Описание
Multiple serious vulnerabilities have been found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges or execute arbitrary code.
Below is a complete list of vulnerabilities
- Improper memory objects handling can be exploited remotely via a specially designed file or web content to execute arbitrary code;
 - AN unknown vulnerability can be exploited via a specially designed web content to gain privileges or execute arbitrary code from vectors related to Internet Explorer;
 - Lack of HTML sanitization at Outlook can be exploited remotely via a specially designed content to spoof user interface. (OS X)
 
Первичный источник обнаружения
Связанные продукты
Список CVE
- CVE-2015-6091 critical
 - CVE-2015-6092 critical
 - CVE-2015-6093 critical
 - CVE-2015-6094 critical
 - CVE-2015-6038 critical
 - CVE-2015-2503 critical
 - CVE-2015-6123 warning
 
Список KB
- 3085634
 - 3101496
 - 3101559
 - 3101514
 - 2899516
 - 3101510
 - 3101513
 - 3101512
 - 3085614
 - 3085594
 - 2687406
 - 3101555
 - 3101554
 - 3101367
 - 3101364
 - 3101365
 - 3101360
 - 3102925
 - 3054793
 - 3102924
 - 2889915
 - 3101507
 - 3085511
 - 3085552
 - 3085551
 - 2910978
 - 3085477
 - 2920680
 - 2920726
 - 3101529
 - 3101543
 - 3101525
 - 3101526
 - 3101553
 - 3101506
 - 2880506
 - 3101359
 - 3101564
 - 3101499
 - 3104540
 - 2965313
 - 3101558
 - 3101544
 - 3101509
 - 3054978
 - 3101371
 - 3101370
 - 2920698
 - 2878230
 - 3085584
 - 2596614
 - 2596770
 - 3085548
 - 3101560
 - 3085561
 - 3101521
 - 3101533
 - 2899473
 - 2817478
 
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
                                    Нашли неточность в описании этой уязвимости? Дайте нам знать!