Search Results (Refine Search)
- Results Type: Overview
- Keyword (text search): cpe:2.3:a:microsoft:office:2019:*:*:*:click-to-run:*:x86:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2025-29822 |
Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally. Published: April 08, 2025; 2:16:08 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-29820 |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:07 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-29816 |
Improper input validation in Microsoft Office Word allows an unauthorized attacker to bypass a security feature over a network. Published: April 08, 2025; 2:16:07 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-29792 |
Use after free in Microsoft Office allows an authorized attacker to elevate privileges locally. Published: April 08, 2025; 2:16:05 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0:(not available) |
CVE-2025-29791 |
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:05 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27752 |
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:04 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27751 |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:04 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27750 |
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:04 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27749 |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:04 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27748 |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:04 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27747 |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:04 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27746 |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:03 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-27745 |
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally. Published: April 08, 2025; 2:16:03 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0:(not available) |
CVE-2025-26630 |
Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally. Published: March 11, 2025; 1:16:42 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2025-24079 |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Published: March 11, 2025; 1:16:31 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2025-24078 |
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally. Published: March 11, 2025; 1:16:30 PM -0400 |
V4.0:(not available) V3.1: 7.0 HIGH V2.0:(not available) |
CVE-2025-24057 |
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally. Published: March 11, 2025; 1:16:28 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2025-21394 |
Microsoft Excel Remote Code Execution Vulnerability Published: February 11, 2025; 1:15:38 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2025-21392 |
Microsoft Office Remote Code Execution Vulnerability Published: February 11, 2025; 1:15:37 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |
CVE-2025-21390 |
Microsoft Excel Remote Code Execution Vulnerability Published: February 11, 2025; 1:15:37 PM -0500 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0:(not available) |