Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
office 365 proplus vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-0759
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 365 Proplus -
Microsoft Excel 2019
2 Articles
6.5
CVSSv3
CVE-2020-0696
A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of URI formats, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.
Microsoft Outlook 2016
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Office 365 Proplus -
Microsoft Office 2019
2 Articles
7.8
CVSSv3
CVE-2020-0697
An elevation of privilege vulnerability exists in Microsoft Office OLicenseHeartbeat task, where an attacker who successfully exploited this vulnerability could run this task as SYSTEM.To exploit the vulnerability, an authenticated attacker would need to place a specially crafted...
Microsoft Office 365 Proplus -
2 Articles
7.8
CVSSv3
CVE-2020-0650
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0651, CVE-2020-0653.
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 365 Proplus -
Microsoft Excel 2019
2 Articles
7.8
CVSSv3
CVE-2020-0651
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0653.
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 365 Proplus -
Microsoft Excel 2019
2 Articles
7.8
CVSSv3
CVE-2020-0652
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Memory Corruption Vulnerability'.
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2010
Microsoft Office 365 Proplus -
Microsoft Excel 2019
2 Articles
7.8
CVSSv3
CVE-2020-0653
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0651.
Microsoft Office 365 Proplus -
2 Articles
6.5
CVSSv3
CVE-2019-1461
A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory, aka 'Microsoft Word Denial of Service Vulnerability'.
Microsoft Word 2016
Microsoft Word 2013
Microsoft Office 2010
Microsoft Word 2010
Microsoft Office 365 Proplus -
Microsoft Office 2019
2 Articles
7.8
CVSSv3
CVE-2019-1462
A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka 'Microsoft PowerPoint Remote Code Execution Vulnerability'.
Microsoft Powerpoint 2013
Microsoft Powerpoint 2010
Microsoft Powerpoint 2016
Microsoft Office 2016
Microsoft Office 365 Proplus -
Microsoft Office 2019
2 Articles
5.5
CVSSv3
CVE-2019-1463
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1400.
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 365 Proplus -
Microsoft Office 2019
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
buffer overflow
type confusion
server-side request forgery
CVE-2024-38440
CVE-2024-27801
CVE-2024-5868
CVE-2024-0582
CVE-2024-37643
CVE-2024-3105
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »