Beschreibung
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted authentication to gain privileges.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- An information disclosure vulnerability in Microsoft SharePoint can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely via specially crafted file to execute arbitrary code.
- A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely via specially crafted file to execute arbitrary code.
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted web-page to spoof user interface.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to obtain sensitive information.
Ursprüngliche Informationshinweise
- CVE-2018-8635
- CVE-2018-8598
- CVE-2018-8636
- CVE-2018-8580
- CVE-2018-8587
- CVE-2018-8628
- CVE-2018-8650
- CVE-2018-8627
CVE Liste
- CVE-2018-8597 high
- CVE-2018-8635 high
- CVE-2018-8598 high
- CVE-2018-8636 high
- CVE-2018-8580 high
- CVE-2018-8587 high
- CVE-2018-8628 high
- CVE-2018-8650 high
- CVE-2018-8627 high
KB Liste
- 4011680
- 4461577
- 4461542
- 4461559
- 4461570
- 4461565
- 4461558
- 4461541
- 4461465
- 4461549
- 4461580
- 4461556
- 4461544
- 4461576
- 4461521
- 4011027
- 4461481
- 4461548
- 2597975
- 4461532
- 4011207
- 2965312
- 4092472
- 4461551
- 4461569
- 4461566
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!