A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input, aka '.NET Framework, SharePoint Server, and Visual Studio Remote Code Execution Vulnerability'.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
microsoft .net core 2.1 |
||
microsoft .net core 3.1 |
||
microsoft .net_framework 2.0 |
||
microsoft .net_framework 3.0 |
||
microsoft .net_framework 3.5 |
||
microsoft .net_framework 4.6.2 |
||
microsoft .net_framework 4.7 |
||
microsoft .net_framework 4.7.1 |
||
microsoft .net_framework 4.7.2 |
||
microsoft .net_framework 4.6.1 |
||
microsoft .net_framework 4.6 |
||
microsoft .net_framework 4.8 |
||
microsoft .net_framework 3.5.1 |
||
microsoft .net_framework 4.5.2 |
||
microsoft sharepoint server 2010 |
||
microsoft sharepoint enterprise server 2016 |
||
microsoft sharepoint enterprise server 2013 |
||
microsoft sharepoint server 2019 |
||
microsoft visual studio 2019 |
||
microsoft visual studio 2017 |
You'll want to patch that – and all these other bugs fixed by Microsoft, Oracle, Adobe, VMware, SAP, Google So kind of SAP NetWeaver to hand out admin accounts to anyone who can reach it. You'll want to patch this
Mega Patch Tuesday Microsoft on Tuesday patched a wormable hole in its Windows Server software that can be exploited remotely to completely commandeer the machine without any authorization. It was one of hundreds of security bugs squashed today by Redmond along with Oracle, Adobe, VMware, SAP and Google. Microsoft emitted fixes for 123 vulnerabilities in this month's Patch Tuesday batch. Some 18 of those CVE-listed security flaws are considered critical, meaning remote code execution (RCE) is po...