Microsoft

365 Apps

380 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Published 08.07.2025 16:58:03
  • Last modified 15.07.2025 17:07:24

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:58:02
  • Last modified 15.07.2025 17:04:20

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

  • EPSS 0.07%
  • Published 08.07.2025 16:58:02
  • Last modified 15.07.2025 17:05:31

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.09%
  • Published 08.07.2025 16:58:01
  • Last modified 15.07.2025 16:49:12

Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.07%
  • Published 08.07.2025 16:58:01
  • Last modified 15.07.2025 17:03:14

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.

Media report
  • EPSS 0.09%
  • Published 08.07.2025 16:58:00
  • Last modified 15.07.2025 16:46:53

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

  • EPSS 0.08%
  • Published 08.07.2025 16:57:20
  • Last modified 15.07.2025 15:35:29

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

  • EPSS 0.32%
  • Published 08.07.2025 16:57:19
  • Last modified 15.07.2025 14:09:43

Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.

  • EPSS 0.06%
  • Published 08.07.2025 16:57:19
  • Last modified 15.07.2025 16:03:49

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

  • EPSS 0.07%
  • Published 10.06.2025 23:15:25
  • Last modified 09.07.2025 13:52:32

Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.