Office Vulnerabilities

Security vulnerability tracking for Microsoft Office

Last updated: Aug 14, 2019
Total CVEs

5

Critical

0

With Exploits

5

Last 30 Days

0

Vulnerability Timeline

5 vulnerabilities discovered over time for Office

Severity Distribution

Critical0
0%
High3
60%
Medium2
40%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2019-11557.8

An attacker can run any code they choose on a victim's computer by tricking them into opening a specially crafted file. This vulnerability affects Microsoft Office products that use the Windows Jet Database Engine, making it crucial for users to avoid suspicious files to stay safe.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11535.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of it. However, the attacker must first log on to the affected system and run a specially crafted application to exploit this weakness.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11518.8

This vulnerability allows an attacker to take control of a system by exploiting flaws in how Windows handles certain fonts, which could let them install programs or access sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11498.8

This vulnerability allows an attacker to take control of a system by exploiting a flaw in how Windows handles certain fonts, which could lead to installing malicious software or accessing sensitive data. To succeed, the attacker needs to trick users into visiting a malicious website or opening a specially crafted document.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019
CVE-2019-11485.5

This vulnerability allows an attacker to access sensitive information from a user's system, which could help them take further control of the system. To exploit it, the attacker must first log on to the affected system and run a specially crafted application.

microsoftoffice
Exploit Available
over 6 years agoAug 14, 2019

About Microsoft Office Security

This page provides comprehensive security vulnerability tracking for Microsoft Office. Our database includes all CVEs affecting this product, updated in real-time from official sources.

Each vulnerability listing includes detailed CVSS severity analysis, exploit availability status, AI-generated explanations, and direct links to official security patches and vendor advisories.

Security Recommendations

  • • Always keep Office updated to the latest version
  • • Subscribe to security advisories from Microsoft
  • • Monitor this page for new vulnerabilities affecting your version
  • • Prioritize patching critical and high severity issues immediately