[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Microsoft Office Remote Code Execution Vulnerability - CVE-2020-0760

ID: oval:org.secpod.oval:def:62492Date: (C)2020-04-16   (M)2023-07-13
Class: VULNERABILITYFamily: windows




A remote code execution vulnerability exists when Microsoft Office improperly loads arbitrary type libraries. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights. To exploit the vulnerability, an attacker must first convince a user to open a specially crafted Office document. The updates address the vulnerability by correcting how Office handles type libraries.

Platform:
Microsoft Windows 11
Microsoft Windows Server 2022
Microsoft Windows 7
Microsoft Windows 8.1
Microsoft Windows Server 2008
Microsoft Windows Server 2012
Microsoft Windows Server 2012 R2
Microsoft Windows 10
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2016
Microsoft Windows Server 2019
Product:
Microsoft Access 2010
Microsoft Access 2013
Microsoft Access 2016
Microsoft Excel 2010
Microsoft Excel 2013
Microsoft Excel 2016
Microsoft Office 2010
Microsoft Office 2013
Microsoft 365 Apps for Enterprise
Microsoft Office 2016
Microsoft Office 2019
Microsoft Outlook 2010
Microsoft Outlook 2013
Microsoft Outlook 2016
Microsoft PowerPoint 2010
Microsoft PowerPoint 2013
Microsoft PowerPoint 2016
Microsoft Project 2010
Microsoft Project 2013
Microsoft Project 2016
Microsoft Publisher 2010
Microsoft Publisher 2013
Microsoft Publisher 2016
Microsoft Visio 2010
Microsoft Visio 2013
Microsoft Visio 2016
Microsoft Word 2010
Microsoft Word 2013
Microsoft Word 2016
Reference:
CVE-2020-0760
CVE    1
CVE-2020-0760
CPE    48
cpe:/a:microsoft:powerpoint:2010:sp2
cpe:/a:microsoft:outlook:2010:sp2
cpe:/a:microsoft:outlook:2013
cpe:/a:microsoft:publisher:2013:sp1
...

© SecPod Technologies