Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Office Click-To-Run can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Microsoft SharePoint can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2026-20944
- CVE-2026-20956
- CVE-2026-20959
- CVE-2026-20955
- CVE-2026-20943
- CVE-2026-20946
- CVE-2026-20949
- CVE-2026-20958
- CVE-2026-20963
- CVE-2026-20951
- CVE-2026-20948
- CVE-2026-20947
- CVE-2026-20953
- CVE-2026-20950
- CVE-2026-20957
Related products
CVE list
- CVE-2026-20943 high
- CVE-2026-20944 critical
- CVE-2026-20946 critical
- CVE-2026-20947 critical
- CVE-2026-20948 critical
- CVE-2026-20949 critical
- CVE-2026-20950 critical
- CVE-2026-20951 critical
- CVE-2026-20952 critical
- CVE-2026-20953 critical
- CVE-2026-20955 critical
- CVE-2026-20956 critical
- CVE-2026-20957 critical
- CVE-2026-20958 high
- CVE-2026-20959 high
- CVE-2026-20963 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!