Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Office
Total 993 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2025-62554 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-12-10 N/A 8.4 HIGH
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-62555 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-12-10 N/A 7.0 HIGH
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-62556 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-12-10 N/A 7.8 HIGH
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62557 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-12-10 N/A 8.4 HIGH
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-62558 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-12-10 N/A 7.8 HIGH
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-62559 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-12-10 N/A 7.8 HIGH
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-62560 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-12-10 N/A 7.8 HIGH
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62561 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-12-10 N/A 7.8 HIGH
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62562 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-12-09 N/A 7.8 HIGH
Use after free in Microsoft Office Outlook allows an unauthorized attacker to execute code locally.
CVE-2025-62563 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-12-09 N/A 7.8 HIGH
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62564 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-12-09 N/A 7.8 HIGH
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62553 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2025-12-09 N/A 7.8 HIGH
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62552 1 Microsoft 4 365 Apps, Access, Office and 1 more 2025-12-09 N/A 7.8 HIGH
Relative path traversal in Microsoft Office Access allows an unauthorized attacker to execute code locally.
CVE-2025-62199 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2025-11-19 N/A 7.8 HIGH
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-60727 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-17 N/A 7.8 HIGH
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62200 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-17 N/A 7.8 HIGH
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62201 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-17 N/A 7.8 HIGH
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-62202 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-17 N/A 7.1 HIGH
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2025-62203 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-17 N/A 7.8 HIGH
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-60726 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-17 N/A 7.1 HIGH
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.