Beschreibung
Multiple serious vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, gain privileges, cause denial of service.
Below is a complete list of vulnerabilities:
- A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted email to execute arbitrary code.
- A vulnerability in Microsoft Outlook can be exploited remotely via specially designed e-mail to obtain sensitive information.
- A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web request to gain privileges.
- A vulnerability in Microsoft SharePoint can be exploited remotely via specially designed request to gain privileges.
- A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft Skype for Business can be exploited remotely via specially designed e-mail to cause denial of service.
- A vulnerability in Microsoft Outlook can be exploited remotely via specially designed e-mail to obtain sensitive information.
- A vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft Project can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
- A vulnerability in Microsoft SharePoint can be exploited remotely via specially designed request to obtain sensitive information.
- A vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2018-8558
- CVE-2018-8576
- CVE-2018-8568
- CVE-2018-8572
- CVE-2018-8522
- CVE-2018-8539
- CVE-2018-8546
- CVE-2018-8579
- CVE-2018-8573
- CVE-2018-8575
- CVE-2018-8574
- CVE-2018-8524
- CVE-2018-8578
- CVE-2018-8577
CVE Liste
- CVE-2018-8582 high
- CVE-2018-8558 high
- CVE-2018-8576 high
- CVE-2018-8568 high
- CVE-2018-8572 high
- CVE-2018-8522 high
- CVE-2018-8539 high
- CVE-2018-8546 high
- CVE-2018-8579 high
- CVE-2018-8573 high
- CVE-2018-8575 high
- CVE-2018-8574 high
- CVE-2018-8524 high
- CVE-2018-8578 high
- CVE-2018-8577 high
KB Liste
- 4461486
- 4461506
- 4461529
- 4461501
- 4461483
- 4461513
- 4461511
- 4461520
- 3114565
- 4461527
- 4461473
- 4461487
- 4461504
- 4461485
- 4461524
- 4461526
- 4461489
- 4461478
- 4022147
- 4461503
- 4011190
- 4032218
- 4461519
- 4092473
- 4022232
- 4461530
- 4461488
- 4461518
- 4022237
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!