📦 Office Online Server
by Microsoft
🔍 What is Office Online Server?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
A remote code execution vulnerability in Microsoft Word allows attackers to execute arbitrary code by tricking users into opening malicious files. This affects users of Microsoft Word who open special...
A heap-based buffer overflow vulnerability in Microsoft Office Excel allows local attackers to execute arbitrary code with elevated privileges. This affects users who open malicious Excel files. The v...
This vulnerability allows an attacker to execute arbitrary code on a victim's system by exploiting an untrusted pointer dereference in Microsoft Excel. Attackers can achieve this by tricking users int...
An integer underflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by opening specially crafted Excel files. This affects users running vulnera...
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim's system by tricking them into opening a malicious...
This vulnerability allows an attacker to execute arbitrary code on a victim's system by exploiting an untrusted pointer dereference in Microsoft Excel. Attackers can achieve this by tricking users int...
A heap-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening a malicious Excel file. This affects ...
An out-of-bounds read vulnerability in Microsoft Office Excel allows an attacker to read memory contents beyond intended boundaries, potentially exposing sensitive information. This affects users who ...
This vulnerability is a use-after-free flaw in Microsoft Office Excel that allows an unauthorized attacker to execute arbitrary code on a victim's system by tricking them into opening a malicious Exce...
This vulnerability is an out-of-bounds read flaw in Microsoft Excel that allows an attacker to read memory contents they shouldn't have access to. Attackers could exploit this by tricking users into o...
This vulnerability allows an attacker to read memory outside the intended buffer in Microsoft Excel, potentially leading to information disclosure or remote code execution. Users who open malicious Ex...
A heap-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by tricking users into opening malicious Excel files. This affects a...
An out-of-bounds read vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by tricking users into opening malicious Excel files. This affects users ru...
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim's system by tricking them into opening a malicious...
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an unauthorized attacker to execute arbitrary code on a victim's system. Attackers can exploit this ...
This vulnerability allows an attacker to execute arbitrary code on a victim's system by exploiting an out-of-bounds read in Microsoft Excel. Attackers can achieve this by tricking users into opening a...
A type confusion vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening a malicious Excel file. This affects all users ru...
A heap-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by tricking users into opening malicious Excel files. This affects a...
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim's system by tricking them into opening a malicious...
A heap-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on vulnerable systems by tricking users into opening malicious Excel files. This affects...
A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening a malicious Excel file. This affects all users ru...
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office that allows an attacker to execute arbitrary code on a victim's system. Attackers can exploit this by tricking users i...
This vulnerability in Microsoft Office Excel involves the release of an invalid pointer or reference, which could allow an attacker to execute arbitrary code on a local system. It affects users who op...
A heap-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by tricking users into opening malicious Excel files. This affects a...
A type confusion vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on vulnerable systems by tricking users into opening malicious Excel files. This affects all users r...
A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening a malicious Excel file. This affects all users ru...
A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on a victim's system by tricking them into opening a malicious Excel file. This affects all users ru...
A use-after-free vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on affected systems by tricking users into opening malicious Excel files. This affects all users run...
This vulnerability is a use-after-free memory corruption flaw in Microsoft Office Excel that allows an attacker to execute arbitrary code on a victim's system by tricking them into opening a malicious...
A stack-based buffer overflow vulnerability in Microsoft Office Excel allows attackers to execute arbitrary code on vulnerable systems by tricking users into opening malicious Excel files. This affect...
This vulnerability allows remote code execution through specially crafted Excel files. Attackers could exploit this to execute arbitrary code on a victim's system when they open a malicious Excel docu...
This vulnerability allows remote attackers to execute arbitrary code on affected systems by tricking users into opening a specially crafted Excel file. It affects Microsoft Excel users across multiple...
Microsoft Excel contains a remote code execution vulnerability that allows attackers to execute arbitrary code by tricking users into opening specially crafted Excel files. This affects all users runn...
This vulnerability allows attackers to execute arbitrary code on a victim's system by tricking them into opening a specially crafted Excel file. It affects users running vulnerable versions of Microso...
This vulnerability allows remote code execution through specially crafted Excel files. Attackers can exploit this by tricking users into opening malicious documents, potentially gaining full control o...
This vulnerability in Microsoft Excel allows an attacker to gain elevated privileges by exploiting a use-after-free memory issue (CWE-416). Attackers could execute arbitrary code with the privileges o...
This vulnerability allows remote code execution through specially crafted Excel files. Attackers can exploit this by tricking users into opening malicious documents, potentially gaining full control o...
CVE-2023-36766 is a Microsoft Excel information disclosure vulnerability that allows an attacker to read memory contents from the Excel process. This affects users who open specially crafted Excel fil...
This vulnerability in Microsoft Office allows attackers to execute arbitrary code on a victim's system by tricking them into opening a specially crafted Office document. It affects users of Microsoft ...
CVE-2023-33133 is a heap-based buffer overflow vulnerability in Microsoft Excel that allows remote code execution when a user opens a specially crafted malicious Excel file. This affects users of Micr...
This vulnerability allows attackers to execute arbitrary code on a victim's system by tricking them into opening a specially crafted Excel file. It affects users running vulnerable versions of Microso...
This vulnerability allows an unauthorized attacker to read memory outside the intended buffer in Microsoft Excel, potentially exposing sensitive information. It affects users who open malicious Excel ...
This vulnerability in Microsoft Office Excel allows an attacker to exploit improper input validation to access sensitive information from the local system. Users who open malicious Excel files are aff...
This vulnerability allows an attacker to read memory outside the intended buffer in Microsoft Excel, potentially exposing sensitive information from the application's memory. It affects users who open...
This is a memory information disclosure vulnerability in Microsoft Excel where specially crafted documents can leak memory contents. Attackers could use leaked information to compromise systems or dat...
This is an information disclosure vulnerability in Microsoft Word where specially crafted documents can leak memory contents when opened. Attackers could potentially use leaked information to further ...