CVE-2025-47169 Microsoft Word Remote Code Execution Vulnerability
Published June 10, 2025
Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Published June 10, 2025
Heap-based buffer overflow in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Published June 10, 2025
Use of uninitialized resource in Windows Netlogon allows an unauthorized attacker to elevate privileges over a network.
Published June 10, 2025
Use after free in Windows KDC Proxy Service (KPSSVC) allows an unauthorized attacker to execute code over a network.
Published June 10, 2025
Improper access control in Windows Storage Port Driver allows an authorized attacker to disclose information locally.
Published June 10, 2025
Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally.
Published June 10, 2025
Improper verification of cryptographic signature in App Control for Business (WDAC) allows an unauthorized attacker to bypass a security feature locally.
Published June 10, 2025
External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally.
Published June 10, 2025
Improper link resolution before file access (‘link following’) in Windows Recovery Driver allows an authorized attacker to elevate privileges locally.
Published June 10, 2025
Access of resource using incompatible type (‘type confusion’) in Microsoft Office allows an unauthorized attacker to execute code locally.
Published June 10, 2025
Uncontrolled resource consumption in Windows Standards-Based Storage Management Service allows an unauthorized attacker to deny service over a network.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.