First published: Tue Aug 15 2023(Updated: )
Microsoft OneNote Spoofing Vulnerability
Credit: secure@microsoft.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft OneNote 2013 | ||
Microsoft Office LTSC 2021 for 64-bit editions | ||
Microsoft OneNote 2013 | ||
Microsoft Office 2019 for 32-bit editions | ||
Microsoft OneNote 2016 | ||
Microsoft Office 2019 for 64-bit editions | ||
Microsoft Office LTSC 2021 for 32-bit editions | ||
Microsoft OneNote 2016 | ||
Microsoft OneNote 2013 RT | ||
Microsoft OneNote | =2013-sp1 | |
Microsoft OneNote | =2013-sp1 | |
Microsoft OneNote | =2016 | |
Microsoft OneNote | =2019 | |
Microsoft OneNote | =2021 | |
Microsoft OneNote 2016 | ||
Microsoft OneNote 2016 | ||
Microsoft OneNote 2013 | ||
Microsoft OneNote 2013 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-36769 refers to the Microsoft OneNote Spoofing Vulnerability.
The affected software products include Microsoft Office LTSC 2021 for 64-bit editions, Microsoft OneNote 2013 RT, Microsoft OneNote 2016, Microsoft OneNote 2013, Microsoft Office LTSC 2021 for 32-bit editions, Microsoft OneNote 2013 (32-bit), Microsoft Office 2019 for 64-bit editions, and Microsoft Office 2019 for 32-bit editions.
CVE-2023-36769 has a severity level of medium (4.6).
To fix CVE-2023-36769, you should apply the recommended patches or updates provided by Microsoft for the affected software products. Please refer to the corresponding URLs in the description for the remedy.
You can find more information about CVE-2023-36769 on the Microsoft Security Response Center (MSRC) website. Please refer to the provided reference link.