Page 11 of 60 results (0.004 seconds)

CVSS: 5.0EPSS: 3%CPEs: 2EXPL: 0

The Response Group Service in Microsoft Lync Server 2010 and 2013 and the Core Components in Lync Server 2013 do not properly handle exceptions, which allows remote attackers to cause a denial of service (daemon hang) via a crafted call, aka "Lync Denial of Service Vulnerability." Response Group Service en Microsoft Lync Server 2010 y 2013 y Core Components en Lync Server 2013 no manejan debidamente las excepciones, lo que permite a atacantes remotos causar una denegación de servicio (cuelgue del demonio) a través de una llamada manipulada, también conocido como 'vulnerabilidad de denegación de servicio de Lync.' • http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-september-2014-security-updates.aspx http://www.securityfocus.com/bid/69586 http://www.securitytracker.com/id/1030821 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-055 https://exchange.xforce.ibmcloud.com/vulnerabilities/95544 • CWE-20: Improper Input Validation •

CVSS: 4.3EPSS: 2%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in the Web Components Server in Microsoft Lync Server 2013 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Lync XSS Information Disclosure Vulnerability." Vulnerabilidad de XSS en Web Components Server en Microsoft Lync Server 2013 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de una URL manipulada, también conocido como 'vulnerabilidad de la divulgación de información XSS de Lync.' • http://www.securityfocus.com/bid/69579 http://www.securitytracker.com/id/1030821 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-055 https://exchange.xforce.ibmcloud.com/vulnerabilities/95546 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 0

The Server in Microsoft Lync Server 2013 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon hang) via a crafted request, aka "Lync Denial of Service Vulnerability." El servidor en Microsoft Lync Server 2013 permite a atacantes remotos causar una denegación de servicio (referencia a puntero nulo y cuelgue del demonio) a través de una solicitud manipulada, también conocido como 'vulnerabilidad de la denegación de servicio de Lync.' • http://blogs.technet.com/b/srd/archive/2014/09/09/assessing-risk-for-the-september-2014-security-updates.aspx http://www.securityfocus.com/bid/69592 http://www.securitytracker.com/id/1030821 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-055 https://exchange.xforce.ibmcloud.com/vulnerabilities/95547 •

CVSS: 4.3EPSS: 82%CPEs: 2EXPL: 0

Cross-site scripting (XSS) vulnerability in the Web Components Server in Microsoft Lync Server 2010 and 2013 allows remote attackers to inject arbitrary web script or HTML via a crafted URL containing a valid meeting ID, aka "Lync Server Content Sanitization Vulnerability." Vulnerabilidad de XSS en Web Components Server en Microsoft Lync Server 2010 y 2013 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a través de una URL manipulada que contiene un identificador de reunión válido, también conocido como 'Vulnerabilidad de Saneamiento de Contenido de Lync Server.' • http://blogs.technet.com/b/srd/archive/2014/06/10/assessing-risk-for-the-june-2014-security-updates.aspx http://secunia.com/advisories/58537 http://www.securityfocus.com/bid/67893 http://www.securitytracker.com/id/1030381 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2014/ms14-032 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.3EPSS: 96%CPEs: 13EXPL: 4

GDI+ in Microsoft Windows Vista SP2 and Server 2008 SP2; Office 2003 SP3, 2007 SP3, and 2010 SP1 and SP2; Office Compatibility Pack SP3; and Lync 2010, 2010 Attendee, 2013, and Basic 2013 allows remote attackers to execute arbitrary code via a crafted TIFF image, as demonstrated by an image in a Word document, and exploited in the wild in October and November 2013. El componente GDI + de Microsoft Windows Vista SP2 y Server 2008 SP2, Office 2003 SP3, 2007 SP3 y 2010 SP1 y SP2, Office Compatibility Pack SP3 y Lync 2010, 2010 Attende, 2.013 y Basic 2013 permite a atacantes remotos ejecutar código arbitrario a través de una imagen TIFF manipulada, como se ha demuestrado por exploits relaizados en octubre y noviembre de 2013 al abrir una imagen en un documento Word. Microsoft Graphics Component contains a memory corruption vulnerability which can allow for remote code execution. • https://www.exploit-db.com/exploits/30011 http://blogs.mcafee.com/mcafee-labs/mcafee-labs-detects-zero-day-exploit-targeting-microsoft-office-2 http://blogs.technet.com/b/srd/archive/2013/11/05/cve-2013-3906-a-graphics-vulnerability-exploited-through-word-documents.aspx http://technet.microsoft.com/security/advisory/2896666 http://www.exploit-db.com/exploits/30011 https://docs.microsoft.com/en-us/security-updates/securitybulletins/2013/ms13-096 • CWE-94: Improper Control of Generation of Code ('Code Injection') •