Filtered by vendor Microsoft Subscriptions
Filtered by product Office Online Server Subscriptions
Total 123 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-31176 1 Microsoft 4 365 Apps, Office, Office Online Server and 1 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-31175 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-31174 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 5.5 Medium
Microsoft Excel Information Disclosure Vulnerability
CVE-2021-28456 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 5.5 Medium
Microsoft Excel Information Disclosure Vulnerability
CVE-2021-28454 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-28453 1 Microsoft 8 365 Apps, Excel, Office and 5 more 2024-11-21 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2021-28451 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-27057 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-27054 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-27053 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-24070 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-24069 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-24067 1 Microsoft 6 365 Apps, Excel, Office and 3 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-1716 1 Microsoft 9 365 Apps, Excel, Office and 6 more 2024-11-21 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2021-1715 1 Microsoft 9 365 Apps, Excel, Office and 6 more 2024-11-21 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2021-1714 1 Microsoft 8 365 Apps, Excel, Excel Services and 5 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-1713 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2020-1583 1 Microsoft 8 365 Apps, Excel, Office and 5 more 2024-11-21 8.8 High
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.
CVE-2020-1503 1 Microsoft 8 365 Apps, Excel, Office and 5 more 2024-11-21 5.5 Medium
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.
CVE-2020-1502 1 Microsoft 4 365 Apps, Office, Office Online Server and 1 more 2024-11-21 5.5 Medium
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.