| CVE ID | Title | Vendor | Product | Severity | CVSS Score | Published At | AI Analysis |
|---|---|---|---|---|---|---|---|
| CVE-2026-20949 | Microsoft Excel Security Feature Bypass Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2026-01-13 17:57:07 | Deep Dive |
| CVE-2026-20948 | Microsoft Word Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2026-01-13 17:57:07 | Deep Dive |
| CVE-2026-20956 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2026-01-13 17:56:49 | Deep Dive |
| CVE-2026-20955 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2026-01-13 17:56:48 | Deep Dive |
| CVE-2026-20953 | Microsoft Office Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 8.4 | 2026-01-13 17:56:48 | Deep Dive |
| CVE-2026-20946 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2026-01-13 17:56:46 | Deep Dive |
| CVE-2026-20944 | Microsoft Word Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 8.4 | 2026-01-13 17:56:46 | Deep Dive |
| CVE-2025-62487 | Under certain configurations, file artifacts uploaded to the Dossier and Slides apps did not inherit security markings of their parent artifact. This lack of security markings could lead to unintended access to the uploaded files. | Palantir | com.palantir.acme:gotham-default-apps-bundle | Low | 3.5 | 2026-01-09 21:17:37 | Deep Dive |
| CVE-2023-50897 | WordPress Media File Renamer plugin <= 5.7.7 - Arbitrary File Rename lead to RCE vulnerability | Meow Apps | Media File Renamer | Critical | 9.1 | 2026-01-05 13:29:13 | Deep Dive |
| CVE-2025-68596 | WordPress Bit Assist plugin <= 1.5.11 - Broken Access Control vulnerability | Bit Apps | Bit Assist | Medium | 5.3 | 2025-12-24 13:10:45 | Deep Dive |
| CVE-2025-65037 | Azure Container Apps Remote Code Execution Vulnerability | Microsoft | Azure Container Apps | Critical | 10.0 | 2025-12-18 22:02:07 | Deep Dive |
| CVE-2025-62560 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2025-12-09 17:56:01 | Deep Dive |
| CVE-2025-62559 | Microsoft Word Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2025-12-09 17:56:00 | Deep Dive |
| CVE-2025-62558 | Microsoft Word Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2025-12-09 17:55:59 | Deep Dive |
| CVE-2025-62556 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2025-12-09 17:55:58 | Deep Dive |
| CVE-2025-62557 | Microsoft Office Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 8.4 | 2025-12-09 17:55:58 | Deep Dive |
| CVE-2025-62554 | Microsoft Office Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 8.4 | 2025-12-09 17:55:57 | Deep Dive |
| CVE-2025-62555 | Microsoft Word Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.0 | 2025-12-09 17:55:57 | Deep Dive |
| CVE-2025-62553 | Microsoft Excel Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2025-12-09 17:55:56 | Deep Dive |
| CVE-2025-62552 | Microsoft Access Remote Code Execution Vulnerability | Microsoft | Microsoft 365 Apps for Enterprise | High | 7.8 | 2025-12-09 17:55:55 | Deep Dive |