Access
by Microsoft
Review your setup
Access has some exploitation signals but is generally manageable with regular updates.
What to do
- Keep this software updated
- Review your configuration for unnecessary exposure
- Check for known-vulnerable components or plugins
What Attackers Target
Vulnerabilities with high exploit probability
35.7%
Confirmed actively exploited (CISA)
7.1%
Public exploit code available
0.0%
Based on 14 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.
Most Dangerous Vulnerabilities
| CVE | CVSS | Exploit Probability | Confirmed |
|---|---|---|---|
| CVE-2007-0671 | 8.8 | 66.8% | Yes |
| CVE-2020-0760 | 8.8 | 33.5% | — |
| CVE-2018-0903 | 7.8 | 30.5% | — |
| CVE-2018-8312 | 7.8 | 24.6% | — |
| CVE-2020-1582 | 7.8 | 11.6% | — |
| CVE-2025-21366 | 7.8 | 1.8% | — |
| CVE-2025-21395 | 7.8 | 1.8% | — |
| CVE-2025-21186 | 7.8 | 1.0% | — |
| CVE-2025-26642 | 7.8 | 0.9% | — |
| CVE-2024-49142 | 7.8 | 0.6% | — |
| CVE-2025-26630 | 7.8 | 0.5% | — |
| CVE-2025-62552 | 7.8 | 0.1% | — |
| CVE-2025-59232 | 7.1 | 0.1% | — |
| CVE-2025-59235 | 7.1 | 0.1% | — |
35
/ 100
moderate-risk
Active Threat
33/50 · High
Exploit Availability
2/50 · Minimal
Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.