Kaspersky ID:
KLA12042
Erkennungsdatum:
01/12/2021
Aktualisiert:
04/02/2025

Beschreibung

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, gain privileges.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  3. A tampering vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  4. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  5. A spoofing vulnerability in Microsoft SharePoint can be exploited remotely to spoof user interface.
  6. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  7. An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely to gain privileges.

Ursprüngliche Informationshinweise

Ausnutzung

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Betroffene Produkte

CVE Liste

  • CVE-2021-1716
    critical
  • CVE-2021-1715
    critical
  • CVE-2021-1707
    critical
  • CVE-2021-1718
    critical
  • CVE-2021-1714
    critical
  • CVE-2021-1641
    high
  • CVE-2021-1711
    critical
  • CVE-2021-1717
    high
  • CVE-2021-1712
    critical
  • CVE-2021-1713
    critical
  • CVE-2021-1719
    critical

KB Liste

Mehr erfahren

Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com

Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!
Kaspersky Next
Let´s go Next: Cybersicherheit neu gedacht
Erfahren Sie mehr
Neu: Kaspersky!
Dein digitales Leben verdient umfassenden Schutz!
Erfahren Sie mehr
Do you want to save your changes?
Your message has been sent successfully.