Total
300 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2025-30393 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-05-19 | N/A | 7.8 HIGH |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-32704 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2025-05-19 | N/A | 8.4 HIGH |
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30383 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30386 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-05-19 | N/A | 8.4 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-32705 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-05-19 | N/A | 7.8 HIGH |
Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-29977 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-29979 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-29978 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-05-19 | N/A | 7.8 HIGH |
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30381 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30379 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Release of invalid pointer or reference in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30377 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 8.4 HIGH |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30376 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2025-30375 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-05-19 | N/A | 7.8 HIGH |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | |||||
CVE-2023-23397 | 1 Microsoft | 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more | 2025-03-13 | N/A | 9.8 CRITICAL |
Microsoft Outlook Elevation of Privilege Vulnerability | |||||
CVE-2021-42292 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2025-03-07 | 6.8 MEDIUM | 7.8 HIGH |
Microsoft Excel Security Feature Bypass Vulnerability | |||||
CVE-2021-38646 | 1 Microsoft | 2 365 Apps, Office | 2025-03-07 | 6.8 MEDIUM | 7.8 HIGH |
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability | |||||
CVE-2023-36569 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-02-28 | N/A | 8.4 HIGH |
Microsoft Office Elevation of Privilege Vulnerability | |||||
CVE-2023-33150 | 1 Microsoft | 3 365 Apps, Office, Word | 2025-02-28 | N/A | 9.6 CRITICAL |
Microsoft Office Security Feature Bypass Vulnerability | |||||
CVE-2023-33148 | 1 Microsoft | 2 365 Apps, Office | 2025-02-28 | N/A | 7.8 HIGH |
Microsoft Office Elevation of Privilege Vulnerability | |||||
CVE-2023-23398 | 1 Microsoft | 3 365 Apps, Excel, Office | 2025-02-28 | N/A | 7.1 HIGH |
Microsoft Excel Spoofing Vulnerability |