Vulnerabilities > Microsoft > 365 Apps > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-03-14 | CVE-2023-23398 | Unspecified vulnerability in Microsoft 365 Apps, Excel and Office Microsoft Excel Spoofing Vulnerability | 7.1 |
2023-02-14 | CVE-2023-21715 | Incorrect Authorization vulnerability in Microsoft 365 Apps Microsoft Publisher Security Feature Bypass Vulnerability | 7.3 |
2021-12-15 | CVE-2021-43256 | Unspecified vulnerability in Microsoft products Microsoft Excel Remote Code Execution Vulnerability | 7.8 |
2021-12-15 | CVE-2021-43875 | Unspecified vulnerability in Microsoft 365 Apps and Office Microsoft Office Graphics Remote Code Execution Vulnerability | 7.8 |
2020-08-17 | CVE-2020-1581 | Unspecified vulnerability in Microsoft 365 Apps and Office An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. | 7.8 |
2020-08-17 | CVE-2020-1563 | Unspecified vulnerability in Microsoft 365 Apps and Office A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory. | 7.8 |
2020-08-17 | CVE-2020-1498 | Unspecified vulnerability in Microsoft 365 Apps, Excel and Office A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. | 8.8 |
2020-08-17 | CVE-2020-1496 | Unspecified vulnerability in Microsoft 365 Apps, Excel and Office A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. | 8.8 |
2020-08-17 | CVE-2020-1495 | Unspecified vulnerability in Microsoft products A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. | 8.8 |
2020-08-17 | CVE-2020-1494 | Unspecified vulnerability in Microsoft 365 Apps, Excel and Office A remote code execution vulnerability exists in Microsoft Excel software when the software fails to properly handle objects in memory. | 8.8 |