Filtered by vendor Microsoft Subscriptions
Filtered by product Sharepoint Server Subscriptions
Total 432 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2021-28450 1 Microsoft 2 Sharepoint Foundation, Sharepoint Server 2024-11-21 5 Medium
Microsoft SharePoint Denial of Service Vulnerability
CVE-2021-27076 1 Microsoft 3 Business Productivity Servers, Sharepoint Foundation, Sharepoint Server 2024-11-21 8.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-27052 1 Microsoft 2 Sharepoint Enterprise Server, Sharepoint Server 2024-11-21 5.3 Medium
Microsoft SharePoint Server Information Disclosure Vulnerability
CVE-2021-26420 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 7.1 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-24104 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 4.6 Medium
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-24072 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 8.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-24071 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 5.3 Medium
Microsoft SharePoint Information Disclosure Vulnerability
CVE-2021-24066 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 8.8 High
Microsoft SharePoint Remote Code Execution Vulnerability
CVE-2021-1726 1 Microsoft 11 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server and 8 more 2024-11-21 8 High
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-1719 1 Microsoft 2 Sharepoint Enterprise Server, Sharepoint Server 2024-11-21 8 High
Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2021-1718 1 Microsoft 2 Sharepoint Foundation, Sharepoint Server 2024-11-21 8 High
Microsoft SharePoint Server Tampering Vulnerability
CVE-2021-1717 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 4.6 Medium
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2021-1716 1 Microsoft 9 365 Apps, Excel, Office and 6 more 2024-11-21 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2021-1715 1 Microsoft 9 365 Apps, Excel, Office and 6 more 2024-11-21 7.8 High
Microsoft Word Remote Code Execution Vulnerability
CVE-2021-1714 1 Microsoft 8 365 Apps, Excel, Excel Services and 5 more 2024-11-21 7.8 High
Microsoft Excel Remote Code Execution Vulnerability
CVE-2021-1712 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 8 High
Microsoft SharePoint Elevation of Privilege Vulnerability
CVE-2021-1707 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 8.8 High
Microsoft SharePoint Server Remote Code Execution Vulnerability
CVE-2021-1641 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 4.6 Medium
Microsoft SharePoint Server Spoofing Vulnerability
CVE-2020-1595 1 Microsoft 3 Sharepoint Enterprise Server, Sharepoint Foundation, Sharepoint Server 2024-11-21 9.9 Critical
<p>A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren't properly protected from unsafe data input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.</p> <p>Exploitation of this vulnerability requires that a user access a susceptible API on an affected version of SharePoint with specially-formatted input.</p> <p>The security update addresses the vulnerability by correcting how SharePoint handles deserialization of untrusted data.</p>
CVE-2020-1583 1 Microsoft 8 365 Apps, Excel, Office and 5 more 2024-11-21 8.8 High
An information disclosure vulnerability exists when Microsoft Word improperly discloses the contents of its memory. An attacker who exploited the vulnerability could use the information to compromise the user’s computer or data. To exploit the vulnerability, an attacker could craft a special document file and then convince the user to open it. An attacker must know the memory address location where the object was created. The update addresses the vulnerability by changing the way certain Word functions handle objects in memory.