Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Win32k can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Windows Graphics Component can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Office can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
Fiches de renseignement originales
- CVE-2026-24285
- CVE-2026-26106
- CVE-2026-25180
- CVE-2026-26144
- CVE-2026-26114
- CVE-2026-26105
- CVE-2026-26109
- CVE-2026-26134
- CVE-2026-26112
- CVE-2026-26110
- CVE-2026-26107
- CVE-2026-26113
Produits associés
Liste CVE
- CVE-2026-24285 high
- CVE-2026-25180 high
- CVE-2026-26105 critical
- CVE-2026-26106 critical
- CVE-2026-26107 critical
- CVE-2026-26108 critical
- CVE-2026-26109 critical
- CVE-2026-26110 critical
- CVE-2026-26112 critical
- CVE-2026-26113 critical
- CVE-2026-26114 critical
- CVE-2026-26134 critical
- CVE-2026-26144 critical
Liste KB
En savoir plus
Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com
Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !