CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
94.6%
Multiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to gain privileges, execute arbitrary code, spoof user interface.
Below is a complete list of vulnerabilities:
Malware exists for this vulnerability. Usually such malware is classified as Exploit. More details.
CVE-2020-0984 warning
CVE-2020-0980 critical
CVE-2020-0961 critical
CVE-2020-0924 warning
CVE-2020-0925 warning
CVE-2020-0926 warning
CVE-2020-0927 warning
CVE-2020-0920 high
CVE-2020-0923 warning
CVE-2020-0906 critical
CVE-2020-0929 high
CVE-2020-0760 high
CVE-2020-0991 critical
CVE-2020-0979 critical
CVE-2020-0978 warning
CVE-2020-0977 warning
CVE-2020-0976 warning
CVE-2020-0975 warning
CVE-2020-0974 high
CVE-2020-0973 warning
CVE-2020-0972 warning
CVE-2020-0971 high
CVE-2020-0954 warning
CVE-2020-0933 warning
CVE-2020-0932 high
CVE-2020-0931 high
CVE-2020-0930 warning
CVE-2020-0935 warning
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.
Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.
Spoof user interface. Exploitation of vulnerabilities with this impact can lead to changes in user interface to beguile user into inaccurate behavior.
support.microsoft.com/kb/2553306
support.microsoft.com/kb/3128012
support.microsoft.com/kb/3162033
support.microsoft.com/kb/3203462
support.microsoft.com/kb/4011097
support.microsoft.com/kb/4011104
support.microsoft.com/kb/4011581
support.microsoft.com/kb/4011584
support.microsoft.com/kb/4032216
support.microsoft.com/kb/4462153
support.microsoft.com/kb/4462210
support.microsoft.com/kb/4462225
support.microsoft.com/kb/4464527
support.microsoft.com/kb/4464544
support.microsoft.com/kb/4475609
support.microsoft.com/kb/4484117
support.microsoft.com/kb/4484125
support.microsoft.com/kb/4484126
support.microsoft.com/kb/4484132
support.microsoft.com/kb/4484167
support.microsoft.com/kb/4484214
support.microsoft.com/kb/4484226
support.microsoft.com/kb/4484229
support.microsoft.com/kb/4484235
support.microsoft.com/kb/4484238
support.microsoft.com/kb/4484244
support.microsoft.com/kb/4484246
support.microsoft.com/kb/4484258
support.microsoft.com/kb/4484260
support.microsoft.com/kb/4484266
support.microsoft.com/kb/4484269
support.microsoft.com/kb/4484273
support.microsoft.com/kb/4484274
support.microsoft.com/kb/4484281
support.microsoft.com/kb/4484283
support.microsoft.com/kb/4484284
support.microsoft.com/kb/4484285
support.microsoft.com/kb/4484287
support.microsoft.com/kb/4484290
support.microsoft.com/kb/4484291
support.microsoft.com/kb/4484292
support.microsoft.com/kb/4484293
support.microsoft.com/kb/4484294
support.microsoft.com/kb/4484295
support.microsoft.com/kb/4484296
support.microsoft.com/kb/4484297
support.microsoft.com/kb/4484298
support.microsoft.com/kb/4484299
support.microsoft.com/kb/4484300
support.microsoft.com/kb/4484301
support.microsoft.com/kb/4484307
support.microsoft.com/kb/4484308
support.microsoft.com/kb/4484319
support.microsoft.com/kb/4484321
support.microsoft.com/kb/4484322
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0760
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0906
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0920
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0923
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0924
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0925
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0926
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0927
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0929
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0930
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0931
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0932
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0933
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0935
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0954
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0961
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0971
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0972
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0973
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0974
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0975
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0976
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0977
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0978
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0979
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0980
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0984
portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0991
statistics.securelist.com/
threats.kaspersky.com/en/class/Exploit/
threats.kaspersky.com/en/product/Microsoft-Access/
threats.kaspersky.com/en/product/Microsoft-Excel/
threats.kaspersky.com/en/product/Microsoft-Office/
threats.kaspersky.com/en/product/Microsoft-Outlook/
threats.kaspersky.com/en/product/Microsoft-Visio-2010/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Microsoft-Word/
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
94.6%