Описание
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, gain privileges, execute arbitrary code, bypass security restrictions, obtain sensitive information.
Below is a complete list of vulnerabilities:
- A cross-site-scripting (XSS) vulnerability Microsoft Office SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- A spoofing vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted web to spoof user interface.
- An elevation of privilege vulnerability in Microsoft SharePoint can be exploited remotely via specially crafted request to gain privileges.
- Unspecified Microsoft can be exploited remotely via specially crafted to spoof user interface.
- A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted page to execute arbitrary code.
- A security feature bypass vulnerability in Microsoft Outlook can be exploited remotely via specially crafted image to bypass security restrictions.
- A remote code execution vulnerability in Microsoft Office can be exploited remotely via specially crafted file to execute arbitrary code.
- An elevation of privilege vulnerability in Microsoft SharePoint Server can be exploited remotely via specially crafted authentication to gain privileges.
- An information disclosure vulnerability in Microsoft Project can be exploited remotely via specially crafted file to obtain sensitive information.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely via specially crafted file to execute arbitrary code.
Первичный источник обнаружения
- CVE-2020-1298
CVE-2020-1289
CVE-2020-1177
CVE-2020-1318
CVE-2020-1295
CVE-2020-1320
CVE-2020-1323
CVE-2020-1148
CVE-2020-1181
CVE-2020-1229
CVE-2020-1183
CVE-2020-1321
CVE-2020-1178
CVE-2020-1297
CVE-2020-1322
CVE-2020-1225
CVE-2020-1226
Эксплуатация
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2020-1298 warning
- CVE-2020-1289 warning
- CVE-2020-1177 warning
- CVE-2020-1318 warning
- CVE-2020-1295 high
- CVE-2020-1320 warning
- CVE-2020-1323 high
- CVE-2020-1148 warning
- CVE-2020-1181 high
- CVE-2020-1229 warning
- CVE-2020-1183 warning
- CVE-2020-1321 high
- CVE-2020-1178 high
- CVE-2020-1297 warning
- CVE-2020-1322 warning
- CVE-2020-1225 critical
- CVE-2020-1226 critical
Список KB
- 4484414
- 4484399
- 4484402
- 4484409
- 4484361
- 4484380
- 4484415
- 4484405
- 4484410
- 4484396
- 4484369
- 4484378
- 4484351
- 4484403
- 4484373
- 4484387
- 4484391
- 4484342
- 4484400
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
Нашли неточность в описании этой уязвимости? Дайте нам знать!