Описание
Microsoft Word Information Disclosure Vulnerability
FAQ
According to the CVSS metric, user interaction is required (UI:R). What interaction would the user have to do?
A user needs to be tricked into running malicious files.
What type of information could be disclosed by this vulnerability?
The type of information that could be disclosed if an attacker successfully exploited this vulnerability is unauthorized file system access - reading from the file system.
Обновления
| Продукт | Статья | Обновление |
|---|---|---|
| Microsoft Office 2016 (32-bit edition) | ||
| Microsoft Office 2016 (64-bit edition) | ||
| Microsoft Office 2019 for 32-bit editions | - | |
| Microsoft Office 2019 for 64-bit editions | - | |
| Microsoft 365 Apps for Enterprise for 32-bit Systems | - | |
| Microsoft 365 Apps for Enterprise for 64-bit Systems | - | |
| Microsoft Office LTSC for Mac 2021 | ||
| Microsoft Office LTSC 2021 for 64-bit editions | - | |
| Microsoft Office LTSC 2021 for 32-bit editions | - |
Показывать по
10
Возможность эксплуатации
Publicly Disclosed
No
Exploited
No
Latest Software Release
Exploitation Less Likely
DOS
N/A
EPSS
Процентиль: 41%
0.0019
Низкий
5.5 Medium
CVSS3
Связанные уязвимости
CVSS3: 5.5
github
около 2 лет назад
Microsoft Word Information Disclosure Vulnerability
CVSS3: 5.5
fstec
около 2 лет назад
Уязвимость текстового редактора Microsoft Word, позволяющая нарушителю раскрыть защищаемую информацию
EPSS
Процентиль: 41%
0.0019
Низкий
5.5 Medium
CVSS3