Beschreibung
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Office Access Connectivity Engine can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Office Graphics Component can be exploited remotely to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2021-38654
- CVE-2021-38655
- CVE-2021-38656
- CVE-2021-38659
- CVE-2021-38653
- CVE-2021-38658
- CVE-2021-38651
- CVE-2021-38646
- CVE-2021-38652
- CVE-2021-38650
- CVE-2021-38657
Ausnutzung
Public exploits exist for this vulnerability.
Betroffene Produkte
CVE Liste
- CVE-2021-38660 critical
- CVE-2021-38654 critical
- CVE-2021-38655 critical
- CVE-2021-38656 critical
- CVE-2021-38659 critical
- CVE-2021-38653 critical
- CVE-2021-38658 critical
- CVE-2021-38651 critical
- CVE-2021-38646 critical
- CVE-2021-38652 critical
- CVE-2021-38650 critical
- CVE-2021-38657 high
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!