Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted request to gain privileges.
- Unspecified Microsoft can be exploited remotely via specially crafted to spoof user interface.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted page to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Outlook can be exploited remotely via specially crafted image to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted authentication to gain privileges.
- An information disclosure vulnerability in Microsoft Project can be exploited remotely via specially crafted file to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
Original advisories
- CVE-2020-1289
- CVE-2020-1177
- CVE-2020-1318
- CVE-2020-1295
- CVE-2020-1320
- CVE-2020-1323
- CVE-2020-1148
- CVE-2020-1181
- CVE-2020-1229
- CVE-2020-1183
- CVE-2020-1321
- CVE-2020-1178
- CVE-2020-1297
- CVE-2020-1322
- CVE-2020-1225
- CVE-2020-1226
Exploitation
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2020-1298 warning
- CVE-2020-1289 warning
- CVE-2020-1177 warning
- CVE-2020-1318 warning
- CVE-2020-1295 high
- CVE-2020-1320 warning
- CVE-2020-1323 high
- CVE-2020-1148 warning
- CVE-2020-1181 high
- CVE-2020-1229 warning
- CVE-2020-1183 warning
- CVE-2020-1321 high
- CVE-2020-1178 high
- CVE-2020-1297 warning
- CVE-2020-1322 warning
- CVE-2020-1225 critical
- CVE-2020-1226 critical
KB list
- 4484414
- 4484399
- 4484402
- 4484409
- 4484361
- 4484380
- 4484415
- 4484405
- 4484410
- 4484396
- 4484369
- 4484378
- 4484351
- 4484403
- 4484373
- 4484387
- 4484391
- 4484342
- 4484400
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!