Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A security feature bypass vulnerability in Microsoft Word can be exploited remotely to bypass security restrictions.
- A spoofing vulnerability in Microsoft Outlook can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Excel can be exploited remotely to gain privileges.
Original advisories
Related products
- Microsoft-Office
- Microsoft-Outlook
- Microsoft-Excel
- Microsoft-Word
- Microsoft-SharePoint
- Microsoft-365
CVE list
- CVE-2026-21258 high
- CVE-2026-21259 critical
- CVE-2026-21260 critical
- CVE-2026-21261 high
- CVE-2026-21511 critical
- CVE-2026-21514 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!