5
0
5
0
Vulnerability Timeline
5 vulnerabilities discovered over time for Office
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2019-1155 | 7.8 | An attacker can run any code they choose on a victim's computer by tricking them into opening a specially crafted file. This vulnerability affects Microsoft Office products that use the Windows Jet Database Engine, making it crucial for users to avoid suspicious files to stay safe. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1153 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. However, the attacker must first log on to the affected system and run a specially crafted application to exploit this weakness. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1151 | 8.8 | This vulnerability allows an attacker to take control of a system by exploiting flaws in how Windows handles certain fonts, which could let them install programs or access sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1149 | 8.8 | This vulnerability allows an attacker to take control of a system by exploiting a flaw in how Windows handles certain fonts, which could lead to installing malicious software or accessing sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
| CVE-2019-1148 | 5.5 | This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the system. To exploit it, the attacker must first log on to the affected system and run a specially crafted application. | microsoftoffice | Exploit Available | over 6 years agoAug 14, 2019 |
About Microsoft Office Security
This page provides comprehensive security vulnerability tracking for Microsoft Office. Our database includes all CVEs affecting this product, updated in real-time from official sources.
Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.
Security Recommendations
- • Always keep Office updated to the latest version
- • Subscribe to security advisories from Microsoft
- • Monitor this page for new vulnerabilities affecting your version
- • Prioritize patching critical and high severity issues immediately