Beschreibung
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office OneNote can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Access can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft AutoUpdate (MAU) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2025-21356
- CVE-2025-21345
- CVE-2025-21344
- CVE-2025-21364
- CVE-2025-21402
- CVE-2025-21393
- CVE-2025-21348
- CVE-2025-21346
- CVE-2025-21362
- CVE-2025-21395
- CVE-2025-21360
- CVE-2025-21361
- CVE-2025-21338
- CVE-2025-21357
- CVE-2025-21366
- CVE-2025-21365
- CVE-2025-21363
- CVE-2025-21186
Ausnutzung
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2025-21338 critical
- CVE-2025-21354 critical
- CVE-2025-21356 critical
- CVE-2025-21345 critical
- CVE-2025-21344 critical
- CVE-2025-21364 critical
- CVE-2025-21402 critical
- CVE-2025-21393 high
- CVE-2025-21348 high
- CVE-2025-21346 critical
- CVE-2025-21362 critical
- CVE-2025-21395 critical
- CVE-2025-21360 critical
- CVE-2025-21361 critical
- CVE-2025-21357 high
- CVE-2025-21366 critical
- CVE-2025-21365 critical
- CVE-2025-21363 critical
- CVE-2025-21186 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!