Search Results (51 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-53731 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-11-10 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-53761 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-11-10 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-53759 1 Microsoft 11 365, 365 Apps, Excel and 8 more 2025-11-10 7.8 High
Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53741 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2025-11-10 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53730 1 Microsoft 8 365, 365 Apps, Office and 5 more 2025-11-10 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2024-38226 1 Microsoft 3 Office 2019, Office Long Term Servicing Channel, Publisher 2025-10-28 7.3 High
Microsoft Publisher Security Feature Bypass Vulnerability
CVE-2024-21413 1 Microsoft 4 365 Apps, Office 2016, Office 2019 and 1 more 2025-10-28 9.8 Critical
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-38189 1 Microsoft 4 365 Apps, Office 2019, Office Long Term Servicing Channel and 1 more 2025-10-28 8.8 High
Microsoft Project Remote Code Execution Vulnerability
CVE-2025-49705 1 Microsoft 10 365 Apps, Office, Office 2016 and 7 more 2025-08-23 7.8 High
Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-47175 1 Microsoft 8 365 Apps, Office, Office 2016 and 5 more 2025-07-11 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-47171 1 Microsoft 8 365 Apps, Office, Office 2019 and 5 more 2025-07-11 6.7 Medium
Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally.