Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-17723 | '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally. |
Fri, 13 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-35 | |
| CPEs | cpe:2.3:a:microsoft:365_apps:*:*:*:*:enterprise:*:*:* cpe:2.3:a:microsoft:office_2024:*:*:*:*:long_term_servicing_channel:*:*:* |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 01 Jul 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft office Long Term Servicing Channel
|
|
| CPEs | cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:* |
cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x64:* cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:*:x86:* |
| Vendors & Products |
Microsoft office
|
Microsoft office Long Term Servicing Channel
|
Tue, 17 Jun 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Microsoft
Microsoft 365 Apps Microsoft office |
|
| CPEs | cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:* cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:* cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x64:* cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:* |
|
| Vendors & Products |
Microsoft
Microsoft 365 Apps Microsoft office |
Tue, 10 Jun 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 |
Tue, 10 Jun 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-22 |
Tue, 10 Jun 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-77 | |
| Metrics |
ssvc
|
Tue, 10 Jun 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | '.../...//' in Microsoft Office Outlook allows an authorized attacker to execute code locally. | |
| Title | Microsoft Outlook Remote Code Execution Vulnerability | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: microsoft
Published:
Updated: 2026-02-26T17:50:49.164Z
Reserved: 2025-05-01T17:10:57.981Z
Link: CVE-2025-47176
Updated: 2025-06-10T17:24:37.986Z
Status : Modified
Published: 2025-06-10T17:23:59.800
Modified: 2026-02-13T20:17:23.027
Link: CVE-2025-47176
No data.
OpenCVE Enrichment
Updated: 2025-06-27T09:26:49Z
EUVD