Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
office_web_apps_server Vendor: microsoft

About This Product

office_web_apps_server is a software product developed by microsoft, a major technology provider with a global presence in enterprise and consumer markets. This product serves as critical infrastructure in many organizational deployments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 62 known vulnerabilities affecting microsoft office_web_apps_server. This includes 48 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2014 to 2023, indicating a sustained research interest and ongoing security attention. 13 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2014-0260 2014-01-15 2025-04-11 - 9.3 Likely
CVE-2014-1761 2014-03-25 2025-10-22 7.8 9.3 Likely
CVE-2014-0251 2014-05-14 2025-04-12 - 9.0 Likely
CVE-2014-1754 2014-05-14 2025-04-12 - 4.3 Likely
CVE-2015-0085 2015-03-11 2025-04-12 - 9.3 Likely
CVE-2015-0086 2015-03-11 2025-04-12 - 9.3 Likely
CVE-2015-1682 2015-05-13 2025-04-12 - 9.3 Likely
CVE-2015-6093 2015-11-11 2025-04-12 - 9.3 Likely
CVE-2016-0022 2016-02-10 2025-04-12 7.8 9.3 Likely
CVE-2016-0052 2016-02-10 2025-04-12 7.8 9.3 Likely
CVE-2016-0053 2016-02-10 2025-04-12 7.8 9.3 Likely
CVE-2016-0134 2016-03-09 2025-04-12 7.8 9.3 Likely
CVE-2016-0127 2016-04-12 2025-04-12 7.8 9.3 Likely
CVE-2016-0025 2016-06-16 2025-04-12 7.3 9.3 Likely
CVE-2016-3282 2016-07-13 2025-04-12 7.8 9.3 Likely
CVE-2016-3357 2016-09-14 2025-04-12 7.8 9.3 Likely
CVE-2016-3360 2016-09-14 2025-04-12 7.8 9.3 Likely
CVE-2017-0195 2017-04-12 2025-04-20 5.4 3.5 Unknown
CVE-2017-8509 2017-06-15 2025-04-20 8.8 9.3 Likely
CVE-2017-8511 2017-06-15 2025-04-20 7.8 9.3 Likely
CVE-2017-8512 2017-06-15 2025-04-20 8.8 9.3 Likely
CVE-2017-8742 2017-09-13 2025-04-20 7.8 9.3 Likely
CVE-2017-11826 2017-10-13 2025-10-22 7.8 9.3 Likely
CVE-2018-0797 2018-01-10 2024-11-21 7.8 9.3 Likely
CVE-2018-0919 2018-03-14 2024-11-21 3.3 4.3 Likely
CVE-2018-8577 2018-11-14 2024-11-21 7.8 9.3 Likely
CVE-2019-0561 2019-01-08 2024-11-21 5.5 4.3 Likely
CVE-2019-0585 2019-01-08 2024-11-21 8.8 9.3 Likely
CVE-2019-1201 2019-08-14 2026-02-20 7.8 9.3 Likely
CVE-2021-1713 2021-01-12 2024-11-21 7.8 6.8 Likely
CVE-2021-1714 2021-01-12 2024-11-21 7.8 6.8 Likely
CVE-2021-1715 2021-01-12 2024-11-21 7.8 9.3 Likely
CVE-2021-1716 2021-01-12 2024-11-21 7.8 9.3 Likely
CVE-2021-28451 2021-04-13 2024-11-21 7.8 6.8 Likely
CVE-2021-28453 2021-04-13 2024-11-21 7.8 6.8 Likely
CVE-2021-28454 2021-04-13 2024-11-21 7.8 6.8 Likely
CVE-2021-28456 2021-04-13 2024-11-21 5.5 4.3 Likely
CVE-2021-31174 2021-05-11 2024-11-21 5.5 2.1 Unknown
CVE-2021-31175 2021-05-11 2024-11-21 7.8 6.8 Likely
CVE-2021-31176 2021-05-11 2024-11-21 7.8 6.8 Likely
CVE-2021-31177 2021-05-11 2024-11-21 7.8 6.8 Likely
CVE-2021-31178 2021-05-11 2024-11-21 5.5 4.3 Likely
CVE-2021-31179 2021-05-11 2024-11-21 7.8 6.8 Likely
CVE-2021-31939 2021-06-08 2024-11-21 7.8 6.8 Likely
CVE-2021-34518 2021-07-14 2024-11-21 7.8 6.8 Likely
CVE-2021-40472 2021-10-13 2024-11-21 5.5 2.1 Unknown
CVE-2021-40474 2021-10-13 2024-11-21 7.8 6.8 Likely
CVE-2021-40486 2021-10-13 2024-11-21 7.8 6.8 Likely
CVE-2021-40442 2021-11-10 2024-11-21 7.8 6.8 Likely
CVE-2022-26901 2022-04-15 2024-11-21 7.8 6.8 Likely
CVE-2022-29110 2022-05-10 2025-01-02 7.8 9.3 Likely
CVE-2022-30159 2022-06-15 2025-01-02 5.5 4.3 Likely
CVE-2022-30171 2022-06-15 2025-01-02 5.5 4.3 Likely
CVE-2022-30172 2022-06-15 2025-01-02 5.5 4.3 Likely
CVE-2022-30173 2022-06-15 2025-01-02 7.8 6.8 Likely
CVE-2022-41060 2022-11-09 2024-11-21 5.5 - -
CVE-2022-41061 2022-11-09 2025-02-28 7.8 - -
CVE-2022-41063 2022-11-09 2024-11-21 7.8 - -
CVE-2022-41103 2022-11-09 2024-11-21 5.5 - -
CVE-2022-41106 2022-11-09 2024-11-21 8.8 - -
CVE-2023-23396 2023-03-14 2024-11-21 6.5 - -
CVE-2023-23399 2023-03-14 2024-11-21 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for microsoft office_web_apps_server by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.