Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
- A remote code execution vulnerability in Microsoft Office Graphics can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Office Access Connectivity Engine can be exploited remotely to execute arbitrary code.
- A spoofing vulnerability in Microsoft Office can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft Office Graphics Component can be exploited remotely to execute arbitrary code.
Notas informativas originales
- CVE-2021-38654
- CVE-2021-38655
- CVE-2021-38656
- CVE-2021-38659
- CVE-2021-38653
- CVE-2021-38658
- CVE-2021-38651
- CVE-2021-38646
- CVE-2021-38652
- CVE-2021-38650
- CVE-2021-38657
Explotación
Public exploits exist for this vulnerability.
Productos relacionados
Lista CVE
- CVE-2021-38660 critical
- CVE-2021-38654 critical
- CVE-2021-38655 critical
- CVE-2021-38656 critical
- CVE-2021-38659 critical
- CVE-2021-38653 critical
- CVE-2021-38658 critical
- CVE-2021-38651 critical
- CVE-2021-38646 critical
- CVE-2021-38652 critical
- CVE-2021-38650 critical
- CVE-2021-38657 high
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!