing a specially craft
msrc
CVE-2017-0199MEDIUMCVSS 6.7KEVPoC2017-04-11
CVE-2017-0199 [HIGH] Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows Description: A remote code execution vulnerability exists in the way that Microsoft Office and WordPad parse specially crafted files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with ful
msrc
CVE-2016-7275HIGHCVSS 7.82016-12-13
CVE-2016-7275 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists when Microsoft Office improperly validates input before loading dynamic link library (DLL) files. An attacker who successfully exploited this vulnerability could take control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
msrc
CVE-2016-7276HIGHCVSS 7.12016-12-13
CVE-2016-7276 [HIGH] Microsoft Office Information Disclosure Vulnerability Microsoft Office Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Microsoft Office software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerability requires that a user open a specially crafted file
msrc
CVE-2016-7245HIGHCVSS 7.82016-11-08
CVE-2016-7245 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-0137HIGHCVSS 3.32016-09-13
CVE-2016-0137 [LOW] Microsoft APP-V Security Feature Bypass Vulnerability Microsoft APP-V Security Feature Bypass Vulnerability Description: An information disclosure vulnerability exists in the way that the Click-to-Run (C2R) components handle objects in memory, which could lead to an Address Space Layout Randomization (ASLR) bypass. An attacker who successfully exploited the information disclosure vulnerability could use the obtained information to bypass the ASLR security mechanism in Window
msrc
CVE-2016-0141HIGHCVSS 6.52016-09-13
CVE-2016-0141 [MEDIUM] Microsoft Office Information Disclosure Vulnerability Microsoft Office Information Disclosure Vulnerability Description: An information disclosure vulnerability exists when Microsoft Outlook fails to enforce copy/paste permissions on DRM-protected emails. An attacker who successfully exploited the vulnerability could potentially extract plaintext content from DRM-protected draft emails. The attacker would have to use another vulnerability to gain access to the victim's Dr
msrc
CVE-2016-3313HIGHCVSS 7.8PoC2016-08-09
CVE-2016-3313 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the Office software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the af
msrc
CVE-2016-3318HIGHCVSS 7.82016-08-09
CVE-2016-3318 [HIGH] Microsoft Office Memory Corruption Vulnerability Microsoft Office Memory Corruption Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected
msrc
CVE-2016-0126HIGHCVSS 7.82016-05-10
CVE-2016-0126 [HIGH] Microsoft Office Remote Code Execution Vulnerability Microsoft Office Remote Code Execution Vulnerability Description: A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the a
msrc