Microsoft

Office

952 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Published 12.08.2025 17:10:33
  • Last modified 15.08.2025 17:15:00

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.16%
  • Published 12.08.2025 17:10:32
  • Last modified 18.08.2025 17:00:01

Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:10:32
  • Last modified 15.08.2025 17:14:49

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.

  • EPSS 0.06%
  • Published 12.08.2025 17:10:31
  • Last modified 15.08.2025 17:14:09

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:10:31
  • Last modified 15.08.2025 17:14:24

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:09:49
  • Last modified 15.08.2025 16:51:28

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:09:47
  • Last modified 15.08.2025 17:16:26

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.13%
  • Published 12.08.2025 17:09:47
  • Last modified 15.08.2025 17:16:38

Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:09:45
  • Last modified 15.08.2025 17:13:56

Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:06
  • Last modified 16.07.2025 17:41:09

Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.