Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
visio Vendor: microsoft

About This Product

visio is a software product developed by microsoft, a major technology provider with a global presence in enterprise and consumer markets. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 54 known vulnerabilities affecting microsoft visio. This includes 51 high-severity issues requiring prompt remediation. Vulnerabilities in this product have been disclosed spanning from 2003 to 2024, indicating a sustained research interest and ongoing security attention. 3 medium-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2003-0347 2003-10-20 2025-04-03 - 10.0 Likely
CVE-2004-0200 2004-09-28 2025-04-03 - 9.3 Likely
CVE-2004-0848 2005-02-08 2025-04-03 - 7.5 Likely
CVE-2005-2127 2005-08-19 2025-04-03 - 7.5 Likely
CVE-2006-3864 2006-10-10 2025-04-09 - 9.3 Likely
CVE-2006-3877 2006-10-10 2025-04-09 - 9.3 Likely
CVE-2006-5574 2006-12-31 2025-04-09 - 9.3 Likely
CVE-2007-0671 2007-02-03 2025-10-22 8.8 9.3 Likely
CVE-2007-0934 2007-06-12 2025-04-09 - 9.3 Likely
CVE-2007-0936 2007-06-12 2025-04-09 - 9.3 Likely
CVE-2008-1089 2008-04-08 2025-04-09 - 9.3 Likely
CVE-2008-1090 2008-04-08 2025-04-09 - 9.3 Likely
CVE-2007-5348 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3012 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3013 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3014 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2008-3015 2008-09-11 2025-04-09 - 9.3 Likely
CVE-2009-0095 2009-02-10 2025-04-09 - 9.3 Likely
CVE-2009-0096 2009-02-10 2025-04-09 - 9.3 Likely
CVE-2009-0097 2009-02-10 2025-04-09 - 9.3 Likely
CVE-2009-2500 2009-10-14 2025-04-09 - 9.3 Likely
CVE-2009-2501 2009-10-14 2025-04-09 - 9.3 Likely
CVE-2009-2502 2009-10-14 2025-04-09 8.1 9.3 Likely
CVE-2009-2503 2009-10-14 2025-04-09 - 9.3 Likely
CVE-2009-2504 2009-10-14 2025-04-09 - 9.3 Likely
CVE-2009-2528 2009-10-14 2025-04-09 - 9.3 Likely
CVE-2009-3126 2009-10-14 2025-04-09 - 9.3 Likely
CVE-2010-0254 2010-04-14 2025-04-11 - 7.6 Unknown
CVE-2010-0256 2010-04-14 2025-04-11 - 7.6 Unknown
CVE-2010-1681 2010-05-06 2025-04-11 - 7.6 Unknown
CVE-2010-3148 2010-08-27 2025-04-11 - 9.3 Likely
CVE-2011-0092 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-0093 2011-02-10 2025-04-11 - 9.3 Likely
CVE-2011-1972 2011-08-10 2025-04-11 - 9.3 Likely
CVE-2011-1979 2011-08-10 2025-04-11 - 9.3 Likely
CVE-2012-1888 2012-08-15 2025-04-11 - 9.3 Likely
CVE-2013-0079 2013-03-13 2025-04-11 - 9.3 Likely
CVE-2013-1301 2013-05-15 2025-04-11 - 4.3 Likely
CVE-2015-2423 2015-08-15 2025-04-12 - 4.3 Likely
CVE-2015-2557 2015-10-14 2025-04-12 - 9.3 Likely
CVE-2015-2503 2015-11-11 2025-04-12 - 9.3 Likely
CVE-2016-0012 2016-01-13 2025-04-12 4.3 4.3 Likely
CVE-2016-3235 2016-06-16 2025-10-22 7.8 9.3 Likely
CVE-2016-3364 2016-09-14 2025-04-12 7.8 9.3 Likely
CVE-2020-0760 2020-04-15 2024-11-21 8.8 6.8 Likely
CVE-2021-27055 2021-03-11 2024-11-21 7.0 6.8 Likely
CVE-2022-38010 2022-09-13 2024-11-21 7.8 - -
CVE-2022-44695 2022-12-13 2024-11-21 7.8 - -
CVE-2023-21736 2023-01-10 2024-11-21 7.8 - -
CVE-2023-21737 2023-01-10 2024-11-21 7.8 - -
CVE-2023-21741 2023-01-10 2024-11-21 7.1 - -
CVE-2024-20673 2024-02-13 2024-11-21 7.8 - -
CVE-2024-43463 2024-09-10 2024-09-17 7.8 - -
CVE-2024-38016 2024-09-19 2024-09-24 7.8 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for microsoft visio by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.