CVE-2022-30159 – Microsoft Office Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2022-30159
Microsoft Office Information Disclosure Vulnerability. This CVE ID is unique from CVE-2022-30171, CVE-2022-30172. Una Vulnerabilidad de Divulgación de Información de Microsoft Office. Este ID de CVE es diferente de CVE-2022-30171, CVE-2022-30172 Microsoft Office Information Disclosure Vulnerability • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30159 •
CVE-2022-29109 – Microsoft Excel Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-29109
Microsoft Excel Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Excel. Este ID de CVE es diferente de CVE-2022-29110 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29109 •
CVE-2022-29107 – Microsoft Office Security Feature Bypass Vulnerability
https://notcve.org/view.php?id=CVE-2022-29107
Microsoft Office Security Feature Bypass Vulnerability Una vulnerabilidad de Omisión de Funciones de Seguridad de Microsoft Office • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29107 •
CVE-2022-26934 – Windows Graphics Component Information Disclosure Vulnerability
https://notcve.org/view.php?id=CVE-2022-26934
Windows Graphics Component Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Windows Graphics Component. Este ID de CVE es diferente de CVE-2022-22011, CVE-2022-29112 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-26934 •
CVE-2022-26901 – Microsoft Excel Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-26901
Microsoft Excel Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft Excel. Este ID de CVE es diferente de CVE-2022-24473 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XLS files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-26901 •