Microsoft vulnerabilities
Showing 51 - 100 of 1.4K CVEs
- CVE-2025-62559 Published Dec 9, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
- CVE-2025-62558 Published Dec 9, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
- CVE-2025-62557 Published Dec 9, 2025
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-62556 Published Dec 9, 2025
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-62555 Published Dec 9, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
- CVE-2025-62554 Published Dec 9, 2025
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-62553 Published Dec 9, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-62552 Published Dec 9, 2025
Relative path traversal in Microsoft Office Access allows an unauthorized attacker to execute code locally.
- CVE-2025-62223 Published Dec 5, 2025
User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.
- CVE-2025-62204 Published Nov 11, 2025
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
- CVE-2025-62203 Published Nov 11, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-62202 Published Nov 11, 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
- CVE-2025-62201 Published Nov 11, 2025
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-62200 Published Nov 11, 2025
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-62199 Published Nov 11, 2025
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-60727 Published Nov 11, 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-60726 Published Nov 11, 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
- CVE-2025-60724 Published Nov 11, 2025
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
- CVE-2025-59240 Published Nov 11, 2025
Exposure of sensitive information to an unauthorized actor in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
- CVE-2025-60711 Published Oct 31, 2025
Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
- CVE-2025-59249 Published Oct 14, 2025
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.
- CVE-2025-59248 Published Oct 14, 2025
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
- CVE-2025-59238 Published Oct 14, 2025
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
- CVE-2025-59237 Published Oct 14, 2025
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
- CVE-2025-59235 Published Oct 14, 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
- CVE-2025-59234 Published Oct 14, 2025
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-59236 Published Oct 14, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-59233 Published Oct 14, 2025
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-59232 Published Oct 14, 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
- CVE-2025-59231 Published Oct 14, 2025
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-59228 Published Oct 14, 2025
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
- CVE-2025-59225 Published Oct 14, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-59227 Published Oct 14, 2025
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-59224 Published Oct 14, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-59223 Published Oct 14, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-59222 Published Oct 14, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
- CVE-2025-59221 Published Oct 14, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
- CVE-2025-53782 Published Oct 14, 2025
Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally.
- CVE-2025-55248 Published Oct 14, 2025
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.
- CVE-2025-59251 Published Sep 24, 2025
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
- CVE-2025-54910 Published Sep 9, 2025
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-54908 Published Sep 9, 2025
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
- CVE-2025-54907 Published Sep 9, 2025
Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
- CVE-2025-54906 Published Sep 9, 2025
Free of memory not on the heap in Microsoft Office allows an unauthorized attacker to execute code locally.
- CVE-2025-54905 Published Sep 9, 2025
Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally.
- CVE-2025-54904 Published Sep 9, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-54903 Published Sep 9, 2025
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-54902 Published Sep 9, 2025
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- CVE-2025-54901 Published Sep 9, 2025
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
- CVE-2025-54900 Published Sep 9, 2025
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
high 8.4
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
high 7.0
Access of resource using incompatible type ('type confusion') in Microsoft Office allows an unauthorized attacker to execute code locally.
high 8.4
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Relative path traversal in Microsoft Office Access allows an unauthorized attacker to execute code locally.
high 7.8
User interface (ui) misrepresentation of critical information in Microsoft Edge for iOS allows an unauthorized attacker to perform spoofing over a network.
medium 4.3
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
high 8.0
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
high 7.1
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Untrusted pointer dereference in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
high 7.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
high 7.1
Heap-based buffer overflow in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network.
critical 9.8
Exposure of sensitive information to an unauthorized actor in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
medium 5.5
Protection mechanism failure in Microsoft Edge (Chromium-based) allows an unauthorized attacker to execute code over a network.
medium 6.3
Weak authentication in Microsoft Exchange Server allows an authorized attacker to elevate privileges over a network.
high 8.8
Improper input validation in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network.
high 7.5
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
high 7.8
Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
high 8.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
high 7.1
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 8.4
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
high 7.1
Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Improper input validation in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
high 8.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
high 7.0
Incorrect implementation of authentication algorithm in Microsoft Exchange Server allows an unauthorized attacker to elevate privileges locally.
high 8.4
Inadequate encryption strength in .NET, .NET Framework, Visual Studio allows an authorized attacker to disclose information over a network.
medium 4.8
Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability
high 7.6
Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
high 8.4
Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally.
high 7.8
Heap-based buffer overflow in Microsoft Office Visio allows an unauthorized attacker to execute code locally.
high 7.8
Free of memory not on the heap in Microsoft Office allows an unauthorized attacker to execute code locally.
high 7.8
Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to disclose information locally.
high 7.1
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8
Buffer over-read in Microsoft Office Excel allows an unauthorized attacker to disclose information locally.
medium 5.5
Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
high 7.8