Filtered by vendor Microsoft Subscriptions
Filtered by product 365 Subscriptions
Total 61 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-53736 1 Microsoft 20 365, 365 Apps, Office and 17 more 2026-02-13 6.8 Medium
Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally.
CVE-2025-53735 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53734 1 Microsoft 8 365, 365 Apps, Office and 5 more 2026-02-13 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-53733 1 Microsoft 19 365, 365 Apps, Office and 16 more 2026-02-13 8.4 High
Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-53731 1 Microsoft 12 365, 365 Apps, Office and 9 more 2026-02-13 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-53761 1 Microsoft 11 365, 365 Apps, Office and 8 more 2026-02-13 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-53759 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2026-02-13 7.8 High
Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53741 1 Microsoft 16 365, 365 Apps, Excel and 13 more 2026-02-13 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53730 1 Microsoft 8 365, 365 Apps, Office and 5 more 2026-02-13 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-55238 1 Microsoft 3 365, Dynamics 365, Dynamics 365 Fasttrack Implementation 2026-02-13 7.5 High
Dynamics 365 FastTrack Implementation Assets Information Disclosure Vulnerability
CVE-2025-54901 1 Microsoft 14 365, 365 Apps, Excel and 11 more 2026-02-13 5.5 Medium
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
CVE-2025-54900 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2026-02-13 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54907 1 Microsoft 8 365, 365 Apps, Office and 5 more 2026-02-13 7.8 High
Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-54904 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54903 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54902 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54899 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Free of memory not on the heap in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54898 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-54896 1 Microsoft 15 365, 365 Apps, Excel and 12 more 2026-02-13 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-4234 3 Microsoft, Palo Alto, Paloaltonetworks 5 365, Networks, Cortex Xdr and 2 more 2025-09-15 N/A
A problem with the Palo Alto Networks Cortex XDR Microsoft 365 Defender Pack can result in exposure of user credentials in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these credentials are exposed to recipients of the application logs.