CVE-2020-0760 vulnerability in Microsoft Products
Published on April 15, 2020
A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991.
Products Associated with CVE-2020-0760
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2020-0760 are published in these products:
Affected Versions
Microsoft Project:- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2019 for 32-bit editions is affected.
- Version 2019 for 64-bit editions is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2013 RT Service Pack 1 is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 32-bit Systems is affected.
- Version 64-bit Systems is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2013 RT Service Pack 1 is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2013 RT Service Pack 1 is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2013 RT Service Pack 1 is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version unspecified is affected.
- Version unspecified is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2016 (32-bit edition) is affected.
- Version 2016 (64-bit edition) is affected.
- Version 2013 Service Pack 1 (32-bit editions) is affected.
- Version 2013 Service Pack 1 (64-bit editions) is affected.
- Version 2013 RT Service Pack 1 is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
- Version unspecified is affected.
- Version unspecified is affected.
- Version 2010 Service Pack 2 (64-bit editions) is affected.
- Version 2010 Service Pack 2 (32-bit editions) is affected.
Exploit Probability
EPSS
34.57%
Percentile
96.91%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.