Popis
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A security feature bypass vulnerability in Microsoft Word can be exploited remotely to bypass security restrictions.
- A spoofing vulnerability in Microsoft Outlook can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Excel can be exploited remotely to gain privileges.
Oficiální doporučení
Související produkty
- Microsoft-Office
- Microsoft-Outlook
- Microsoft-Excel
- Microsoft-Word
- Microsoft-SharePoint
- Microsoft-365
seznam CVE
- CVE-2026-21258 high
- CVE-2026-21259 critical
- CVE-2026-21260 critical
- CVE-2026-21261 high
- CVE-2026-21511 critical
- CVE-2026-21514 critical
seznam KB
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!