| CVE ID | CVSS3.1 | Exploitable | Vendor | Product | Vulnerability | Date added |
|---|---|---|---|---|---|---|
| CVE-2026-21514 | 7.8 | True | Microsoft | Office | Microsoft Office Word Reliance on Untrusted Inputs in a Security Decision Vulnerability | 2026-02-10 00:00:00 |
| CVE-2026-21509 | 7.8 | True | Microsoft | Office | Microsoft Office Security Feature Bypass Vulnerability | 2026-01-26 00:00:00 |
| CVE-2009-0556 | 8.8 | True | Microsoft | Office | Microsoft Office PowerPoint Code Injection Vulnerability | 2026-01-07 00:00:00 |
| CVE-2007-0671 | 8.8 | True | Microsoft | Office | Microsoft Office Excel Remote Code Execution Vulnerability | 2025-08-12 00:00:00 |
| CVE-2023-23397 | 9.8 | True | Microsoft | Office | Microsoft Office Outlook Privilege Escalation Vulnerability | 2023-03-14 00:00:00 |
| CVE-2023-21715 | 7.3 | True | Microsoft | Office | Microsoft Office Publisher Security Feature Bypass Vulnerability | 2023-02-14 00:00:00 |
| CVE-2009-0557 | 7.8 | True | Microsoft | Office | Microsoft Office Object Record Corruption Vulnerability | 2022-06-08 00:00:00 |
| CVE-2009-0563 | 7.8 | True | Microsoft | Office | Microsoft Office Buffer Overflow Vulnerability | 2022-06-08 00:00:00 |
| CVE-2013-1331 | 7.8 | True | Microsoft | Office | Microsoft Office Buffer Overflow Vulnerability | 2022-06-08 00:00:00 |
| CVE-2015-1770 | 8.8 | True | Microsoft | Office | Microsoft Office Uninitialized Memory Use Vulnerability | 2022-03-28 00:00:00 |
| CVE-2021-38646 | 7.8 | True | Microsoft | Office | Microsoft Office Access Connectivity Engine Remote Code Execution Vulnerability | 2022-03-28 00:00:00 |
| CVE-2010-3333 | 7.8 | True | Microsoft | Office | Microsoft Office Stack-based Buffer Overflow Vulnerability | 2022-03-03 00:00:00 |
| CVE-2012-1856 | 8.8 | True | Microsoft | Office | Microsoft Office MSCOMCTL.OCX Remote Code Execution Vulnerability | 2022-03-03 00:00:00 |
| CVE-2015-1642 | 7.8 | True | Microsoft | Office | Microsoft Office Memory Corruption Vulnerability | 2022-03-03 00:00:00 |
| CVE-2015-2545 | 7.8 | True | Microsoft | Office | Microsoft Office Malformed EPS File Vulnerability | 2022-03-03 00:00:00 |
| CVE-2016-7193 | 7.8 | True | Microsoft | Office | Microsoft Office Memory Corruption Vulnerability | 2022-03-03 00:00:00 |
| CVE-2017-0261 | 7.8 | True | Microsoft | Office | Microsoft Office Use-After-Free Vulnerability | 2022-03-03 00:00:00 |
| CVE-2017-11826 | 7.8 | True | Microsoft | Office | Microsoft Office Remote Code Execution Vulnerability | 2022-03-03 00:00:00 |
| CVE-2017-8570 | 7.8 | True | Microsoft | Office | Microsoft Office Remote Code Execution Vulnerability | 2022-02-25 00:00:00 |
| CVE-2017-0262 | 7.8 | True | Microsoft | Office | Microsoft Office Remote Code Execution Vulnerability | 2022-02-10 00:00:00 |
| CVE-2021-42292 | 7.8 | True | Microsoft | Office | Microsoft Excel Security Feature Bypass | 2021-11-17 00:00:00 |
| CVE-2016-3235 | 7.8 | True | Microsoft | Office | Microsoft Office OLE DLL Side Loading Vulnerability | 2021-11-03 00:00:00 |
| CVE-2017-11774 | 7.8 | True | Microsoft | Office | Microsoft Office Outlook Security Feature Bypass Vulnerability | 2021-11-03 00:00:00 |
| CVE-2021-27059 | 7.6 | True | Microsoft | Office | Microsoft Office Remote Code Execution Vulnerability | 2021-11-03 00:00:00 |
| CVE-2017-11882 | 7.8 | True | Microsoft | Office | Microsoft Office Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
| CVE-2015-1641 | 7.8 | True | Microsoft | Office | Microsoft Office Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
| CVE-2018-0802 | 7.8 | True | Microsoft | Office | Microsoft Office Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
| CVE-2018-0798 | 8.8 | True | Microsoft | Office | Microsoft Office Memory Corruption Vulnerability | 2021-11-03 00:00:00 |
AVET INS is an owner of VULNDBASE brand and website. This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD page for more information. CVE is a registered trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE site. CWE is a registered trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE page. KEV (Known Exploited Vulnerabilities) is a catalog maintained by CISA. EUVD is the official EU repository for timely, curated cybersecurity vulnerability intelligence and remediation guidance run by ENISA. DORA (Digital Operational Resilience Act) is and EU directive.
Copyright AVET INS 1997 - 2026