Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Office can be exploited remotely via specially designed document file to obtain sensitive information;
- An information disclosure vulnerability in Microsoft Outlook can be exploited remotely via specially crafted email to obtain sensitive information;
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code;
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted webpage to gain privileges;
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted webpage to spoof user interface;
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted webpage to spoof user interface;
- An elevation of privilege vulnerability in Skype for Android can be exploited remotely via specially designed request to gain privileges;
- A remote code execution vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code;
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted webpage to spoof user interface;
- An information disclosure vulnerability in Microsoft Word can be exploited remotely via specially designed document file to obtain sensitive information;
Original advisories
- CVE-2019-0559
- CVE-2019-0541
- CVE-2019-0562
- CVE-2019-0556
- CVE-2019-0558
- CVE-2019-0622
- CVE-2019-0585
- CVE-2019-0557
- CVE-2019-0561
- CVE-2019-0538
- CVE-2019-0582
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2019-0582 critical
- CVE-2019-0538 critical
- CVE-2019-0560 warning
- CVE-2019-0559 warning
- CVE-2019-0541 critical
- CVE-2019-0562 warning
- CVE-2019-0556 warning
- CVE-2019-0558 warning
- CVE-2019-0622 warning
- CVE-2019-0585 critical
- CVE-2019-0557 warning
- CVE-2019-0561 warning
KB list
- 4461614
- 4461535
- 4461537
- 4461623
- 4461595
- 4461601
- 3172522
- 4022162
- 4462112
- 2596760
- 2553332
- 4461634
- 4461598
- 4461591
- 4461596
- 4461624
- 4461594
- 4461612
- 4461543
- 4461625
- 4461633
- 4461617
- 4461620
- 4461589
- 4461635
- 4018313
- 4018300
- 4018294
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!