CVE Database

Comprehensive vulnerability intelligence with advanced analytics

8.4

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.03%
View Details
8.4

Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.03%
View Details
7.8

Improper input validation in Microsoft Office SharePoint allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft sharepoint_server
EPSS: 0.10%
View Details
7.8

Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 14, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.04%
View Details
7.8

Improper access control in Microsoft Office Excel allows an unauthorized attacker to bypass a security feature locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.03%
View Details
7.8

Untrusted pointer dereference in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.04%
View Details
8.8

Improper neutralization of special elements used in an sql command ('sql injection') in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft sharepoint_server
EPSS: 0.08%
View Details
7.8

Out-of-bounds read in Microsoft Office Excel allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.04%
View Details
8.4

Out-of-bounds read in Microsoft Office Word allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft office_long_term_servicing_channel
EPSS: 0.03%
View Details
7.0

Untrusted search path in Microsoft Office allows an unauthorized attacker to execute code locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft office
EPSS: 0.07%
View Details
7.8

Improper link resolution before file access ('link following') in Host Process for Windows Tasks allows an authorized attacker to elevate privileges locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.05%
View Details
7.8

Heap-based buffer overflow in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_11_23h2
EPSS: 0.04%
View Details
5.5

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.04%
View Details
7.8

Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an authorized attacker to elevate privileges locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_11_23h2
EPSS: 0.04%
View Details
5.5

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.04%
View Details
4.3

Out-of-bounds read in Windows NDIS allows an authorized attacker to disclose information with a physical attack.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.04%
View Details
6.2

Untrusted pointer dereference in Windows Virtualization-Based Security (VBS) Enclave allows an unauthorized attacker to disclose information locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_11_23h2
EPSS: 0.04%
View Details
7.5

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.06%
View Details
5.5

Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an authorized attacker to disclose information locally.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.04%
View Details
8.0

External control of file name or path in Windows Telephony Service allows an authorized attacker to elevate privileges over an adjacent network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.90%
View Details
7.5

Improper access control in Windows HTTP.sys allows an authorized attacker to elevate privileges over a network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_11_23h2
EPSS: 0.06%
View Details
5.3

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to deny service over a network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.06%
View Details
7.5

Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB Server allows an authorized attacker to elevate privileges over a network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.06%
View Details
6.5

External control of file name or path in Windows NTLM allows an unauthorized attacker to perform spoofing over a network.

Published: Jan 13, 2026
Modified: Jan 16, 2026
Product: microsoft windows_server_2025
EPSS: 0.08%
View Details