- Description
- '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally.
- Source
- secure@microsoft.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Secondary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-22
- Hype score
- Not currently trending
Ну и про аутлук почитайте, все равно вам нечего делать в укрытии ( я не читал, на ваш страх и риск ) Microsoft Outlook - Remote Code Execution (RCE) CVE-2025-47176 Date: 07/06/2025 Reference: - https://
@IT_news_for_all
8 Jul 2025
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
nu11secur1ty: CVE-2025-47176 - Microsoft Outlook Remote Code Exe... https://t.co/ee2fMRwCNb
@nu11secur1ty1
6 Jul 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚠️Vulnerabilidad en Microsoft Outlook ❗CVE-2025-47176 ➡️Más info: https://t.co/tO9FYPC6Wq https://t.co/3NS9dOJOpb
@CERTpy
13 Jun 2025
181 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-47176
@transilienceai
13 Jun 2025
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
A newly disclosed vulnerability, CVE-2025-47176, poses serious risks in Microsoft Outlook due to path traversal issues. Exploiting this flaw allows local attackers to execute arbitrary code remotely. https://t.co/ukFxwn8Y2T
@The4n6Analyst
12 Jun 2025
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical Outlook vulnerability (CVE-2025-47176) allows remote code execution via malicious file handling. Attackers can exploit social engineering to gain low-privilege access. No patch available yet. ⚠️ #OutlookRisk #Microsoft #USA https://t.co/tOauK0wzXk
@TweetThreatNews
12 Jun 2025
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #Microsoft Outlook Vulnerability (#CVE-2025-47176) Allows Remote Code Execution https://t.co/E88CFDCaJj Educational Purposes!
@UndercodeUpdate
12 Jun 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Yesterday, Microsoft patched two Remote Code Execution vulnerabilities in Outlook that we discovered. 🙃 1. CVE-2025-47171 --> https://t.co/qG4fzy69Jw 2. CVE-2025-47176 --> https://t.co/mjzDoMhmGX ⚠️ More findings on the way — stay tuned.
@osipov_ar
11 Jun 2025
2641 Impressions
6 Retweets
35 Likes
18 Bookmarks
1 Reply
0 Quotes
YIKES! CVE-2025-47176 '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally. https://t.co/lvO1JqkHI4
@LanWanNinja
11 Jun 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Microsoft Outlook Vulnerability (CVE-2025-47176): Remote Code Execution with Local Access Read more 👇 https://t.co/bkk8HsS8G5 Schedule Your Free Demo: https://t.co/enketcjxSz ▶ YT: https://t.co/UBPvXj0dlr 🌐 Insta: https://t.co/DVC83rMf6D 📙 LinkedIn:https://t.co/xzg
@decabyte_info
11 Jun 2025
1094 Impressions
2 Retweets
9 Likes
5 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378"
},
{
"criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x64:*",
"vulnerable": true,
"matchCriteriaId": "C461C8D7-D6DC-47E2-BF64-0872A4D24E43"
},
{
"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x86:*",
"vulnerable": true,
"matchCriteriaId": "875BEC9A-6123-48A9-8B89-88AEA8422B89"
}
],
"operator": "OR"
}
]
}
]