CVE-2019-1109

Summary

A spoofing vulnerability exists when Microsoft Office Javascript does not check the validity of the web page making a request to Office documents.An attacker who successfully exploited this vulnerability could read or write information in Office documents.The security update addresses the vulnerability by correcting the way that Microsoft Office Javascript verifies trusted web pages., aka 'Microsoft Office Spoofing Vulnerability'.

Technical Details

CVSSv3 Severity:

Critical

CVSSv2 Score:

6.4

CVSSv3 Score:

9.1

CWE ID:

CWE-20

Published Date:

Monday 15th of July 2019

Modified Date:

Friday 19th of July 2019

CVSSv2 Score:
  • Access Vector: Network
  • Access Complexity: Low
  • Authentication Required: None
  • Confidentiality Impact: Partial
  • Integrity Impact: Partial
  • Availability Impact: None
CVSSv3 Score:
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Scope: Unchanged
  • Confidentiality Impact: High
  • Integrity Impact: High
  • Availability Impact: None
Common Platform Enumeration (CPE) Affected: Common Platform Enumeration (CPE) List:

Reference: Find your Vulnerabilities:

Find out if you have vulnerabilities exposing you to hackers and malware: Download Mageni's Free Edition

Keyword Search

Search CVEs, Products and Vendors.

Don't pay for a vulnerability scanning and management platform. This one is free.

Mageni provides a free vulnerability scanning and management platform which helps you need to find, prioritize, remediate and manage your vulnerabilities.