Kaspersky ID:
KLA50773
Date de la détection:
07/11/2023
Mis à jour:
03/28/2025

Description

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, bypass security restrictions, obtain sensitive information, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  2. An elevation of privilege vulnerability in Microsoft Office can be exploited remotely to gain privileges.
  3. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  4. A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
  5. A security feature bypass vulnerability in Microsoft SharePoint Server can be exploited remotely to bypass security restrictions.
  6. A remote code execution vulnerability in Microsoft SharePoint can be exploited remotely to execute arbitrary code.
  7. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  8. A remote code execution vulnerability in Microsoft ActiveX can be exploited remotely to execute arbitrary code.
  9. An information disclosure vulnerability in Microsoft Excel can be exploited remotely to obtain sensitive information.
  10. A security feature bypass vulnerability in Microsoft Outlook can be exploited remotely to bypass security restrictions.
  11. A remote code execution vulnerability in Microsoft Outlook can be exploited remotely to execute arbitrary code.
  12. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  13. A spoofing vulnerability in Microsoft Outlook can be exploited remotely to spoof user interface.

Fiches de renseignement originales

Exploitation

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

Produits associés

Liste CVE

  • CVE-2023-33161
    critical
  • CVE-2023-33148
    critical
  • CVE-2023-33158
    critical
  • CVE-2023-33160
    critical
  • CVE-2023-33149
    critical
  • CVE-2023-33165
    critical
  • CVE-2023-33157
    critical
  • CVE-2023-33150
    critical
  • CVE-2023-33152
    critical
  • CVE-2023-33162
    high
  • CVE-2023-33134
    critical
  • CVE-2023-35311
    critical
  • CVE-2023-33153
    critical
  • CVE-2023-33159
    critical
  • CVE-2023-33151
    high

Liste KB

En savoir plus

Découvrez les statistiques de la propagation des vulnérabilités dans votre région statistics.securelist.com

Vous avez trouvé une inexactitude dans la description de cette vulnérabilité ? Faites-le nous savoir !
Kaspersky IT Security Calculator:
Calculez le profil de sécurité de votre entreprise
Apprendre encore plus
Kaspersky!
Votre vie en ligne mérite une protection complète!
Apprendre encore plus
Do you want to save your changes?
Your message has been sent successfully.