Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Office
(Microsoft)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 933 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2025-02-11 | CVE-2025-21394 | Microsoft Excel Remote Code Execution Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel, Office_online_server | 7.8 | ||
2025-02-11 | CVE-2025-21381 | Microsoft Excel Remote Code Execution Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel, Office_online_server | 7.8 | ||
2025-02-11 | CVE-2025-21383 | Microsoft Excel Information Disclosure Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel | 5.5 | ||
2025-02-11 | CVE-2025-21386 | Microsoft Excel Remote Code Execution Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel, Office_online_server | 7.8 | ||
2025-02-11 | CVE-2025-21387 | Microsoft Excel Remote Code Execution Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel, Office_online_server | 7.8 | ||
2025-02-11 | CVE-2025-21390 | Microsoft Excel Remote Code Execution Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel, Office_online_server | 7.8 | ||
2025-02-11 | CVE-2025-21392 | Microsoft Office Remote Code Execution Vulnerability | 365_apps, Office, Office_long_term_servicing_channel | 7.8 | ||
2022-08-09 | CVE-2022-33631 | Microsoft Excel Security Feature Bypass Vulnerability | 365_apps, Excel, Office, Office_long_term_servicing_channel | N/A | ||
2024-02-13 | CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability | 365_apps, Office, Office_long_term_servicing_channel | N/A | ||
2019-06-12 | CVE-2019-1034 | A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. For example, the file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected... | Office, Office_365_proplus, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_server, Word | 7.8 |