Download
| Alert*
oval:org.secpod.oval:def:21855
The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1 or Office Compatibility Pack SP3 and is prone to a excel invalid pointer remote code execution vulnerability. The flaw is present in the applications, which improperly handles objects in memory while parsing speciall ... oval:org.secpod.oval:def:21856 The host is missing an important security update according to Microsoft security bulletin, MS14-083. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle certain objects in memory while parsing specially crafted ... oval:org.secpod.oval:def:24307 The host is installed with Office 2010, 2013, Word 2010, 2013, Excel 2010, 2013, Powerpoint 2010,2013, Powerpoint Viewer, Sharepoint Server 2010, 2013, Foundation 2010, 2013, Office Web Apps 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which ... oval:org.secpod.oval:def:25364 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, or Office Compatibility Pack SP3 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:25366 The host is installed with Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel Services on SharePoint Server 2010 SP2, or Excel Services on SharePoint Server 2013 SP1 and is prone to a Microsoft Excel ASLR bypass vulnerability. A flaw is present in the applications, which fail to handle a crafted spread ... oval:org.secpod.oval:def:25360 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel Viewer 2007 SP3, Office Compatibility Pack SP3, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, and Excel Services on SharePoint Server 2013 SP1 and is prone to a me ... oval:org.secpod.oval:def:25361 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, or Office Compatibility Pack SP3 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to ... oval:org.secpod.oval:def:15452 Microsoft Excel 2013 is installed oval:org.secpod.oval:def:26549 The host is installed with Microsoft Excel 2007, 2010, 2013, Excel Viewer 2007 or Office Compatibility Pack and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fails to properly handle a specially crafted file. Successful exploitation could allow attackers ... oval:org.secpod.oval:def:15657 The host is installed with Microsoft Excel SP3, Office 2007 SP3, Office 2010 SP1/SP2, Office 2013, Excel Viewer 2007, Office Compatibility Pack SP3, Office Web Apps 2010,SharePoint Server 2007 SP3, SharePoint Server 2010 SP1/SP2, SharePoint Server 2013 and is prone to remote code execution vulnerabi ... oval:org.secpod.oval:def:15654 The host is missing an important security update according to Microsoft security bulletin, MS13-085. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle certain objects in memory while parsing specially crafted ... oval:org.secpod.oval:def:57343 The host is missing an important security update for KB4464565 oval:org.secpod.oval:def:33819 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3 or Excel Viewer 2007 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle objects in memory. An attacker who succes ... oval:org.secpod.oval:def:30007 The host is installed with Microsoft Excel 2010, 2013, 2016, Sharepoint Server 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploitation could allow attackers to execute arbitrary co ... oval:org.secpod.oval:def:30009 The host is installed with Microsoft Excel 2007, 2010, 2013, 2016, Office Compatibility pack, Excel Viewer 2007, Sharepoint Server 2007, 2010 or 2013 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful ... oval:org.secpod.oval:def:32922 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer 2007, SharePoint Server 2007, SharePoint Server 2010, SharePoint Server 2013 or Web Apps 2010 and is prone to a memory corruption vulnerability. A flaw is pres ... oval:org.secpod.oval:def:31395 The host is installed with Microsoft Excel 2010 SP2, Excel 2013 SP1, Excel 2016 or Excel Services on SharePoint Server 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle specially crafted Microsoft Office file. Successful exploitat ... oval:org.secpod.oval:def:31391 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer or Excel Services on SharePoint Server 2007 SP3, 2010 SP2 or 2013 SP1 and is prone to a memory corruption vulnerability. A flaw is present in the applications, ... oval:org.secpod.oval:def:41219 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:41220 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:42050 A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the f ... oval:org.secpod.oval:def:37962 The host is installed with Microsoft Excel Viewer 2007, Microsoft Office Compatibility Pack, Microsoft Excel 2007, Excel 2010, Excel 2013 or Excel 2016 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation ... oval:org.secpod.oval:def:37961 The host is installed with Microsoft Office Compatibility Pack, Microsoft Excel 2007, Excel 2010, Excel 2013 or Excel 2016 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could allow attackers to exe ... oval:org.secpod.oval:def:37960 The host is installed with Microsoft Office Compatibility Pack, Microsoft Excel 2007, Excel 2010, Excel 2013 or Excel 2016 and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could allow attackers to exe ... oval:org.secpod.oval:def:39337 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:39338 An information disclosure vulnerability exists when Microsoft Office improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special docume ... oval:org.secpod.oval:def:38341 The host is installed with Microsoft Excel 2010, 2013 or 2016 and is prone to a security feature bypass vulnerability. A flaw is present in the applications, which fails to properly run embedded content. Successful exploitation could allow attackers to execute arbitrary code. oval:org.secpod.oval:def:38337 The host is installed with Microsoft Excel 2007, 2010, 2013, 2016, Office Compatibility Pack or Excel Viewer 2007 and is prone to a security feature bypass vulnerability. A flaw is present in the applications, which fails to properly handle crafted document file. Successful exploitation could allow ... oval:org.secpod.oval:def:38338 The host is installed with Microsoft Excel 2007, 2010, 2013, 2016, Office Compatibility Pack, Excel Viewer 2007, Sharepoint Server 2007 or 2010 and is prone to an information disclosure vulnerability. A flaw is present in the applications, which fails to properly initialize affected variables. Succe ... oval:org.secpod.oval:def:38339 The host is installed with Microsoft Excel 2007, 2010, 2013, 2016, Office Compatibility Pack or Excel Viewer 2007 and is prone to a security feature bypass vulnerability. A flaw is present in the applications, which fails to properly run embedded content. Successful exploitation could allow attacker ... oval:org.secpod.oval:def:32603 The host is installed with Microsoft Office 2007, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2016, Excel 2016, PowerPoint ... oval:org.secpod.oval:def:32604 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Excel Viewer or Office Compatibility Pack and is prone to a privilege escalation vulnerability. The flaws are present in the applications, which fail to handle specially crafted Microsoft Office file. Su ... oval:org.secpod.oval:def:35960 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, or Excel Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to properly handle objects in memory. Successful exploi ... oval:org.secpod.oval:def:35955 The host is installed with Microsoft Excel 2010 SP2, Powerpoint 2010 SP2, Word 2010 SP2, Excel 2013 SP1, Powerpoint 2013 SP1, Word 2013 SP1, Excel 2016, Word 2016, Word Automation Services on SharePoint Server 2010 SP2 or Office Web Apps 2010 SP2 and is prone to a memory corruption vulnerability. A ... oval:org.secpod.oval:def:37078 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1 and is pro ... oval:org.secpod.oval:def:37086 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3 or Excel Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could al ... oval:org.secpod.oval:def:37084 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1 and is pro ... oval:org.secpod.oval:def:37082 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3, Excel Viewer, Excel Services on SharePoint Server 2007 SP3, Excel Services on SharePoint Server 2010 SP2, Excel Automation Services on SharePoint Server 2013 SP1 and is pro ... oval:org.secpod.oval:def:44587 A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. The security feature bypass by itself does not allow arbitrary code execution. To successfully exploit the vulnerability, an attacker would have to embed a control in an ... oval:org.secpod.oval:def:45394 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:45395 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:46036 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:43443 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:45400 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:45401 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:49075 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:47467 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could access information previously deleted from the active worksheet. To exploit the vulnerability, an attacker could craft a special doc ... oval:org.secpod.oval:def:49709 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:47922 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in Protected View. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with a ... oval:org.secpod.oval:def:49710 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:49711 An information disclosure vulnerability exists when Microsoft Excel software reads out of bound memory due to an uninitialized variable, which could disclose the contents of memory. An attacker who successfully exploited the vulnerability could view out of bound memory. Exploitation of the vulnerabi ... oval:org.secpod.oval:def:49714 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:57248 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:54125 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:50695 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:57249 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:58906 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:58902 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:59854 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:61282 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:58436 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:60621 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:60622 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:58440 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:63645 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:63646 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:63079 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:62493 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:62492 A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the syst ... oval:org.secpod.oval:def:82636 Microsoft Excel Security Feature Bypass Vulnerability oval:org.secpod.oval:def:76402 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:75281 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:75287 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:75285 Microsoft Excel Information Disclosure Vulnerability oval:org.secpod.oval:def:73208 Microsoft Excel Information Disclosure Vulnerability oval:org.secpod.oval:def:31365 The host is missing an important security update according to Microsoft security bulletin, MS15-116. The update is required to fix multiple remote code execution vulnerabilities. The flaws are present in the applications, which fail to handle specially crafted Microsoft Office file. Successful explo ... oval:org.secpod.oval:def:31390 The host is installed with Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, P ... oval:org.secpod.oval:def:47126 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:47125 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:44953 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:42055 A remote code execution vulnerability exists in Microsoft Office software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the f ... oval:org.secpod.oval:def:42732 A security feature bypass vulnerability exists in Microsoft Office software by not enforcing macro settings on an Excel document. The security feature bypass by itself does not allow arbitrary code execution. To successfully exploit the vulnerability, an attacker would have to embed a control in an ... oval:org.secpod.oval:def:42733 A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administ ... oval:org.secpod.oval:def:15454 The host is missing an important security update according to Microsoft bulletin, MS13-073. The update is required to fix multiple vulnerabilities. The flaws are present in the applications, which fail to handle certain objects in memory. Successful exploitation allows attackers to execute arbitrary ... oval:org.secpod.oval:def:15456 The host is installed with Microsoft Excel 2003 SP3, 2007 SP3, 2010 SP1, SP2, 2013, Excel Viewer 2007 or Office Compatibility Pack SP3 and is prone to remote code execution vulnerability. A flaw are present in the applications, which fail to handle certain objects in memory while parsing specially c ... oval:org.secpod.oval:def:47122 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:44956 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:44958 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:23488 The host is installed with Excel 2007, 2010, 2013, Excel Viewer 2007 or Office Compatibility Pack 2007 and is prone to a remote code execution vulnerability. A flaw is present in the applications, which fail to handle crafted office files. Successful exploitation could allow attackers to execute arb ... oval:org.secpod.oval:def:23487 The host is missing an important security update according to Microsoft security bulletin, MS15-012. The update is required to fix multiple vulnerabilities. The flaw are present in the applications, which fails to properly handle a crafted file. Successful exploitation could allow attackers to gain ... oval:org.secpod.oval:def:77633 Microsoft Office Remote Code Execution Vulnerability. Successfully exploitation allows an attacker to read uninitialized memory. oval:org.secpod.oval:def:78711 Microsoft Excel Remote Code Execution Vulnerability. oval:org.secpod.oval:def:88033 Microsoft Excel Spoofing Vulnerability. oval:org.secpod.oval:def:88032 Microsoft Excel Spoofing Vulnerability. oval:org.secpod.oval:def:89705 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:90334 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:90335 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:90336 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:90770 Microsoft Excel Information Disclosure Vulnerability. oval:org.secpod.oval:def:37083 The host is installed with Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2016, Office Compatibility Pack SP3 or Excel Viewer and is prone to a memory corruption vulnerability. A flaw is present in the applications, which fail to handle crafted data. Successful exploitation could al ... oval:org.secpod.oval:def:81503 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:79935 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:77054 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:75806 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:75804 Microsoft Excel Security Feature Bypass Vulnerability oval:org.secpod.oval:def:74877 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:74876 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:73733 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:73732 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:71799 Microsoft Office Information Disclosure Vulnerability oval:org.secpod.oval:def:71798 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:71797 Microsoft Excel Information Disclosure Vulnerability oval:org.secpod.oval:def:71800 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:71801 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:70928 Microsoft Excel Information Disclosure Vulnerability oval:org.secpod.oval:def:70929 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:70926 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:69976 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:69977 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:69980 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:69010 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:69013 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:69011 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:69012 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:68166 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:68167 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:67692 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:67691 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:67689 Microsoft Excel Information Disclosure Vulnerability oval:org.secpod.oval:def:67688 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:67686 Microsoft Excel Remote Code Execution Vulnerability oval:org.secpod.oval:def:66912 The host is installed with Microsoft Office products and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the connectivity engine. Successful exploitation could allow a remote attacker to execute arbitrary code. oval:org.secpod.oval:def:66913 The host is installed with Microsoft Office products and is prone to a remote code execution vulnerability. A flaw is present in the application, which fails to handle an issue in the connectivity engine. Successful exploitation could allow a remote attacker to execute arbitrary code. oval:org.secpod.oval:def:66915 The host is installed with Microsoft Office products and is prone to a security feature bypass vulnerability. A flaw is present in the application, which fails to handle unspecified vectors. Successful exploitation could allow an attacker to cause unspecified impact. oval:org.secpod.oval:def:66035 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:66032 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:66034 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:65544 The host is missing an important security update for KB4484526 oval:org.secpod.oval:def:65387 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:65374 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:65375 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:65372 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:64912 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:64913 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:64914 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:64915 An information disclosure vulnerability exists when Microsoft Excel improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the users computer or data. To exploit the vulnerability, an attacker could craft a special documen ... oval:org.secpod.oval:def:64916 A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administr ... oval:org.secpod.oval:def:70927 Microsoft Office Remote Code Execution Vulnerability oval:org.secpod.oval:def:91839 Microsoft has released an update for Microsoft Office that provides enhanced security as a defense in depth measure. |