Beschreibung
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security vulnerability in Microsoft Office can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in Microsoft Office Word can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Excel can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Access can be exploited to cause denial of service or execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2025-24080
- CVE-2025-26629
- CVE-2025-24057
- CVE-2025-24082
- CVE-2025-24079
- CVE-2025-24081
- CVE-2025-24075
- CVE-2025-24083
- CVE-2025-24077
- CVE-2025-26630
Betroffene Produkte
CVE Liste
- CVE-2025-24057 critical
- CVE-2025-24075 critical
- CVE-2025-24077 critical
- CVE-2025-24078 high
- CVE-2025-24079 critical
- CVE-2025-24080 critical
- CVE-2025-24081 critical
- CVE-2025-24082 critical
- CVE-2025-24083 critical
- CVE-2025-26629 critical
- CVE-2025-26630 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!