Kaspersky ID:
KLA20002
Date de la détection:
10/11/2022
Mis à jour:
01/28/2026

Description

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  2. A spoofing vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
  3. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  4. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  5. A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
  6. An information disclosure vulnerability in Microsoft Office can be exploited remotely to obtain sensitive information.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2022-41036
    critical
  • CVE-2022-38001
    high
  • CVE-2022-41037
    critical
  • CVE-2022-38048
    critical
  • CVE-2022-41031
    critical
  • CVE-2022-38053
    critical
  • CVE-2022-38049
    critical
  • CVE-2022-41043
    warning
  • CVE-2022-41038
    critical

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.