Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Windows Graphics Component can be exploited remotely to execute arbitrary code.
Notas informativas originales
- CVE-2025-29978
- CVE-2025-30375
- CVE-2025-30386
- CVE-2025-30378
- CVE-2025-30379
- CVE-2025-30382
- CVE-2025-32704
- CVE-2025-29977
- CVE-2025-29976
- CVE-2025-30381
- CVE-2025-32705
- CVE-2025-30377
- CVE-2025-29979
- CVE-2025-30383
- CVE-2025-30384
- CVE-2025-30376
- CVE-2025-30388
Productos relacionados
Lista CVE
- CVE-2025-29976 critical
- CVE-2025-29977 critical
- CVE-2025-29978 critical
- CVE-2025-29979 critical
- CVE-2025-30375 critical
- CVE-2025-30376 critical
- CVE-2025-30377 critical
- CVE-2025-30378 high
- CVE-2025-30379 critical
- CVE-2025-30381 critical
- CVE-2025-30382 critical
- CVE-2025-30383 critical
- CVE-2025-30384 high
- CVE-2025-30386 critical
- CVE-2025-30388 critical
- CVE-2025-30393 critical
- CVE-2025-32704 critical
- CVE-2025-32705 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!