If leveraged by an attacker, these flaws in Word, Excel, PowerPoint, OneNote, Outlook and even Microsoft Teams could be used ...