Descripción
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, obtain sensitive information, bypass security restrictions, cause denial of service.
Below is a complete list of vulnerabilities:
- An elevation of privilege vulnerability in Microsoft Excel can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft Office Visio can be exploited remotely to execute arbitrary code.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
- An information disclosure vulnerability in Microsoft Outlook for iOS can be exploited remotely to obtain sensitive information.
- A security feature bypass vulnerability in Microsoft Publisher can be exploited remotely to bypass security restrictions.
- An elevation of privilege vulnerability in Microsoft AutoUpdate (MAU) can be exploited remotely to gain privileges.
- A denial of service vulnerability in Microsoft SharePoint Server can be exploited remotely to cause denial of service.
Notas informativas originales
- CVE-2024-43463
- CVE-2024-38250
- CVE-2024-38018
- CVE-2024-43464
- CVE-2024-43482
- CVE-2024-38226
- CVE-2024-43492
- CVE-2024-38227
- CVE-2024-38228
- CVE-2024-43466
Explotación
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Productos relacionados
Lista CVE
- CVE-2024-38250 critical
- CVE-2024-43465 critical
- CVE-2024-43463 critical
- CVE-2024-38018 critical
- CVE-2024-43464 high
- CVE-2024-43482 high
- CVE-2024-38226 high
- CVE-2024-43492 critical
- CVE-2024-38227 high
- CVE-2024-38228 high
- CVE-2024-43466 critical
Lista KB
Leer más
Conozca las estadísticas de las vulnerabilidades que se propagan en su región statistics.securelist.com
¿Has encontrado algún error en la descripción de esta vulnerabilidad? ¡Háznoslo saber!