Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft Jet Red Database Engine and Access Connectivity Engine can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft Office Trust Center can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Visual Basic for Applications can be exploited remotely to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely to gain privileges.
Original advisories
- CVE-2021-43875
- CVE-2021-43255
- CVE-2021-42320
- CVE-2021-42294
- CVE-2021-42309
- CVE-2021-42295
- CVE-2021-43242
- CVE-2021-43256
- CVE-2021-43876
Related products
CVE list
- CVE-2021-42293 high
- CVE-2021-43875 critical
- CVE-2021-43255 high
- CVE-2021-42320 high
- CVE-2021-42294 high
- CVE-2021-42309 critical
- CVE-2021-42295 high
- CVE-2021-43242 high
- CVE-2021-43256 critical
- CVE-2021-43876 critical
KB list
- 5002054
- 5002047
- 4504710
- 4504745
- 5002101
- 5002045
- 5002015
- 5002099
- 5002033
- 5002103
- 4486726
- 5002059
- 5002008
- 5002055
- 5002098
- 5002061
- 5002097
- 5002105
- 5002071
- 5002104
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!