Descrição
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, bypass security restrictions, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft Excel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Outlook for iOS can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Publisher can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft AutoUpdate (MAU) can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft SharePoint Server can be exploited remotely to cause denial of service.
Comunicados originais
- CVE-2024-43463
- CVE-2024-38250
- CVE-2024-38018
- CVE-2024-43464
- CVE-2024-43482
- CVE-2024-38226
- CVE-2024-43492
- CVE-2024-38227
- CVE-2024-38228
- CVE-2024-43466
Exploração
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Produtos relacionados
Lista de CVE
- CVE-2024-38250 critical
- CVE-2024-43465 critical
- CVE-2024-43463 critical
- CVE-2024-38018 critical
- CVE-2024-43464 high
- CVE-2024-43482 high
- CVE-2024-38226 high
- CVE-2024-43492 critical
- CVE-2024-38227 high
- CVE-2024-38228 high
- CVE-2024-43466 critical
Lista de KB
Saiba mais
Descubra as estatísticas das vulnerabilidades que se espalham em sua região statistics.securelist.com
Encontrou uma imprecisão na descrição desta vulnerabilidade? Avise-nos!