Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted request to gain privileges.
- Unspecified Microsoft can be exploited remotely via specially crafted to spoof user interface.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted page to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Outlook can be exploited remotely via specially crafted image to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted authentication to gain privileges.
- An information disclosure vulnerability in Microsoft Project can be exploited remotely via specially crafted file to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
Original advisories
- CVE-2020-1289
- CVE-2020-1177
- CVE-2020-1318
- CVE-2020-1295
- CVE-2020-1320
- CVE-2020-1323
- CVE-2020-1148
- CVE-2020-1181
- CVE-2020-1229
- CVE-2020-1183
- CVE-2020-1321
- CVE-2020-1178
- CVE-2020-1297
- CVE-2020-1322
- CVE-2020-1225
- CVE-2020-1226
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2020-1298 high
- CVE-2020-1289 high
- CVE-2020-1177 high
- CVE-2020-1318 high
- CVE-2020-1295 critical
- CVE-2020-1320 high
- CVE-2020-1323 high
- CVE-2020-1148 high
- CVE-2020-1181 critical
- CVE-2020-1229 warning
- CVE-2020-1183 high
- CVE-2020-1321 critical
- CVE-2020-1178 critical
- CVE-2020-1297 high
- CVE-2020-1322 high
- CVE-2020-1225 critical
- CVE-2020-1226 critical
KB list
- 4484414
- 4484399
- 4484402
- 4484409
- 4484361
- 4484380
- 4484415
- 4484405
- 4484410
- 4484396
- 4484369
- 4484378
- 4484351
- 4484403
- 4484373
- 4484387
- 4484391
- 4484342
- 4484400
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!