Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
office 365 proplus vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2020-0696
A security feature bypass vulnerability exists in Microsoft Outlook software when it improperly handles the parsing of URI formats, aka 'Microsoft Outlook Security Feature Bypass Vulnerability'.
Microsoft Office 2019
Microsoft Office 365 Proplus -
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
2 Articles
9.3
CVSSv2
CVE-2020-0759
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
7.2
CVSSv2
CVE-2020-0697
An elevation of privilege vulnerability exists in Microsoft Office OLicenseHeartbeat task, where an attacker who successfully exploited this vulnerability could run this task as SYSTEM.To exploit the vulnerability, an authenticated attacker would need to place a specially crafted...
Microsoft Office 365 Proplus -
2 Articles
9.3
CVSSv2
CVE-2020-0653
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0651.
Microsoft Office 365 Proplus -
2 Articles
9.3
CVSSv2
CVE-2020-0651
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0650, CVE-2020-0653.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
6.8
CVSSv2
CVE-2020-0652
A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka 'Microsoft Office Memory Corruption Vulnerability'.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
9.3
CVSSv2
CVE-2020-0650
A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory, aka 'Microsoft Excel Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0651, CVE-2020-0653.
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Excel 2019
Microsoft Office 365 Proplus -
2 Articles
7.1
CVSSv2
CVE-2019-1461
A denial of service vulnerability exists in Microsoft Word software when the software fails to properly handle objects in memory, aka 'Microsoft Word Denial of Service Vulnerability'.
Microsoft Office 2010
Microsoft Office 2019
Microsoft Office 365 Proplus -
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
2 Articles
2.1
CVSSv2
CVE-2019-1400
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1463.
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
1 Article
2.1
CVSSv2
CVE-2019-1463
An information disclosure vulnerability exists in Microsoft Access software when the software fails to properly handle objects in memory, aka 'Microsoft Access Information Disclosure Vulnerability'. This CVE ID is unique from CVE-2019-1400.
Microsoft Office 2010
Microsoft Office 2013
Microsoft Office 2016
Microsoft Office 2019
Microsoft Office 365 Proplus -
1 Article
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-27322
cross-site request forgery
unauthorized
CVE-2024-33925
reflected XSS
CVE-2023-51580
CVE-2023-51579
CVE-2015-2051
CVE-2023-51609
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »