Beschreibung
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft OneNote can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A denial of service vulnerability in Microsoft SharePoint can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
- Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
Ursprüngliche Informationshinweise
- CVE-2023-33133
- CVE-2023-33140
- CVE-2023-33132
- CVE-2023-33129
- CVE-2023-33137
- CVE-2023-33130
- CVE-2023-33146
- CVE-2023-29357
- CVE-2023-32029
- CVE-2023-33131
- CVE-2023-27909
- CVE-2023-27911
Ausnutzung
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Betroffene Produkte
CVE Liste
- CVE-2023-27909 critical
- CVE-2023-27911 critical
- CVE-2023-33142 high
- CVE-2023-33133 critical
- CVE-2023-33140 high
- CVE-2023-33132 high
- CVE-2023-33129 high
- CVE-2023-33137 critical
- CVE-2023-33130 high
- CVE-2023-33146 critical
- CVE-2023-29357 critical
- CVE-2023-32029 critical
- CVE-2023-33131 critical
KB Liste
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!