Kaspersky ID:
KLA12220
Bulunma tarihi:
07/13/2021
Yüklendi:
03/31/2025

Açıklama

Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions, obtain sensitive information.

Below is a complete list of vulnerabilities:

  1. A remote code execution vulnerability in Microsoft Word can be exploited remotely to execute arbitrary code.
  2. A remote code execution vulnerability in Microsoft SharePoint Server can be exploited remotely to execute arbitrary code.
  3. A spoofing vulnerability in Microsoft Office Online Server can be exploited remotely to spoof user interface.
  4. A security feature bypass vulnerability in Microsoft Office can be exploited remotely to bypass security restrictions.
  5. A spoofing vulnerability in Microsoft SharePoint Server can be exploited remotely to spoof user interface.
  6. An information disclosure vulnerability in Microsoft SharePoint Server can be exploited remotely to obtain sensitive information.
  7. A remote code execution vulnerability in Microsoft Excel can be exploited remotely to execute arbitrary code.

Orijinal öneriler

Kötüye kullanma

Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.

İlgili ürünler

CVE Listesi

  • CVE-2021-34452
    critical
  • CVE-2021-34520
    critical
  • CVE-2021-34451
    high
  • CVE-2021-34467
    critical
  • CVE-2021-34469
    critical
  • CVE-2021-34517
    high
  • CVE-2021-34468
    critical
  • CVE-2021-34519
    high
  • CVE-2021-34518
    critical
  • CVE-2021-34501
    critical

KB Listesi

Daha fazlasını okuyun

Bölgenizde yayılan güvenlik açıklarının istatistiklerini öğrenin statistics.securelist.com

Bu güvenlik açığının açıklamasında bir tutarsızlık mı tespit ettiniz? Bize bildirin!
Kaspersky IT Security Calculator
Daha fazla bilgi edin
Yeni Kaspersky!
Dijital hayatınız güçlü korumayı hak ediyor!
Daha fazla bilgi edin
Do you want to save your changes?
Your message has been sent successfully.