Popis
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Office can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
Oficiální doporučení
- CVE-2026-24285
- CVE-2026-26106
- CVE-2026-25180
- CVE-2026-26144
- CVE-2026-26114
- CVE-2026-26105
- CVE-2026-26109
- CVE-2026-26134
- CVE-2026-26112
- CVE-2026-26110
- CVE-2026-26107
- CVE-2026-26113
Související produkty
seznam CVE
- CVE-2026-24285 high
- CVE-2026-25180 high
- CVE-2026-26105 critical
- CVE-2026-26106 critical
- CVE-2026-26107 critical
- CVE-2026-26108 critical
- CVE-2026-26109 critical
- CVE-2026-26110 critical
- CVE-2026-26112 critical
- CVE-2026-26113 critical
- CVE-2026-26114 critical
- CVE-2026-26134 critical
- CVE-2026-26144 critical
seznam KB
Zobrazit více
Zjistěte statistiky zranitelností šířících se ve vaší oblasti statistics.securelist.com
Našli jste v popisu této chyby zabezpečení nepřesnost? Dej nám vědět!