Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Microsoft Excel can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Office for Android can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft OneDrive for Android can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Outlook can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft OneDrive for MacOS can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Excel can be exploited remotely to cause denial of service.
Original advisories
- CVE-2023-23391
- CVE-2023-24923
- CVE-2023-24882
- CVE-2023-23397
- CVE-2023-24930
- CVE-2023-24910
- CVE-2023-23395
- CVE-2023-23399
- CVE-2023-23396
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2023-24910 critical
- CVE-2023-23398 high
- CVE-2023-23391 high
- CVE-2023-24923 high
- CVE-2023-24882 high
- CVE-2023-23397 critical
- CVE-2023-24930 critical
- CVE-2023-23395 warning
- CVE-2023-23399 critical
- CVE-2023-23396 high
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!