Kaspersky ID:
KLA12288
検出日:
09/14/2021
更新日:
01/28/2026

説明

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
  3. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
  4. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  5. A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
  6. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  7. A remote code execution vulnerability in Microsoft Office Access Connectivity Engine can be exploited remotely to execute arbitrary code.
  8. A spoofing vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
  9. An information disclosure vulnerability in Microsoft Office Graphics Component can be exploited remotely to execute arbitrary code.

オリジナルアドバイザリー

エクスプロイテーション

Public exploits exist for this vulnerability.

関連製品

CVEリスト

  • CVE-2021-38660
    critical
  • CVE-2021-38654
    critical
  • CVE-2021-38655
    critical
  • CVE-2021-38656
    critical
  • CVE-2021-38659
    critical
  • CVE-2021-38653
    critical
  • CVE-2021-38658
    critical
  • CVE-2021-38651
    critical
  • CVE-2021-38646
    critical
  • CVE-2021-38652
    critical
  • CVE-2021-38650
    critical
  • CVE-2021-38657
    high

KBリスト

も参照してください

お住まいの地域に広がる脆弱性の統計をご覧ください statistics.securelist.com

この脆弱性についての記述に不正確な点がありますか? お知らせください!
Kaspersky IT Security Calculator
も参照してください
新しいカスペルスキー
あなたのデジタルライフを守る
も参照してください
Do you want to save your changes?
Your message has been sent successfully.