U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*
  • CPE Name Search: true
There are 263 matching records.
Displaying matches 1 through 20.
Vuln ID Summary CVSS Severity
CVE-2025-49711

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:58 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49705

Heap-based buffer overflow in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:58 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49703

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:57 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49702

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:57 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49700

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:56 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49699

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:56 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49698

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:56 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49697

Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:56 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49696

Out-of-bounds read in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:55 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-49695

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: July 08, 2025; 1:15:55 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-48812

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.

Published: July 08, 2025; 1:15:45 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47994

Deserialization of untrusted data in Microsoft Office allows an unauthorized attacker to elevate privileges locally.

Published: July 08, 2025; 1:15:41 PM -0400
V4.0:(not available)
V3.1: 8.6 HIGH
V2.0:(not available)
CVE-2025-47953

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:24:01 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47175

Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:23:57 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47173

Improper input validation in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:23:53 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47171

Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally.

Published: June 10, 2025; 1:23:49 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47169

Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:23:45 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47168

Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:23:43 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47167

Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:23:41 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)
CVE-2025-47165

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: June 10, 2025; 1:23:36 PM -0400
V4.0:(not available)
V3.x:(not available)
V2.0:(not available)