Page 8 of 241 results (0.004 seconds)

CVSS: 7.6EPSS: 0%CPEs: 3EXPL: 0

Microsoft SharePoint Server Spoofing Vulnerability Una Vulnerabilidad de Suplantación de Identidad de Microsoft SharePoint Server . Este CVE ID es diferente de CVE-2021-38652 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38651 •

CVSS: 7.6EPSS: 0%CPEs: 3EXPL: 0

Microsoft SharePoint Server Spoofing Vulnerability Una Vulnerabilidad de suplantación de identidad en Microsoft SharePoint Server • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-36940 •

CVSS: 8.1EPSS: 0%CPEs: 3EXPL: 0

Microsoft SharePoint Server Spoofing Vulnerability Una vulnerabilidad de Suplantación de Identidad de Microsoft SharePoint Server. Este ID de CVE es diferente de CVE-2021-31950, CVE-2021-31964 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31948 •

CVSS: 8.8EPSS: 9%CPEs: 3EXPL: 0

Microsoft SharePoint Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota en Microsoft SharePoint Server. Este ID de CVE es diferente de CVE-2021-31963, CVE-2021-31966 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the System.Workflow.ComponentModel.Compiler.WorkflowCompilerInternal class. This class allows an attacker to specify a path to an arbitrary workflow definition file. An attacker can leverage this vulnerability to execute code in the context of the web service account. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26420 https://www.zerodayinitiative.com/advisories/ZDI-21-755 •

CVSS: 8.8EPSS: 47%CPEs: 3EXPL: 1

Microsoft SharePoint Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft SharePoint This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of server-side controls in WebParts. By specifying a control using a non-canonical string, an unsafe server-side control can be instantiated. An attacker can leverage this vulnerability to execute code in the context of the service account. • http://packetstormsecurity.com/files/163208/Microsoft-SharePoint-Unsafe-Control-And-ViewState-Remote-Code-Execution.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31181 https://www.zerodayinitiative.com/advisories/ZDI-21-573 •