7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.022 Low
EPSS
Percentile
89.3%
06/11/2019
High
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, cause denial of service.
Microsoft SharePoint Enterprise Server 2013 Service Pack 1
Microsoft Office 2019 for 32-bit editions
Microsoft Word 2010 Service Pack 2 (64-bit editions)
Microsoft Office Web Apps 2010 Service Pack 2
Microsoft Word 2016 (32-bit edition)
Microsoft Office 2019 for Mac
Microsoft Office 2010 Service Pack 2 (64-bit editions)
Microsoft Word 2010 Service Pack 2 (32-bit editions)
Microsoft Office 2010 Service Pack 2 (32-bit editions)
Microsoft SharePoint Enterprise Server 2016
Microsoft Word 2013 RT Service Pack 1
Microsoft SharePoint Server 2019
Microsoft Office Online Server
Office 365 ProPlus for 32-bit Systems
Microsoft Word 2013 Service Pack 1 (64-bit editions)
Microsoft Office 2016 for Mac
Microsoft Office 2019 for 64-bit editions
Office 365 ProPlus for 64-bit Systems
Microsoft Word 2016 (64-bit edition)
Microsoft SharePoint Server 2010 Service Pack 2
Microsoft Word 2013 Service Pack 1 (32-bit editions)
Microsoft SharePoint Foundation 2010 Service Pack 2
Microsoft SharePoint Foundation 2013 Service Pack 1
Microsoft Lync Server 2013
Microsoft Lync Server 2010
Microsoft Project Server 2010 Service Pack 2
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
CVE-2019-1034
CVE-2019-1031
CVE-2019-1032
CVE-2019-1029
CVE-2019-1035
CVE-2019-1033
CVE-2019-1036
ACE
CVE-2019-10349.3Critical
CVE-2019-10313.5Warning
CVE-2019-10323.5Warning
CVE-2019-10297.1High
CVE-2019-10359.3Critical
CVE-2019-10333.5Warning
CVE-2019-10363.5Warning
4464596
4461619
4461621
4464594
4461611
4464590
4464602
4475511
4475512
4462178
4464597
4464571
4506009
4092442
support.microsoft.com/kb/4092442
support.microsoft.com/kb/4461611
support.microsoft.com/kb/4461619
support.microsoft.com/kb/4461621
support.microsoft.com/kb/4462178
support.microsoft.com/kb/4464571
support.microsoft.com/kb/4464590
support.microsoft.com/kb/4464594
support.microsoft.com/kb/4464596
support.microsoft.com/kb/4464597
support.microsoft.com/kb/4464602
support.microsoft.com/kb/4475511
support.microsoft.com/kb/4475512
support.microsoft.com/kb/4506009
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1029
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1031
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1032
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1033
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1034
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1035
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1036
portal.msrc.microsoft.com/en-us/security-guidance
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1029
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1031
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1032
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1033
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1034
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1035
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1036
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Lync-Server/
threats.kaspersky.com/en/product/Microsoft-Lync/
threats.kaspersky.com/en/product/Microsoft-Word/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
9.3 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
0.022 Low
EPSS
Percentile
89.3%