Multiple vulnerabilities in Microsoft Office. Malicious users can execute arbitrary code, spoof user interface, bypass security restrictions, gain privileges. Complete list of vulnerabilities provided including advisories, CVE list, related products, and KB list
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo