Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
office 365 proplus vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2020-0759
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
6.5
CVSSv3
CVE-2020-0696
A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of URI formats, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.
Microsoft Office 2019
Microsoft Office 365 Proplus -
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
2 Articles
7.8
CVSSv3
CVE-2020-0697
An elevation of privilege vulnerability exists in Microsoft Office OLicenseHeartbeat task, where an attacker who successfully exploited this vulnerability could run this task as SYSTEM.To exploit the vulnerability, an authenticated attacker would need to place a specially crafted...
Microsoft Office 365 Proplus -
2 Articles
7.8
CVSSv3
CVE-2020-0650
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0651, CVE-2020-0653.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
7.8
CVSSv3
CVE-2020-0651
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0653.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
7.8
CVSSv3
CVE-2020-0652
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Memory Corruption Vulnerability'.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
7.8
CVSSv3
CVE-2020-0653
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0651.
Microsoft Office 365 Proplus -
2 Articles
6.5
CVSSv3
CVE-2019-1461
A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory, aka 'Microsoft Word Denial of Service Vulnerability'.
Microsoft Office 2010
Microsoft Office 2019
Microsoft Office 365 Proplus -
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
2 Articles
7.8
CVSSv3
CVE-2019-1462
A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka 'Microsoft PowerPoint Remote Code Execution Vulnerability'.
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
Microsoft Powerpoint 2010
Microsoft Powerpoint 2013
Microsoft Powerpoint 2016
2 Articles
5.5
CVSSv3
CVE-2019-1463
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1400.
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
CVE-2006-4304
wireless
CVE-2023-23022
local file inclusion
CVE-2024-27058
CVE-2024-33820
open redirect
CVE-2024-27079
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »