Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security vulnerability in Microsoft Office can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in Microsoft Office Word can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Excel can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Access can be exploited to cause denial of service or execute arbitrary code.
Original advisories
- CVE-2025-24080
- CVE-2025-26629
- CVE-2025-24057
- CVE-2025-24082
- CVE-2025-24079
- CVE-2025-24081
- CVE-2025-24075
- CVE-2025-24083
- CVE-2025-24077
- CVE-2025-26630
Related products
CVE list
- CVE-2025-24057 critical
- CVE-2025-24075 critical
- CVE-2025-24077 critical
- CVE-2025-24078 high
- CVE-2025-24079 critical
- CVE-2025-24080 critical
- CVE-2025-24081 critical
- CVE-2025-24082 critical
- CVE-2025-24083 critical
- CVE-2025-26629 critical
- CVE-2025-26630 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!