Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface, cause denial of service, obtain sensitive information.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft OneNote can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A denial of service vulnerability in Microsoft SharePoint can be exploited remotely to cause denial of service.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
- Heap buffer overflow vulnerability in Autodesk® FBX® SDK 2020 can be exploited remotely to execute arbitrary code.
Original advisories
- CVE-2023-33133
- CVE-2023-33140
- CVE-2023-33132
- CVE-2023-33129
- CVE-2023-33137
- CVE-2023-33130
- CVE-2023-33146
- CVE-2023-29357
- CVE-2023-32029
- CVE-2023-33131
- CVE-2023-27909
- CVE-2023-27911
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2023-27909 critical
- CVE-2023-27911 critical
- CVE-2023-33142 high
- CVE-2023-33133 critical
- CVE-2023-33140 high
- CVE-2023-33132 high
- CVE-2023-33129 high
- CVE-2023-33137 critical
- CVE-2023-33130 high
- CVE-2023-33146 critical
- CVE-2023-29357 critical
- CVE-2023-32029 critical
- CVE-2023-33131 critical
KB list
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!