Patch Repository

MS16-133 Bulletin Details
Bulletin ID MS16-133
Title Security Update for Microsoft Office (3199168)
Summary This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.
Knowledgebase 3199168

List of Patches

S.No Patch Name Severity
1office-KB3127962-FullFile-ENU.exeImportant
2excel2007-kb3118395-fullfile-x86-glb.exeImportant
3word2007-kb3127949-fullfile-x86-glb.exeImportant
4xlconv2007-kb3127889-fullfile-x86-glb.exeImportant
5wordconv2007-kb3127948-fullfile-x86-glb.exeImportant
6mso2007-kb3118396-fullfile-x86-glb.exeImportant
7vbe62007-kb2986253-fullfile-x86-glb.exeImportant
8xlview2007-kb3127893-fullfile-x86-glb.exeImportant
9kb24286772010-kb3127951-fullfile-x86-glb.exeImportant
10excel2010-kb3118390-fullfile-x86-glb.exeImportant
11word2010-kb3127953-fullfile-x86-glb.exeImportant
12powerpoint2010-kb3118378-fullfile-x86-glb.exeImportant
13vbe72010-kb3115120-fullfile-x86-glb.exeImportant
14kb24286772010-kb3127951-fullfile-x64-glb.exeImportant
15excel2010-kb3118390-fullfile-x64-glb.exeImportant
16word2010-kb3127953-fullfile-x64-glb.exeImportant
17powerpoint2010-kb3118378-fullfile-x64-glb.exeImportant
18vbe72010-kb3115120-fullfile-x64-glb.exeImportant
19pptview2010-kb3118382-fullfile-x86-glb.exeImportant
20excel2013-kb3127921-fullfile-x86-glb.exeImportant
21vbe72013-kb3115153-fullfile-x86-glb.exeImportant
22word2013-kb3127932-fullfile-x86-glb.exeImportant
23excel2013-kb3127921-fullfile-x64-glb.exeImportant
24vbe72013-kb3115153-fullfile-x64-glb.exeImportant
25word2013-kb3127932-fullfile-x64-glb.exeImportant
26excel2016-kb3127904-fullfile-x86-glb.exeImportant
27vbe72016-kb3115135-fullfile-x86-glb.exeImportant
28excel2016-kb3127904-fullfile-x64-glb.exeImportant
29vbe72016-kb3115135-fullfile-x64-glb.exeImportant

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.