Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft AutoUpdate (MAU) can be exploited remotely to gain privileges.
Notas informativas originales
- CVE-2025-47953
- CVE-2025-47172
- CVE-2025-47173
- CVE-2025-47171
- CVE-2025-47165
- CVE-2025-47957
- CVE-2025-47176
- CVE-2025-47169
- CVE-2025-47170
- CVE-2025-47166
- CVE-2025-47162
- CVE-2025-47167
- CVE-2025-47175
- CVE-2025-47968
- CVE-2025-47168
- CVE-2025-47164
- CVE-2025-47174
- CVE-2025-32717
Productos relacionados
Lista CVE
- CVE-2025-47162 critical
- CVE-2025-47163 critical
- CVE-2025-47164 critical
- CVE-2025-47165 critical
- CVE-2025-47166 critical
- CVE-2025-47167 critical
- CVE-2025-47168 critical
- CVE-2025-47169 critical
- CVE-2025-47170 critical
- CVE-2025-47171 high
- CVE-2025-47172 critical
- CVE-2025-47173 critical
- CVE-2025-47174 critical
- CVE-2025-47175 critical
- CVE-2025-47176 critical
- CVE-2025-47953 critical
- CVE-2025-47957 critical
- CVE-2025-47968 critical
- CVE-2025-32717 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!