Microsoft

365

54 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.45%
  • Published 10.06.2025 17:02:05
  • Last modified 09.07.2025 13:33:34

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.14%
  • Published 13.05.2025 16:59:12
  • Last modified 19.05.2025 18:27:24

Out-of-bounds read in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.

  • EPSS 0.11%
  • Published 13.05.2025 16:59:12
  • Last modified 19.05.2025 18:30:17

Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.14%
  • Published 13.05.2025 16:58:47
  • Last modified 19.05.2025 18:33:21

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.11%
  • Published 13.05.2025 16:58:45
  • Last modified 19.05.2025 18:28:17

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.14%
  • Published 13.05.2025 16:58:42
  • Last modified 19.05.2025 14:18:05

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.11%
  • Published 13.05.2025 16:58:40
  • Last modified 19.05.2025 14:17:35

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.27%
  • Published 13.05.2025 16:58:39
  • Last modified 19.05.2025 14:11:31

Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.14%
  • Published 13.05.2025 16:58:37
  • Last modified 19.05.2025 14:19:28

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

  • EPSS 0.21%
  • Published 08.04.2025 17:23:32
  • Last modified 08.07.2025 17:12:21

Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally.