Description
Microsoft Excel 2007 SP3, Excel 2010 SP2, Excel 2013 SP1, Excel 2013 RT SP1, Excel 2016, Word 2016 for Mac, Office Compatibility Pack SP3, and Excel Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka "Microsoft Office Memory Corruption Vulnerability."
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Sébastien Morin · textlocalwindows
https://www.exploit-db.com/exploits/39694
References (3)
Core 3
Core References
Vendor Advisory vendor-advisory
x_refsource_ms
https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-042
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id/1035525
Exploit, Third Party Advisory exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/39694/
Scores
CVSS v3
7.8
EPSS
0.3992
EPSS Percentile
97.3%
Attack Vector
LOCAL
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-119
Status
published
Products (7)
microsoft/excel
2007 sp3
microsoft/excel
2010 sp2
microsoft/excel
2013 sp1 (2 CPE variants)
microsoft/excel
2016
microsoft/excel_viewer
microsoft/office_compatibility_pack
microsoft/word_for_mac
2016
Published
Apr 12, 2016
Tracked Since
Feb 18, 2026