Patch Repository

MS16-133 Bulletin Details
Bulletin ID MS16-133
Title Security Update for Microsoft Office (3199168)
Summary This security update resolves vulnerabilities in Microsoft Office. The most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file.
Knowledgebase 3199168

List of Patches

S.No Patch Name Severity
1excel2007-kb3118395-fullfile-x86-glb.exeImportant
2word2007-kb3127949-fullfile-x86-glb.exeImportant
3kb24286772010-kb3127951-fullfile-x86-glb.exeImportant
4kb24286772010-kb3127951-fullfile-x64-glb.exeImportant
5excel2010-kb3118390-fullfile-x86-glb.exeImportant
6excel2010-kb3118390-fullfile-x64-glb.exeImportant
7word2010-kb3127953-fullfile-x86-glb.exeImportant
8word2010-kb3127953-fullfile-x64-glb.exeImportant
9powerpoint2010-kb3118378-fullfile-x86-glb.exeImportant
10powerpoint2010-kb3118378-fullfile-x64-glb.exeImportant
11excel2013-kb3127921-fullfile-x86-glb.exeImportant
12excel2013-kb3127921-fullfile-x64-glb.exeImportant
13excel2016-kb3127904-fullfile-x86-glb.exeImportant
14excel2016-kb3127904-fullfile-x64-glb.exeImportant
15xlconv2007-kb3127889-fullfile-x86-glb.exeImportant
16wordconv2007-kb3127948-fullfile-x86-glb.exeImportant
17xlview2007-kb3127893-fullfile-x86-glb.exeImportant
18pptview2010-kb3118382-fullfile-x86-glb.exeImportant
19mso2007-kb3118396-fullfile-x86-glb.exeImportant
20vbe62007-kb2986253-fullfile-x86-glb.exeImportant
21vbe72010-kb3115120-fullfile-x86-glb.exeImportant
22vbe72010-kb3115120-fullfile-x64-glb.exeImportant
23vbe72013-kb3115153-fullfile-x86-glb.exeImportant
24vbe72013-kb3115153-fullfile-x64-glb.exeImportant
25word2013-kb3127932-fullfile-x86-glb.exeImportant
26word2013-kb3127932-fullfile-x64-glb.exeImportant
27vbe72016-kb3115135-fullfile-x86-glb.exeImportant
28vbe72016-kb3115135-fullfile-x64-glb.exeImportant
29office-KB3127962-FullFile-ENU.exeImportant

Disclaimer: This webpage is intended to provide you information about patch announcement for certain specific software products. The information is provided "As Is" without warranty of any kind. The links provided point to pages on the vendors websites. You can get more information by clicking the links to visit the relevant pages on the vendors website.