Описание
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to obtain sensitive information, execute arbitrary code, gain privileges, spoof user interface.
Below is a complete list of vulnerabilities:
- An information disclosure vulnerability in Microsoft Office can be exploited remotely via specially designed document file to obtain sensitive information;
- An information disclosure vulnerability in Microsoft Outlook can be exploited remotely via specially crafted email to obtain sensitive information;
- A remote code execution vulnerability in MSHTML Engine can be exploited remotely via specially crafted file to execute arbitrary code;
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted webpage to gain privileges;
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted webpage to spoof user interface;
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted webpage to spoof user interface;
- An elevation of privilege vulnerability in Skype for Android can be exploited remotely via specially designed request to gain privileges;
- A remote code execution vulnerability in Microsoft Word can be exploited remotely via specially crafted file to execute arbitrary code;
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted webpage to spoof user interface;
- An information disclosure vulnerability in Microsoft Word can be exploited remotely via specially designed document file to obtain sensitive information;
Первичный источник обнаружения
- CVE-2019-0560
CVE-2019-0559
CVE-2019-0541
CVE-2019-0562
CVE-2019-0556
CVE-2019-0558
CVE-2019-0622
CVE-2019-0585
CVE-2019-0557
CVE-2019-0561
CVE-2019-0538
CVE-2019-0582
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2019-0582 critical
- CVE-2019-0538 critical
- CVE-2019-0560 warning
- CVE-2019-0559 warning
- CVE-2019-0541 critical
- CVE-2019-0562 warning
- CVE-2019-0556 warning
- CVE-2019-0558 warning
- CVE-2019-0622 warning
- CVE-2019-0585 critical
- CVE-2019-0557 warning
- CVE-2019-0561 warning
Список KB
- 4461614
- 4461535
- 4461537
- 4461623
- 4461595
- 4461601
- 3172522
- 4022162
- 4462112
- 2596760
- 2553332
- 4461634
- 4461598
- 4461591
- 4461596
- 4461624
- 4461594
- 4461612
- 4461543
- 4461625
- 4461633
- 4461617
- 4461620
- 4461589
- 4461635
- 4018313
- 4018300
- 4018294
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!