Filtered by vendor Microsoft Subscriptions
Filtered by product 365 Apps Subscriptions
Total 354 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-30393 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-07-15 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-30386 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-07-15 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-30383 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-15 7.8 High
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-30379 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-15 7.8 High
Release of invalid pointer or reference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-30377 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-15 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-30375 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-15 7.8 High
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-29979 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-15 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-29978 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-07-15 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-29977 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-15 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-47176 1 Microsoft 5 365 Apps, Office, Office 2024 and 2 more 2025-07-11 7.8 High
'.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally.
CVE-2025-47175 1 Microsoft 8 365 Apps, Office, Office 2016 and 5 more 2025-07-11 7.8 High
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
CVE-2025-47174 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2025-07-11 7.8 High
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-47173 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-07-11 7.8 High
Improper input validation in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-47171 1 Microsoft 8 365 Apps, Office, Office 2019 and 5 more 2025-07-11 6.7 Medium
Improper input validation in Microsoft Office Outlook allows an authorized attacker to execute code locally.
CVE-2025-47170 1 Microsoft 2 365 Apps, Office Long Term Servicing Channel 2025-07-11 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-47169 1 Microsoft 6 365 Apps, Office, Office Long Term Servicing Channel and 3 more 2025-07-11 7.8 High
Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-47168 1 Microsoft 6 365 Apps, Office, Office Long Term Servicing Channel and 3 more 2025-07-11 7.8 High
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
CVE-2025-47167 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-07-11 8.4 High
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
CVE-2025-47165 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-07-11 7.8 High
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
CVE-2025-47164 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-07-11 8.4 High
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.