Page 2 of 218 results (0.009 seconds)

CVSS: 8.0EPSS: 0%CPEs: 23EXPL: 0

Microsoft SharePoint Server Spoofing Vulnerability Una Vulnerabilidad de Suplantación de Identidad de Microsoft SharePoint • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1726 •

CVSS: 8.8EPSS: 1%CPEs: 4EXPL: 0

Microsoft SharePoint Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Microsoft SharePoint This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint Server. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the SPWorkflowDataSourceView class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the SharePoint service at high integrity. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-24066 • CWE-502: Deserialization of Untrusted Data •

CVSS: 9.3EPSS: 1%CPEs: 14EXPL: 0

Microsoft Word Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Microsoft Word. Este ID de CVE es diferente de CVE-2021-1715 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1716 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1716 •

CVSS: 7.8EPSS: 1%CPEs: 14EXPL: 0

Microsoft Excel Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Microsoft Excel. Este ID de CVE es diferente de CVE-2021-1713 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1714 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1714 •

CVSS: 9.3EPSS: 3%CPEs: 15EXPL: 0

Microsoft Word Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota de Microsoft Word. Este ID de CVE es diferente de CVE-2021-1716 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DOC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-1715 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-1715 • CWE-787: Out-of-bounds Write •