Description
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft Office can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft SharePoint Server can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft ActiveX can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Outlook can be exploited remotely to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Microsoft Outlook can be exploited remotely to spoof user interface.
Original advisories
- CVE-2023-33148
- CVE-2023-33158
- CVE-2023-33160
- CVE-2023-33149
- CVE-2023-33165
- CVE-2023-33157
- CVE-2023-33150
- CVE-2023-33152
- CVE-2023-33162
- CVE-2023-33134
- CVE-2023-35311
- CVE-2023-33153
- CVE-2023-33159
- CVE-2023-33151
Exploitation
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Related products
CVE list
- CVE-2023-33161 critical
- CVE-2023-33148 critical
- CVE-2023-33158 critical
- CVE-2023-33160 critical
- CVE-2023-33149 critical
- CVE-2023-33165 critical
- CVE-2023-33157 critical
- CVE-2023-33150 critical
- CVE-2023-33152 critical
- CVE-2023-33162 high
- CVE-2023-33134 critical
- CVE-2023-35311 critical
- CVE-2023-33153 critical
- CVE-2023-33159 critical
- CVE-2023-33151 high
KB list
- 5002419
- 5002427
- 5002423
- 5002432
- 5002426
- 5002425
- 5002411
- 5002406
- 5001952
- 5002421
- 5002058
- 4493154
- 5002069
- 5002400
- 4464506
- 5002434
- 4475581
- 5002424
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!