Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security vulnerability in Microsoft Office can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in Microsoft Office Word can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Excel can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Access can be exploited to cause denial of service or execute arbitrary code.
Notas informativas originales
- CVE-2025-24080
- CVE-2025-26629
- CVE-2025-24057
- CVE-2025-24082
- CVE-2025-24079
- CVE-2025-24081
- CVE-2025-24075
- CVE-2025-24083
- CVE-2025-24077
- CVE-2025-26630
Productos relacionados
Lista CVE
- CVE-2025-24057 critical
- CVE-2025-24075 critical
- CVE-2025-24077 critical
- CVE-2025-24078 high
- CVE-2025-24079 critical
- CVE-2025-24080 critical
- CVE-2025-24081 critical
- CVE-2025-24082 critical
- CVE-2025-24083 critical
- CVE-2025-26629 critical
- CVE-2025-26630 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!