Количество 4
Количество 4
CVE-2020-1581
An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. An attacker who successfully exploited the vulnerability could elevate privileges. The attacker would need to already have the ability to execute code on the system. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle objects in memory.
CVE-2020-1581
Microsoft Office Click-to-Run Elevation of Privilege Vulnerability
GHSA-wpjv-j566-pfwc
An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory, aka 'Microsoft Office Click-to-Run Elevation of Privilege Vulnerability'.
BDU:2020-04072
Уязвимость компонента Click-to-Run (C2R) офисных программ Microsoft Office и Office 365, связанная с ошибками обработки объектов в памяти, позволяющая злоумышленнику повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2020-1581 An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory. An attacker who successfully exploited the vulnerability could elevate privileges. The attacker would need to already have the ability to execute code on the system. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The security update addresses the vulnerability by correcting how Microsoft Office Click-to-Run (C2R) components handle objects in memory. | CVSS3: 7.8 | 10% Низкий | больше 5 лет назад | |
CVE-2020-1581 Microsoft Office Click-to-Run Elevation of Privilege Vulnerability | 10% Низкий | больше 5 лет назад | ||
GHSA-wpjv-j566-pfwc An elevation of privilege vulnerability exists in the way that Microsoft Office Click-to-Run (C2R) components handle objects in memory, aka 'Microsoft Office Click-to-Run Elevation of Privilege Vulnerability'. | CVSS3: 7.8 | 10% Низкий | больше 3 лет назад | |
BDU:2020-04072 Уязвимость компонента Click-to-Run (C2R) офисных программ Microsoft Office и Office 365, связанная с ошибками обработки объектов в памяти, позволяющая злоумышленнику повысить свои привилегии | CVSS3: 7.8 | 10% Низкий | больше 5 лет назад |
Уязвимостей на страницу