Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Office Access Connectivity Engine can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Office Graphics Component can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2021-38654
- CVE-2021-38655
- CVE-2021-38656
- CVE-2021-38659
- CVE-2021-38653
- CVE-2021-38658
- CVE-2021-38651
- CVE-2021-38646
- CVE-2021-38652
- CVE-2021-38650
- CVE-2021-38657
Exploitation
Public exploits exist for this vulnerability.
Related products
CVE list
- CVE-2021-38660 critical
- CVE-2021-38654 critical
- CVE-2021-38655 critical
- CVE-2021-38656 critical
- CVE-2021-38659 critical
- CVE-2021-38653 critical
- CVE-2021-38658 critical
- CVE-2021-38651 critical
- CVE-2021-38646 critical
- CVE-2021-38652 critical
- CVE-2021-38650 critical
- CVE-2021-38657 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!