According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :
A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.
A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.
A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.
A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.
A tampering vulnerability exists when Microsoft SharePoint Server fails to properly handle profile data.
A remote code execution vulnerability exists in Microsoft SharePoint where APIs aren’t properly protected from unsafe data input.
Note that the scanner has not tested for these issues but has instead relied only on the application’s self-reported version number.
No source data
Vendor | Product | Version | CPE |
---|---|---|---|
microsoft | sharepoint_server | * | cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:* |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1198
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1200
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1205
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1210
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1218
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1224
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1227
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1335
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1338
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1345
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1440
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1452
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1453
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1460
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1482
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1514
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1523
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1575
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1576
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-1595
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1198
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1200
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1205
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1210
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1218
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1224
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1227
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1335
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1338
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1345
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1440
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1452
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1453
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1460
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1482
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1514
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1523
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1575
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1576
portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1595