説明
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted request to gain privileges.
- Unspecified Microsoft can be exploited remotely via specially crafted to spoof user interface.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted page to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Outlook can be exploited remotely via specially crafted image to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted authentication to gain privileges.
- An information disclosure vulnerability in Microsoft Project can be exploited remotely via specially crafted file to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
オリジナルアドバイザリー
- CVE-2020-1289
- CVE-2020-1177
- CVE-2020-1318
- CVE-2020-1295
- CVE-2020-1320
- CVE-2020-1323
- CVE-2020-1148
- CVE-2020-1181
- CVE-2020-1229
- CVE-2020-1183
- CVE-2020-1321
- CVE-2020-1178
- CVE-2020-1297
- CVE-2020-1322
- CVE-2020-1225
- CVE-2020-1226
エクスプロイテーション
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
関連製品
CVEリスト
- CVE-2020-1298 high
- CVE-2020-1289 high
- CVE-2020-1177 high
- CVE-2020-1318 high
- CVE-2020-1295 critical
- CVE-2020-1320 high
- CVE-2020-1323 high
- CVE-2020-1148 high
- CVE-2020-1181 critical
- CVE-2020-1229 warning
- CVE-2020-1183 high
- CVE-2020-1321 critical
- CVE-2020-1178 critical
- CVE-2020-1297 high
- CVE-2020-1322 high
- CVE-2020-1225 critical
- CVE-2020-1226 critical
KBリスト
- 4484414
- 4484399
- 4484402
- 4484409
- 4484361
- 4484380
- 4484415
- 4484405
- 4484410
- 4484396
- 4484369
- 4484378
- 4484351
- 4484403
- 4484373
- 4484387
- 4484391
- 4484342
- 4484400
も参照してください
お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com
この脆弱性についての記述に不正確な点がありますか? お知らせください!