Microsoft

Office

952 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 08.07.2025 16:58:05
  • Last modified 16.07.2025 17:40:06

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.15%
  • Published 08.07.2025 16:58:04
  • Last modified 16.07.2025 17:39:15

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:03
  • Last modified 15.07.2025 17:07:24

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:02
  • Last modified 15.07.2025 17:04:20

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 08.07.2025 16:58:02
  • Last modified 15.07.2025 17:05:31

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.09%
  • Published 08.07.2025 16:58:01
  • Last modified 15.07.2025 16:49:12

Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.07%
  • Published 08.07.2025 16:58:01
  • Last modified 15.07.2025 17:03:14

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.09%
  • Published 08.07.2025 16:58:00
  • Last modified 15.07.2025 16:46:53

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:57:20
  • Last modified 15.07.2025 15:35:29

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.32%
  • Published 08.07.2025 16:57:19
  • Last modified 15.07.2025 14:09:43

Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.