Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, bypass security restrictions, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Word can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
Notas informativas originales
- CVE-2026-32188
- CVE-2026-33114
- CVE-2026-33095
- CVE-2026-20945
- CVE-2026-32199
- CVE-2026-32197
- CVE-2026-32189
- CVE-2026-23657
- CVE-2026-32201
- CVE-2026-33115
- CVE-2026-32198
- CVE-2026-32200
- CVE-2026-32190
Productos relacionados
Lista CVE
- CVE-2026-20945 warning
- CVE-2026-23657 critical
- CVE-2026-32188 high
- CVE-2026-32189 critical
- CVE-2026-32190 critical
- CVE-2026-32197 critical
- CVE-2026-32198 critical
- CVE-2026-32199 critical
- CVE-2026-32200 critical
- CVE-2026-32201 high
- CVE-2026-33095 critical
- CVE-2026-33114 critical
- CVE-2026-33115 critical
- CVE-2026-33822 high
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!