Описание
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, bypass security restrictions, spoof user interface, obtain sensitive information, gain privileges.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- An elevation of privilege vulnerability in Microsoft Office Click-To-Run can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Excel can be exploited remotely to bypass security restrictions.
- An information disclosure vulnerability in Microsoft SharePoint can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
Первичный источник обнаружения
- CVE-2026-20952
CVE-2026-20944
CVE-2026-20956
CVE-2026-20959
CVE-2026-20955
CVE-2026-20943
CVE-2026-20946
CVE-2026-20949
CVE-2026-20958
CVE-2026-20963
CVE-2026-20951
CVE-2026-20948
CVE-2026-20947
CVE-2026-20953
CVE-2026-20950
CVE-2026-20957
Связанные продукты
Список CVE
- CVE-2026-20943 high
- CVE-2026-20944 critical
- CVE-2026-20946 critical
- CVE-2026-20947 critical
- CVE-2026-20948 critical
- CVE-2026-20949 critical
- CVE-2026-20950 critical
- CVE-2026-20951 critical
- CVE-2026-20952 critical
- CVE-2026-20953 critical
- CVE-2026-20955 critical
- CVE-2026-20956 critical
- CVE-2026-20957 critical
- CVE-2026-20958 high
- CVE-2026-20959 high
- CVE-2026-20963 critical
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!