Microsoft

Word

235 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 09.09.2025 17:00:57
  • Last modified 12.09.2025 16:52:24

Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:10:35
  • Last modified 18.08.2025 15:41:52

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.05%
  • Published 12.08.2025 17:10:34
  • Last modified 18.08.2025 17:03:06

Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally.

Media report
  • EPSS 0.16%
  • Published 12.08.2025 17:10:32
  • Last modified 18.08.2025 17:00:01

Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:05
  • Last modified 16.07.2025 17:40:06

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:03
  • Last modified 15.07.2025 17:07:24

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:02
  • Last modified 15.07.2025 17:04:20

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 08.07.2025 16:58:02
  • Last modified 15.07.2025 17:05:31

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 10.06.2025 17:02:39
  • Last modified 09.07.2025 14:06:45

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 10.06.2025 17:02:39
  • Last modified 09.07.2025 13:22:51

Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.