Kaspersky ID:
KLA12109
検出日:
03/09/2021
更新日:
01/28/2026

説明

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, obtain sensitive information, bypass security restrictions.

Below is a complete list of vulnerabilities:

  1. A spoofing vulnerability in Microsoft SharePoint can be exploited remotely to spoof user interface.
  2. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  3. An information disclosure vulnerability in Microsoft SharePoint Server can be exploited remotely to obtain sensitive information.
  4. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  5. A security feature bypass vulnerability in Microsoft Visio can be exploited remotely to bypass security restrictions.
  6. A remote code execution vulnerability in Microsoft PowerPoint can be exploited remotely to execute arbitrary code.
  7. A remote code execution vulnerability in Microsoft Office ClickToRun can be exploited remotely to execute arbitrary code.
  8. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

関連製品

CVEリスト

  • CVE-2021-24104
    high
  • CVE-2021-27053
    critical
  • CVE-2021-27052
    high
  • CVE-2021-27059
    critical
  • CVE-2021-27054
    critical
  • CVE-2021-27055
    high
  • CVE-2021-27057
    critical
  • CVE-2021-27056
    critical
  • CVE-2021-27058
    critical
  • CVE-2021-27076
    critical
  • CVE-2021-24108
    critical

KBリスト

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.