cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-38171,https://securityvulnerability.io/vulnerability/CVE-2024-38171,PowerPoint Remote Code Execution Vulnerability,"A vulnerability exists in Microsoft PowerPoint allowing for remote code execution. An attacker can exploit this flaw by persuading a user to open a specially crafted PowerPoint file. Successful exploitation can lead to unauthorized actions on the system, potentially compromising sensitive data and impacting overall system integrity. It is recommended to apply security updates provided by Microsoft to mitigate the risks associated with this vulnerability.",Microsoft,"Microsoft Office 2019,Microsoft 365 Apps For Enterprise,Microsoft Office Ltsc For Mac 2021,Microsoft Office Ltsc 2021,Microsoft Powerpoint 2016",7.8,HIGH,0.0007200000109151006,false,false,false,false,,false,false,2024-08-13T17:30:27.403Z,0 CVE-2024-20673,https://securityvulnerability.io/vulnerability/CVE-2024-20673,Microsoft Office Remote Code Execution Vulnerability,"A vulnerability exists in Microsoft Office where maliciously crafted documents can potentially allow an attacker to execute arbitrary code on a user's system. This occurs when a user opens a specially crafted Office file that can lead to unauthorized access and control over the affected system. The vulnerability highlights significant risks posed to users, emphasizing the necessity for prompt updates and security best practices to mitigate potential exploits.",Microsoft,"Microsoft Office 2019,Microsoft Office Ltsc 2021,Microsoft Excel 2016,Microsoft Office 2016,Microsoft Powerpoint 2016,Microsoft Visio 2016,Microsoft Word 2016,Microsoft Publisher 2016,Skype For Business 2016",7.8,HIGH,0.0005300000193528831,false,false,false,false,,false,false,2024-02-13T18:02:25.889Z,0 CVE-2021-27056,https://securityvulnerability.io/vulnerability/CVE-2021-27056,Microsoft PowerPoint Remote Code Execution Vulnerability,Microsoft PowerPoint Remote Code Execution Vulnerability,Microsoft,"Microsoft Office 2019,Microsoft 365 Apps For Enterprise,Microsoft Powerpoint 2013 Service Pack 1,Microsoft Powerpoint 2016,Microsoft Powerpoint 2010 Service Pack 2",7.8,HIGH,0.015279999934136868,false,false,false,false,,false,false,2021-03-11T15:48:19.000Z,0 CVE-2020-17124,https://securityvulnerability.io/vulnerability/CVE-2020-17124,Microsoft PowerPoint Remote Code Execution Vulnerability,Microsoft PowerPoint Remote Code Execution Vulnerability,Microsoft,"Microsoft Office 2019,Microsoft Office 2019 For Mac,Microsoft 365 Apps For Enterprise,Microsoft Powerpoint 2013 Service Pack 1,Microsoft Powerpoint 2016,Microsoft Powerpoint 2010 Service Pack 2",7.8,HIGH,0.014109999872744083,false,false,false,false,,false,false,2020-12-10T00:15:00.000Z,0 CVE-2020-0760,https://securityvulnerability.io/vulnerability/CVE-2020-0760,,"A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries, aka 'Microsoft Office Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-0991.",Microsoft,"Microsoft Project,Microsoft Office,Office 365 Proplus,Microsoft Excel,Microsoft Powerpoint,Microsoft Visio,Microsoft Word,Microsoft Publisher 2016 (32-bit Edition),Microsoft Publisher 2016 (64-bit Edition),Microsoft Access,Microsoft Outlook,Microsoft Publisher 2013 Service Pack 1 (32-bit Editions),Microsoft Publisher 2013 Service Pack 1 (64-bit Editions),Microsoft Publisher",8.8,HIGH,0.06233999878168106,false,false,false,false,,false,false,2020-04-15T15:12:40.000Z,0 CVE-2019-1462,https://securityvulnerability.io/vulnerability/CVE-2019-1462,,"A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka 'Microsoft PowerPoint Remote Code Execution Vulnerability'.",Microsoft,"Microsoft Office,Office 365 Proplus,Microsoft Powerpoint",7.8,HIGH,0.010250000283122063,false,false,false,false,,false,false,2019-12-10T21:40:58.000Z,0 CVE-2019-0540,https://securityvulnerability.io/vulnerability/CVE-2019-0540,,"A security feature bypass vulnerability exists when Microsoft Office does not validate URLs.An attacker could send a victim a specially crafted file, which could trick the victim into entering credentials, aka 'Microsoft Office Security Feature Bypass Vulnerability'.",Microsoft,"Microsoft Office,Microsoft Excel Viewer,Office 365 Proplus,Microsoft Powerpoint Viewer,Microsoft Office Compatibility Pack",5.5,MEDIUM,0.17754000425338745,false,false,false,false,,false,false,2019-03-05T23:29:00.000Z,0 CVE-2018-8628,https://securityvulnerability.io/vulnerability/CVE-2018-8628,,"A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in memory, aka ""Microsoft PowerPoint Remote Code Execution Vulnerability."" This affects Microsoft Office, Office 365 ProPlus, Microsoft PowerPoint, Microsoft SharePoint, Microsoft PowerPoint Viewer, Office Online Server, Microsoft SharePoint Server.",Microsoft,"Microsoft Office,Microsoft Powerpoint,Microsoft Sharepoint,Microsoft Powerpoint Viewer,Office,Office Online Server,Microsoft Sharepoint Server",7.8,HIGH,0.01460999995470047,false,false,false,false,,false,false,2018-12-12T00:00:00.000Z,0 CVE-2018-8427,https://securityvulnerability.io/vulnerability/CVE-2018-8427,,"An information disclosure vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka ""Microsoft Graphics Components Information Disclosure Vulnerability."" This affects Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Windows Server 2008, Microsoft PowerPoint Viewer, Microsoft Excel Viewer.",Microsoft,"Microsoft Office,Microsoft Office Word Viewer,Windows Server 2008,Microsoft Powerpoint Viewer,Office,Microsoft Excel Viewer",5.5,MEDIUM,0.020549999549984932,false,false,false,false,,false,false,2018-10-10T13:00:00.000Z,0 CVE-2018-8501,https://securityvulnerability.io/vulnerability/CVE-2018-8501,,"A remote code execution vulnerability exists in Microsoft PowerPoint software when the software fails to properly handle objects in Protected View, aka ""Microsoft PowerPoint Remote Code Execution Vulnerability."" This affects Office 365 ProPlus, PowerPoint Viewer, Microsoft Office, Microsoft PowerPoint.",Microsoft,"Powerpoint Viewer,Microsoft Office,Office,Microsoft Powerpoint",8.8,HIGH,0.6867600083351135,false,false,false,false,,false,false,2018-10-10T13:00:00.000Z,0 CVE-2018-8432,https://securityvulnerability.io/vulnerability/CVE-2018-8432,,"A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory, aka ""Microsoft Graphics Components Remote Code Execution Vulnerability."" This affects Windows 7, Microsoft Office, Microsoft Office Word Viewer, Office 365 ProPlus, Microsoft Excel Viewer, Microsoft PowerPoint Viewer, Windows Server 2019, Windows Server 2008 R2, Windows 10, Windows Server 2008.",Microsoft,"Windows 7,Microsoft Office,Microsoft Office Word Viewer,Microsoft Excel Viewer,Microsoft Powerpoint Viewer,Windows Server 2019,Office,Windows Server 2008 R2,Windows 10,Windows Server 2008",7.8,HIGH,0.8542199730873108,false,false,false,false,,false,false,2018-10-10T13:00:00.000Z,0 CVE-2018-8281,https://securityvulnerability.io/vulnerability/CVE-2018-8281,,"A remote code execution vulnerability exists in Microsoft Office software when the software fails to properly handle objects in memory, aka ""Microsoft Office Remote Code Execution Vulnerability."" This affects Microsoft Excel Viewer, Microsoft PowerPoint Viewer, Microsoft Office, Microsoft Office Word Viewer.",Microsoft,"Microsoft Excel Viewer,Microsoft Powerpoint Viewer,Microsoft Office,Microsoft Office Word Viewer",7.8,HIGH,0.8078799843788147,false,false,false,false,,false,false,2018-07-11T00:00:00.000Z,0 CVE-2016-7230,https://securityvulnerability.io/vulnerability/CVE-2016-7230,,"Microsoft PowerPoint 2010 SP2, PowerPoint Viewer, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted Office document, aka ""Microsoft Office Memory Corruption Vulnerability.""",Microsoft,"Powerpoint Viewer,Powerpoint,Office Web Apps",7.8,HIGH,0.7043700218200684,false,false,false,false,,false,false,2016-11-10T06:16:00.000Z,0 CVE-2016-3360,https://securityvulnerability.io/vulnerability/CVE-2016-3360,,"Microsoft PowerPoint 2007 SP3, PowerPoint 2010 SP2, PowerPoint 2013 SP1, PowerPoint 2013 RT SP1, PowerPoint 2016 for Mac, Office Compatibility Pack SP3, PowerPoint Viewer, SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, and Office Web Apps Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka ""Microsoft Office Memory Corruption Vulnerability.""",Microsoft,"Powerpoint,Powerpoint Viewer,Office Web Apps,Powerpoint For Mac,Office Web Apps Server,Sharepoint Designer,Office Compatibility Pack",7.8,HIGH,0.2513599991798401,false,false,false,false,,false,false,2016-09-14T10:00:00.000Z,0 CVE-2016-3279,https://securityvulnerability.io/vulnerability/CVE-2016-3279,,"Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Excel 2016, Word 2016, Word Automation Services on SharePoint Server 2010 SP2, and Office Web Apps 2010 SP2 allow remote attackers to execute arbitrary code via a crafted XLA file, aka ""Microsoft Office Remote Code Execution Vulnerability.""",Microsoft,"Word,Powerpoint,Excel,Powerpoint Rt,Office Web Apps,Sharepoint Server,Office,Word Rt,Excel Rt",5.5,MEDIUM,0.133310005068779,false,false,false,false,,false,false,2016-07-13T01:00:00.000Z,0 CVE-2016-0012,https://securityvulnerability.io/vulnerability/CVE-2016-0012,,"Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office 2016, Excel 2016, PowerPoint 2016, Visio 2016, Word 2016, and Visual Basic 6.0 Runtime allow remote attackers to bypass the ASLR protection mechanism via unspecified vectors, aka ""Microsoft Office ASLR Bypass.""",Microsoft,"Word,Powerpoint,Excel,Visio,Office,Visual Basics",4.3,MEDIUM,0.14215999841690063,false,false,false,false,,false,false,2016-01-13T02:00:00.000Z,0 CVE-2016-0010,https://securityvulnerability.io/vulnerability/CVE-2016-0010,,"Microsoft Office 2007 SP3, Office 2010 SP2, Office 2013 SP1, Office 2013 RT SP1, Office 2016, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, Excel 2016 for Mac, PowerPoint 2016 for Mac, Word 2016 for Mac, and Word Viewer allow remote attackers to execute arbitrary code via a crafted Office document, aka ""Microsoft Office Memory Corruption Vulnerability.""",Microsoft,"Office,Word For Mac,Excel For Mac,Powerpoint For Mac,Word Viewer",7.8,HIGH,0.790910005569458,false,false,false,false,,false,false,2016-01-13T02:00:00.000Z,0 CVE-2015-2503,https://securityvulnerability.io/vulnerability/CVE-2015-2503,,"Microsoft Access 2007 SP3, Excel 2007 SP3, InfoPath 2007 SP3, OneNote 2007 SP3, PowerPoint 2007 SP3, Project 2007 SP3, Publisher 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2007 IME (Japanese) SP3, Access 2010 SP2, Excel 2010 SP2, InfoPath 2010 SP2, OneNote 2010 SP2, PowerPoint 2010 SP2, Project 2010 SP2, Publisher 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Pinyin IME 2010, Access 2013 SP1, Excel 2013 SP1, InfoPath 2013 SP1, OneNote 2013 SP1, PowerPoint 2013 SP1, Project 2013 SP1, Publisher 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, OneNote 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Access 2016, Excel 2016, OneNote 2016, PowerPoint 2016, Project 2016, Publisher 2016, Visio 2016, Word 2016, Skype for Business 2016, and Lync 2013 SP1 allow remote attackers to bypass a sandbox protection mechanism and gain privileges via a crafted web site that is accessed with Internet Explorer, as demonstrated by a transition from Low Integrity to Medium Integrity, aka ""Microsoft Office Elevation of Privilege Vulnerability.""",Microsoft,"Word,Onenote,Publisher,Powerpoint,Project Server,Infopath,Access,Excel,Project,Visio,Lync,Skype For Business,Pinyin Ime,Office 2007 Ime",,,0.006819999776780605,false,false,false,false,,false,false,2015-11-11T11:00:00.000Z,0 CVE-2015-2423,https://securityvulnerability.io/vulnerability/CVE-2015-2423,,"Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT Gold and 8.1, Windows 10, Excel 2007 SP3, PowerPoint 2007 SP3, Visio 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Visio 2010 SP2, Word 2010 SP2, Excel 2013 SP1, PowerPoint 2013 SP1, Visio 2013 SP1, Word 2013 SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Visio 2013 RT SP1, Word 2013 RT SP1, and Internet Explorer 7 through 11 allow remote attackers to gain privileges and obtain sensitive information via a crafted command-line parameter to an Office application or Notepad, as demonstrated by a transition from Low Integrity to Medium Integrity, aka ""Unsafe Command Line Parameter Passing Vulnerability.""",Microsoft,"Word,Powerpoint,Excel,Visio,Office",,,0.016349999234080315,false,false,false,false,,false,false,2015-08-15T00:00:00.000Z,0 CVE-2015-1682,https://securityvulnerability.io/vulnerability/CVE-2015-1682,,"Microsoft Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 SP1, Excel 2013 SP1, PowerPoint 2013 SP1, Word 2013 SP1, Office 2013 RT SP1, Excel 2013 RT SP1, PowerPoint 2013 RT SP1, Word 2013 RT SP1, Office for Mac 2011, Excel for Mac 2011, PowerPoint for Mac 2011, Word for Mac 2011, PowerPoint Viewer, Word Automation Services on SharePoint Server 2010 SP2 and 2013 SP1, Excel Services on SharePoint Server 2010 SP2 and 2013 SP1, Office Web Apps 2010 SP2, Excel Web App 2010 SP2, Office Web Apps Server 2013 SP1, SharePoint Foundation 2010 SP2, and SharePoint Server 2013 SP1 allow remote attackers to execute arbitrary code via a crafted document, aka ""Microsoft Office Memory Corruption Vulnerability.""",Microsoft,"Word,Excel Web App,Powerpoint,Sharepoint Foundation,Office,Sharepoint Server,Office Web Apps Server,Excel,Powerpoint Viewer",,,0.8939599990844727,false,false,false,false,,false,false,2015-05-13T10:00:00.000Z,0 CVE-2015-0085,https://securityvulnerability.io/vulnerability/CVE-2015-0085,,"Use-after-free vulnerability in Microsoft Office 2007 SP3, Excel 2007 SP3, PowerPoint 2007 SP3, Word 2007 SP3, Office 2010 SP2, Excel 2010 SP2, PowerPoint 2010 SP2, Word 2010 SP2, Office 2013 Gold and SP1, Word 2013 Gold and SP1, Office 2013 RT Gold and SP1, Word 2013 RT Gold and SP1, Excel Viewer, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Excel Services on SharePoint Server 2013 Gold and SP1, Word Automation Services on SharePoint Server 2013 Gold and SP1, Web Applications 2010 SP2, Office Web Apps Server 2010 SP2, Web Apps Server 2013 Gold and SP1, SharePoint Server 2007 SP3, Windows SharePoint Services 3.0 SP3, SharePoint Foundation 2010 SP2, SharePoint Server 2010 SP2, SharePoint Foundation 2013 Gold and SP1, and SharePoint Server 2013 Gold and SP1 allows remote attackers to execute arbitrary code via a crafted Office document, aka ""Microsoft Office Component Use After Free Vulnerability.""",Microsoft,"Word,Office,Sharepoint Foundation,Powerpoint,Sharepoint Server,Excel Viewer,Office Web Apps Server,Office Compatibility Pack,Sharepoint Services,Web Applications,Excel",,,0.9249100089073181,false,false,false,false,,false,false,2015-03-11T10:00:00.000Z,0 CVE-2011-3413,https://securityvulnerability.io/vulnerability/CVE-2011-3413,,"Microsoft PowerPoint 2007 SP2; Office 2008 for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; and PowerPoint Viewer 2007 SP2 allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via an invalid OfficeArt record in a PowerPoint document, aka ""OfficeArt Shape RCE Vulnerability.""",Microsoft,"Office,Office Compatibility Pack,Powerpoint,Powerpoint Viewer",,,0.9348099827766418,false,false,false,false,,false,false,2011-12-14T00:00:00.000Z,0 CVE-2011-1269,https://securityvulnerability.io/vulnerability/CVE-2011-1269,,"Microsoft PowerPoint 2002 SP3, 2003 SP3, and 2007 SP2; Office 2004 and 2008 for Mac; Open XML File Format Converter for Mac; and Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2 make unspecified function calls during file parsing without proper handling of memory, which allows remote attackers to execute arbitrary code via a crafted PowerPoint document, aka ""Presentation Memory Corruption RCE Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Powerpoint,Office Compatibility Pack",,,0.6441900134086609,false,false,false,false,,false,false,2011-05-13T17:00:00.000Z,0 CVE-2011-0656,https://securityvulnerability.io/vulnerability/CVE-2011-0656,,"Microsoft PowerPoint 2002 SP3, 2003 SP3, 2007 SP2, and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate PersistDirectoryEntry records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a Slide with a malformed record, which triggers an exception and later use of an unspecified method, aka ""Persist Directory RCE Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Powerpoint,Powerpoint Web App,Office Compatibility Pack,Powerpoint Viewer,Office Powerpoint Viewer",,,0.7747200131416321,false,false,false,false,,false,false,2011-04-13T18:00:00.000Z,0 CVE-2011-0655,https://securityvulnerability.io/vulnerability/CVE-2011-0655,,"Microsoft PowerPoint 2007 SP2 and 2010; Office 2004, 2008, and 2011 for Mac; Open XML File Format Converter for Mac; Office Compatibility Pack for Word, Excel, and PowerPoint 2007 File Formats SP2; PowerPoint Viewer; PowerPoint Viewer 2007 SP2; and PowerPoint Web App do not properly validate TimeColorBehaviorContainer Floating Point records in PowerPoint documents, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted document containing an invalid record, aka ""Floating Point Techno-color Time Bandit RCE Vulnerability.""",Microsoft,"Open Xml File Format Converter,Office,Powerpoint,Powerpoint Web App,Office Compatibility Pack,Powerpoint Viewer,Office Powerpoint Viewer",,,0.8910599946975708,false,false,false,false,,false,false,2011-04-13T18:00:00.000Z,0