Описание
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions.
Below is a complete list of vulnerabilities:
- Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
- Use after free in Microsoft Office allows an unauthorized attacker to execute code locally.
- Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally.
- Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- Stack-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally.
- Untrusted pointer dereference in Microsoft Office allows an unauthorized attacker to execute code locally.
- Use after free in Microsoft Office Access allows an unauthorized attacker to execute code locally.
Первичный источник обнаружения
- CVE-2025-24078
CVE-2025-24080
CVE-2025-26629
CVE-2025-24057
CVE-2025-24082
CVE-2025-24079
CVE-2025-24081
CVE-2025-24075
CVE-2025-24083
CVE-2025-24077
CVE-2025-26630
Связанные продукты
Список CVE
- CVE-2025-24057 high
- CVE-2025-24075 high
- CVE-2025-24077 high
- CVE-2025-24078 high
- CVE-2025-24079 high
- CVE-2025-24080 high
- CVE-2025-24081 high
- CVE-2025-24082 high
- CVE-2025-24083 high
- CVE-2025-26629 high
- CVE-2025-26630 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!