Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to bypass security restrictions, spoof user interface, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A security feature bypass vulnerability in Microsoft Word can be exploited remotely to bypass security restrictions.
- A spoofing vulnerability in Microsoft Outlook can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Excel can be exploited remotely to gain privileges.
Notas informativas originales
Productos relacionados
- Microsoft-Office
- Microsoft-Outlook
- Microsoft-Excel
- Microsoft-Word
- Microsoft-SharePoint
- Microsoft-365
Lista CVE
- CVE-2026-21258 high
- CVE-2026-21259 critical
- CVE-2026-21260 critical
- CVE-2026-21261 high
- CVE-2026-21511 critical
- CVE-2026-21514 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!