Filtered by vendor Microsoft Subscriptions
Filtered by product Office Subscriptions
Total 953 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-53784 1 Microsoft 7 365, 365 Apps, Office and 4 more 2025-08-15 8.4 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-53766 1 Microsoft 20 Gdi+, Gdiplus, Office and 17 more 2025-08-15 9.8 Critical
Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network.
CVE-2025-53740 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-08-15 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-53739 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2025-08-15 7.8 High
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53738 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-08-15 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-53737 1 Microsoft 11 365, 365 Apps, Excel and 8 more 2025-08-15 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53736 1 Microsoft 13 365, 365 Apps, Office and 10 more 2025-08-15 6.8 Medium
Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally.
CVE-2025-53735 1 Microsoft 11 365, 365 Apps, Excel and 8 more 2025-08-15 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53734 1 Microsoft 8 365, 365 Apps, Office and 5 more 2025-08-15 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2025-53733 1 Microsoft 12 365, 365 Apps, Office and 9 more 2025-08-15 8.4 High
Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-53732 1 Microsoft 1 Office 2025-08-15 7.8 High
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-53731 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-08-15 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-53761 1 Microsoft 10 365, 365 Apps, Office and 7 more 2025-08-15 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-53759 1 Microsoft 11 365, 365 Apps, Excel and 8 more 2025-08-15 7.8 High
Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53741 1 Microsoft 13 365, 365 Apps, Excel and 10 more 2025-08-15 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-53730 1 Microsoft 8 365, 365 Apps, Office and 5 more 2025-08-15 7.8 High
Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
CVE-2007-0671 1 Microsoft 14 Access, Excel, Excel Viewer and 11 more 2025-08-13 8.8 High
Unspecified vulnerability in Microsoft Excel 2000, XP, 2003, and 2004 for Mac, and possibly other Office products, allows remote user-assisted attackers to execute arbitrary code via unknown attack vectors, as demonstrated by Exploit-MSExcel.h in targeted zero-day attacks.
CVE-2025-49705 1 Microsoft 10 365 Apps, Office, Office 2016 and 7 more 2025-08-05 7.8 High
Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-49703 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-08-05 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-49702 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-08-05 7.8 High
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.