Beschreibung
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges or execute arbitrary code.
Below is a complete list of vulnerabilities
- Improper memory objects handling can be exploited remotely via a specially designed file or web content to execute arbitrary code;
- AN unknown vulnerability can be exploited via a specially designed web content to gain privileges or execute arbitrary code from vectors related to Internet Explorer;
- Lack of HTML sanitization at Outlook can be exploited remotely via a specially designed content to spoof user interface. (OS X)
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2015-6091 high
- CVE-2015-6092 high
- CVE-2015-6093 high
- CVE-2015-6094 high
- CVE-2015-6038 high
- CVE-2015-2503 high
- CVE-2015-6123 high
KB Liste
- 3085634
- 3101496
- 3101559
- 3101514
- 2899516
- 3101510
- 3101513
- 3101512
- 3085614
- 3085594
- 2687406
- 3101555
- 3101554
- 3101367
- 3101364
- 3101365
- 3101360
- 3102925
- 3054793
- 3102924
- 2889915
- 3101507
- 3085511
- 3085552
- 3085551
- 2910978
- 3085477
- 2920680
- 2920726
- 3101529
- 3101543
- 3101525
- 3101526
- 3101553
- 3101506
- 2880506
- 3101359
- 3101564
- 3101499
- 3104540
- 2965313
- 3101558
- 3101544
- 3101509
- 3054978
- 3101371
- 3101370
- 2920698
- 2878230
- 3085584
- 2596614
- 2596770
- 3085548
- 3101560
- 3085561
- 3101521
- 3101533
- 2899473
- 2817478
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!