Vulnerabilities (CVE)

Filtered by vendor Microsoft Subscribe
Filtered by product Office
Total 947 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2023-28295 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-05-29 N/A 7.8 HIGH
Microsoft Publisher Remote Code Execution Vulnerability
CVE-2023-29335 1 Microsoft 15 365 Apps, Office, Windows 10 1507 and 12 more 2024-05-29 N/A 7.5 HIGH
Microsoft Word Security Feature Bypass Vulnerability
CVE-2023-24953 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-05-29 N/A 7.8 HIGH
Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-35636 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-05-29 N/A 6.5 MEDIUM
Microsoft Outlook Information Disclosure Vulnerability
CVE-2023-28311 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-05-29 N/A 7.8 HIGH
Microsoft Word Remote Code Execution Vulnerability
CVE-2023-32029 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-05-29 N/A 7.8 HIGH
Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-33146 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-05-29 N/A 7.8 HIGH
Microsoft Office Remote Code Execution Vulnerability
CVE-2023-35371 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-05-29 N/A 7.8 HIGH
Microsoft Office Remote Code Execution Vulnerability
CVE-2023-35372 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2024-05-29 N/A 7.8 HIGH
Microsoft Office Visio Remote Code Execution Vulnerability
CVE-2024-21379 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-05-29 N/A 7.8 HIGH
Microsoft Word Remote Code Execution Vulnerability
CVE-2024-21378 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2024-05-29 N/A 8.8 HIGH
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2021-34452 1 Microsoft 3 365 Apps, Office, Word 2024-03-21 6.8 MEDIUM 7.8 HIGH
Microsoft Word Remote Code Execution Vulnerability
CVE-2004-0121 1 Microsoft 2 Office, Outlook 2024-02-13 7.5 HIGH N/A
Argument injection vulnerability in Microsoft Outlook 2002 does not sufficiently filter parameters of mailto: URLs when using them as arguments when calling OUTLOOK.EXE, which allows remote attackers to use script code in the Local Machine zone and execute arbitrary programs.
CVE-2002-0862 2 Apple, Microsoft 10 Macos, Internet Explorer, Office and 7 more 2024-02-09 6.8 MEDIUM N/A
The (1) CertGetCertificateChain, (2) CertVerifyCertificateChainPolicy, and (3) WinVerifyTrust APIs within the CryptoAPI for Microsoft products including Microsoft Windows 98 through XP, Office for Mac, Internet Explorer for Mac, and Outlook Express for Mac, do not properly verify the Basic Constraints of intermediate CA-signed X.509 certificates, which allows remote attackers to spoof the certificates of trusted sites via a man-in-the-middle attack for SSL sessions, as originally reported for Internet Explorer and IIS.
CVE-2010-0258 1 Microsoft 6 Excel, Office, Office Compatibility Pack and 3 more 2024-02-02 9.3 HIGH 7.8 HIGH
Microsoft Office Excel 2002 SP3, 2003 SP3, and 2007 SP1 and SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; Office Excel Viewer SP1 and SP2; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP1 and SP2 do not properly parse the Excel file format, which allows remote attackers to execute arbitrary code via a crafted spreadsheet that causes memory to be interpreted as a different object type than intended, aka "Microsoft Office Excel Sheet Object Type Confusion Vulnerability."
CVE-2020-1498 1 Microsoft 3 365 Apps, Excel, Office 2024-01-19 9.3 HIGH 8.8 HIGH
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.
CVE-2020-1495 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-01-19 9.3 HIGH 8.8 HIGH
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.
CVE-2020-1494 1 Microsoft 3 365 Apps, Excel, Office 2024-01-19 9.3 HIGH 8.8 HIGH
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Excel. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. In a web-based attack scenario, an attacker could host a website (or leverage a compromised website that accepts or hosts user-provided content) containing a specially crafted file designed to exploit the vulnerability. An attacker would have no way to force users to visit the website. Instead, an attacker would have to convince users to click a link, typically by way of an enticement in an email or instant message, and then convince them to open the specially crafted file. The security update addresses the vulnerability by correcting how Microsoft Excel handles objects in memory.
CVE-2020-1563 1 Microsoft 2 365 Apps, Office 2024-01-19 9.3 HIGH 7.8 HIGH
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. Exploitation of the vulnerability requires that a user open a specially crafted file with an affected version of Microsoft Office. In an email attack scenario, an attacker could exploit the vulnerability by sending the specially crafted file to the user and convincing the user to open the file. The security update addresses the vulnerability by correcting how Microsoft Office handles objects in memory.
CVE-2020-1502 1 Microsoft 4 365 Apps, Office, Office Online Server and 1 more 2024-01-19 4.3 MEDIUM 5.5 MEDIUM
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.