Описание
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, obtain sensitive information, gain privileges, execute arbitrary code, cause denial of service.
Below is a complete list of vulnerabilities:
- A spoofing vulnerability in Microsoft Excel can be exploited remotely to spoof user interface.
- A spoofing vulnerability in Office for Android can be exploited remotely to spoof user interface.
- An information disclosure vulnerability in Microsoft OneDrive for Android can be exploited remotely to obtain sensitive information.
- An elevation of privilege vulnerability in Microsoft Outlook can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Microsoft OneDrive for MacOS can be exploited remotely to gain privileges.
- An elevation of privilege vulnerability in Windows Graphics Component can be exploited remotely to gain privileges.
- A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
- A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.
- A denial of service vulnerability in Microsoft Excel can be exploited remotely to cause denial of service.
Первичный источник обнаружения
- CVE-2023-23398
 CVE-2023-23391
 CVE-2023-24923
 CVE-2023-24882
 CVE-2023-23397
 CVE-2023-24930
 CVE-2023-24910
 CVE-2023-23395
 CVE-2023-23399
 CVE-2023-23396
Эксплуатация
Public exploits exist for this vulnerability.
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
Связанные продукты
Список CVE
- CVE-2023-24910 critical
- CVE-2023-23398 high
- CVE-2023-23391 high
- CVE-2023-24923 high
- CVE-2023-24882 high
- CVE-2023-23397 critical
- CVE-2023-24930 critical
- CVE-2023-23395 warning
- CVE-2023-23399 critical
- CVE-2023-23396 high
Список KB
Смотрите также
Узнай статистику распространения уязвимостей в своем регионе statistics.securelist.com
                                    Нашли неточность в описании этой уязвимости? Дайте нам знать!