Kaspersky ID:
KLA11287
Data de detecção:
07/10/2018
Atualizado:
01/28/2026

Descrição

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, gain privileges.

Below is a complete list of vulnerabilities:

  1. A tampering vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
  2. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Skype for Business and Microsoft Lync can be exploited remotely to execute arbitrary code.
  4. A remote code execution vulnerability in Microsoft Access can be exploited remotely to execute arbitrary code.
  5. An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely to gain privileges.
  6. A security feature bypass vulnerability in Skype for Business and Lync can be exploited remotely to bypass security restrictions.
  7. A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.

Comunicados originais

Exploração

Public exploits exist for this vulnerability.

Produtos relacionados

Lista de CVE

  • CVE-2018-8310
    critical
  • CVE-2018-8281
    critical
  • CVE-2018-8311
    critical
  • CVE-2018-8312
    critical
  • CVE-2018-8323
    high
  • CVE-2018-8238
    critical
  • CVE-2018-8300
    critical
  • CVE-2018-8299
    high
  • CVE-2018-8284
    critical

Lista de KB

Saiba mais

Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com

Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!
Kaspersky Next:
cibersegurança redefinida
Saber mais
Novo Kaspersky!
Sua vida dgital merece proteção completa!
Saber mais
Do you want to save your changes?
Your message has been sent successfully.