Page 8 of 504 results (0.009 seconds)

CVSS: 8.8EPSS: 24%CPEs: 3EXPL: 1

Microsoft SharePoint Server Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the GenerateProxyAssembly method. The issue results from the lack of proper validation of a user-supplied string before using it to execute C# code. An attacker can leverage this vulnerability to execute code in the context of SharePoint farm service account. Microsoft SharePoint Server contains a code injection vulnerability that allows an authenticated attacker with Site Owner privileges to execute code remotely. • https://github.com/former-farmer/CVE-2023-24955-PoC https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24955 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.5EPSS: 0%CPEs: 17EXPL: 0

Microsoft SharePoint Server Information Disclosure Vulnerability This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft SharePoint. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the userphoto endpoint. The issue results from the exposure of sensitive information. An attacker can leverage this vulnerability to disclose information in the context of the SharePoint server. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24954 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.0EPSS: 0%CPEs: 3EXPL: 0

Microsoft SharePoint Server Spoofing Vulnerability This vulnerability allows remote attackers to relay NTLM credentials on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the implementation of the AdRotator WebControl. The issue results from the lack of proper input validation. An attacker can leverage this vulnerability to relay NTLM credentials of the service account. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24950 • CWE-20: Improper Input Validation •

CVSS: 8.1EPSS: 0%CPEs: 5EXPL: 1

Microsoft SharePoint Server Spoofing Vulnerability This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the WSSXmlUrlResolver class. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to disclose information in the context of IUSR. Microsoft SharePoint Enterprise Server 2016 suffers from a spoofing vulnerability. • https://www.exploit-db.com/exploits/51543 http://packetstormsecurity.com/files/173126/Microsoft-SharePoint-Enterprise-Server-2016-Spoofing.html https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28288 • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 3.1EPSS: 0%CPEs: 4EXPL: 0

Microsoft SharePoint Server Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23395 • CWE-601: URL Redirection to Untrusted Site ('Open Redirect') •