Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Word can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2026-32188
- CVE-2026-33114
- CVE-2026-33095
- CVE-2026-20945
- CVE-2026-32199
- CVE-2026-32197
- CVE-2026-32189
- CVE-2026-23657
- CVE-2026-32201
- CVE-2026-33115
- CVE-2026-32198
- CVE-2026-32200
- CVE-2026-32190
Exploitation
Related products
CVE list
- CVE-2026-20945 warning
- CVE-2026-23657 critical
- CVE-2026-32188 high
- CVE-2026-32189 critical
- CVE-2026-32190 critical
- CVE-2026-32197 critical
- CVE-2026-32198 critical
- CVE-2026-32199 critical
- CVE-2026-32200 critical
- CVE-2026-32201 high
- CVE-2026-33095 critical
- CVE-2026-33114 critical
- CVE-2026-33115 critical
- CVE-2026-33822 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!