Product:

Sharepoint_enterprise_server

(Microsoft)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 242
Date Id Summary Products Score Patch Annotated
2022-11-09 CVE-2022-41060 Microsoft Word Information Disclosure Vulnerability 365_apps, Office, Office_online_server, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word N/A
2022-11-09 CVE-2022-41103 Microsoft Word Information Disclosure Vulnerability 365_apps, Office, Office_online_server, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word N/A
2022-11-09 CVE-2022-41122 Microsoft SharePoint Server Spoofing Vulnerability Sharepoint_enterprise_server, Sharepoint_foundation, Sharepoint_server N/A
2022-12-13 CVE-2022-44693 Microsoft SharePoint Server Remote Code Execution Vulnerability Sharepoint_enterprise_server, Sharepoint_foundation, Sharepoint_server N/A
2023-02-14 CVE-2023-21716 Microsoft Word Remote Code Execution Vulnerability Office, Office_long_term_servicing_channel, Office_online_server, Office_web_apps, Sharepoint_enterprise_server, Sharepoint_foundation, Sharepoint_server, Word 9.8
2023-02-14 CVE-2023-21717 Microsoft SharePoint Server Elevation of Privilege Vulnerability Sharepoint_enterprise_server, Sharepoint_foundation, Sharepoint_server N/A
2023-05-09 CVE-2023-24950 Microsoft SharePoint Server Spoofing Vulnerability Sharepoint_enterprise_server, Sharepoint_server N/A
2023-05-09 CVE-2023-24954 Microsoft SharePoint Server Information Disclosure Vulnerability Sharepoint_enterprise_server, Sharepoint_server, Windows_10_1507, Windows_10_1607, Windows_10_1809, Windows_10_20h2, Windows_10_21h2, Windows_10_22h2, Windows_11_21h2, Windows_11_22h2, Windows_server_2008, Windows_server_2012, Windows_server_2016, Windows_server_2022 N/A
2023-11-14 CVE-2023-38177 Microsoft SharePoint Server Remote Code Execution Vulnerability Sharepoint_enterprise_server, Sharepoint_server 6.8
2019-08-14 CVE-2019-1201 A remote code execution vulnerability exists in Microsoft Word software when it fails to properly handle objects in memory. An attacker who successfully exploited the vulnerability could use a specially crafted file to perform actions in the security context of the current user. The file could then take actions on behalf of the logged-on user with the same permissions as the current user. To exploit the vulnerability, a user must open a specially crafted file with an affected version of... Office, Office_365_proplus, Office_online_server, Office_web_apps, Office_web_apps_server, Sharepoint_enterprise_server, Sharepoint_server, Word 7.8