Search Results (1283 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2009-0556 1 Microsoft 2 Office Powerpoint, Powerpoint 2026-01-08 8.8 High
Microsoft Office PowerPoint 2000 SP3, 2002 SP3, and 2003 SP3, and PowerPoint in Microsoft Office 2004 for Mac, allows remote attackers to execute arbitrary code via a PowerPoint file with an OutlineTextRefAtom containing an an invalid index value that triggers memory corruption, as exploited in the wild in April 2009 by Exploit:Win32/Apptom.gen, aka "Memory Corruption Vulnerability."
CVE-2024-30104 1 Microsoft 5 365 Apps, Office, Office 2016 and 2 more 2025-12-17 7.8 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2024-30103 1 Microsoft 6 365 Apps, Office, Office 2019 and 3 more 2025-12-17 8.8 High
Microsoft Outlook Remote Code Execution Vulnerability
CVE-2024-30101 1 Microsoft 5 365 Apps, Office, Office 2016 and 2 more 2025-12-17 7.5 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2023-33133 1 Microsoft 4 365 Apps, Excel, Office Long Term Servicing Channel and 1 more 2025-11-04 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2023-32029 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-11-04 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-36741 2 Microsoft, Trendmicro 5 Windows, Apex One, Officescan and 2 more 2025-10-31 8.8 High
An improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG, and Worry-Free Business Security 10.0 SP1 allows a remote attached to upload arbitrary files on affected installations. Please note: an attacker must first obtain the ability to logon to the product�s management console in order to exploit this vulnerability.
CVE-2021-36742 2 Microsoft, Trendmicro 5 Windows, Apex One, Officescan and 2 more 2025-10-31 7.8 High
A improper input validation vulnerability in Trend Micro Apex One, Apex One as a Service, OfficeScan XG and Worry-Free Business Security 10.0 SP1 allows a local attacker to escalate privileges on affected installations. Please note: an attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVE-2021-27059 1 Microsoft 2 Excel, Office 2025-10-30 7.6 High
Microsoft Office Remote Code Execution Vulnerability
CVE-2021-42292 1 Microsoft 4 365 Apps, Excel, Office and 1 more 2025-10-30 7.8 High
Microsoft Excel Security Feature Bypass Vulnerability
CVE-2021-38646 1 Microsoft 2 365 Apps, Office 2025-10-30 7.8 High
Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability
CVE-2023-21823 1 Microsoft 22 Office, Windows 10 1507, Windows 10 1607 and 19 more 2025-10-30 7.8 High
Windows Graphics Component Remote Code Execution Vulnerability
CVE-2023-36761 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2025-10-30 6.5 Medium
Microsoft Word Information Disclosure Vulnerability
CVE-2023-36762 1 Microsoft 5 365 Apps, Office, Office Long Term Servicing Channel and 2 more 2025-10-30 7.3 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2023-36763 1 Microsoft 4 365 Apps, Office, Office Long Term Servicing Channel and 1 more 2025-10-30 7.5 High
Microsoft Outlook Information Disclosure Vulnerability
CVE-2023-41764 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-10-30 5.5 Medium
Microsoft Office Spoofing Vulnerability
CVE-2023-36765 1 Microsoft 1 Office 2025-10-30 7.8 High
Microsoft Office Elevation of Privilege Vulnerability
CVE-2023-36766 1 Microsoft 5 365 Apps, Excel, Office and 2 more 2025-10-30 7.8 High
Microsoft Excel Information Disclosure Vulnerability
CVE-2023-36767 1 Microsoft 3 365 Apps, Office, Office Long Term Servicing Channel 2025-10-30 4.3 Medium
Microsoft Office Security Feature Bypass Vulnerability
CVE-2019-18187 2 Microsoft, Trendmicro 2 Windows, Officescan 2025-10-30 8.8 High
Trend Micro OfficeScan versions 11.0 and XG (12.0) could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE). The remote process execution is bound to a web service account, which depending on the web platform used may have restricted permissions. An attempted attack requires user authentication.