Описание
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Security vulnerability in Microsoft Office can be exploited to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- Use after free vulnerability in Microsoft Office Word can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Excel can be exploited to cause denial of service or execute arbitrary code.
- Use after free vulnerability in Microsoft Office Access can be exploited to cause denial of service or execute arbitrary code.
Первичный источник обнаружения
- CVE-2025-24078
CVE-2025-24080
CVE-2025-26629
CVE-2025-24057
CVE-2025-24082
CVE-2025-24079
CVE-2025-24081
CVE-2025-24075
CVE-2025-24083
CVE-2025-24077
CVE-2025-26630
Связанные продукты
Список CVE
- CVE-2025-24057 critical
- CVE-2025-24075 critical
- CVE-2025-24077 critical
- CVE-2025-24078 high
- CVE-2025-24079 critical
- CVE-2025-24080 critical
- CVE-2025-24081 critical
- CVE-2025-24082 critical
- CVE-2025-24083 critical
- CVE-2025-26629 critical
- CVE-2025-26630 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!