Filtered by vendor Microsoft
Subscriptions
Filtered by product 365 Apps
Subscriptions
Total
302 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2025-47176 | 1 Microsoft | 2 365 Apps, Office | 2025-06-20 | 7.8 High |
'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally. | ||||
CVE-2025-30376 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30381 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-32705 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-06-17 | 7.8 High |
Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-32704 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2025-06-17 | 8.4 High |
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30393 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-06-17 | 7.8 High |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30386 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-06-17 | 8.4 High |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30383 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30379 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Release of invalid pointer or reference in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30377 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 8.4 High |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-30375 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-29979 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-29978 | 1 Microsoft | 2 365 Apps, Office Long Term Servicing Channel | 2025-06-17 | 7.8 High |
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally. | ||||
CVE-2025-29977 | 1 Microsoft | 5 365 Apps, Excel, Office and 2 more | 2025-06-17 | 7.8 High |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. | ||||
CVE-2024-49033 | 1 Microsoft | 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more | 2025-06-16 | 7.5 High |
Microsoft Word Security Feature Bypass Vulnerability | ||||
CVE-2024-49032 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-06-16 | 7.8 High |
Microsoft Office Graphics Remote Code Execution Vulnerability | ||||
CVE-2024-49031 | 1 Microsoft | 3 365 Apps, Office, Office Long Term Servicing Channel | 2025-06-16 | 7.8 High |
Microsoft Office Graphics Remote Code Execution Vulnerability | ||||
CVE-2024-49030 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2025-06-16 | 7.8 High |
Microsoft Excel Remote Code Execution Vulnerability | ||||
CVE-2024-49029 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2025-06-16 | 7.8 High |
Microsoft Excel Remote Code Execution Vulnerability | ||||
CVE-2024-49028 | 1 Microsoft | 4 365 Apps, Excel, Office and 1 more | 2025-06-16 | 7.8 High |
Microsoft Excel Remote Code Execution Vulnerability |