Beschreibung
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Word can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2026-32188
- CVE-2026-33114
- CVE-2026-33095
- CVE-2026-20945
- CVE-2026-32199
- CVE-2026-32197
- CVE-2026-32189
- CVE-2026-23657
- CVE-2026-32201
- CVE-2026-33115
- CVE-2026-32198
- CVE-2026-32200
- CVE-2026-32190
Betroffene Produkte
CVE Liste
- CVE-2026-20945 warning
- CVE-2026-23657 critical
- CVE-2026-32188 high
- CVE-2026-32189 critical
- CVE-2026-32190 critical
- CVE-2026-32197 critical
- CVE-2026-32198 critical
- CVE-2026-32199 critical
- CVE-2026-32200 critical
- CVE-2026-32201 high
- CVE-2026-33095 critical
- CVE-2026-33114 critical
- CVE-2026-33115 critical
- CVE-2026-33822 high
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!