CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally. |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Free of memory not on the heap in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally. |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally. |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. |
Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. |
Microsoft Office 2016 Click-to-Run (C2R) and Microsoft Office 2016 for Mac allow an attacker to use a specially crafted file to perform actions in the security context of the current user, due to how Microsoft Office handles files in memory, aka "Microsoft Office Remote Code Execution Vulnerability". |