Microsoft

Office 365

31 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 09.09.2025 17:01:27
  • Last modified 12.09.2025 16:50:48

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.06%
  • Published 09.09.2025 17:00:56
  • Last modified 12.09.2025 16:52:07

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.06%
  • Published 09.09.2025 17:00:55
  • Last modified 12.09.2025 16:51:16

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.06%
  • Published 09.09.2025 17:00:55
  • Last modified 01.10.2025 20:29:54

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.06%
  • Published 09.09.2025 17:00:54
  • Last modified 12.09.2025 16:44:51

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.06%
  • Published 12.08.2025 17:10:41
  • Last modified 18.08.2025 15:23:25

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:10:33
  • Last modified 15.08.2025 17:15:00

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.13%
  • Published 12.08.2025 17:09:47
  • Last modified 15.08.2025 17:16:38

Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 12.08.2025 17:09:47
  • Last modified 15.08.2025 17:16:26

Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.02%
  • Published 08.07.2025 16:57:27
  • Last modified 10.07.2025 13:18:53

Use of a broken or risky cryptographic algorithm in Office Developer Platform allows an authorized attacker to bypass a security feature locally.