Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office OneNote can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Access can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft AutoUpdate (MAU) can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in GDI+ can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
Notas informativas originales
- CVE-2025-21356
- CVE-2025-21345
- CVE-2025-21344
- CVE-2025-21364
- CVE-2025-21402
- CVE-2025-21393
- CVE-2025-21348
- CVE-2025-21346
- CVE-2025-21362
- CVE-2025-21395
- CVE-2025-21360
- CVE-2025-21361
- CVE-2025-21338
- CVE-2025-21357
- CVE-2025-21366
- CVE-2025-21365
- CVE-2025-21363
- CVE-2025-21186
Explotación
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2025-21338 critical
- CVE-2025-21354 critical
- CVE-2025-21356 critical
- CVE-2025-21345 critical
- CVE-2025-21344 critical
- CVE-2025-21364 critical
- CVE-2025-21402 critical
- CVE-2025-21393 high
- CVE-2025-21348 high
- CVE-2025-21346 critical
- CVE-2025-21362 critical
- CVE-2025-21395 critical
- CVE-2025-21360 critical
- CVE-2025-21361 critical
- CVE-2025-21357 high
- CVE-2025-21366 critical
- CVE-2025-21365 critical
- CVE-2025-21363 critical
- CVE-2025-21186 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!