Continuing the trend of large Microsoft Patch Tuesdays, this month’s addresses 111 vulnerabilities with 16 of them labeled as Critical. The 16 Critical vulnerabilities cover SharePoint, Browsers, Scripting Engines, Media Foundation, Microsoft Graphics, Microsoft Color Management, and the VS Code Python Extension. Adobe released patches today for Acrobat/Reader, and DNG SDK.
### Workstation Patches
The Browser, Scripting Engine, Media Foundation, Microsoft Graphics, and Microsoft Color Management patches should be prioritized for workstation-type devices, meaning any system that is used for email or to access the internet via a browser. This includes multi-user servers that are used as remote desktops for users.
### SharePoint RCEs
Similar to last month, Microsoft has also released patches for SharePoint covering four RCE vulnerabilities ([CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>), [CVE-2020-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>), [CVE-2020-1102](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102>), [CVE-2020-1069](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069>)). Three of the four RCEs involve uploading a malicious application package to exploit the vulnerabilities, while the other involves uploading a malicious page. These patches should be prioritized for all SharePoint servers.
### Visual Studio Code Python Extension RCE
Microsoft also released a patch for an RCE vulnerability the VS Code Python Extension ([CVE-2020-1192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1192>)). Exploiting the vulnerability would require the user to open a malicious file, and would grant the attacker the same rights as the user. All VS Code installations with this extension should prioritized for patching.
### Autodesk FBX Library
In late April, Microsoft issued out-of-band [updates](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200004>) for Office, 3D Viewer, and Paint 3D which use the Autodesk FBX Library to render 3D content. [Vulnerabilities](<https://www.autodesk.com/trust/security-advisories/adsk-sa-2020-0002>) in this library can lead to remote code execution if a user opens a specially crafted file.
### Adobe
Adobe issued patches today covering multiple vulnerabilities in [Acrobat/Reader](<https://helpx.adobe.com/security/products/acrobat/apsb20-24.html>) and [DNG SDK](<https://helpx.adobe.com/security/products/dng-sdk/apsb20-26.html>). The patches for Acrobat/Reader are labeled as [Priority 2](<https://helpx.adobe.com/security/severity-ratings.html>), while DNS SDK's patches are set to [Priority 3](<https://helpx.adobe.com/security/severity-ratings.html>). These patches resolve multiple Critical vulnerabilities.
Adobe also released patches out-of-band on April 28th covering Critical vulnerabilities in [Bridge](<https://helpx.adobe.com/security/products/bridge/apsb20-19.html>), [Illustrator](<https://helpx.adobe.com/security/products/illustrator/apsb20-20.html>), and [Magento](<https://helpx.adobe.com/security/products/magento/apsb20-22.html>). The patches for Magento are Priority 2, while the others are Priority 3.
While none of the vulnerabilities disclosed in Adobe’s release are known to be Actively Attacked today, all patches should be prioritized on systems with these products installed.
### About Patch Tuesday
Patch Tuesday QIDs are published at [Security Alerts](<https://www.qualys.com/research/security-alerts/>), typically late in the evening of [Patch Tuesday](<https://blog.qualys.com/tag/patch-tuesday>).
{"id": "QUALYSBLOG:3D59C3E8B929E373B69498E8E48C734E", "type": "qualysblog", "bulletinFamily": "blog", "title": "May 2020 Patch Tuesday \u2013 111 Vulns, 16 Critical, SharePoint, VS Code, Adobe Patches", "description": "Continuing the trend of large Microsoft Patch Tuesdays, this month\u2019s addresses 111 vulnerabilities with 16 of them labeled as Critical. The 16 Critical vulnerabilities cover SharePoint, Browsers, Scripting Engines, Media Foundation, Microsoft Graphics, Microsoft Color Management, and the VS Code Python Extension. Adobe released patches today for Acrobat/Reader, and DNG SDK.\n\n### Workstation Patches\n\nThe Browser, Scripting Engine, Media Foundation, Microsoft Graphics, and Microsoft Color Management patches should be prioritized for workstation-type devices, meaning any system that is used for email or to access the internet via a browser. This includes multi-user servers that are used as remote desktops for users.\n\n### SharePoint RCEs\n\nSimilar to last month, Microsoft has also released patches for SharePoint covering four RCE vulnerabilities ([CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>), [CVE-2020-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>), [CVE-2020-1102](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102>), [CVE-2020-1069](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069>)). Three of the four RCEs involve uploading a malicious application package to exploit the vulnerabilities, while the other involves uploading a malicious page. These patches should be prioritized for all SharePoint servers.\n\n### Visual Studio Code Python Extension RCE\n\nMicrosoft also released a patch for an RCE vulnerability the VS Code Python Extension ([CVE-2020-1192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1192>)). Exploiting the vulnerability would require the user to open a malicious file, and would grant the attacker the same rights as the user. All VS Code installations with this extension should prioritized for patching.\n\n### Autodesk FBX Library\n\nIn late April, Microsoft issued out-of-band [updates](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200004>) for Office, 3D Viewer, and Paint 3D which use the Autodesk FBX Library to render 3D content. [Vulnerabilities](<https://www.autodesk.com/trust/security-advisories/adsk-sa-2020-0002>) in this library can lead to remote code execution if a user opens a specially crafted file.\n\n### Adobe\n\nAdobe issued patches today covering multiple vulnerabilities in [Acrobat/Reader](<https://helpx.adobe.com/security/products/acrobat/apsb20-24.html>) and [DNG SDK](<https://helpx.adobe.com/security/products/dng-sdk/apsb20-26.html>). The patches for Acrobat/Reader are labeled as [Priority 2](<https://helpx.adobe.com/security/severity-ratings.html>), while DNS SDK's patches are set to [Priority 3](<https://helpx.adobe.com/security/severity-ratings.html>). These patches resolve multiple Critical vulnerabilities.\n\nAdobe also released patches out-of-band on April 28th covering Critical vulnerabilities in [Bridge](<https://helpx.adobe.com/security/products/bridge/apsb20-19.html>), [Illustrator](<https://helpx.adobe.com/security/products/illustrator/apsb20-20.html>), and [Magento](<https://helpx.adobe.com/security/products/magento/apsb20-22.html>). The patches for Magento are Priority 2, while the others are Priority 3.\n\nWhile none of the vulnerabilities disclosed in Adobe\u2019s release are known to be Actively Attacked today, all patches should be prioritized on systems with these products installed.\n\n### About Patch Tuesday\n\nPatch Tuesday QIDs are published at [Security Alerts](<https://www.qualys.com/research/security-alerts/>), typically late in the evening of [Patch Tuesday](<https://blog.qualys.com/tag/patch-tuesday>).", "published": "2020-05-12T18:25:06", "modified": "2020-05-12T18:25:06", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "href": "https://blog.qualys.com/category/vulnerabilities-research", "reporter": "Jimmy Graham", "references": [], "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1102", "CVE-2020-1192"], "lastseen": "2020-06-03T17:50:28", "viewCount": 65, "enchantments": {"dependencies": {"references": [{"type": "avleonov", "idList": ["AVLEONOV:D8BE9238C3E35C438BC4D8515D78E548"]}, {"type": "cve", "idList": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1102", "CVE-2020-1171", "CVE-2020-1192"]}, {"type": "githubexploit", "idList": ["C0148A2C-75C9-5375-AE2F-DBEDCCD0999F"]}, {"type": "kaspersky", "idList": ["KLA11772", "KLA11774"]}, {"type": "mscve", "idList": ["MS:CVE-2020-1023", "MS:CVE-2020-1024", "MS:CVE-2020-1069", "MS:CVE-2020-1102", "MS:CVE-2020-1192"]}, {"type": "mskb", "idList": ["KB4484332", "KB4484336", "KB4484364"]}, {"type": "nessus", "idList": ["MICROSOFT_VISUAL_STUDIO_CODE_MS20_MAY.NASL", "SMB_NT_MS20_MAY_OFFICE_SHAREPOINT.NASL", "WEB_APPLICATION_SCANNING_112449", "WEB_APPLICATION_SCANNING_112450", "WEB_APPLICATION_SCANNING_112451"]}, {"type": "nvidia", "idList": ["NVIDIA:5147"]}, {"type": "threatpost", "idList": ["THREATPOST:D3F7F2434B9347169B642A60BEC9FF02"]}, {"type": "zdi", "idList": ["ZDI-20-648"]}]}, "score": {"value": 0.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "adobe", "idList": ["APSB20-19", "APSB20-20", "APSB20-22", "APSB20-24", "APSB20-26"]}, {"type": "avleonov", "idList": ["AVLEONOV:D8BE9238C3E35C438BC4D8515D78E548"]}, {"type": "cve", "idList": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1102", "CVE-2020-1192"]}, {"type": "githubexploit", "idList": ["C0148A2C-75C9-5375-AE2F-DBEDCCD0999F"]}, {"type": "kaspersky", "idList": ["KLA11772", "KLA11774"]}, {"type": "mscve", "idList": ["MS:CVE-2020-1023", "MS:CVE-2020-1024", "MS:CVE-2020-1069", "MS:CVE-2020-1102", "MS:CVE-2020-1192"]}, {"type": "mskb", "idList": ["KB4484336"]}, {"type": "nessus", "idList": ["MICROSOFT_VISUAL_STUDIO_CODE_MS20_MAY.NASL"]}, {"type": "nvidia", "idList": ["NVIDIA:5147"]}, {"type": "threatpost", "idList": ["THREATPOST:D3F7F2434B9347169B642A60BEC9FF02"]}, {"type": "zdi", "idList": ["ZDI-20-648"]}]}, "exploitation": null, "vulnersScore": 0.2}, "immutableFields": [], "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1647589307, "score": 1659743467}}
{"cve": [{"lastseen": "2022-03-23T11:52:39", "description": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1024, CVE-2020-1102.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-21T23:15:00", "type": "cve", "title": "CVE-2020-1023", "cwe": ["CWE-434"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1102"], "modified": "2020-05-26T18:13:00", "cpe": ["cpe:/a:microsoft:sharepoint_foundation:2013", "cpe:/a:microsoft:sharepoint_enterprise_server:2016", "cpe:/a:microsoft:sharepoint_server:2019"], "id": "CVE-2020-1023", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1023", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T11:52:51", "description": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1102.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-21T23:15:00", "type": "cve", "title": "CVE-2020-1024", "cwe": ["CWE-434"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1102"], "modified": "2020-05-26T17:55:00", "cpe": ["cpe:/a:microsoft:sharepoint_foundation:2013", "cpe:/a:microsoft:sharepoint_enterprise_server:2016", "cpe:/a:microsoft:sharepoint_server:2019"], "id": "CVE-2020-1024", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1024", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:06:26", "description": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1023, CVE-2020-1024.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-21T23:15:00", "type": "cve", "title": "CVE-2020-1102", "cwe": ["CWE-434"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1102"], "modified": "2020-05-26T18:21:00", "cpe": ["cpe:/a:microsoft:sharepoint_enterprise_server:2016", "cpe:/a:microsoft:sharepoint_server:2019"], "id": "CVE-2020-1102", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1102", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:00:07", "description": "A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls, aka 'Microsoft SharePoint Server Remote Code Execution Vulnerability'.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-21T23:15:00", "type": "cve", "title": "CVE-2020-1069", "cwe": ["CWE-476"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1069"], "modified": "2021-07-21T11:39:00", "cpe": ["cpe:/a:microsoft:sharepoint_foundation:2013", "cpe:/a:microsoft:sharepoint_enterprise_server:2016", "cpe:/a:microsoft:sharepoint_server:2019"], "id": "CVE-2020-1069", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1069", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_foundation:2013:sp1:*:*:*:*:*:*", "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*"]}, {"lastseen": "2022-03-23T12:24:53", "description": "A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads workspace settings from a notebook file, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1171.", "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-05-21T23:15:00", "type": "cve", "title": "CVE-2020-1192", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1171", "CVE-2020-1192"], "modified": "2021-12-01T14:19:00", "cpe": [], "id": "CVE-2020-1192", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1192", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": []}, {"lastseen": "2022-03-23T12:21:16", "description": "A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project, aka 'Visual Studio Code Python Extension Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1192.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-05-21T23:15:00", "type": "cve", "title": "CVE-2020-1171", "cwe": ["NVD-CWE-noinfo"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1171", "CVE-2020-1192"], "modified": "2021-12-01T14:20:00", "cpe": [], "id": "CVE-2020-1171", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-1171", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "cpe23": []}], "mskb": [{"lastseen": "2023-01-11T10:48:44", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1069](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1099](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1099>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1100](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1100>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1101](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1101>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1102](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1103>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1104](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1104>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1106](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1106>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1107](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1107>)\n**Note** To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.\n\n## Improvements and fixes\n\nThis security update contains improvements and fixes for the following nonsecurity issues:\n\n * Fixes an issue in which the arrowhead symbol that signifies an additional fly-out shortcut menu disappears or appears incorrectly on the **Advanced **option on a task callout that's found in a SharePoint task list.\n * Fixes an issue in which site creation fails if only Security Assertion Markup Language (SAML)-based authentication is enabled.\n * Fixes an issue that prevents images from appearing in modern News posts and Pages if the site collection is using the Turkish language.\n * Fixes an issue in which the **Copy To** function doesn't work for folders that contain .vol files larger than 4 GB in size.\n * Fixes the issue that causes list totals to be misaligned while displaying sum total.\n * To improve accessibility, fixes the following issues:\n * Always use \"all documents\" as aria-label for the first view on the **View Selector** menu.\n * **View Selector** items specify a non-existent \"view\" role and aren't correctly recognized by screen readers.\nThis update also fixes the following issues. To fix these completely, you must also install [KB 4484331](<https://support.microsoft.com/help/4484331>) together with this update:\n\n * Fixes an accessibility issue in which focus is trapped in the **Close **button in the **Share **dialog box when you navigate through screen readers.\n * Fixes an issue where anonymous users are unexpectedly prompted for credentials while using the modern experience in SharePoint sites that allow anonymous access. This includes modern Team sites and Communication sites.\n * Fixes an issue where the screen readers are unable to detect the people field or required flag of modern pages.\n * Fixes an issue where screen readers cannot read the required flag in the modern document library folder creation experience.\n * Fixes an issue that affects choice fields in the modern list experience. After a value is set for a choice field, users cannot overwrite that value by using a blank value, even if the field doesn't require a value.\n * Fixes an issue that occurs when you navigate between modern pages through in-app transition. If the URL contained the \"?#\" character sequence, the \"?\" is removed from the navigated page URL. This can affect how web frameworks render the page.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484332>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484332 for the 64-bit version of SharePoint Server 2019](<http://www.microsoft.com/download/details.aspx?familyid=74d91329-15bb-4cfb-9040-5860a4e27805>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: May 12, 2020](<https://support.microsoft.com/en-us/help/20200512>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4484292](<http://support.microsoft.com/kb/4484292>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nsts2019-kb4484332-fullfile-x64-glb.exe| 9246A1BD8FDA4C952BA6CF33852E0EDD9794AB99| 9354ECF523C7C7872EF68C0C328E0E51CD8EB7D89392966F554B319BCEFE7147 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x64-based versions of SharePoint Server 2019\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmicrosoft.office.access.services.moss.dll| microsoft.office.access.services.moss.dll| 16.0.10359.20000| 768112| 14-Apr-20| 09:10 \nascalc.dll| ascalc.dll| 16.0.10359.20000| 972408| 14-Apr-20| 09:10 \nmicrosoft.office.access.server.application.dll| microsoft.office.access.server.application.dll| 16.0.10359.20000| 608680| 14-Apr-20| 09:10 \nmicrosoft.office.access.server.dll| microsoft.office.access.server.dll| 16.0.10359.20000| 1410704| 14-Apr-20| 09:10 \naccsrv.layouts.root.accsrvscripts.js| accessserverscripts.js| | 575532| 14-Apr-20| 09:05 \nconversion.chartserver.dll| chartserver.dll| 16.0.10359.20000| 16148384| 14-Apr-20| 09:03 \nppt.conversion.chartserver.dll| chartserver.dll| 16.0.10359.20000| 16148384| 14-Apr-20| 09:03 \nppt.edit.chartserver.dll| chartserver.dll| 16.0.10359.20000| 16148384| 14-Apr-20| 09:03 \nwac.office.chartserver.dll| chartserver.dll| 16.0.10359.20000| 16148384| 14-Apr-20| 09:03 \nprodfeat.xml| feature.xml| | 616| 14-Apr-20| 09:04 \nastcmmn_js| assetcommon.js| | 18253| 14-Apr-20| 09:02 \nastpkrs_js| assetpickers.js| | 68292| 14-Apr-20| 09:04 \nsm.js| cmssitemanager.js| | 29279| 14-Apr-20| 09:03 \ncmssummarylinks_js| cmssummarylinks.js| | 6015| 14-Apr-20| 09:03 \neditmenu_js| editingmenu.js| | 11359| 14-Apr-20| 09:03 \nhierlist_js| hierarchicallistbox.js| | 30327| 14-Apr-20| 09:03 \nmediaplayer.js| mediaplayer.js| | 47725| 14-Apr-20| 09:03 \nptdlg.js| pickertreedialog.js| | 2950| 14-Apr-20| 09:04 \nselect_js| select.js| | 2387| 14-Apr-20| 09:03 \nslctctls_js| selectorcontrols.js| | 13288| 14-Apr-20| 09:02 \nserializ_js| serialize.js| | 3219| 14-Apr-20| 09:04 \nsp.ui.assetlibrary.ribbon.debug.js| sp.ui.assetlibrary.debug.js| | 13367| 14-Apr-20| 09:04 \nsp.ui.assetlibrary.js| sp.ui.assetlibrary.js| | 5455| 14-Apr-20| 09:03 \nsp.ui.pub.htmldesign.debug.js| sp.ui.pub.htmldesign.debug.js| | 38342| 14-Apr-20| 09:03 \nsp.ui.pub.htmldesign.js| sp.ui.pub.htmldesign.js| | 19407| 14-Apr-20| 09:04 \nsp.ui.pub.ribbon.debug.js| sp.ui.pub.ribbon.debug.js| | 146313| 14-Apr-20| 09:02 \nsp.ui.pub.ribbon.js| sp.ui.pub.ribbon.js| | 84979| 14-Apr-20| 09:02 \nsp.ui.rte.publishing.debug.js| sp.ui.rte.publishing.debug.js| | 98216| 14-Apr-20| 09:03 \nsp.ui.rte.publishing.js| sp.ui.rte.publishing.js| | 49716| 14-Apr-20| 09:04 \nsp.ui.spellcheck.debug.js| sp.ui.spellcheck.debug.js| | 68393| 14-Apr-20| 09:03 \nsp.ui.spellcheck.js| sp.ui.spellcheck.js| | 36522| 14-Apr-20| 09:03 \nsplchkpg_js| spellcheckentirepage.js| | 6653| 14-Apr-20| 09:03 \nspelchek_js| spellchecker.js| | 34657| 14-Apr-20| 09:03 \nvideoportal.js| videoportal.js| | 14742| 14-Apr-20| 09:03 \nmicrosoft.sharepoint.publishing.dll_isapi| microsoft.sharepoint.publishing.dll| 16.0.10359.20000| 5408680| 14-Apr-20| 09:10 \nsharepointpub.dll| microsoft.sharepoint.publishing.dll| 16.0.10359.20000| 5408680| 14-Apr-20| 09:10 \nsharepointpub_gac.dll| microsoft.sharepoint.publishing.dll| 16.0.10359.20000| 5408680| 14-Apr-20| 09:10 \nsppubint.dll| microsoft.sharepoint.publishing.intl.dll| 16.0.10359.20000| 350632| 14-Apr-20| 09:10 \nsppubint_gac.dll| microsoft.sharepoint.publishing.intl.dll| 16.0.10359.20000| 350632| 14-Apr-20| 09:10 \nschema.xml_pubresfeap| schema.xml| | 44173| 14-Apr-20| 09:12 \nasctyps.xml| assetcontenttypes.xml| | 2846| 14-Apr-20| 09:03 \nasctyps2.xml| assetcontenttypes2.xml| | 2460| 14-Apr-20| 09:04 \nasflds.xml| assetfields.xml| | 1366| 14-Apr-20| 09:03 \nasflds2.xml| assetfields2.xml| | 1045| 14-Apr-20| 09:03 \naslibalt.xml| assetlibrarytemplate.xml| | 555| 14-Apr-20| 09:03 \naslibft.xml| feature.xml| | 2763| 14-Apr-20| 09:02 \naslibui.xml| provisionedui.xml| | 5075| 14-Apr-20| 09:04 \naslibui2.xml| provisionedui2.xml| | 1708| 14-Apr-20| 09:02 \ncdsele.xml| contentdeploymentsource.xml| | 637| 14-Apr-20| 09:10 \ncdsfeatu.xml| feature.xml| | 604| 14-Apr-20| 09:10 \ndocmpgcv.xml| docmpageconverter.xml| | 496| 14-Apr-20| 09:12 \ndocxpgcv.xml| docxpageconverter.xml| | 496| 14-Apr-20| 09:11 \nconvfeat.xml| feature.xml| | 766| 14-Apr-20| 09:12 \nippagecv.xml| infopathpageconverter.xml| | 577| 14-Apr-20| 09:12 \nxslappcv.xml| xslapplicatorconverter.xml| | 575| 14-Apr-20| 09:12 \nanalyticsreports.xml| analyticsreports.xml| | 2850| 14-Apr-20| 09:03 \nxspsset.xml| catalogsitesettings.xml| | 556| 14-Apr-20| 09:03 \nxspfeat.xml| feature.xml| | 1514| 14-Apr-20| 09:02 \ndepoper.xml| deploymentoperations.xml| | 2415| 14-Apr-20| 09:09 \ndepfeat.xml| feature.xml| | 788| 14-Apr-20| 09:10 \npestset.xml| enhancedhtmlediting.xml| | 157| 14-Apr-20| 09:06 \npefeat.xml| feature.xml| | 793| 14-Apr-20| 09:06 \nenthmft.xml| feature.xml| | 564| 14-Apr-20| 09:09 \nenthmset.xml| themingsitesettings.xml| | 1005| 14-Apr-20| 09:09 \nenctb.xml| enterprisewikicontenttypebinding.xml| | 559| 14-Apr-20| 09:06 \nenctb2.xml| enterprisewikicontenttypebinding2.xml| | 390| 14-Apr-20| 09:06 \nenfet.xml| feature.xml| | 1168| 14-Apr-20| 09:07 \nenct.xml| enterprisewikicontenttypes.xml| | 1456| 14-Apr-20| 09:12 \nenct2.xml| enterprisewikicontenttypes2.xml| | 1211| 14-Apr-20| 09:11 \nenlayfet.xml| feature.xml| | 1618| 14-Apr-20| 09:12 \nprov.xml| provisionedfiles.xml| | 1181| 14-Apr-20| 09:12 \nprov2.xml| provisionedfiles2.xml| | 1197| 14-Apr-20| 09:12 \newiki2.xml| feature.xml| | 766| 14-Apr-20| 09:12 \nhtmlfeat.xml| feature.xml| | 11263| 14-Apr-20| 09:12 \nhtmlcolm.xml| htmldesigncolumns.xml| | 909| 14-Apr-20| 09:11 \nhtmlcol2.xml| htmldesigncolumns2.xml| | 543| 14-Apr-20| 09:12 \nhtmlcol3.xml| htmldesigncolumns3.xml| | 597| 14-Apr-20| 09:12 \nhtmlcont.xml| htmldesigncontenttypes.xml| | 2330| 14-Apr-20| 09:12 \nhtmlfile.xml| htmldesignfiles.xml| | 657| 14-Apr-20| 09:11 \nhtmlfil2.xml| htmldesignfiles2.xml| | 771| 14-Apr-20| 09:12 \nhtmlfil3.xml| htmldesignfiles3.xml| | 895| 14-Apr-20| 09:11 \nhtmldpui.xml| htmldesignprovisionedui.xml| | 669| 14-Apr-20| 09:12 \nhtmldrib.xml| htmldesignribbon.xml| | 29320| 14-Apr-20| 09:11 \nhtmldpct.xml| htmldisplaytemplatecontenttypes.xml| | 11361| 14-Apr-20| 09:12 \nhtmldpwp.xml| htmldisplaytemplatefiles.xml| | 9302| 14-Apr-20| 09:12 \nhtmldpwp10.xml| htmldisplaytemplatefiles10.xml| | 575| 14-Apr-20| 09:12 \nhtmldpwp11.xml| htmldisplaytemplatefiles11.xml| | 1091| 14-Apr-20| 09:12 \nhtmldpwp12.xml| htmldisplaytemplatefiles12.xml| | 401| 14-Apr-20| 09:11 \nhtmldpwp13.xml| htmldisplaytemplatefiles13.xml| | 396| 14-Apr-20| 09:12 \nhtmldpwp14.xml| htmldisplaytemplatefiles14.xml| | 856| 14-Apr-20| 09:12 \nhtmldpwp15.xml| htmldisplaytemplatefiles15.xml| | 492| 14-Apr-20| 09:12 \nhtmldpwp2.xml| htmldisplaytemplatefiles2.xml| | 830| 14-Apr-20| 09:11 \nhtmldpwp3.xml| htmldisplaytemplatefiles3.xml| | 497| 14-Apr-20| 09:11 \nhtmldpwp4.xml| htmldisplaytemplatefiles4.xml| | 496| 14-Apr-20| 09:12 \nhtmldpwp5.xml| htmldisplaytemplatefiles5.xml| | 506| 14-Apr-20| 09:11 \nhtmldpwp6.xml| htmldisplaytemplatefiles6.xml| | 412| 14-Apr-20| 09:12 \nhtmldpwp7.xml| htmldisplaytemplatefiles7.xml| | 4003| 14-Apr-20| 09:12 \nhtmldpwp8.xml| htmldisplaytemplatefiles8.xml| | 399| 14-Apr-20| 09:12 \nhtmldpwp9.xml| htmldisplaytemplatefiles9.xml| | 401| 14-Apr-20| 09:12 \nhtmldtcbs.xml| htmldisplaytemplatefilesoobcbs.xml| | 580| 14-Apr-20| 09:11 \nhtmldtqb.xml| htmldisplaytemplatefilesqb.xml| | 598| 14-Apr-20| 09:12 \nhtmldtqbref.xml| htmldisplaytemplatefilesqbref.xml| | 507| 14-Apr-20| 09:12 \nhtmldpwp_recs.xml| htmldisplaytemplatefilesrecs.xml| | 418| 14-Apr-20| 09:11 \nststngimplk.xml| sitesettingsimportlink.xml| | 667| 14-Apr-20| 09:12 \naltmp.xam| alternatemediaplayer.xaml| | 35634| 14-Apr-20| 09:10 \nmwpfeat.xml| feature.xml| | 940| 14-Apr-20| 09:10 \nmwpprovf.xml| provisionedfiles.xml| | 1457| 14-Apr-20| 09:10 \nmwpprovu.xml| provisionedui.xml| | 22914| 14-Apr-20| 09:10 \nmwpprovui2.xml| provisionedui2.xml| | 2690| 14-Apr-20| 09:10 \npnfeat.xml| feature.xml| | 782| 14-Apr-20| 09:03 \npnstset.xml| navigationsitesettings.xml| | 4721| 14-Apr-20| 09:03 \nplnfeat.xml| feature.xml| | 760| 14-Apr-20| 09:04 \nplnstset.xml| navigationsitesettings.xml| | 152| 14-Apr-20| 09:03 \ntpfeat.xml| feature.xml| | 2846| 14-Apr-20| 09:12 \ntpcls.xml| pointpublishingcolumns.xml| | 701| 14-Apr-20| 09:12 \ntpcts.xml| pointpublishingcontenttypes.xml| | 488| 14-Apr-20| 09:12 \ntptltsch.xml| schema.xml| | 4088| 14-Apr-20| 09:11 \npclts.xml| schema.xml| | 2354| 14-Apr-20| 09:11 \npcltf.xml| feature.xml| | 857| 14-Apr-20| 09:05 \npclt.xml| productcataloglisttemplate.xml| | 753| 14-Apr-20| 09:05 \npcfeat.xml| feature.xml| | 1699| 14-Apr-20| 09:10 \npccol.xml| productcatalogcolumns.xml| | 6259| 14-Apr-20| 09:10 \npcct.xml| productcatalogcontenttypes.xml| | 830| 14-Apr-20| 09:10 \npcct2.xml| productcatalogcontenttypes2.xml| | 643| 14-Apr-20| 09:10 \npcprov.xml| provisionedfiles.xml| | 926| 14-Apr-20| 09:10 \npubpubpf.xml| feature.xml| | 551| 14-Apr-20| 09:12 \npppptset.xml| portalsettings.xml| | 584| 14-Apr-20| 09:11 \nctconvst.xml| contenttypeconvertersettings.xml| | 511| 14-Apr-20| 09:09 \ndoclbset.xml| documentlibrarysettings.xml| | 524| 14-Apr-20| 09:09 \neditmenu.xml| editingmenu.xml| | 470| 14-Apr-20| 09:09 \npubfeat.xml| feature.xml| | 2696| 14-Apr-20| 09:09 \npaglttmp.xml| pageslisttemplate.xml| | 516| 14-Apr-20| 09:09 \nprovui.xml| provisionedui.xml| | 40574| 14-Apr-20| 09:08 \nprovui2.xml| provisionedui2.xml| | 1489| 14-Apr-20| 09:08 \nprovui3.xml| provisionedui3.xml| | 2135| 14-Apr-20| 09:08 \npubstset.xml| publishingsitesettings.xml| | 6235| 14-Apr-20| 09:09 \nregext.xml| regionalsettingsextensions.xml| | 328| 14-Apr-20| 09:08 \nsiteacmn.xml| siteactionmenucustomization.xml| | 646| 14-Apr-20| 09:08 \nvarflagc.xml| variationsflagcontrol.xml| | 473| 14-Apr-20| 09:09 \nvarnomin.xml| variationsnomination.xml| | 613| 14-Apr-20| 09:08 \npblyfeat.xml| feature.xml| | 6194| 14-Apr-20| 09:04 \npblyprovfile.xml| provisionedfiles.xml| | 7964| 14-Apr-20| 09:03 \npblyprovfile2.xml| provisionedfiles2.xml| | 610| 14-Apr-20| 09:03 \npblyprovfile4.xml| provisionedfiles4.xml| | 308| 14-Apr-20| 09:03 \npblyprovfile5.xml| provisionedfiles5.xml| | 414| 14-Apr-20| 09:03 \npblyprovfile6.xml| provisionedfiles6.xml| | 385| 14-Apr-20| 09:02 \npblyprovfile7.xml| provisionedfiles7.xml| | 1170| 14-Apr-20| 09:03 \npblyprovfile8.xml| provisionedfiles8.xml| | 507| 14-Apr-20| 09:04 \npblyprovui.xml| provisionedui.xml| | 11330| 14-Apr-20| 09:04 \nxspfeatlayouts.xml| searchboundpagelayouts.xml| | 3671| 14-Apr-20| 09:03 \npubmelem.xml| elements.xml| | 4149| 14-Apr-20| 09:12 \npubmele2.xml| elements2.xml| | 592| 14-Apr-20| 09:12 \npubmfeat.xml| feature.xml| | 1697| 14-Apr-20| 09:12 \npubmprui.xml| provisionedui.xml| | 1548| 14-Apr-20| 09:12 \npubmstng.xml| sitesettings.xml| | 670| 14-Apr-20| 09:12 \npubprft.xml| feature.xml| | 758| 14-Apr-20| 09:07 \npubrfeat.xml| feature.xml| | 4927| 14-Apr-20| 09:03 \nprovfile.xml| provisionedfiles.xml| | 4739| 14-Apr-20| 09:04 \nprovfl4.xml| provisionedfiles4.xml| | 1394| 14-Apr-20| 09:03 \npubrcol.xml| publishingcolumns.xml| | 20566| 14-Apr-20| 09:04 \npubrctt.xml| publishingcontenttypes.xml| | 12093| 14-Apr-20| 09:03 \npubrctt2.xml| publishingcontenttypes2.xml| | 304| 14-Apr-20| 09:03 \npubrctt3.xml| publishingcontenttypes3.xml| | 500| 14-Apr-20| 09:02 \npubrcont.xml| publishingcontrols.xml| | 405| 14-Apr-20| 09:03 \nprsset.xml| publishingresourcessitesettings.xml| | 3506| 14-Apr-20| 09:03 \nupgd1.xml| upgrade1.xml| | 548| 14-Apr-20| 09:04 \nupgd2.xml| upgrade2.xml| | 486| 14-Apr-20| 09:03 \nupgd3.xml| upgrade3.xml| | 600| 14-Apr-20| 09:02 \npubtfeat.xml| feature.xml| | 1477| 14-Apr-20| 09:08 \nrollplf.xml| feature.xml| | 862| 14-Apr-20| 09:02 \nrollplpf.xml| provisionedfiles.xml| | 14529| 14-Apr-20| 09:03 \nrollplct.xml| rolluppagecontenttype.xml| | 742| 14-Apr-20| 09:03 \nrollpf.xml| feature.xml| | 816| 14-Apr-20| 09:08 \nrollps.xml| rolluppagesettings.xml| | 4091| 14-Apr-20| 09:08 \nseofeatu.xml| feature.xml| | 1253| 14-Apr-20| 09:06 \nseoopt.xml| searchengineoptimization.xml| | 3578| 14-Apr-20| 09:06 \nseoopt1.xml| searchengineoptimization1.xml| | 2904| 14-Apr-20| 09:06 \nsppelm.xml| elements.xml| | 1843| 14-Apr-20| 09:03 \nsppfea.xml| feature.xml| | 1015| 14-Apr-20| 09:04 \nsaicona.xml| consoleaction.xml| | 412| 14-Apr-20| 09:04 \nsaifeat.xml| feature.xml| | 1324| 14-Apr-20| 09:03 \nsairibn.xml| ribbon.xml| | 2895| 14-Apr-20| 09:03 \nsaisset.xml| sitesettings.xml| | 584| 14-Apr-20| 09:04 \naddtheme.xml| additionalthemes.xml| | 3819| 14-Apr-20| 09:10 \nsbwcopa.xml| colorpalette.xml| | 4813| 14-Apr-20| 09:10 \nsbwcona.xml| consoleaction.xml| | 692| 14-Apr-20| 09:10 \nsbwct.xml| contenttypes.xml| | 4261| 14-Apr-20| 09:10 \nsbwdesba.xml| designbuilderaction.xml| | 444| 14-Apr-20| 09:10 \nsbwdesea.xml| designeditoraction.xml| | 438| 14-Apr-20| 09:10 \nsbwdpa.xml| designpackageactions.xml| | 418| 14-Apr-20| 09:10 \nsbwdpr.xml| designpreviewaction.xml| | 447| 14-Apr-20| 09:10 \nsbwdmt.xml| disablesystemmasterpagetheming.xml| | 436| 14-Apr-20| 09:10 \nsbwfeat.xml| feature.xml| | 6499| 14-Apr-20| 09:10 \nsbwinsdes.xml| installeddesigns.xml| | 536| 14-Apr-20| 09:10 \nsbwmob.xml| mobilechannel.xml| | 1098| 14-Apr-20| 09:10 \nsbwpagela.xml| pagelayouts.xml| | 4119| 14-Apr-20| 09:10 \nsbwpages.xml| pages.xml| | 13120| 14-Apr-20| 09:10 \npubblogwp.xml| publishingblogwebparts.xml| | 949| 14-Apr-20| 09:10 \nsbwqd.xml| quicklaunchdatasource.xml| | 685| 14-Apr-20| 09:10 \nsbwrb.xml| ribbon.xml| | 44107| 14-Apr-20| 09:10 \nsbwsearch.xml| search.xml| | 2352| 14-Apr-20| 09:10 \nsbwsc.xml| sitecolumns.xml| | 3579| 14-Apr-20| 09:10 \nsbwsec.xml| siteelementcontrols.xml| | 952| 14-Apr-20| 09:10 \nsbwss.xml| sitesettings.xml| | 14657| 14-Apr-20| 09:10 \nsbwcss.xml| styles.xml| | 625| 14-Apr-20| 09:10 \nsbwwps.xml| webparts.xml| | 509| 14-Apr-20| 09:10 \nsbwfsf.xml| feature.xml| | 708| 14-Apr-20| 09:06 \nscfeatr.xml| feature.xml| | 856| 14-Apr-20| 09:05 \nspelchek.xml| spellchecking.xml| | 1033| 14-Apr-20| 09:05 \nspelchk2.xml| spellchecking2.xml| | 2641| 14-Apr-20| 09:05 \ncms_tenantadmindeploymentlinksfeature_feature_xml| feature.xml| | 826| 14-Apr-20| 09:02 \ncms_tenantadmindeploymentlinksfeature_links_xml| links.xml| | 542| 14-Apr-20| 09:03 \ntopicplf.xml| feature.xml| | 732| 14-Apr-20| 09:04 \ntopicpf.xml| feature.xml| | 713| 14-Apr-20| 09:03 \nplnkfeat.xml| feature.xml| | 621| 14-Apr-20| 09:04 \npublcol.xml| publishedlinkscolumns.xml| | 1206| 14-Apr-20| 09:03 \npublctt.xml| publishedlinkscontenttypes.xml| | 948| 14-Apr-20| 09:04 \nv2vpblyfeat.xml| feature.xml| | 540| 14-Apr-20| 09:03 \nv2vpblyprovfil.xml| provisionedfiles.xml| | 1934| 14-Apr-20| 09:03 \nvwfrmlk.xml| feature.xml| | 794| 14-Apr-20| 09:07 \nxmlsfeat.xml| feature.xml| | 818| 14-Apr-20| 09:11 \nxmlsitem.xml| xmlsitemap.xml| | 624| 14-Apr-20| 09:11 \nmicrosoft.cobaltcore.dll| microsoft.cobaltcore.dll| 16.0.10359.20000| 3081632| 14-Apr-20| 09:06 \nmicrosoft.cobalt.base.dll| microsoft.cobalt.base.dll| 16.0.10359.20000| 874920| 14-Apr-20| 09:10 \nsystem.collections.immutable.dll| system.collections.immutable.dll| 4.6.23123.00| 193680| | \nupdate_system.collections.immutable.dll| system.collections.immutable.dll| 4.6.23123.00| 193680| 7-Apr-20| 05:20 \ncsisrv.dll| csisrv.dll| 16.0.10359.20000| 1283512| 14-Apr-20| 09:05 \ncsisrvexe.exe| csisrvexe.exe| 16.0.10359.20000| 328632| 14-Apr-20| 09:05 \nonfda.dll| onfda.dll| 16.0.10359.20000| 2096800| 14-Apr-20| 09:05 \ncolumnfiltering.ascx| columnfiltering.ascx| | 443| 14-Apr-20| 01:01 \ndocsettemplates.ascx| docsettemplates.ascx| | 1459| 14-Apr-20| 01:01 \nmetadatanavkeyfilters.ascx| metadatanavkeyfilters.ascx| | 4647| 14-Apr-20| 01:01 \nmetadatanavtree.ascx| metadatanavtree.ascx| | 2686| 14-Apr-20| 01:01 \nmultilangtemplates.ascx| transmgmtlibtemplates.ascx| | 3287| 14-Apr-20| 01:01 \nvideosettemplates.ascx| videosettemplates.ascx| | 1972| 14-Apr-20| 01:01 \neditdlg.htm_multilang| editdlg.htm| | 4796| 14-Apr-20| 01:01 \nfiledlg.htm_multilang| filedlg.htm| | 3344| 14-Apr-20| 01:01 \nediscoveryquerystatistics.ascx| ediscoveryquerystatistics.ascx| | 1357| 14-Apr-20| 01:01 \nediscoverytemplate.ascx| ediscoverytemplate.ascx| | 3267| 14-Apr-20| 01:01 \npdfirml.dll_0002| microsoft.office.irm.pdfprotectorlib.dll| 16.0.10359.20000| 1308552| 14-Apr-20| 01:01 \nbarcodeglobalsettings.ascx| barcodeglobalsettings.ascx| | 1473| 14-Apr-20| 01:01 \nbargensettings.ascx| bargensettings.ascx| | 1523| 14-Apr-20| 01:01 \ndropoffzoneroutingform.ascx| dropoffzoneroutingform.ascx| | 3528| 14-Apr-20| 01:01 \nrecordsribbon.ascx| recordsribbon.ascx| | 367| 14-Apr-20| 01:01 \nmicrosoft.office.policy.dll| microsoft.office.policy.dll| 16.0.10359.20000| 2383240| 14-Apr-20| 01:01 \nmicrosoft.office.policy.dll_isapi| microsoft.office.policy.dll| 16.0.10359.20000| 2383240| 14-Apr-20| 01:01 \nauditcustquery.ascx| auditcustomquery.ascx| | 11154| 14-Apr-20| 01:01 \nauditsettings.ascx| auditsettings.ascx| | 3594| 14-Apr-20| 01:01 \nbarcodesettings.ascx| barcodesettings.ascx| | 1399| 14-Apr-20| 01:01 \ndiscoveryglobalcontrol.ascx| discoveryglobalcontrol.ascx| | 5175| 14-Apr-20| 01:01 \ndiscoveryproperties.ascx| discoveryproperties.ascx| | 7132| 14-Apr-20| 01:01 \ndiscoveryquerystatistics.ascx| discoveryquerystatistics.ascx| | 3788| 14-Apr-20| 01:01 \ndlptemplatepicker.ascx| dlptemplatepicker.ascx| | 3594| 14-Apr-20| 01:01 \nlabelsettings.ascx| labelsettings.ascx| | 9510| 14-Apr-20| 01:01 \nretentionsettings.ascx| retentionsettings.ascx| | 11060| 14-Apr-20| 01:01 \ndw20.exe_0001| dw20.exe| 16.0.10359.20000| 2129032| 14-Apr-20| 09:06 \ndwtrig20.exe| dwtrig20.exe| 16.0.10359.20000| 318928| 14-Apr-20| 09:06 \nconversion.office.gfxserver.dll| gfxserver.dll| 16.0.10359.20000| 5265520| 14-Apr-20| 09:06 \nppt.conversion.gfxserver.dll| gfxserver.dll| 16.0.10359.20000| 5265520| 14-Apr-20| 09:06 \nppt.edit.gfxserver.dll| gfxserver.dll| 16.0.10359.20000| 5265520| 14-Apr-20| 09:06 \nwac.office.gfxserver.dll| gfxserver.dll| 16.0.10359.20000| 5265520| 14-Apr-20| 09:06 \nconversion.igxserver.dll| igxserver.dll| 16.0.10359.20000| 12128648| 14-Apr-20| 09:10 \nppt.conversion.igxserver.dll| igxserver.dll| 16.0.10359.20000| 12128648| 14-Apr-20| 09:10 \nppt.edit.igxserver.dll| igxserver.dll| 16.0.10359.20000| 12128648| 14-Apr-20| 09:10 \nwac.office.igxserver.dll| igxserver.dll| 16.0.10359.20000| 12128648| 14-Apr-20| 09:10 \nsltemp.asc| sldlibtemplates.ascx| | 12554| 14-Apr-20| 09:08 \nsldlib.js| sldlib.js| | 29295| 14-Apr-20| 09:12 \neditdlg.htm_slfeat| editdlg.htm| | 4796| 14-Apr-20| 09:05 \nfiledlg.htm_slfeat| filedlg.htm| | 3344| 14-Apr-20| 09:05 \nclientx.dll| microsoft.office.sharepoint.clientextensions.dll| 16.0.10359.20000| 382104| 14-Apr-20| 09:08 \nclientxr.dll.x64| microsoft.office.sharepoint.clientextensions.dll| 16.0.10359.20000| 382104| 14-Apr-20| 09:08 \nas_adal_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| adal.dll| | 1456656| 31-Mar-20| 06:14 \nas_adal_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| adal.dll| | 1784544| 31-Mar-20| 06:13 \nas_azureclient_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| microsoft.analysisservices.azureclient.dll| | 316496| 31-Mar-20| 06:14 \nas_azureclient_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| microsoft.analysisservices.azureclient.dll| | 316496| 31-Mar-20| 06:14 \nas_client_db2v0801_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| db2v0801.xsl| | 30717| 31-Mar-20| 06:14 \nas_client_db2v0801_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| db2v0801.xsl| | 30717| 31-Mar-20| 06:14 \nas_client_hive_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| hive.xsl| | 81782| 31-Mar-20| 06:13 \nas_client_hive_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| hive.xsl| | 81782| 31-Mar-20| 06:13 \nas_client_msql_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msql.xsl| | 128792| 31-Mar-20| 06:13 \nas_client_msql_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msql.xsl| | 128792| 31-Mar-20| 06:13 \nas_client_orcl7_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| orcl7.xsl| | 95739| 31-Mar-20| 06:14 \nas_client_orcl7_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| orcl7.xsl| | 95739| 31-Mar-20| 06:14 \nas_client_sqlpdw_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqlpdw.xsl| | 105635| 31-Mar-20| 06:13 \nas_client_sqlpdw_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqlpdw.xsl| | 105635| 31-Mar-20| 06:13 \nas_client_trdtv2r41_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| trdtv2r41.xsl| | 105800| 31-Mar-20| 06:13 \nas_client_trdtv2r41_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| trdtv2r41.xsl| | 105800| 31-Mar-20| 06:13 \nas_client_xmsrv_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmsrv.dll| | 35081808| 31-Mar-20| 06:13 \nas_client_xmsrv_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmsrv.dll| | 25498704| 31-Mar-20| 06:14 \nas_clientas80_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as80.xsl| | 17484| 31-Mar-20| 06:14 \nas_clientas80_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as80.xsl| | 17484| 31-Mar-20| 06:14 \nas_clientas90_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as90.xsl| | 20021| 31-Mar-20| 06:14 \nas_clientas90_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as90.xsl| | 20021| 31-Mar-20| 06:14 \nas_clientinformix_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| informix.xsl| | 32145| 31-Mar-20| 06:13 \nas_clientinformix_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| informix.xsl| | 32145| 31-Mar-20| 06:13 \nas_clientmsjet_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msjet.xsl| | 30427| 31-Mar-20| 06:13 \nas_clientmsjet_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msjet.xsl| | 30427| 31-Mar-20| 06:13 \nas_clientmsmgdsrv_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmgdsrv.dll| | 7638824| 31-Mar-20| 06:13 \nas_clientmsmgdsrv_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmgdsrv.dll| | 9328720| 31-Mar-20| 06:14 \nas_clientsql120_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql120.xsl| | 135247| 31-Mar-20| 06:13 \nas_clientsql120_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql120.xsl| | 135247| 31-Mar-20| 06:13 \nas_clientsql2000_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql2000.xsl| | 35014| 31-Mar-20| 06:14 \nas_clientsql2000_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql2000.xsl| | 35014| 31-Mar-20| 06:14 \nas_clientsql70_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql70.xsl| | 33181| 31-Mar-20| 06:14 \nas_clientsql70_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql70.xsl| | 33181| 31-Mar-20| 06:14 \nas_clientsql90_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql90.xsl| | 136426| 31-Mar-20| 06:13 \nas_clientsql90_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql90.xsl| | 136426| 31-Mar-20| 06:13 \nas_clientsybase_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sybase.xsl| | 30964| 31-Mar-20| 06:13 \nas_clientsybase_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sybase.xsl| | 30964| 31-Mar-20| 06:13 \nas_msmdlocal_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmdlocal.dll| | 45813840| 31-Mar-20| 06:14 \nas_msmdlocal_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmdlocal.dll| | 63495968| 31-Mar-20| 06:14 \nas_msolap_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolap.dll| | 7999272| 31-Mar-20| 06:13 \nas_msolap_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolap.dll| | 10331936| 31-Mar-20| 06:14 \nas_msolui_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolui.dll| | 292128| 31-Mar-20| 06:13 \nas_msolui_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolui.dll| | 312616| 31-Mar-20| 06:13 \nas_sqldumper_exe_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqldumper.exe| | 147560| 31-Mar-20| 06:13 \nas_sqldumper_exe_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqldumper.exe| | 172368| 31-Mar-20| 06:14 \nas_xmlrw_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrw.dll| | 289376| 31-Mar-20| 06:14 \nas_xmlrw_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrw.dll| | 333928| 31-Mar-20| 06:14 \nas_xmlrwbin_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrwbin.dll| | 194152| 31-Mar-20| 06:13 \nas_xmlrwbin_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrwbin.dll| | 224864| 31-Mar-20| 06:14 \nconversion.office.mso99lres.dll| mso99lres.dll| 16.0.10359.20000| 14548904| 14-Apr-20| 09:12 \nppt.conversion.mso99lres.dll| mso99lres.dll| 16.0.10359.20000| 14548904| 14-Apr-20| 09:12 \nppt.edit.mso99lres.dll| mso99lres.dll| 16.0.10359.20000| 14548904| 14-Apr-20| 09:12 \nwac.office.mso99lres.dll| mso99lres.dll| 16.0.10359.20000| 14548904| 14-Apr-20| 09:12 \nconversion.office.mso20win32server.dll| mso20win32server.dll| 16.0.10359.20000| 4390824| 14-Apr-20| 09:05 \nmso.mso20win32server.dll| mso20win32server.dll| 16.0.10359.20000| 4390824| 14-Apr-20| 09:05 \nppt.conversion.mso20win32server.dll| mso20win32server.dll| 16.0.10359.20000| 4390824| 14-Apr-20| 09:05 \nppt.edit.mso20win32server.dll| mso20win32server.dll| 16.0.10359.20000| 4390824| 14-Apr-20| 09:05 \nwac.office.mso20win32server.dll| mso20win32server.dll| 16.0.10359.20000| 4390824| 14-Apr-20| 09:05 \nconversion.office.mso30win32server.dll| mso30win32server.dll| 16.0.10359.20000| 5585816| 14-Apr-20| 09:08 \nmso.mso30win32server.dll| mso30win32server.dll| 16.0.10359.20000| 5585816| 14-Apr-20| 09:08 \nppt.conversion.mso30win32server.dll| mso30win32server.dll| 16.0.10359.20000| 5585816| 14-Apr-20| 09:08 \nppt.edit.mso30win32server.dll| mso30win32server.dll| 16.0.10359.20000| 5585816| 14-Apr-20| 09:08 \nwac.office.mso30win32server.dll| mso30win32server.dll| 16.0.10359.20000| 5585816| 14-Apr-20| 09:08 \nconversion.office.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10359.20000| 12480928| 14-Apr-20| 09:13 \nppt.conversion.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10359.20000| 12480928| 14-Apr-20| 09:13 \nppt.edit.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10359.20000| 12480928| 14-Apr-20| 09:13 \nwac.office.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10359.20000| 12480928| 14-Apr-20| 09:13 \nconversion.office.mso98win32server.dll| mso98win32server.dll| 16.0.10359.20000| 3941800| 14-Apr-20| 09:13 \nppt.conversion.mso98win32server.dll| mso98win32server.dll| 16.0.10359.20000| 3941800| 14-Apr-20| 09:13 \nppt.edit.mso98win32server.dll| mso98win32server.dll| 16.0.10359.20000| 3941800| 14-Apr-20| 09:13 \nwac.office.mso98win32server.dll| mso98win32server.dll| 16.0.10359.20000| 3941800| 14-Apr-20| 09:13 \nconversion.office.msoserver.dll| msoserver.dll| 16.0.10359.20000| 14474144| 14-Apr-20| 09:13 \nppt.conversion.msoserver.dll| msoserver.dll| 16.0.10359.20000| 14474144| 14-Apr-20| 09:13 \nppt.edit.msoserver.dll| msoserver.dll| 16.0.10359.20000| 14474144| 14-Apr-20| 09:13 \nwac.office.msoserver.dll| msoserver.dll| 16.0.10359.20000| 14474144| 14-Apr-20| 09:13 \nmicrosoft.office.web.common.dll| microsoft.office.web.common.dll| 16.0.10359.20000| 1973160| 14-Apr-20| 09:08 \nnl7data0011.dll_osssearch| nl7data0011.dll| 16.0.10359.20000| 7782880| 14-Apr-20| 09:08 \nnl7data0404.dll_osssearch| nl7data0404.dll| 16.0.10359.20000| 2708680| 14-Apr-20| 09:08 \nnl7data0804.dll_osssearch| nl7data0804.dll| 16.0.10359.20000| 3588096| 14-Apr-20| 09:08 \nconversion.oartodfserver.dll| oartodfserver.dll| 16.0.10359.20000| 3555736| 14-Apr-20| 09:05 \nppt.conversion.oartodfserver.dll| oartodfserver.dll| 16.0.10359.20000| 3555736| 14-Apr-20| 09:05 \nppt.edit.oartodfserver.dll| oartodfserver.dll| 16.0.10359.20000| 3555736| 14-Apr-20| 09:05 \nwac.office.oartodfserver.dll| oartodfserver.dll| 16.0.10359.20000| 3555736| 14-Apr-20| 09:05 \nconversion.office.oartserver.dll| oartserver.dll| 16.0.10359.20000| 18199464| 14-Apr-20| 09:05 \nppt.conversion.oartserver.dll| oartserver.dll| 16.0.10359.20000| 18199464| 14-Apr-20| 09:05 \nppt.edit.oartserver.dll| oartserver.dll| 16.0.10359.20000| 18199464| 14-Apr-20| 09:05 \nwac.office.oartserver.dll| oartserver.dll| 16.0.10359.20000| 18199464| 14-Apr-20| 09:05 \nmicrosoft.office.connectedservices.identity.dll| microsoft.office.connectedservices.identity.dll| 16.0.10359.20000| 62880| 14-Apr-20| 09:10 \nconversion.cultures.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \noffice.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nppt.conversion.cultures.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nvisioserver.cultures.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nwac.conversion.cultures.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nwac.powerpoint.edit.bin.cultures.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nxlsrv.ecs.culture.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nxlsrv.ecs.office.odf| office.odf| | 2224560| 14-Apr-20| 09:13 \nconversionhtmlutil.dll| htmlutil.dll| 16.0.10359.20000| 2854816| 14-Apr-20| 09:11 \nonetnative.dll| onetnative.dll| 16.0.10359.20000| 812160| 14-Apr-20| 09:11 \nonetnative_1.dll| onetnative.dll| 16.0.10359.20000| 812160| 14-Apr-20| 09:11 \nonetutil.dll| onetutil.dll| 16.0.10359.20000| 2866096| 14-Apr-20| 09:11 \nconversion.office.osfserver.dll| osfserver.dll| 16.0.10359.20000| 164264| 14-Apr-20| 09:11 \nwac.office.osfserver.dll| osfserver.dll| 16.0.10359.20000| 164264| 14-Apr-20| 09:11 \nconversion.office.osfsharedserver.dll| osfsharedserver.dll| 16.0.10359.20000| 734120| 14-Apr-20| 09:11 \nwac.office.osfsharedserver.dll| osfsharedserver.dll| 16.0.10359.20000| 734120| 14-Apr-20| 09:11 \nconversion.office.osfuiserver.dll| osfuiserver.dll| 16.0.10359.20000| 488584| 14-Apr-20| 09:11 \nwac.office.osfuiserver.dll| osfuiserver.dll| 16.0.10359.20000| 488584| 14-Apr-20| 09:11 \nosfserver_activities_dll.x64| microsoft.sharepoint.workflowservices.activities.dll| 16.0.10359.20000| 286136| 14-Apr-20| 09:11 \nosfserver_workflow_dll| microsoft.sharepoint.workflowservices.dll| 16.0.10359.20000| 487880| 14-Apr-20| 09:11 \nosfextap.dll| microsoft.sharepoint.officeextension.applicationpages.dll| 16.0.10359.20000| 16312| 14-Apr-20| 09:07 \noffice_extension_manager_js| sp.officeextensionmanager.js| | 50999| 14-Apr-20| 09:13 \nmicrosoft.office.serviceinfrastructure.runtime.dll| microsoft.office.serviceinfrastructure.runtime.dll| 16.0.10359.20000| 1053128| 14-Apr-20| 09:13 \nosrvadml.xml| officeserveradminlinks.xml| | 3483| 31-Mar-20| 06:00 \nugcdot.xml| feature.xml| | 629| 31-Mar-20| 06:03 \nmicrosoft.office.server.directory.sharepoint| microsoft.office.server.directory.sharepoint.dll| 16.0.10359.20000| 747472| 14-Apr-20| 09:06 \nmicrosoft.office.server.dll| microsoft.office.server.dll| 16.0.10359.20000| 3042416| 14-Apr-20| 09:06 \nmicrosoft.office.server.dll_isapi| microsoft.office.server.dll| 16.0.10359.20000| 3042416| 14-Apr-20| 09:06 \nmicrosoft.office.server.openxml.dll| microsoft.office.server.openxml.dll| 16.0.10359.20000| 1658280| 14-Apr-20| 09:06 \nmicrosoft.office.server.userprofiles.dll| microsoft.office.server.userprofiles.dll| 16.0.10359.20000| 5325960| 14-Apr-20| 09:06 \nmicrosoft.office.server.userprofiles.dll_isapi| microsoft.office.server.userprofiles.dll| 16.0.10359.20000| 5325960| 14-Apr-20| 09:06 \nmicrosoft.sharepoint.taxonomy.dll| microsoft.sharepoint.taxonomy.dll| 16.0.10359.20000| 1744288| 14-Apr-20| 09:06 \nmicrosoft.sharepoint.taxonomy.dll_gac| microsoft.sharepoint.taxonomy.dll| 16.0.10359.20000| 1744288| 14-Apr-20| 09:06 \nmicrosoft.sharepoint.taxonomy.dll_gac1| microsoft.sharepoint.taxonomy.dll| 16.0.10359.20000| 1744288| 14-Apr-20| 09:06 \nmicrosoft.office.server.userprofiles.proxy.dll| microsoft.office.server.userprofiles.dll| 16.0.10359.20000| 1465808| 14-Apr-20| 09:12 \nmediaplayer.xap| mediaplayer.xap| | 38491| 14-Apr-20| 01:18 \ndecompositiontree.xap| decompositiontree.xap| | 108403| 14-Apr-20| 01:18 \naddgal.xap| addgallery.xap| | 407875| 14-Apr-20| 01:18 \nwpgalim.xap| webpartgalleryimages.xap| | 100639| 14-Apr-20| 01:18 \naddgallery.xap_silverlight| addgallery.xap| | 374016| 14-Apr-20| 01:18 \nmicrosoft.sharepoint.client.xap| microsoft.sharepoint.client.xap| | 312890| 14-Apr-20| 01:18 \ndsigres.cab.x64| dsigres.cab| | 229723| 14-Apr-20| 01:18 \ndsigres.cab.x64_10266| dsigres.cab| | 229723| 14-Apr-20| 01:18 \ndsigres.cab.x64_1033| dsigres.cab| | 229723| 14-Apr-20| 01:18 \ndsigres.cab.x64_1087| dsigres.cab| | 229723| 14-Apr-20| 01:18 \ndsigctrl.cab.x64| dsigctrl.cab| | 479093| 14-Apr-20| 01:18 \ndsigres.cab.x86| dsigres.cab| | 190917| 14-Apr-20| 01:19 \ndsigres.cab.x86_10266| dsigres.cab| | 190917| 14-Apr-20| 01:19 \ndsigres.cab.x86_1033| dsigres.cab| | 190917| 14-Apr-20| 01:19 \ndsigres.cab.x86_1087| dsigres.cab| | 190917| 14-Apr-20| 01:19 \ndsigctrl.cab.x86| dsigctrl.cab| | 526865| 14-Apr-20| 01:19 \nmossbi.wfe.gac.scorecards.client.dll| microsoft.performancepoint.scorecards.client.dll| 16.0.10359.20000| 2225336| 14-Apr-20| 09:10 \nppt.conversion.ppserver.dll| ppserver.dll| 16.0.10359.20000| 12352936| 14-Apr-20| 09:08 \nppt.edit.ppserver.dll| ppserver.dll| 16.0.10359.20000| 12352936| 14-Apr-20| 09:08 \nmicrosoft.office.server.powerpoint.dll| microsoft.office.server.powerpoint.dll| 16.0.10359.20000| 108976| 14-Apr-20| 09:05 \npowerpointpowershell.format.ps1xml| powerpointpowershell.format.ps1xml| | 14386| 7-Apr-20| 05:24 \npjintl_1_new.dll| pjintl.dll| 16.0.10359.20000| 4898224| 14-Apr-20| 09:13 \nschedengine_new.exe| schedengine.exe| 16.0.10359.20000| 16455824| 14-Apr-20| 09:11 \nmicrosoft.projectserver.client.silverlight.dll| microsoft.projectserver.client.silverlight.dll| 16.0.10359.20000| 396400| 14-Apr-20| 09:12 \nmicrosoft.projectserver.client.phone.dll| microsoft.projectserver.client.phone.dll| 16.0.10359.20000| 396200| 14-Apr-20| 09:12 \ncontentdatabasecreate.sql| contentdatabasecreate.sql| | 8485872| 14-Apr-20| 09:07 \nmicrosoft.office.project.schema.dll| microsoft.office.project.schema.dll| 16.0.10359.20000| 6844328| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.database.dll| microsoft.office.project.server.database.dll| 16.0.10359.20000| 10455152| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.database.extension.dll| microsoft.office.project.server.database.extension.dll| 16.0.10359.20000| 4377496| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.dll| microsoft.office.project.server.dll| 16.0.10359.20000| 9608104| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.events.remote.dll| microsoft.office.project.server.events.remote.dll| 16.0.10359.20000| 59288| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.library.dll| microsoft.office.project.server.library.dll| 16.0.10359.20000| 1971824| 14-Apr-20| 09:11 \nsdk.microsoft.office.project.server.library.dll| microsoft.office.project.server.library.dll| 16.0.10359.20000| 1971824| 14-Apr-20| 09:11 \nmicrosoft.office.project.shared.dll| microsoft.office.project.shared.dll| 16.0.10359.20000| 1897368| 14-Apr-20| 09:11 \nsdk.microsoft.office.project.shared.dll| microsoft.office.project.shared.dll| 16.0.10359.20000| 1897368| 14-Apr-20| 09:11 \nmicrosoft.projectserver.client.dll| microsoft.projectserver.client.dll| 16.0.10359.20000| 396240| 14-Apr-20| 09:11 \nmicrosoft.projectserver.client.dll_001| microsoft.projectserver.client.dll| 16.0.10359.20000| 396240| 14-Apr-20| 09:11 \nmicrosoft.projectserver.dll| microsoft.projectserver.dll| 16.0.10359.20000| 887768| 14-Apr-20| 09:11 \nmicrosoft.projectserver.dll_001| microsoft.projectserver.dll| 16.0.10359.20000| 887768| 14-Apr-20| 09:11 \nmicrosoft.projectserver.serverproxy.dll| microsoft.projectserver.serverproxy.dll| 16.0.10359.20000| 1304528| 14-Apr-20| 09:11 \nps.csom.scriptclient.debug.js| ps.debug.js| | 1030292| 31-Mar-20| 06:08 \nps.csom.scriptclient.js| ps.js| | 623325| 31-Mar-20| 06:07 \nmicrosoft.office.project.server.pwa.applicationpages.dll| microsoft.office.project.server.pwa.applicationpages.dll| 16.0.10359.20000| 1051104| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.pwa.dll| microsoft.office.project.server.pwa.dll| 16.0.10359.20000| 2758608| 14-Apr-20| 09:11 \nmicrosoft.office.project.server.administration.dll| microsoft.office.project.server.administration.dll| 16.0.10359.20000| 1002920| 14-Apr-20| 09:11 \npwa.admin.editcustomfield.aspx| editcustomfield.aspx| | 153030| 31-Mar-20| 06:12 \npwa.library.projectdrilldownsatellite.debug.js| projectdrilldownsatellite.debug.js| | 152603| 31-Mar-20| 06:24 \npwa.library.projectdrilldownsatellite.js| projectdrilldownsatellite.js| | 83340| 31-Mar-20| 06:24 \npwa.library.projectservertreepicker.debug.js| projectservertreepicker.debug.js| | 81985| 31-Mar-20| 06:20 \npwa.library.projectservertreepicker.js| projectservertreepicker.js| | 42509| 31-Mar-20| 06:21 \npwa.resx| pwa.resx| | 824177| 14-Apr-20| 09:13 \nworkflowactivitiesdll| microsoft.office.project.server.workflowactivities.dll| 16.0.10359.20000| 55192| 14-Apr-20| 09:09 \nconversion.office.riched20.dll| riched20.dll| 16.0.10359.20000| 3242896| 14-Apr-20| 09:13 \nppt.conversion.riched20.dll| riched20.dll| 16.0.10359.20000| 3242896| 14-Apr-20| 09:13 \nppt.edit.riched20.dll| riched20.dll| 16.0.10359.20000| 3242896| 14-Apr-20| 09:13 \nwac.office.riched20.dll| riched20.dll| 16.0.10359.20000| 3242896| 14-Apr-20| 09:13 \nxlsrv.ecs.riched20.dll| riched20.dll| 16.0.10359.20000| 3242896| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.de.dll| microsoft.eedict_companies.de| 16.0.10359.20000| 19056| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.dll| microsoft.eedict_companies| 16.0.10359.20000| 109864048| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.en.dll| microsoft.eedict_companies.en| 16.0.10359.20000| 16800| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.es.dll| microsoft.eedict_companies.es| 16.0.10359.20000| 16800| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.fr.dll| microsoft.eedict_companies.fr| 16.0.10359.20000| 24992| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.it.dll| microsoft.eedict_companies.it| 16.0.10359.20000| 46728| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.ja.dll| microsoft.eedict_companies.ja| 16.0.10359.20000| 1533856| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.nl.dll| microsoft.eedict_companies.nl| 16.0.10359.20000| 18344| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.no.dll| microsoft.eedict_companies.no| 16.0.10359.20000| 2098288| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.pt.dll| microsoft.eedict_companies.pt| 16.0.10359.20000| 17824| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies.ru.dll| microsoft.eedict_companies.ru| 16.0.10359.20000| 33214880| 14-Apr-20| 09:13 \nmicrosoft.eedict_companies_acceptor.ar.dll| microsoft.eedict_companies_acceptor.ar| 16.0.10359.20000| 9888368| 14-Apr-20| 09:13 \nmicrosoft.stopworddictionary.dll| microsoft.stopworddictionary.dll| 16.0.10359.20000| 32672| 14-Apr-20| 09:13 \nmicrosoft.system_dictionaries_spellcheck.dll| microsoft.system_dictionaries_spellcheck.dll| 16.0.10359.20000| 24632736| 14-Apr-20| 09:13 \nodffilt.dll.x64| odffilt.dll| 16.0.10359.20000| 1840072| 14-Apr-20| 09:13 \nofffiltx.dll.x64| offfiltx.dll| 16.0.10359.20000| 2115016| 14-Apr-20| 09:13 \nmicrosoft.ceres.common.utils.dllmsil| microsoft.ceres.common.utils.dll| 16.0.10359.20000| 322672| 14-Apr-20| 09:12 \nmicrosoft.ceres.contentengine.contentpush.dll| microsoft.ceres.contentengine.contentpush.dll| 16.0.10359.20000| 160160| 14-Apr-20| 09:08 \nmicrosoft.ceres.contentengine.nlpevaluators.dll| microsoft.ceres.contentengine.nlpevaluators.dll| 16.0.10359.20000| 251808| 14-Apr-20| 09:09 \nmicrosoft.ceres.contentengine.operators.mars.dll| microsoft.ceres.contentengine.operators.mars.dll| 16.0.10359.20000| 37488| 14-Apr-20| 09:09 \ndocumentformat.openxml.dllmsil2| documentformat.openxml.dll| 2.6.0.4| 5305360| | \nupdate_documentformat.openxml.dllmsil2| documentformat.openxml.dll| 2.6.0.4| 5305360| 31-Mar-20| 06:12 \nsystem.io.packaging.dllmsil| system.io.packaging.dll| 1.0.0.4| 121872| | \nupdate_system.io.packaging.dllmsil| system.io.packaging.dll| 1.0.0.4| 121872| 31-Mar-20| 06:12 \nmicrosoft.ceres.docparsing.formathandlers.pdf.dllmsil| microsoft.ceres.docparsing.formathandlers.pdf.dll| 16.0.10359.20000| 4217248| 14-Apr-20| 09:09 \nmicrosoft.ceres.interactionengine.processing.builtin.dll| microsoft.ceres.interactionengine.processing.builtin.dll| 16.0.10359.20000| 402848| 14-Apr-20| 09:11 \nmicrosoft.ceres.nlpbase.dictionaries.dll| microsoft.ceres.nlpbase.dictionaries.dll| 16.0.10359.20000| 138864| 14-Apr-20| 09:10 \nmanagedblingsigned.dll| managedblingsigned.dll| | 1862344| | \nupdate_managedblingsigned.dll| managedblingsigned.dll| | 1862344| 31-Mar-20| 06:01 \nmicrosoft.ceres.nlpbase.richfields.dll| microsoft.ceres.nlpbase.richfields.dll| 16.0.10359.20000| 97696| 14-Apr-20| 09:08 \nmicrosoft.sharepointsearchproviderflow.dll| microsoft.sharepointsearchproviderflow.dll| 16.0.10359.3000| 27048| 14-Apr-20| 09:05 \nsearchcore.clustering.indexclusteringmember.dll| microsoft.ceres.searchcore.clustering.indexclusteringmember.dll| 16.0.10359.20000| 62376| 14-Apr-20| 09:13 \nsearchcore.clustering.indexclustermanager.dll| microsoft.ceres.searchcore.clustering.indexclustermanager.dll| 16.0.10359.20000| 128424| 14-Apr-20| 09:13 \nmicrosoft.ceres.searchcore.indexstorage.dll| microsoft.ceres.searchcore.indexstorage.dll| 16.0.10359.20000| 30616| 14-Apr-20| 09:05 \ntquery.dll| tquery.dll| 16.0.10359.20000| 760448| 14-Apr-20| 09:13 \nmicrosoft.ceres.searchcore.journalshipper.dll| microsoft.ceres.searchcore.journalshipper.dll| 16.0.10359.20000| 87464| 14-Apr-20| 09:13 \nmicrosoft.ceres.searchcore.query.marslookupcomponent.dll| microsoft.ceres.searchcore.query.marslookupcomponent.dll| 16.0.10359.20000| 583280| 14-Apr-20| 09:05 \nmicrosoft.ceres.searchcore.seeding.dll| microsoft.ceres.searchcore.seeding.dll| 16.0.10359.20000| 132520| 14-Apr-20| 09:10 \najaxtkid.js| ajaxtoolkit.debug.js| | 312267| 31-Mar-20| 06:21 \najaxtkit.js| ajaxtoolkit.js| | 132858| 31-Mar-20| 06:20 \nsrchccd.js| search.clientcontrols.debug.js| | 380631| 31-Mar-20| 06:20 \nsrchcc.js| search.clientcontrols.js| | 204222| 31-Mar-20| 06:18 \nsrchuicd.js| searchui.debug.js| | 116371| 31-Mar-20| 06:24 \nsrchuicc.js| searchui.js| | 50907| 31-Mar-20| 06:24 \nsrchquerypipeline.dll| microsoft.office.server.search.query.dll| 16.0.10359.20000| 1103272| 14-Apr-20| 09:05 \nossapp.dll| microsoft.office.server.search.applications.dll| 16.0.10359.20000| 454056| 14-Apr-20| 09:13 \nossapp.dll_0001| microsoft.office.server.search.applications.dll| 16.0.10359.20000| 454056| 14-Apr-20| 09:13 \nclkprdct.dll| microsoft.office.server.search.clickpredict.dll| 16.0.10359.20000| 202680| 14-Apr-20| 09:13 \nsearchom.dll| microsoft.office.server.search.dll| 16.0.10359.20000| 21185960| 14-Apr-20| 09:13 \nsearchom.dll_0001| microsoft.office.server.search.dll| 16.0.10359.20000| 21185960| 14-Apr-20| 09:13 \nossex.dll| microsoft.office.server.search.exchangeadapter.dll| 16.0.10359.20000| 107648| 14-Apr-20| 09:13 \nossex.dll_0001| microsoft.office.server.search.exchangeadapter.dll| 16.0.10359.20000| 107648| 14-Apr-20| 09:13 \nsrchomnt.dll| microsoft.office.server.search.native.dll| 16.0.10359.20000| 517760| 14-Apr-20| 09:13 \nsearchom.dll_0003| microsoft.sharepoint.search.dll| 16.0.10359.20000| 3881912| 14-Apr-20| 09:12 \nsearchom.dll_0005| microsoft.sharepoint.search.dll| 16.0.10359.20000| 3881912| 14-Apr-20| 09:12 \nsrchomnt.dll_1| microsoft.sharepoint.search.native.dll| 16.0.10359.20000| 486032| 14-Apr-20| 09:12 \nmsscpi.dll| msscpi.dll| 16.0.10359.20000| 359552| 14-Apr-20| 09:13 \nmssdmn.exe| mssdmn.exe| 16.0.10359.20000| 625576| 14-Apr-20| 09:13 \nmssearch.exe| mssearch.exe| 16.0.10359.20000| 292488| 14-Apr-20| 09:13 \nmsslad.dll| msslad.dll| 16.0.10359.20000| 205240| 14-Apr-20| 09:13 \nmssph.dll| mssph.dll| 16.0.10359.20000| 2204800| 14-Apr-20| 09:13 \nmssrch.dll| mssrch.dll| 16.0.10359.20000| 3266688| 14-Apr-20| 09:13 \nquery9x.dll_0001| query.dll| 16.0.10359.20000| 136120| 14-Apr-20| 09:13 \nnoteswebservice.dll.oss.x86| noteswebservice.dll| 16.0.10359.20000| 740264| 14-Apr-20| 09:03 \ncontrol_defaultresult.html| control_searchresults.html| | 31715| 31-Mar-20| 06:23 \ncontrol_defaultresult.js| control_searchresults.js| | 33365| 31-Mar-20| 06:23 \nitem_excel.html| item_excel.html| | 2696| 31-Mar-20| 06:01 \nitem_excel.js| item_excel.js| | 4014| 31-Mar-20| 06:01 \nitem_powerpoint.html| item_powerpoint.html| | 3221| 31-Mar-20| 06:01 \nitem_powerpoint.js| item_powerpoint.js| | 4570| 31-Mar-20| 06:01 \nitem_word.html| item_word.html| | 2832| 31-Mar-20| 06:01 \nitem_word.js| item_word.js| | 4160| 31-Mar-20| 06:01 \nlstqr.apx| listqueryrules.aspx| | 16035| 31-Mar-20| 06:04 \nliqrs.apx| listqueryrules.aspx| | 19878| 31-Mar-20| 06:04 \nlistqrl.apx| listqueryrules.aspx| | 14885| 31-Mar-20| 06:22 \nsetup.exe| setup.exe| 16.0.10359.20000| 1972656| 14-Apr-20| 09:12 \nsvrsetup.exe| setup.exe| 16.0.10359.20000| 1972656| 14-Apr-20| 09:12 \nsvrsetup.dll| svrsetup.dll| 16.0.10359.20000| 17131104| 14-Apr-20| 09:12 \nwsssetup.dll| wsssetup.dll| 16.0.10359.20000| 17129880| 14-Apr-20| 09:12 \nvisioserver.microsoft.office.graphics.shapebuilder.dll| microsoft.office.graphics.shapebuilder.dll| 16.0.10359.20000| 13125056| 14-Apr-20| 09:10 \nsptrns.dll| microsoft.sharepoint.translation.dll| 16.0.10359.20000| 1104808| 14-Apr-20| 09:12 \nmicrosoft.fileservices.v2.dll| microsoft.fileservices.v2.dll| 16.0.10359.20000| 981912| 14-Apr-20| 09:13 \nspdxap.dll| microsoft.sharepoint.appmonitoring.applicationpages.dll| 16.0.10359.20000| 65944| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.flighting.dll| microsoft.sharepoint.flighting.dll| 16.0.10359.20000| 2285472| 14-Apr-20| 09:08 \nactxprjlchrd.js| activexwinprojlauncher.debug.js| | 2095| 14-Apr-20| 09:13 \nactxprjlchr.js| activexwinprojlauncher.js| | 983| 14-Apr-20| 09:13 \nbitreeview.js| bitreeview.js| | 12879| 14-Apr-20| 09:13 \ncontentfollowing.debug.js| contentfollowing.debug.js| | 123898| 14-Apr-20| 09:13 \ncontentfollowing.js| contentfollowing.js| | 54228| 14-Apr-20| 09:13 \nfollowedtags.debug.js| followedtags.debug.js| | 6347| 14-Apr-20| 09:13 \nfollowedtags.js| followedtags.js| | 2726| 14-Apr-20| 09:13 \nfollowingcommon.debug.js| followingcommon.debug.js| | 21971| 14-Apr-20| 09:13 \nfollowingcommon.js| followingcommon.js| | 9646| 14-Apr-20| 09:13 \ngroup.debug.js| group.debug.js| | 125958| 14-Apr-20| 09:13 \ngroup.js| group.js| | 75983| 14-Apr-20| 09:13 \nhashtagprofile.debug.js| hashtagprofile.debug.js| | 6184| 14-Apr-20| 09:13 \nhashtagprofile.js| hashtagprofile.js| | 3285| 14-Apr-20| 09:13 \nhierarchytreeview.js| hierarchytreeview.js| | 8799| 14-Apr-20| 09:13 \nhtmlmenu.js| htmlmenus.js| | 21157| 14-Apr-20| 09:13 \nkpilro.js| kpilro.js| | 3182| 14-Apr-20| 09:13 \nmrudocs.debug.js| mrudocs.debug.js| | 9192| 14-Apr-20| 09:13 \nmrudocs.js| mrudocs.js| | 5862| 14-Apr-20| 09:13 \nmydocs.debug.js| mydocs.debug.js| | 73509| 14-Apr-20| 09:13 \nmydocs.js| mydocs.js| | 34453| 14-Apr-20| 09:13 \nmylinks.debug.js| mylinks.debug.js| | 7003| 14-Apr-20| 09:13 \nmylinks.js| mylinks.js| | 2629| 14-Apr-20| 09:13 \nmysiterecommendationsdebug.js| mysiterecommendations.debug.js| | 74489| 14-Apr-20| 09:13 \nmysiterecommendations.js| mysiterecommendations.js| | 41310| 14-Apr-20| 09:13 \nnotificationpanel.debug.js| notificationpanel.debug.js| | 14102| 14-Apr-20| 09:13 \nnotificationpanel.js| notificationpanel.js| | 7017| 14-Apr-20| 09:13 \nportal.debug.js| portal.debug.js| | 94787| 14-Apr-20| 09:13 \nportal.js| portal.js| | 52464| 14-Apr-20| 09:13 \nprbrows.debug.js| profilebrowsercontrol.debug.js| | 52762| 14-Apr-20| 09:13 \nprbrows.js| profilebrowsercontrol.js| | 28062| 14-Apr-20| 09:13 \nprojectsummary.debug.js| projectsummary.debug.js| | 36524| 14-Apr-20| 09:13 \nprojectsummary.js| projectsummary.js| | 13118| 14-Apr-20| 09:13 \nratings.js| ratings.js| | 18205| 14-Apr-20| 09:13 \nreputation.debug.js| reputation.debug.js| | 5317| 14-Apr-20| 09:13 \nreputation.js| reputation.js| | 3428| 14-Apr-20| 09:13 \nsoccom.js| socialcomment.js| | 23526| 14-Apr-20| 09:13 \nsocdata.js| socialdata.js| | 14889| 14-Apr-20| 09:13 \nsoctag.js| socialtag.js| | 9992| 14-Apr-20| 09:13 \nsprecdocsd.js| sp.recentdocs.debug.js| | 40634| 14-Apr-20| 09:13 \nsprecdocs.js| sp.recentdocs.js| | 18260| 14-Apr-20| 09:13 \nannouncementtilesdebug.js| sp.ui.announcementtiles.debug.js| | 14781| 14-Apr-20| 09:13 \nannouncementtiles.js| sp.ui.announcementtiles.js| | 8782| 14-Apr-20| 09:13 \nspui_cold.js| sp.ui.collabmailbox.debug.js| | 11768| 14-Apr-20| 09:13 \nspui_col.js| sp.ui.collabmailbox.js| | 7592| 14-Apr-20| 09:13 \ncommunities.js| sp.ui.communities.js| | 43980| 14-Apr-20| 09:13 \ncommunitiestileview.js| sp.ui.communities.tileview.js| | 8538| 14-Apr-20| 09:13 \ncommunityfeed.js| sp.ui.communityfeed.js| | 9997| 14-Apr-20| 09:13 \ncommunitymoderation.js| sp.ui.communitymoderation.js| | 8223| 14-Apr-20| 09:13 \nsp.ui.documentssharedbyme.debug.js| sp.ui.documentssharedbyme.debug.js| | 3174| 14-Apr-20| 09:13 \nsp.ui.documentssharedbyme.js| sp.ui.documentssharedbyme.js| | 2210| 14-Apr-20| 09:13 \nsp.ui.documentssharedwithme.debug.js| sp.ui.documentssharedwithme.debug.js| | 41725| 14-Apr-20| 09:13 \nsp.ui.documentssharedwithme.js| sp.ui.documentssharedwithme.js| | 24710| 14-Apr-20| 09:13 \nspui_listsearchbox_debug.js| sp.ui.listsearchbox.debug.js| | 39586| 14-Apr-20| 09:13 \nspui_listsearchbox.js| sp.ui.listsearchbox.js| | 20180| 14-Apr-20| 09:13 \nspui_listsearchboxbootstrap_debug.js| sp.ui.listsearchboxbootstrap.debug.js| | 7401| 14-Apr-20| 09:13 \nspui_listsearchboxbootstrap.js| sp.ui.listsearchboxbootstrap.js| | 3068| 14-Apr-20| 09:13 \nmicrofeeddebug.js| sp.ui.microfeed.debug.js| | 393708| 14-Apr-20| 09:13 \nmicrofeed.js| sp.ui.microfeed.js| | 230147| 14-Apr-20| 09:13 \nmysitecommondebug.js| sp.ui.mysitecommon.debug.js| | 131548| 14-Apr-20| 09:13 \nmysitecommon.js| sp.ui.mysitecommon.js| | 75538| 14-Apr-20| 09:13 \nmysitenavigationdebug.js| sp.ui.mysitenavigation.debug.js| | 2523| 14-Apr-20| 09:13 \nmysitenavigation.js| sp.ui.mysitenavigation.js| | 2523| 14-Apr-20| 09:13 \nmysiterecommendationsuidebug.js| sp.ui.mysiterecommendations.debug.js| | 14330| 14-Apr-20| 09:13 \nmysiterecommendationsui.js| sp.ui.mysiterecommendations.js| | 7266| 14-Apr-20| 09:13 \npeopledebug.js| sp.ui.people.debug.js| | 87048| 14-Apr-20| 09:13 \npeopledebug.js1| sp.ui.people.debug.js| | 87048| 14-Apr-20| 09:13 \npeople.js| sp.ui.people.js| | 59577| 14-Apr-20| 09:13 \npeople.js1| sp.ui.people.js| | 59577| 14-Apr-20| 09:13 \nspui_persond.js| sp.ui.person.debug.js| | 18230| 14-Apr-20| 09:13 \nspui_person.js| sp.ui.person.js| | 10324| 14-Apr-20| 09:13 \nspui_psd.js| sp.ui.promotedsites.debug.js| | 24862| 14-Apr-20| 09:13 \nspui_ps.js| sp.ui.promotedsites.js| | 15123| 14-Apr-20| 09:13 \nsp.ui.ratings.debug.js| sp.ui.ratings.debug.js| | 20220| 14-Apr-20| 09:13 \nsp.ui.ratings.js| sp.ui.ratings.js| | 11909| 14-Apr-20| 09:13 \nsp.ui.reputation.debug.js| sp.ui.reputation.debug.js| | 42482| 14-Apr-20| 09:13 \nsp.ui.reputation.js| sp.ui.reputation.js| | 25974| 14-Apr-20| 09:13 \nspssoc.js| sp.ui.socialribbon.js| | 20740| 14-Apr-20| 09:13 \nhomeapi.dll_gac| microsoft.sharepoint.homeapi.dll| 16.0.10359.20000| 352376| 14-Apr-20| 09:08 \nhomeapi.dll_isapi| microsoft.sharepoint.homeapi.dll| 16.0.10359.20000| 352376| 14-Apr-20| 09:08 \nportal.dll| microsoft.sharepoint.portal.dll| 16.0.10359.20000| 6994544| 14-Apr-20| 09:11 \nportal.dll_001| microsoft.sharepoint.portal.dll| 16.0.10359.20000| 6994544| 14-Apr-20| 09:11 \nprofileext.sql| profileext.sql| | 1388377| 31-Mar-20| 06:24 \nprofilesrp.sql| profilesrp.sql| | 1553927| 31-Mar-20| 06:24 \nprofilesrp_c.sql| profilesrp_c.sql| | 150583| 31-Mar-20| 06:24 \nprofilesrp_n.sql| profilesrp_n.sql| | 1004057| 31-Mar-20| 06:24 \nantixsslibrary.dll| antixsslibrary.dll| 3.0.3259.31320| 26256| | \nupdate_antixsslibrary.dll| antixsslibrary.dll| 3.0.3259.31320| 26256| 31-Mar-20| 06:04 \nstsapa.dll| microsoft.sharepoint.applicationpages.administration.dll| 16.0.10359.20000| 688552| 14-Apr-20| 09:13 \nwssadmop.dll_0001| microsoft.sharepoint.administrationoperation.dll| 16.0.10359.20000| 1173464| 14-Apr-20| 09:07 \nanglesharp.dll| anglesharp.dll| 0.9.7| 1203712| | \nupdate_anglesharp.dll| anglesharp.dll| 0.9.7| 1203712| 31-Mar-20| 06:08 \ntimezone.xml| timezone.xml| | 88560| 31-Mar-20| 06:17 \nsiteupgrade.xml| siteupgradelinks.xml| | 534| 31-Mar-20| 06:24 \nsiteupgrade.xml_14| siteupgradelinks.xml| | 534| 31-Mar-20| 06:24 \nmicrosoft.sharepoint.health.dll| microsoft.sharepoint.health.dll| 16.0.10359.20000| 136368| 14-Apr-20| 09:06 \nmicrosoft.sharepoint.identitymodel.dll| microsoft.sharepoint.identitymodel.dll| 16.0.10359.20000| 655272| 14-Apr-20| 09:12 \nmicrosoft.owin.3.0.1.dll| microsoft.owin.dll| 3.0.40213.64| 101032| | \nupdate_microsoft.owin.3.0.1.dll| microsoft.owin.dll| 3.0.40213.64| 101032| 31-Mar-20| 06:05 \nmicrosoft.owin.host.systemweb.3.0.1.dll| microsoft.owin.host.systemweb.dll| 3.0.40213.64| 133288| | \nupdate_microsoft.owin.host.systemweb.3.0.1.dll| microsoft.owin.host.systemweb.dll| 3.0.40213.64| 133288| 31-Mar-20| 06:08 \nmicrosoft.sharepoint.client.dll.x64| microsoft.sharepoint.client.dll| 16.0.10359.20000| 853936| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.dll_0001.x64| microsoft.sharepoint.client.dll| 16.0.10359.20000| 853936| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.phone.dll| microsoft.sharepoint.client.phone.dll| 16.0.10359.20000| 799152| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.portable.dll.x64| microsoft.sharepoint.client.portable.dll| 16.0.10359.20000| 815024| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.portable.dll_gac.x64| microsoft.sharepoint.client.portable.dll| 16.0.10359.20000| 815024| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.serverruntime.dll| microsoft.sharepoint.client.serverruntime.dll| 16.0.10359.20000| 741056| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.serverruntime.dll_0001| microsoft.sharepoint.client.serverruntime.dll| 16.0.10359.20000| 741056| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.client.silverlight.dll.x64| microsoft.sharepoint.client.silverlight.dll| 16.0.10359.20000| 798136| 14-Apr-20| 09:05 \ncontextinfo.dll_0001| microsoft.sharepoint.context.dll| 16.0.10359.20000| 48552| 14-Apr-20| 09:05 \nsplinq.dll| microsoft.sharepoint.linq.dll| 16.0.10359.20000| 388512| 14-Apr-20| 09:05 \nsplinqvs.dll| microsoft.sharepoint.linq.dll| 16.0.10359.20000| 388512| 14-Apr-20| 09:05 \nrenderlist.dll_0001| microsoft.sharepoint.renderlist.dll| 16.0.10359.20000| 22944| 14-Apr-20| 09:05 \nmicrosoft.sharepoint.serverstub.dll| microsoft.sharepoint.serverstub.dll| 16.0.10359.20000| 2888656| 14-Apr-20| 09:05 \nnewtonsoft.json.6.0.8.dll| newtonsoft.json.dll| 6.0.8.18111| 513536| | \nupdate_newtonsoft.json.6.0.8.dll| newtonsoft.json.dll| 6.0.8.18111| 513536| 31-Mar-20| 05:58 \noffprsx.dll| offparser.dll| 16.0.10359.20000| 2138752| 14-Apr-20| 09:09 \nowin.1.0.dll| owin.dll| 1.0| 4608| | \nupdate_owin.1.0.dll| owin.dll| 1.0| 4608| 31-Mar-20| 06:05 \nstslib.dll_0001| microsoft.sharepoint.library.dll| 16.0.10359.20000| 230528| 14-Apr-20| 09:08 \nowssvr.dll_0001| owssvr.dll| 16.0.10359.20000| 6900648| 14-Apr-20| 09:08 \nmicrosoft.sharepoint.powershell.dll_0001| microsoft.sharepoint.powershell.dll| 16.0.10359.20000| 1065896| 14-Apr-20| 09:11 \nmicrosoft.sharepoint.powershell.intl.dll| microsoft.sharepoint.powershell.intl.dll| 16.0.10359.20000| 97192| 14-Apr-20| 09:11 \npsconfig.exe| psconfig.exe| 16.0.10359.20000| 538776| 14-Apr-20| 09:05 \npsconfigui.exe| psconfigui.exe| 16.0.10359.20000| 809936| 14-Apr-20| 09:05 \ncore_0.rsx| core.resx| | 526140| 14-Apr-20| 09:07 \nstsom.dll| microsoft.sharepoint.dll| 16.0.10359.20000| 38546024| 14-Apr-20| 09:13 \nstsom.dll_0001| microsoft.sharepoint.dll| 16.0.10359.20000| 38546024| 14-Apr-20| 09:13 \nstsomdr.dll| microsoft.sharepoint.intl.dll| 16.0.10359.20000| 1409448| 14-Apr-20| 09:13 \nstsap.dll| microsoft.sharepoint.applicationpages.dll| 16.0.10359.20000| 2445792| 14-Apr-20| 09:11 \nstssoap.dll| stssoap.dll| 16.0.10359.20000| 776832| 14-Apr-20| 09:05 \nsubsetproxy.dll_0001| microsoft.sharepoint.subsetproxy.dll| 16.0.10359.20000| 1140928| 14-Apr-20| 09:05 \nsubsetshim.dll_0001| microsoft.sharepoint.dll| 16.900.rup.rpr| 2449312| 14-Apr-20| 09:10 \nsystem.net.http.formatting.5.2.3.dll| system.net.http.formatting.dll| 5.2.30128.0| 185544| | \nupdate_system.net.http.formatting.5.2.3.dll| system.net.http.formatting.dll| 5.2.30128.0| 185544| 31-Mar-20| 05:59 \nsystem.web.http.5.2.3.dll| system.web.http.dll| 5.2.30128.0| 471240| | \nupdate_system.web.http.5.2.3.dll| system.web.http.dll| 5.2.30128.0| 471240| 31-Mar-20| 06:08 \napplications.asx_0014| applications.aspx| | 3998| 31-Mar-20| 06:05 \napps.asx_0014| apps.aspx| | 3974| 31-Mar-20| 06:05 \nbackups.asx_0014| backups.aspx| | 3983| 31-Mar-20| 06:05 \nconfigurationwizards.asx_0014| configurationwizards.aspx| | 4022| 31-Mar-20| 06:05 \ndefault.asx_0014| default.aspx| | 5440| 31-Mar-20| 06:05 \ngenappsettings.asx_0014| generalapplicationsettings.aspx| | 4041| 31-Mar-20| 06:06 \nmonitoring.asx_0014| monitoring.aspx| | 3992| 31-Mar-20| 06:05 \no365config.asx_0015| office365configuration.aspx| | 5180| 31-Mar-20| 06:05 \nsecurity.asx_0014| security.aspx| | 3986| 31-Mar-20| 06:06 \nsysset.asx_0014| systemsettings.aspx| | 4004| 31-Mar-20| 06:06 \nupgandmig.asx_0014| upgradeandmigration.aspx| | 4019| 31-Mar-20| 06:05 \ndip.js| dip.js| | 50487| 31-Mar-20| 06:15 \ndip.js_14| dip.js| | 50487| 31-Mar-20| 06:15 \naccreqctl.debug.js| accessrequestscontrol.debug.js| | 20696| 14-Apr-20| 09:06 \naccreqctl.js| accessrequestscontrol.js| | 11682| 14-Apr-20| 09:06 \naccreqviewtmpl.debug.js| accessrequestsviewtemplate.debug.js| | 50013| 14-Apr-20| 09:06 \naccreqviewtmpl.js| accessrequestsviewtemplate.js| | 22931| 14-Apr-20| 09:06 \nappcatalogfieldtemplate.debug.js| appcatalogfieldtemplate.debug.js| | 9638| 14-Apr-20| 09:06 \nappcatalogfieldtemplate.js| appcatalogfieldtemplate.js| | 3693| 14-Apr-20| 09:06 \nappdeveloperdash.debug.js| appdeveloperdash.debug.js| | 23162| 14-Apr-20| 09:06 \nappdeveloperdash.js| appdeveloperdash.js| | 11550| 14-Apr-20| 09:06 \napprequestmanagefieldtemplate.debug.js| apprequestmanagefieldtemplate.debug.js| | 2771| 14-Apr-20| 09:06 \napprequestmanagefieldtemplate.js| apprequestmanagefieldtemplate.js| | 1474| 14-Apr-20| 09:06 \nautofill.debug.js| autofill.debug.js| | 20542| 14-Apr-20| 09:06 \nautofill.js| autofill.js| | 11560| 14-Apr-20| 09:06 \nautohostedlicensingtemplates.debug.js| autohostedlicensingtemplates.debug.js| | 21187| 14-Apr-20| 09:06 \nautohostedlicensingtemplates.js| autohostedlicensingtemplates.js| | 8987| 14-Apr-20| 09:06 \nbform.debug.js| bform.debug.js| | 460795| 14-Apr-20| 09:06 \nbform.js| bform.js| | 259447| 14-Apr-20| 09:06 \nblank.debug.js| blank.debug.js| | 755| 14-Apr-20| 09:06 \nblank.js| blank.js| | 454| 14-Apr-20| 09:06 \ncallout.debug.js| callout.debug.js| | 92039| 14-Apr-20| 09:06 \ncallout.js| callout.js| | 29821| 14-Apr-20| 09:06 \nchoicebuttonfieldtemplate.debug.js| choicebuttonfieldtemplate.debug.js| | 6382| 14-Apr-20| 09:06 \nchoicebuttonfieldtemplate.js| choicebuttonfieldtemplate.js| | 2741| 14-Apr-20| 09:06 \nclientforms.debug.js| clientforms.debug.js| | 155351| 14-Apr-20| 09:06 \nclientforms.js| clientforms.js| | 78855| 14-Apr-20| 09:06 \nclientpeoplepicker.debug.js| clientpeoplepicker.debug.js| | 83399| 14-Apr-20| 09:06 \nclientpeoplepicker.js| clientpeoplepicker.js| | 44296| 14-Apr-20| 09:06 \nclientrenderer.debug.js| clientrenderer.debug.js| | 30681| 14-Apr-20| 09:06 \nclientrenderer.js| clientrenderer.js| | 12958| 14-Apr-20| 09:06 \nclienttemplates.debug.js| clienttemplates.debug.js| | 398027| 14-Apr-20| 09:06 \nclienttemplates.js| clienttemplates.js| | 203322| 14-Apr-20| 09:06 \ncommonvalidation.debug.js| commonvalidation.debug.js| | 6758| 14-Apr-20| 09:06 \ncomval.js| commonvalidation.js| | 4222| 14-Apr-20| 09:06 \ncore.debug.js| core.debug.js| | 955755| 14-Apr-20| 09:06 \ncore.js_0001| core.js| | 507033| 14-Apr-20| 09:06 \ncreatesharedfolderdialog.debug.js| createsharedfolderdialog.debug.js| | 42912| 14-Apr-20| 09:06 \ncreatesharedfolderdialog.js| createsharedfolderdialog.js| | 18730| 14-Apr-20| 09:06 \ndatepicker.debug.js| datepicker.debug.js| | 160256| 14-Apr-20| 09:06 \ndatepick.js| datepicker.js| | 71406| 14-Apr-20| 09:06 \ndesigngallery.debug.js| designgallery.debug.js| | 47390| 14-Apr-20| 09:06 \ndesigngallery.js| designgallery.js| | 29173| 14-Apr-20| 09:06 \ndevdash.debug.js| devdash.debug.js| | 89841| 14-Apr-20| 09:06 \ndevdash.js| devdash.js| | 38402| 14-Apr-20| 09:06 \ndragdrop.debug.js| dragdrop.debug.js| | 237831| 14-Apr-20| 09:06 \ndragdrop.js| dragdrop.js| | 122516| 14-Apr-20| 09:06 \nentityeditor.debug.js| entityeditor.debug.js| | 73995| 14-Apr-20| 09:06 \nentityeditor.js| entityeditor.js| | 38997| 14-Apr-20| 09:06 \nfilepreview.debug.js| filepreview.debug.js| | 25986| 14-Apr-20| 09:06 \nfilepreview.js| filepreview.js| | 14044| 14-Apr-20| 09:06 \nfoldhyperlink.debug.js| foldhyperlink.debug.js| | 3924| 14-Apr-20| 09:06 \nfoldhyperlink.js| foldhyperlink.js| | 1861| 14-Apr-20| 09:06 \nform.debug.js| form.debug.js| | 241306| 14-Apr-20| 09:06 \nform.js| form.js| | 129250| 14-Apr-20| 09:06 \nganttscript.debug.js| ganttscript.debug.js| | 9384| 14-Apr-20| 09:06 \nganttscr.js| ganttscript.js| | 5098| 14-Apr-20| 09:06 \ngeolocationfieldtemplate.debug.js| geolocationfieldtemplate.debug.js| | 40968| 14-Apr-20| 09:06 \ngeolocationfieldtemplate.js| geolocationfieldtemplate.js| | 15411| 14-Apr-20| 09:06 \ngroupboard.debug.js| groupboard.debug.js| | 16339| 14-Apr-20| 09:06 \ngroupboard.js| groupboard.js| | 9548| 14-Apr-20| 09:06 \ngroupeditempicker.debug.js| groupeditempicker.debug.js| | 21014| 14-Apr-20| 09:06 \ngip.js| groupeditempicker.js| | 12055| 14-Apr-20| 09:06 \nhierarchytaskslist.debug.js| hierarchytaskslist.debug.js| | 60796| 14-Apr-20| 09:06 \nhierarchytaskslist.js| hierarchytaskslist.js| | 20086| 14-Apr-20| 09:06 \nimglib.debug.js| imglib.debug.js| | 91322| 14-Apr-20| 09:06 \nimglib.js| imglib.js| | 53905| 14-Apr-20| 09:06 \ninit.debug.js| init.debug.js| | 626534| 14-Apr-20| 09:06 \ninit.js_0001| init.js| | 303045| 14-Apr-20| 09:06 \ninplview.debug.js| inplview.debug.js| | 155120| 14-Apr-20| 09:06 \ninplview.js| inplview.js| | 79289| 14-Apr-20| 09:06 \njsgrid.debug.js| jsgrid.debug.js| | 1185748| 14-Apr-20| 09:06 \njsgrid.gantt.debug.js| jsgrid.gantt.debug.js| | 110109| 14-Apr-20| 09:06 \njsgrid.gantt.js| jsgrid.gantt.js| | 42304| 14-Apr-20| 09:06 \njsgrid.js| jsgrid.js| | 444710| 14-Apr-20| 09:06 \nlanguagepickercontrol.js| languagepickercontrol.js| | 11516| 14-Apr-20| 09:06 \nlistview.debug.js| listview.debug.js| | 930728| 14-Apr-20| 09:06 \nlistview.js| listview.js| | 400119| 14-Apr-20| 09:06 \nmapviewtemplate.debug.js| mapviewtemplate.debug.js| | 38394| 14-Apr-20| 09:06 \nmapviewtemplate.js| mapviewtemplate.js| | 15542| 14-Apr-20| 09:06 \nmenu.debug.js| menu.debug.js| | 103516| 14-Apr-20| 09:06 \nmenu.js_0001| menu.js| | 52559| 14-Apr-20| 09:06 \nmountpt.debug.js| mountpoint.debug.js| | 13632| 14-Apr-20| 09:06 \nmountpt.js| mountpoint.js| | 6211| 14-Apr-20| 09:06 \nmquery.debug.js| mquery.debug.js| | 60340| 14-Apr-20| 09:06 \nmquery.js| mquery.js| | 22614| 14-Apr-20| 09:06 \nms.rte.debug.js| ms.rte.debug.js| | 714303| 14-Apr-20| 09:06 \nms.rte.js| ms.rte.js| | 401119| 14-Apr-20| 09:06 \noffline.debug.js| offline.debug.js| | 22145| 14-Apr-20| 09:06 \noffline.js| offline.js| | 11374| 14-Apr-20| 09:06 \nows.debug.js| ows.debug.js| | 714306| 14-Apr-20| 09:06 \nows.js| ows.js| | 376993| 14-Apr-20| 09:06 \nowsbrows.debug.js| owsbrows.debug.js| | 24730| 14-Apr-20| 09:06 \nowsbrows.js| owsbrows.js| | 13191| 14-Apr-20| 09:06 \npickerhierarchycontrol.js| pickerhierarchycontrol.js| | 84676| 14-Apr-20| 09:06 \npivotcontrol.debug.js| pivotcontrol.debug.js| | 18169| 31-Mar-20| 06:22 \npivotcontrol.js| pivotcontrol.js| | 8580| 31-Mar-20| 06:22 \nquicklaunch.debug.js| quicklaunch.debug.js| | 135522| 14-Apr-20| 09:06 \nquicklaunch.js| quicklaunch.js| | 74048| 14-Apr-20| 09:06 \nradiobuttonwithchildren.js| radiobuttonwithchildren.js| | 3555| 14-Apr-20| 09:06 \nroamingapps.debug.js| roamingapps.debug.js| | 55031| 14-Apr-20| 09:06 \nroamingapps.js| roamingapps.js| | 21853| 14-Apr-20| 09:06 \nsharing.debug.js| sharing.debug.js| | 322361| 14-Apr-20| 09:06 \nsharing.js| sharing.js| | 135348| 14-Apr-20| 09:06 \nsharingmodern.debug.js| sharingmodern.debug.js| | 18196| 14-Apr-20| 09:06 \nsharingmodern.js| sharingmodern.js| | 5805| 14-Apr-20| 09:06 \nsinglesignon.debug.js| singlesignon.debug.js| | 17059| 14-Apr-20| 09:06 \nsinglesignon.js| singlesignon.js| | 6060| 14-Apr-20| 09:06 \nsiteupgrade.debug.js| siteupgrade.debug.js| | 1693| 14-Apr-20| 09:06 \nsiteupgrade.debug.js_14| siteupgrade.debug.js| | 1693| 14-Apr-20| 09:06 \nsiteupgrade.js| siteupgrade.js| | 1119| 14-Apr-20| 09:06 \nsiteupgrade.js_14| siteupgrade.js| | 1119| 14-Apr-20| 09:06 \nsp.accessibility.debug.js| sp.accessibility.debug.js| | 34811| 14-Apr-20| 09:06 \nsp.accessibility.js| sp.accessibility.js| | 21841| 14-Apr-20| 09:06 \nsp.core.debug.js| sp.core.debug.js| | 165966| 14-Apr-20| 09:06 \nsp.core.js| sp.core.js| | 87861| 14-Apr-20| 09:06 \nsp.datetimeutil.debug.js| sp.datetimeutil.debug.js| | 115552| 14-Apr-20| 09:06 \nsp.datetimeutil.js| sp.datetimeutil.js| | 66618| 14-Apr-20| 09:06 \nsp.debug.js| sp.debug.js| | 1706076| 14-Apr-20| 09:06 \nsp.exp.debug.js| sp.exp.debug.js| | 41182| 14-Apr-20| 09:06 \nsp.exp.js| sp.exp.js| | 24498| 14-Apr-20| 09:06 \nsp.init.debug.js| sp.init.debug.js| | 57831| 14-Apr-20| 09:06 \nsp.init.js| sp.init.js| | 32952| 14-Apr-20| 09:06 \nsp.js| sp.js| | 1044725| 14-Apr-20| 09:06 \nspmap.debug.js| sp.map.debug.js| | 15759| 14-Apr-20| 09:06 \nspmap.js| sp.map.js| | 8531| 14-Apr-20| 09:06 \nsppageinstr.debug.js| sp.pageinstrumentation.debug.js| | 1925| 14-Apr-20| 09:06 \nsppageinstr.js| sp.pageinstrumentation.js| | 1395| 14-Apr-20| 09:06 \nsp.requestexecutor.debug.js| sp.requestexecutor.debug.js| | 100405| 14-Apr-20| 09:06 \nsp.requestexecutor.js| sp.requestexecutor.js| | 63696| 14-Apr-20| 09:06 \nsp.ribbon.debug.js| sp.ribbon.debug.js| | 361474| 14-Apr-20| 09:06 \nsp.ribbon.js| sp.ribbon.js| | 222917| 14-Apr-20| 09:06 \nsp.runtime.debug.js| sp.runtime.debug.js| | 197022| 14-Apr-20| 09:06 \nsp.runtime.js| sp.runtime.js| | 115684| 14-Apr-20| 09:06 \nsp.simpleloggermobile.debug.js| sp.simpleloggermobile.debug.js| | 40931| 14-Apr-20| 09:06 \nsp.simpleloggermobile.js| sp.simpleloggermobile.js| | 20442| 14-Apr-20| 09:06 \nsp.storefront.debug.js| sp.storefront.debug.js| | 440500| 14-Apr-20| 09:06 \nsp.storefront.js| sp.storefront.js| | 296736| 14-Apr-20| 09:06 \nsp.ui.admin.debug.js| sp.ui.admin.debug.js| | 18904| 14-Apr-20| 09:06 \nsp.ui.admin.js| sp.ui.admin.js| | 11611| 14-Apr-20| 09:06 \nsp.ui.allapps.debug.js| sp.ui.allapps.debug.js| | 45304| 14-Apr-20| 09:06 \nsp.ui.allapps.js| sp.ui.allapps.js| | 27972| 14-Apr-20| 09:06 \nsp.ui.applicationpages.calendar.debug.js| sp.ui.applicationpages.calendar.debug.js| | 278413| 14-Apr-20| 09:06 \nsp.ui.applicationpages.calendar.js| sp.ui.applicationpages.calendar.js| | 143448| 14-Apr-20| 09:06 \nsp.ui.applicationpages.debug.js| sp.ui.applicationpages.debug.js| | 11283| 14-Apr-20| 09:06 \nsp.ui.applicationpages.js| sp.ui.applicationpages.js| | 7682| 14-Apr-20| 09:06 \nsp.ui.bdcadminpages.debug.js| sp.ui.bdcadminpages.debug.js| | 16634| 14-Apr-20| 09:06 \nsp.ui.bdcadminpages.js| sp.ui.bdcadminpages.js| | 11650| 14-Apr-20| 09:06 \nspblogd.js| sp.ui.blogs.debug.js| | 51882| 14-Apr-20| 09:06 \nspblog.js| sp.ui.blogs.js| | 31202| 14-Apr-20| 09:06 \nsp.ui.combobox.debug.js| sp.ui.combobox.debug.js| | 100153| 14-Apr-20| 09:06 \nsp.ui.combobox.js| sp.ui.combobox.js| | 52056| 14-Apr-20| 09:06 \nsp.ui.controls.debug.js| sp.ui.controls.debug.js| | 58556| 14-Apr-20| 09:06 \nsp.ui.controls.js| sp.ui.controls.js| | 39727| 14-Apr-20| 09:06 \nsp.ui.dialog.debug.js| sp.ui.dialog.debug.js| | 75579| 14-Apr-20| 09:06 \nsp.ui.dialog.js| sp.ui.dialog.js| | 44112| 14-Apr-20| 09:06 \nspdiscd.js| sp.ui.discussions.debug.js| | 136669| 14-Apr-20| 09:06 \nspdisc.js| sp.ui.discussions.js| | 81745| 14-Apr-20| 09:06 \nspimgcd.js| sp.ui.imagecrop.debug.js| | 28399| 14-Apr-20| 09:06 \nspimgc.js| sp.ui.imagecrop.js| | 28399| 14-Apr-20| 09:06 \nspui_rid.js| sp.ui.relateditems.debug.js| | 29224| 14-Apr-20| 09:06 \nspui_ri.js| sp.ui.relateditems.js| | 18376| 14-Apr-20| 09:06 \nsp.ui.rte.debug.js| sp.ui.rte.debug.js| | 355959| 14-Apr-20| 09:06 \nsp.ui.rte.js| sp.ui.rte.js| | 217944| 14-Apr-20| 09:06 \nsp.ui.tileview.debug.js| sp.ui.tileview.debug.js| | 100921| 14-Apr-20| 09:06 \nsp.ui.tileview.js| sp.ui.tileview.js| | 61800| 14-Apr-20| 09:06 \nspui_tld.js| sp.ui.timeline.debug.js| | 488762| 14-Apr-20| 09:06 \nspui_tl.js| sp.ui.timeline.js| | 265916| 14-Apr-20| 09:06 \nspgantt.debug.js| spgantt.debug.js| | 192623| 14-Apr-20| 09:06 \nspgantt.js| spgantt.js| | 69725| 14-Apr-20| 09:06 \nspgridview.debug.js| spgridview.debug.js| | 7876| 14-Apr-20| 09:06 \nspgridvw.js| spgridview.js| | 4901| 14-Apr-20| 09:06 \nstart.debug.js| start.debug.js| | 185210| 14-Apr-20| 09:06 \nstart.js| start.js| | 101322| 14-Apr-20| 09:06 \nsuitelinks.debug.js| suitelinks.debug.js| | 32319| 14-Apr-20| 09:06 \nsuitelnk.js| suitelinks.js| | 13506| 14-Apr-20| 09:06 \ntimecard.debug.js| timecard.debug.js| | 37455| 14-Apr-20| 09:06 \ntimecard.js| timecard.js| | 21190| 14-Apr-20| 09:06 \nwpadder.debug.js| wpadder.debug.js| | 52865| 14-Apr-20| 09:06 \nwpadder.js| wpadder.js| | 33268| 14-Apr-20| 09:06 \nwpcm.debug.js| wpcm.debug.js| | 7521| 14-Apr-20| 09:06 \nwpcm.js| wpcm.js| | 3847| 14-Apr-20| 09:06 \nsigstore.dll| sigstore.dll| | 19888| | \nupdate_sigstore.dll| sigstore.dll| | 19888| 31-Mar-20| 05:58 \nstore.sql| store.sql| | 8074807| 13-Apr-20| 04:20 \nstore.xml| store.xml| | 8917277| 14-Apr-20| 09:13 \nstoreazure.xml| store_azure.xml| | 8917277| 14-Apr-20| 09:13 \nusagedb.sql| usagedb.sql| | 88742| 31-Mar-20| 06:01 \nusgdbup.sql| usgdbup.sql| | 88551| 31-Mar-20| 06:01 \nappassoc.asx| applicationassociations.aspx| | 5504| 31-Mar-20| 06:06 \nauthen.asx| authentication.aspx| | 13965| 31-Mar-20| 06:06 \nblkftyp.asx| blockedfiletype.aspx| | 4282| 31-Mar-20| 06:05 \ndftcntdb.asx| defaultcontentdb.aspx| | 6243| 31-Mar-20| 06:06 \nhealrepo.asx| healthreport.aspx| | 6499| 31-Mar-20| 06:07 \nincemail.asx| incomingemail.aspx| | 22663| 31-Mar-20| 06:07 \nirmadmin.asx| irmadmin.aspx| | 8804| 31-Mar-20| 06:07 \nlogusage.asx| logusage.aspx| | 14555| 31-Mar-20| 06:06 \nmetrics.asx| metrics.aspx| | 15403| 31-Mar-20| 06:06 \nofadmin.asx| officialfileadmin.aspx| | 13839| 31-Mar-20| 06:06 \nprivacy.asx| privacy.aspx| | 10182| 31-Mar-20| 06:07 \nslctcfaz.asx| selectcrossfirewallaccesszone.aspx| | 5643| 31-Mar-20| 06:07 \nsvcappcn.asx| serviceapplicationconnect.aspx| | 5027| 31-Mar-20| 06:06 \nsiteex.asx| siteandlistexport.aspx| | 12538| 31-Mar-20| 06:07 \nsitebaks.asx| sitebackuporexportstatus.aspx| | 10389| 31-Mar-20| 06:06 \nsitecbac.asx| sitecollectionbackup.aspx| | 10764| 31-Mar-20| 06:06 \nsitequot.asx| sitequota.aspx| | 24455| 31-Mar-20| 06:06 \nspscrstg.asx_0002| spsecuritysettings.aspx| | 7731| 31-Mar-20| 06:06 \nunatcdb.asx| unattacheddbselect.aspx| | 6322| 31-Mar-20| 06:07 \nuser_solution.asx| usersolutions.aspx| | 9571| 31-Mar-20| 06:06 \nversions.asx| versions.aspx| | 37378| 31-Mar-20| 06:24 \nofadmin.aspx_tenantadmin| ta_officialfileadmin.aspx| | 11593| 31-Mar-20| 06:13 \nowstimer.exe_0001| owstimer.exe| 16.0.10359.20000| 81008| 14-Apr-20| 09:08 \nmicrosoft.extensions.dependencyinjection.abstractions.1.0.0.dll| microsoft.extensions.dependencyinjection.abstractions.dll| 1.0.0.20622| 35720| | \nupdate_microsoft.extensions.dependencyinjection.abstractions.1.0.0.dll| microsoft.extensions.dependencyinjection.abstractions.dll| 1.0.0.20622| 35720| 7-Apr-20| 05:14 \nmicrosoft.extensions.dependencyinjection.1.0.0.dll| microsoft.extensions.dependencyinjection.dll| 1.0.0.20622| 37472| | \nupdate_microsoft.extensions.dependencyinjection.1.0.0.dll| microsoft.extensions.dependencyinjection.dll| 1.0.0.20622| 37472| 7-Apr-20| 05:14 \nmicrosoft.odata.core.7.0.0.dll| microsoft.odata.core.dll| 7.0.0.0| 1395624| | \nupdate_microsoft.odata.core.7.0.0.dll| microsoft.odata.core.dll| 7.0.0.0| 1395624| 7-Apr-20| 05:13 \nmicrosoft.odata.edm.7.0.0.dll| microsoft.odata.edm.dll| 7.0.0.0| 780184| | \nupdate_microsoft.odata.edm.7.0.0.dll| microsoft.odata.edm.dll| 7.0.0.0| 780184| 4-Apr-20| 08:02 \nmicrosoft.spatial.7.0.0.dll| microsoft.spatial.dll| 7.0.0.0| 135784| | \nupdate_microsoft.spatial.7.0.0.dll| microsoft.spatial.dll| 7.0.0.0| 135784| 10-Apr-20| 11:05 \nmicrosoft.vroom.sharepoint.dll| microsoft.vroom.sharepoint.dll| 16.0.10359.20000| 623528| 14-Apr-20| 09:13 \nsystem.collections.immutable.1.2.0.dll| system.collections.immutable.dll| 1.0.24212.01| 174000| | \nupdate_system.collections.immutable.1.2.0.dll| system.collections.immutable.1.2.0.dll| 1.0.24212.01| 174000| 7-Apr-20| 05:14 \nsystem.web.http.owin.5.2.3.dll| system.web.http.owin.dll| 5.2.30128.0| 64400| | \nupdate_system.web.http.owin.5.2.3.dll| system.web.http.owin.dll| 5.2.30128.0| 64400| 7-Apr-20| 05:14 \nsystem.web.odata.6.0.0.dll| system.web.odata.dll| 6.0.40914.0| 779672| | \nupdate_system.web.odata.6.0.0.dll| system.web.odata.dll| 6.0.40914.0| 779672| 7-Apr-20| 05:13 \nspwriter.exe_0001| spwriter.exe| 16.0.10359.20000| 51128| 14-Apr-20| 09:13 \nstswel.dll| stswel.dll| 16.0.10359.20000| 3669416| 14-Apr-20| 09:13 \nstswfacb.dll| microsoft.sharepoint.workflowactions.dll| 16.0.10359.20000| 312752| 14-Apr-20| 09:05 \nstswfact.dll| microsoft.sharepoint.workflowactions.dll| 16.0.10359.20000| 312752| 14-Apr-20| 09:05 \nsts.workflows.dll| microsoft.sharepoint.workflows.dll| 16.0.10359.20000| 65464| 14-Apr-20| 09:13 \nie50up.debug.js| ie50up.debug.js| | 155104| 14-Apr-20| 09:09 \nie50up.js| ie50up.js| | 81713| 14-Apr-20| 09:09 \nie55up.debug.js| ie55up.debug.js| | 154298| 14-Apr-20| 09:08 \nie55up.js| ie55up.js| | 81174| 14-Apr-20| 09:09 \nnon_ie.debug.js| non_ie.debug.js| | 102961| 14-Apr-20| 09:09 \nnon_ie.js| non_ie.js| | 60386| 14-Apr-20| 09:09 \nbpstd.debug.js| bpstd.debug.js| | 8194| 14-Apr-20| 09:13 \nbpstd.js| bpstd.js| | 4666| 14-Apr-20| 09:13 \nctp.debug.js| ctp.debug.js| | 7940| 14-Apr-20| 09:13 \nctp.js| ctp.js| | 4221| 14-Apr-20| 09:13 \ncvtp.debug.js| cvtp.debug.js| | 5066| 14-Apr-20| 09:13 \ncvtp.js| cvtp.js| | 2702| 14-Apr-20| 09:13 \nitp.debug.js| itp.debug.js| | 13120| 14-Apr-20| 09:13 \nitp.js| itp.js| | 9812| 14-Apr-20| 09:13 \nxtp.debug.js| xtp.debug.js| | 3605| 14-Apr-20| 09:13 \nxtp.js| xtp.js| | 1799| 14-Apr-20| 09:13 \nosrv_sandbox.dll| microsoft.office.server.sandbox.dll| 16.0.10359.20000| 761280| 14-Apr-20| 09:10 \nmicrosoft.office.web.sandbox.dll| microsoft.office.web.sandbox.dll| 16.0.10359.20000| 761480| 14-Apr-20| 09:10 \nsts_sandbox.dll| microsoft.sharepoint.sandbox.dll| 16.0.10359.20000| 761272| 14-Apr-20| 09:10 \nvisfilt.dll.x64| visfilt.dll| 16.0.10359.20000| 6132648| 14-Apr-20| 09:13 \nvisioserver.vutils.dll| vutils.dll| 16.0.10359.20000| 3139680| 14-Apr-20| 09:11 \noffice365icons.eot| office365icons.eot| | 84528| | \noffice365icons_1.eot| office365icons.eot| | 84528| 1-Apr-20| 03:19 \nsts_odspnextnewux1f1ebb360d2bde34a50cf953c975391e| createsite.js| | 1070869| 9-Apr-20| 05:11 \nsts_odspnextnewux1efa61166de43c71668b949c99f0686b| listitemformdeferred.js| | 2258128| 9-Apr-20| 05:11 \nsts_odspnextnewuxcd202787c8a8cb28e2c71ee818995ab3| listitemformexecutors.js| | 618553| 9-Apr-20| 05:11 \nsts_odspnextnewuxe8f363779e230efb9d852eceace8ab24| listitemformreactcontrols.js| | 199550| 1-Apr-20| 04:15 \nsts_odspnextnewux71d8b89e6d9d95995887b0a27dbc8f99| listitemformscenario.js| | 882360| 9-Apr-20| 05:11 \nsts_odspnextnewuxbe3313501487c79fe05e26c262deaaa9| createsite.json| | 43509| 9-Apr-20| 05:11 \nsts_odspnextnewux73bf67ca708ed0b9bbee05da7d4ab95b| listitemform.json| | 178731| 9-Apr-20| 05:11 \nodbonedrive.json| odbonedrive.json| | 359241| 9-Apr-20| 05:11 \nsts_odspnextnewux0caa67c96a8a488d88a0b64e58cf6219| recyclebin.json| | 181109| 9-Apr-20| 05:11 \nsts_odspnextnewux82ec74261e20424f9653d60d8846afce| sitehub.json| | 223234| 9-Apr-20| 05:11 \nsts_odspnextnewuxc2feb86763199de55a499729d395cb83| splist.json| | 299044| 9-Apr-20| 05:11 \nsts_odspnextnewuxc4da3cf2e6b1ad11477e32ac2c90cea6| odbdeferred.js| | 2441224| 9-Apr-20| 05:11 \nsts_odspnextnewux308f9878bc3bd35d6e7c02477ff10b6f| odbdeferredcontrols.js| | 688575| 1-Apr-20| 04:15 \nsts_odspnextnewux9e5f0d05cada29614b74c28d9065e102| odbexecutors.js| | 962203| 9-Apr-20| 05:11 \nsts_odspnextnewuxc563bd732bac9201f0dcad0747118e6b| odbfiles.js| | 839451| 1-Apr-20| 04:15 \nsts_odspnextnewux8c0380eb9a20542616b7c1feeac0f995| odbonedrive.js| | 678591| 9-Apr-20| 05:11 \nsts_odspnextnewux6e3d88bd0f1447b264307d9749f011bc| odboneup.js| | 354486| 1-Apr-20| 04:15 \nsts_odspnextnewux4a79707daf48fcca13da03638a9e77b8| odbreactcontrols.js| | 591530| 1-Apr-20| 04:15 \nsts_odspnextnewux57f35b229017c79fd2db2964ca66fbca| odbsites.js| | 148454| 1-Apr-20| 04:15 \nsts_odspnextnewuxdf192495e18fd01667a80b7f5657d569| odbtiles.js| | 258934| 1-Apr-20| 04:15 \nsts_odspnextnewux1a2b15ed274bbfbba6d5eaa8be1efc60| odbuploadmanager.js| | 64324| 1-Apr-20| 04:15 \nsts_odspnextnewux795d12a100cd0691f928c64b88b80240| odrestore.js| | 368703| 1-Apr-20| 04:15 \nsts_odspnextnewuxee5697f761f94ca16ffd86a4ef02d1a8| recyclebindeferred.js| | 2823669| 9-Apr-20| 05:11 \nsts_odspnextnewux759803f73d82cd669caf6d930c79a020| recyclebinexecutors.js| | 668838| 9-Apr-20| 05:11 \nsts_odspnextnewux736776bec9f6c6dad2f7dda661dc3dfd| recyclebinreactcontrols.js| | 313676| 9-Apr-20| 05:11 \nsts_odspnextnewuxb8931dbbdb97beb330defb6bad1ae332| sitehubdeferred.js| | 2415121| 9-Apr-20| 05:11 \nsts_odspnextnewuxbed2e8db2e84613293dad61e0584dfb2| sitehubexecutors.js| | 759621| 9-Apr-20| 05:11 \nsts_odspnextnewuxafb6081087eefbfe800401ef617122bd| sitehubreactcontrolsbeforeplt.js| | 1435822| 9-Apr-20| 05:11 \nsts_odspnextnewux72bfe35ac1f8fee6cf37ba0be87c481a| sitehubreactcontrolsdeferred.js| | 40363| 1-Apr-20| 04:15 \nsts_odspnextnewuxd4f616ce0ce5d815121f4cb904bab0b2| splist.js| | 837098| 1-Apr-20| 04:15 \nsts_odspnextnewux75199cdb9d900d5ff11f7782399cb17f| splistdeferred.js| | 2280789| 9-Apr-20| 05:11 \nsts_odspnextnewux506c878c67f39538b69ab51117ced233| splistdeferredexpress.js| | 1642998| 9-Apr-20| 05:11 \nsts_odspnextnewuxdc9ebd6c43507fcad50632f22cb166c4| splistexecutors.js| | 386520| 9-Apr-20| 05:11 \nsts_odspnextnewux643043514490c475b8e63daa45587cfb| splistreactcontrolsbeforeplt.js| | 262322| 9-Apr-20| 05:11 \nsts_odspnextnewux95c14b220e8e6a345ca52833f517b678| splistreactcontrolsdeferred.js| | 286632| 1-Apr-20| 04:16 \nsts_odspnextnewux30484b0717864b439efabcb4caaf6538| spoapp.js| | 272957| 1-Apr-20| 04:16 \nsts_odspnextnewuxb680d3a8e2013810dae29dafe4d75340| spofiles.js| | 610823| 1-Apr-20| 04:16 \nsts_odspnextnewuxceea7ee2c5681d1ddacc2916754e6b3b| spooneup.js| | 377558| 1-Apr-20| 04:16 \nsts_odspnextnewuxa1bba3f539805635ed1b4d1828dbd548| spouploadmanager.js| | 70861| 1-Apr-20| 04:16 \nsts_spclientnewux11247c610eb2b35fec6b7d74a26c38f0| 0.0.js| | 398423| 9-Apr-20| 05:11 \nsts_spclientnewuxe5f4fb44132db455bfc5684abc91d769| 0.contentrollupwebpart-propertypanesettings.js| | 13836| 9-Apr-20| 05:11 \nsts_spclientnewuxf8f9524d7aede8aa27335bd307d3283c| 0.developer-tools.js| | 482322| 9-Apr-20| 05:11 \nsts_spclientnewux8f54e1232a604b66101d785f00e07c5d| 0.image-gallery-edit-mode.js| | 39729| 9-Apr-20| 05:11 \nsts_spclientnewux10b60c752308e4797414cc1592352c08| 0.page-picker-component.js| | 135789| 9-Apr-20| 05:11 \nsts_spclientnewuxe567272b5c2a010aa70b17e8c313858a| 0.quick-links-property-pane.js| | 13168| 9-Apr-20| 05:11 \nsts_spclientnewux5b94fcc774f1d14f356a8939ad0c76cf| 0.sp-filepickercontrol.js| | 286022| 9-Apr-20| 05:11 \nsts_spclientnewux1a0dd8556ea12fdfdce46c1b97bf966d| 0.sp-pages-panels.js| | 635853| 9-Apr-20| 05:11 \nsts_spclientnewuxf51e90850f93328c38d84d1e68d27fb3| 0.sp-people-contact-card.js| | 13725| 9-Apr-20| 05:11 \nsts_spclientnewux892018044204a190e9f581edcd620dae| 0.sp-rte-propertypane.js| | 39875| 9-Apr-20| 05:11 \nsts_spclientnewuxe8964dd3d437ce4f33115b3bc0557c72| 0.sp-webpart-base-propertypane.js| | 130210| 9-Apr-20| 05:11 \nsts_spclientnewux6bcd61d2c5362c6320b3a14b80a5b5a8| 0.toolbox.js| | 34732| 9-Apr-20| 05:11 \nsts_spclientnewux48cae7c08b68c5b16fa6bb6d1d734fe3| 0ef418ba-5d19-4ade-9db0-b339873291d0.json| | 12533| 9-Apr-20| 05:11 \nsts_spclientnewux0c482d383b518aa8956558dbdc75bd48| 1.debug-prompt-components.js| | 342352| 9-Apr-20| 05:11 \nsts_spclientnewuxb2f3b0a56c9ef61cd2b5cfa27b5fc37e| 1.people-property-pane.js| | 2745| 9-Apr-20| 05:11 \nsts_spclientnewuxe45badc655897ae1f90884f5a1a97ee7| 1.sp-pages-comments.js| | 99849| 9-Apr-20| 05:11 \nsts_spclientnewuxb2c3d8de1fdcb7cca7c4b2044da486f5| 1.sp-title-region-webpart-edit-mode.js| | 5423| 9-Apr-20| 05:11 \nsts_spclientnewux62046735201d3091111f28556666e654| 1.sp-webpart-base-maintenancemode.js| | 4830| 9-Apr-20| 05:11 \nsts_spclientnewuxf9441b622f01689f522ab5fb5fe73335| 1.twitter-web-part-property-pane-configuration.js| | 4502| 9-Apr-20| 05:11 \nsts_spclientnewux2640b3a11359099d8bdf5c5c5f8d0e69| 10.sp-pages-search.js| | 1771217| 9-Apr-20| 05:11 \nsts_spclientnewuxa36a04dce9a2a71bf262086728c8fca4| 12.sp-news-digest-layout-component.js| | 78511| 9-Apr-20| 05:11 \nsts_spclientnewux0abc9921c94a0185a26543546fe69bf9| 13.sp-command-bar.js| | 85479| 9-Apr-20| 05:11 \nsts_spclientnewux5fc507cbbaf792d92d7c965bf98229fb| 14.sp-pages-news.js| | 33108| 9-Apr-20| 05:11 \nsts_spclientnewux0ac00e19bb36ceac5b16c783f9c57697| 16.sp-pages-sitesseeall.js| | 10059| 9-Apr-20| 05:11 \nsts_spclientnewux34bd612300838bb534ab17b955244e64| 17.sp-pages-seeall.js| | 10003| 9-Apr-20| 05:11 \nsts_spclientnewux703f83fa82314d3646b6336ccfc68c7d| 18.sp-pages-firstrun.js| | 21481| 9-Apr-20| 05:11 \nsts_spclientnewux7ba0584c61764c54362d49e256636a60| 2.herowebpart-propertypaneconfiguration.js| | 20379| 9-Apr-20| 05:11 \nsts_spclientnewux4ae937081b814e011b3a30f8781ff6a0| 2.sp-list-webpart-setup.js| | 4226| 9-Apr-20| 05:11 \nsts_spclientnewuxd27a762a6f595ea2f447ab2d8ec565da| 2.sp-pages-social.js| | 50013| 9-Apr-20| 05:11 \nsts_spclientnewuxe24fd72f1cbfb12913e16ac1df4cdcb5| 20745d7d-8581-4a6c-bf26-68279bc123fc.json| | 12654| 9-Apr-20| 05:11 \nsts_spclientnewux52b9b523aa83665cd001252b93e94ac1| 2161a1c6-db61-4731-b97c-3cdb303f7cbb.json| | 13230| 9-Apr-20| 05:11 \nsts_spclientnewuxc54eccabfa9009b899cb953abfdf678f| 23.sp-pages-planner.js| | 3542| 9-Apr-20| 05:11 \nsts_spclientnewuxf6dfe077c4098d2785be12a31e5473d2| 24.sp-pages-mobileupsellview.js| | 1782| 9-Apr-20| 05:11 \nsts_spclientnewuxf6f7df5704468d218c5f3b26fe863bd9| 243166f5-4dc3-4fe2-9df2-a7971b546a0a.json| | 6971| 9-Apr-20| 05:11 \nsts_spclientnewuxc81847f87b94153a324bd86419f281a7| 25.sp-pages-app.js| | 1875| 9-Apr-20| 05:11 \nsts_spclientnewuxffbcf313abc7966e7e6a8b536675bbe5| 275c0095-a77e-4f6d-a2a0-6a7626911518.json| | 21256| 9-Apr-20| 05:11 \nsts_spclientnewux4324d9c2f2457e23dc7ffb0d040b05b8| 28.editnavchunk.js| | 59095| 1-Apr-20| 04:16 \nsts_spclientnewux1e6815f76323c00fbafeb7b4dc9cc99e| 29.sp-pages-newpagedialog.js| | 36075| 9-Apr-20| 05:11 \nsts_spclientnewux36bc50758605996dd2de21816e72ee1b| 2ba60960-c928-4ae5-9bb2-f40c17c611b8.json| | 13174| 9-Apr-20| 05:11 \nsts_spclientnewux0ebe3b2589e383ae358631657a956c04| 2e57bdfd-b419-4536-8fc1-e0681be4c1a6.json| | 13203| 9-Apr-20| 05:11 \nsts_spclientnewux263fefdcdce7237f0c86c5e707b0cb41| 3.sp-imageeditcontrol.js| | 27070| 9-Apr-20| 05:11 \nsts_spclientnewux97cf7a0b7f088024120f36c9581e9186| 3.sp-pages-events.js| | 203036| 9-Apr-20| 05:11 \nsts_spclientnewux8031c437dabae71b5524cf06f87980ce| 31.sp-pages-pagestatusnotifier.js| | 2550| 9-Apr-20| 05:11 \nsts_spclientnewuxb86635d3446dedd3ac668ca110311406| 31e9537e-f9dc-40a4-8834-0e3b7df418bc.json| | 14677| 9-Apr-20| 05:11 \nsts_spclientnewux7d2dc45432f95b86fd103556238966cc| 32.sp-pages-newsdigest-navbar.js| | 2232| 9-Apr-20| 05:11 \nsts_spclientnewux07d34bca797f60c1a73b0d1676b500e5| 39c4c1c2-63fa-41be-8cc2-f6c0b49b253d.json| | 12263| 9-Apr-20| 05:11 \nsts_spclientnewux58e18b3d801d33325553bb31ac88885c| 4.image-gallery-light-box.js| | 6463| 9-Apr-20| 05:11 \nsts_spclientnewuxe2421af58d3d88a988faa8ba86b4adba| 4.sp-pages-sharebyemail.js| | 77679| 9-Apr-20| 05:11 \nsts_spclientnewux342db9533a3215a3913c429babe7abdc| 46698648-fcd5-41fc-9526-c7f7b2ace919.json| | 13806| 9-Apr-20| 05:11 \nsts_spclientnewux158a628d96eef5d6058dbfae15012eca| 490d7c76-1824-45b2-9de3-676421c997fa.json| | 15352| 9-Apr-20| 05:11 \nsts_spclientnewuxfb61b8977a1e1fb434df06105e16277f| 5.sp-pages-navigation.js| | 19539| 9-Apr-20| 05:11 \nsts_spclientnewux4986186266f727199b59946626fb8518| 544dd15b-cf3c-441b-96da-004d5a8cea1d.json| | 13834| 9-Apr-20| 05:11 \nsts_spclientnewuxb907f5fcee962e6ea16d517b503603f4| 6410b3b6-d440-4663-8744-378976dc041e.json| | 15198| 9-Apr-20| 05:11 \nsts_spclientnewux9947ff60b8287e06021dd8602e52a729| 6676088b-e28e-4a90-b9cb-d0d0303cd2eb.json| | 14484| 9-Apr-20| 05:11 \nsts_spclientnewux87639a606cb4eff65fc640a791358fab| 71c19a43-d08c-4178-8218-4df8554c0b0e.json| | 14977| 9-Apr-20| 05:11 \nsts_spclientnewuxa2e20ea074942a4b9cd5953a7cf70276| 7f718435-ee4d-431c-bdbf-9c4ff326f46e.json| | 13553| 9-Apr-20| 05:11 \nsts_spclientnewux7b48f61cb957c98d82358746f12289b0| 8654b779-4886-46d4-8ffb-b5ed960ee986.json| | 12583| 9-Apr-20| 05:11 \nsts_spclientnewux1496efe075e30075e96a884d8a074cd1| 893a257e-9c92-49bc-8a36-2f6bb058da34.json| | 141746| 9-Apr-20| 05:11 \nsts_spclientnewuxc5a328833cf912cc5b9867a481094c28| 8c88f208-6c77-4bdb-86a0-0c47b4316588.json| | 12200| 9-Apr-20| 05:11 \nsts_spclientnewuxa7df2052c2e0346723a7875f2e78139d| 9.sp-pages-teamstab.js| | 111208| 9-Apr-20| 05:11 \nsts_spclientnewuxcace392aa7eeb0215447d8373ed109d9| 91a50c94-865f-4f5c-8b4e-e49659e69772.json| | 15541| 9-Apr-20| 05:11 \nsts_spclientnewux0682b2fe8e8e6f7cccca4db9a0c29990| 9d7e898c-f1bb-473a-9ace-8b415036578b.json| | 13841| 9-Apr-20| 05:11 \nsts_spclientnewux0fdddb1f7d99376230fe4d4bb49759c8| a5df8fdf-b508-4b66-98a6-d83bc2597f63.json| | 12061| 9-Apr-20| 05:11 \nsts_spclientnewuxcf9063f036a2e975629266aaa103d655| af8be689-990e-492a-81f7-ba3e4cd3ed9c.json| | 15409| 9-Apr-20| 05:11 \nsts_spclientnewuxd98a7a0da89134c14b2cda056449e632| b19b3b9e-8d13-4fec-a93c-401a091c0707.json| | 15301| 9-Apr-20| 05:11 \nsts_spclientnewux79892d83bd937bf01186bd091972e9a1| b7dd04e1-19ce-4b24-9132-b60a1c2b910d.json| | 23126| 9-Apr-20| 05:11 \nsts_spclientnewuxf5e9c8e2184df5b63ca16f1319fa7960| c4bd7b2f-7b6e-4599-8485-16504575f590.json| | 15854| 9-Apr-20| 05:11 \nsts_spclientnewux7e3c7f016142a2f71b28f9d75fc43958| c70391ea-0b10-4ee9-b2b4-006d3fcad0cd.json| | 14970| 9-Apr-20| 05:11 \nsts_spclientnewux408dd0ffcb6b1d88eceefc32163a8518| cbe7b0a9-3504-44dd-a3a3-0e5cacd07788.json| | 14194| 9-Apr-20| 05:11 \nsts_spclientnewuxe04b7ba5c57d6efdd1b3f023a9afd70f| d1d91016-032f-456d-98a4-721247c305e8.json| | 12829| 9-Apr-20| 05:11 \nsts_spclientnewuxe0de0464927d19518f48aaff08ed2ad1| daf0b71c-6de8-4ef7-b511-faae7c388708.json| | 17481| 9-Apr-20| 05:11 \nsts_spclientnewuxa08a88a1a20d60fc6fa9f6eecf78666e| embed-webpart-base.js| | 47158| 9-Apr-20| 05:11 \nsts_spclientnewux1074201167d7ccbe2841810fbf4b9ce1| i18n-utilities-bundle.js| | 91320| 9-Apr-20| 05:11 \nsts_spclientnewux1248484f0eaf072567b2270eb74e2a1f| listview-host-assembly.js| | 724423| 9-Apr-20| 05:11 \nsts_spclientnewuxa8c9aa3afb3e1858c4883c80b87b0886| sp-application-base.js| | 88591| 9-Apr-20| 05:11 \nsts_spclientnewux26dacaeae91404692b5c89ca58e6ef98| sp-bing-map-webpart-bundle.js| | 74178| 9-Apr-20| 05:11 \nsts_spclientnewuxa61f5e0f461e05cce0e0c856fdaae280| sp-blogs-webpart-bundle.js| | 138518| 9-Apr-20| 05:11 \nsts_spclientnewuxf5d396401fea052502b6aae89b8cc207| sp-canvas.js| | 304637| 9-Apr-20| 05:11 \nsts_spclientnewuxacbcfd1635aafc26d7fa34d3a4170557| sp-carousel-layout.js| | 74660| 9-Apr-20| 05:11 \nsts_spclientnewux22d4383e576bd2d0767efe61a9b0177f| sp-classic-page-assembly.js| | 1527232| 9-Apr-20| 05:11 \nsts_spclientnewux687ed0916c9953c4eb72b0f5cd6905e1| sp-compactcard-layout.js| | 26189| 9-Apr-20| 05:11 \nsts_spclientnewux3fd286c73a51e55671b2cf05ad879fe4| sp-component-layouts.js| | 192659| 9-Apr-20| 05:11 \nsts_spclientnewux6d0b88b1fc07d52bfd5ed0e7ffd2ff96| sp-component-utilities.js| | 106924| 9-Apr-20| 05:11 \nsts_spclientnewuxf9e26c8ba0232226f164fb3134158861| sp-connector-webpart.js| | 137981| 9-Apr-20| 05:11 \nsts_spclientnewuxaeab4a7dad255efb982d8cc6384a6b30| sp-contentrollup-webpart-bundle.js| | 225614| 9-Apr-20| 05:11 \nsts_spclientnewux2a2fc2a92e0cb8cd022d363ea1786ae4| sp-custommessageregion-bundle.js| | 34510| 9-Apr-20| 05:11 \nsts_spclientnewuxd14e8603d99cfdea0f8636f109640add| sp-datetimepicker.js| | 105535| 9-Apr-20| 05:11 \nsts_spclientnewux294ffd36afbed5a9fdb51794f4f3a730| sp-default-assembly.js| | 702283| 9-Apr-20| 05:11 \nsts_spclientnewuxe526f3106af18bfd9a893c145a68bea1| sp-divider-webpart-bundle.js| | 32150| 9-Apr-20| 05:11 \nsts_spclientnewux6c85212e5fd53659abdaac84362ead1f| sp-documentembed-webpart-bundle.js| | 97121| 9-Apr-20| 05:11 \nsts_spclientnewuxc67750e80ee512c39aae0f51156cc4c5| sp-embed-webparts-bundle.js| | 43199| 9-Apr-20| 05:11 \nsts_spclientnewux960f55d92c073ad967c1d41757c1f0a8| sp-events-webpart-bundle.js| | 71240| 9-Apr-20| 05:11 \nsts_spclientnewuxe983fe94f37bdad72135b55a29225aed| sp-forms-webpart-bundle.js| | 61656| 9-Apr-20| 05:11 \nsts_spclientnewuxf19a838e191127967cd29ae6b20ab799| sp-groupcalendar-webpart-bundle.js| | 133450| 9-Apr-20| 05:11 \nsts_spclientnewuxa591d003a7a8c3afca3c8688ad401ea0| sp-hero-webpart-bundle.js| | 128284| 9-Apr-20| 05:11 \nsts_spclientnewux772296c19fc27e1b6f18d28759f2ba5b| sp-html-embed.js| | 40476| 9-Apr-20| 05:11 \nsts_spclientnewux8f461cff81c07d944621f876e997777e| sp-image-gallery-webpart-bundle.js| | 81367| 9-Apr-20| 05:11 \nsts_spclientnewux2d92f617d4e9cc7ec385e0e500a3d7b2| sp-image-webpart-bundle.js| | 105611| 9-Apr-20| 05:11 \nsts_spclientnewux42e703f43e251f868d972f61dafd921e| sp-linkpreview-webpart-bundle.js| | 66341| 9-Apr-20| 05:11 \nsts_spclientnewux49b289bb50fa43774a9d4645eef75e88| sp-list-webpart-bundle.js| | 1029956| 9-Apr-20| 05:11 \nsts_spclientnewux6b8c7c4233559a13836ef1a691ba7023| sp-loader.js| | 147060| 9-Apr-20| 05:11 \nsts_spclientnewux383919f8fe3b958e524c8a635d1e2c2c| sp-loader-assembly.js| | 584557| 9-Apr-20| 05:11 \nsts_spclientnewuxe842d74f8bb0760b55d7f43f35d0d7a7| sp-newsfeed-webpart-bundle.js| | 136395| 9-Apr-20| 05:11 \nsts_spclientnewux11d2e484811a186abfb7f9a6c7275fd4| sp-newsreel-webpart-bundle.js| | 136387| 9-Apr-20| 05:11 \nsts_spclientnewuxe2e58fc5fb56b66cddf843e55ff5f992| sp-news-webpart-bundle.js| | 136209| 9-Apr-20| 05:11 \nsts_spclientnewuxc21a3246bdf5a3aa770903ed6fd493ee| sp-pages.js| | 492534| 9-Apr-20| 05:11 \nsts_spclientnewuxb3b4f7cd0e237860f1b8fdbe1372826e| sp-pages-assembly.js| | 2556971| 9-Apr-20| 05:11 \nsts_spclientnewuxb7c159038749343c1c4b0ec9f2deec4c| sp-pages-core.js| | 59295| 9-Apr-20| 05:11 \nsts_spclientnewuxb3342cfbf53938dec6fdf773f6adeebc| sp-people-webparts-bundle.js| | 163855| 9-Apr-20| 05:11 \nsts_spclientnewuxb501aed454e9ea1b719ba92103130738| sp-planner-webpart-bundle.js| | 3143147| 1-Apr-20| 04:16 \nsts_spclientnewuxea46ce84a74da087564f5d905acd4e56| sp-powerapps-webpart.js| | 24084| 9-Apr-20| 05:11 \nsts_spclientnewux22fad59d46fcfec7745b173cc20fd92d| sp-queryfilter.js| | 141706| 9-Apr-20| 05:11 \nsts_spclientnewuxec0d18f646f918f9cae4bd08ccdc09ab| sp-quickchart-webpart-bundle.js| | 255118| 9-Apr-20| 05:11 \nsts_spclientnewux0bbc1a9825e04eb5a37f62f2a09d2dbf| sp-quick-links-webpart.js| | 95055| 9-Apr-20| 05:11 \nsts_spclientnewux113384fd2f31fde205b8bf2f79ccdcd3| sp-siteactivity-webpart-bundle.js| | 194669| 9-Apr-20| 05:11 \nsts_spclientnewux2f7f2f92075f659c5926320cfab3f096| sp-sitepicker.js| | 44819| 9-Apr-20| 05:11 \nsts_spclientnewux6c3d8d275dd7351021418bffbebe3d8c| sp-spacer-webpart-bundle.js| | 44319| 9-Apr-20| 05:11 \nsts_spclientnewuxf5437647b691243399470c6a80d66804| sp-title-region-webpart.js| | 129204| 9-Apr-20| 05:11 \nsts_spclientnewuxb200a6283a80b8a6b4ee220419563723| sp-toolbox.js| | 31030| 9-Apr-20| 05:11 \nsts_spclientnewux3436740e82f30185ab432f7dbe7eed84| sp-twitter-webpart-bundle.js| | 44259| 9-Apr-20| 05:11 \nsts_spclientnewux084c8b925815606929921fa578f05539| sp-webpart-application-assembly.js| | 1522271| 9-Apr-20| 05:11 \nsts_spclientnewuxf9d542f5e7a1ffba716f8cf63efa490b| sp-webpart-base.js| | 106452| 9-Apr-20| 05:11 \nsts_spclientnewux1113dc0b40c4f62ba0b2c0cbbc272713| sp-webpart-shared.js| | 151404| 9-Apr-20| 05:11 \nsts_spclientnewuxf6f4d7aff6b346521ef692276ec4c4c6| sp-webpart-workbench.js| | 51898| 9-Apr-20| 05:11 \nsts_spclientnewux96fbeacb80b41e044617bbe3fade4c6c| sp-webpart-workbench-assembly.js| | 1916685| 9-Apr-20| 05:11 \nsts_spclientnewuxb936577a0b035ab65bc7e49bd5e6a9ab| sp-yammerembed-webpart-bundle.js| | 144166| 9-Apr-20| 05:11 \nsts_spclientnewux80dae808de3b5078b4efc4fb29865793| e377ea37-9047-43b9-8cdb-a761be2f8e09.json| | 13427| 9-Apr-20| 05:11 \nsts_spclientnewuxab7b1df6c15b0a294a30492e9ac8fae1| eb95c819-ab8f-4689-bd03-0c2d65d47b1f.json| | 14590| 9-Apr-20| 05:11 \nsts_spclientnewux8ef36081a346aba067e958bbb3d5a845| f6fdf4f8-4a24-437b-a127-32e66a5dd9b4.json| | 13425| 9-Apr-20| 05:11 \nsts_spclientnewuxcb869d957d4e64318530b63e610d75f7| f92bf067-bc19-489e-a556-7fe95f508720.json| | 18015| 9-Apr-20| 05:11 \nsts_spclientnewux2e8f0649b2b51d464fb6d12bb368a21f| spclientmanifests.json| | 842428| 9-Apr-20| 05:13 \nsts_spclientnewuxcdd2fade97e6bd1c609dafc0204d0272| office-ui-fabric-react-bundle.js| | 548871| 1-Apr-20| 05:31 \nsts_spclientnewux7ffed58434bba18019f8dc25a6921a4f| sp-a11y.js| | 18449| 1-Apr-20| 05:31 \nsts_spclientnewuxd06b22027fae659d53ac198990a2bb9a| sp-dragzone.js| | 8397| 9-Apr-20| 05:13 \nsts_spclientnewuxdce4aa0e772fc2b45853242803a8efdf| sp-flex-layout.js| | 6517| 9-Apr-20| 05:13 \nsts_spclientnewux121e8abb46c9ff351343b680014b113b| sp-hero-layout.js| | 20682| 9-Apr-20| 05:13 \nsts_spclientnewuxf915d58a5d7a11c9f0074f6a6b62e431| sp-masonry-layout.js| | 73604| 9-Apr-20| 05:13 \nsts_spclientnewuxa9691f2e24a93a05b2f0aea66ecd2b39| sp-page-context.js| | 24215| 9-Apr-20| 05:13 \nsts_spclientnewux45c199cda8c597c6b22274f4ccd6346b| tab-test-field-customizer.js| | 5718| 9-Apr-20| 05:13 \ncui.debug.js| cui.debug.js| | 657986| 14-Apr-20| 09:07 \ncui.js| cui.js| | 364464| 14-Apr-20| 09:07 \nxui.debug.js| xui.debug.js| | 45549| 14-Apr-20| 09:07 \nxui.js| xui.js| | 18952| 14-Apr-20| 09:07 \nwac.word.sword.dll| sword.dll| 16.0.10359.20000| 12657768| 14-Apr-20| 09:06 \nwdsrv.conversion.sword.dll| sword.dll| 16.0.10359.20000| 12657768| 14-Apr-20| 09:06 \nwdsrv.dll| microsoft.office.word.server.dll| 16.0.10359.20000| 376432| 14-Apr-20| 09:07 \nwdsrv.isapi.dll| microsoft.office.word.server.dll| 16.0.10359.20000| 376432| 14-Apr-20| 09:07 \ntranslationqueue.sql| translationqueue.sql| | 53164| 14-Apr-20| 09:12 \ncore.js| core.js| | 646739| 31-Mar-20| 06:12 \nifswfe.dll| microsoft.office.infopath.server.dll| 16.0.10359.20000| 3175320| 14-Apr-20| 09:06 \nifswfepriv.dll| microsoft.office.infopath.server.dll| 16.0.10359.20000| 3175320| 14-Apr-20| 09:06 \noffxml.dll| offxml.dll| 16.0.10359.20000| 412576| 14-Apr-20| 09:10 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Server 2019: May 12, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2020-05-12T07:00:00", "id": "KB4484332", "href": "https://support.microsoft.com/en-us/help/4484332", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T10:48:44", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1069](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1099](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1099>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1100](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1100>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1101](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1101>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1102](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1103>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1104](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1104>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1105](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1105>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1106](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1106>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1107](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1107>)\n**Note** To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.This public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:\n\n * SharePoint Framework (SPF_x_)\nThis public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including the following:\n * Administrative Actions Logging\n * MinRole enhancements\n * SharePoint Custom Tiles\n * Hybrid Taxonomy\n * OneDrive API for SharePoint on-premises\n * OneDrive for Business modern user experience (available to Software Assurance customers)\nThe OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.For more information, see the following Microsoft Docs articles:\n * [New features included in the November 2016 Public Update for SharePoint Server 2016 (Feature Pack 1)](<https://go.microsoft.com/fwlink/?linkid=832679>)\n * [New features included in the September 2017 Public Update for SharePoint Server 2016 (Feature Pack 2)](<https://go.microsoft.com/fwlink/?linkid=856819>)\n\n## Improvements and fixes\n\nThis security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server 2016:\n\n * Changes the \"Scheduled Start Date\" and \"Scheduled End Date\" fields in a publishing page to format the date field according to the correct locale.\n * Updates SharePoint search crawler to send GET requests by using HTTP 1.1 if the HTTP 1.0 requests fail.\n * Updates the Search word breaker to tag IP addresses and GUIDs as named entities for all languages except Korean.\n * Fixes an issue in which axis values may be truncated when you use SharePoint Server 2016 to convert a file that contains charts to PDF.\n * Fixes the HTTP 404 response error when you access site collections in newly created or mounted content databases.\n * Consider the following scenario:\n * You have a web application that uses Windows claims authentication only.\n * You create an Active Directory (AD) user that has a mail account name that's not the same as the user principal name (UPN), and the AD user doesn\u2019t exist in the UserInfo list.\n * You create a new team site and also create a custom list that has a \"person\" field.\n * You use the Quick Edit mode to set the person field to the AD user.\nIn this scenario, the AD user isn't validated.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484336>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484336 for the 64-bit version of SharePoint Enterprise 2016](<http://www.microsoft.com/download/details.aspx?familyid=4943205b-b1fc-4faf-8a2f-3f35afdb3178>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: May 12, 2020](<https://support.microsoft.com/en-us/help/20200512>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4484299](<http://support.microsoft.com/kb/4484299>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nsts2016-kb4484336-fullfile-x64-glb.exe| 192B1DF5801B06907DEA8187C2AD3A68DE9D5C22| 7722CEF51237A2A8C982602333C1133AB3B3DED676CA38BAD88246999F7A32F9 \n \nFile informationDownload the [list of files that are included in security update 4484336](<https://download.microsoft.com/download/b/3/d/b3d37e58-d2fc-4252-8d46-c93c55aa6a0c/4484336.csv>).\n\n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Server Enterprise 2016: May 12, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2020-05-12T07:00:00", "id": "KB4484336", "href": "https://support.microsoft.com/en-us/help/4484336", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T10:48:58", "description": "None\n## Summary\n\nThis security update resolves vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1069](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1101](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1101>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1103>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1104](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1104>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1105](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1105>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1106](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1106>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2020-1107](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1107>)\n**Note** To apply this security update, you must have the release version of [Service Pack 1 for Microsoft SharePoint Foundation 2013](<http://support.microsoft.com/kb/2880551>) installed on the computer.\n\n## Improvements and fixes\n\nThis security update fixes an issue that prevents the FedAuth cookie from being deleted on Chrome 80+ browsers.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/en-us/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB4484364>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 4484364 for the 64-bit version of SharePoint Foundation 2013](<http://www.microsoft.com/download/details.aspx?familyid=2a44537d-f219-46f5-9c20-c5455b5ed61c>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see [security update deployment information: May 12, 2020](<https://support.microsoft.com/en-us/help/20200512>).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4484321](<http://support.microsoft.com/kb/4484321>).\n\n### File hash information\n\nFile name| SHA1 hash| SHA256 hash \n---|---|--- \nsts2013-kb4484364-fullfile-x64-glb.exe| DBA39166569DE8B703BD24FDE3430740C93FA03E| C40141D4905468A9B3C1FEBDD2641286C4432F554B256941CCACF2054D046CE4 \n \nFile informationThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n## \n\n__\n\nFor all supported x64-based versions of SharePoint Foundation 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmicrosoft.cobaltcore.dll| microsoft.cobaltcore.dll| 15.0.4991.1000| 1211112| 15-Apr-20| 07:52 \ncsisrv.dll| csisrv.dll| 15.0.5233.1000| 1410656| 15-Apr-20| 07:52 \ncsisrvexe.exe| csisrvexe.exe| 15.0.5233.1000| 203664| 15-Apr-20| 07:52 \nonfda.dll| onfda.dll| 15.0.5233.1000| 2151312| 15-Apr-20| 07:52 \njsapiextensibilitymanager.debug.js| jsapiextensibilitymanager.debug.js| | 20163| 15-Apr-20| 07:52 \nganttsharepointapishim.generated.debug.js| ganttapishim.generated.debug.js| | 6812| 15-Apr-20| 07:52 \nganttsharedapi.generated.debug.js| ganttsharedapi.generated.debug.js| | 4617| 15-Apr-20| 07:52 \ntimelinesharepointapishim.generated.debug.js| timelineapishim.generated.debug.js| | 1842| 15-Apr-20| 07:52 \ntimelinesharedapi.generated.debug.js| timelinesharedapi.generated.debug.js| | 3420| 15-Apr-20| 07:52 \nmsoidclil.dll| msoidclil.dll| 7.250.4556.0| 1446248| 15-Apr-20| 07:51 \nmsoidclil.dll.x64| msoidclil.dll| 7.250.4556.0| 1446248| 15-Apr-20| 07:51 \nmsoidres.dll| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-20| 07:51 \nmsoidres.dll.x64| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-20| 07:51 \nmsoidclil.dll| msoidclil.dll| 7.250.4556.0| 1220456| 15-Apr-20| 07:51 \nmsoidclil.dll.x86| msoidclil.dll| 7.250.4556.0| 1220456| 15-Apr-20| 07:51 \nmsoidres.dll| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-20| 07:51 \nmsoidres.dll.x86| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-20| 07:51 \ncompat.bro| compat.browser| | 14781| 15-Apr-20| 07:52 \nmicrosoft.naturallanguage.keywordextraction.resources.en.dll| microsoft.naturallanguage.keywordextraction.resources.dll| 15.0.5155.1000| 2752624| 15-Apr-20| 07:52 \ndevdash15.png| devdash15.png| | 699| 16-Apr-20| 02:36 \ndevsitegettingstarted.png| devsitegettingstarted.png| | 4798| 16-Apr-20| 02:36 \ngettingstarted.png| gettingstarted.png| | 4260| 16-Apr-20| 02:36 \ngettingstartedwithappcatalogsite.png| gettingstartedwithappcatalogsite.png| | 1518| 16-Apr-20| 02:36 \nspcommon.png| spcommon.png| | 19434| 16-Apr-20| 02:36 \nspimn.png| spimn.png| | 4248| 16-Apr-20| 02:36 \nspnav.png| spnav.png| | 651| 16-Apr-20| 02:36 \nsproaming.png| sproaming.png| | 8717| 16-Apr-20| 02:36 \nspstorefront.png| spstorefront.png| | 4785| 16-Apr-20| 02:36 \nspstorefrontbkg.png| spstorefrontbkg.png| | 239| 16-Apr-20| 02:36 \nacatrb16.png| stsappcatalogribbon16x16.png| | 475| 16-Apr-20| 02:36 \nacatrb32.png| stsappcatalogribbon32x32.png| | 790| 16-Apr-20| 02:36 \nattach16.png| attach16.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1025| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1026| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1027| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1028| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1029| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1030| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1031| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1032| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1033| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1035| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1036| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1037| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1038| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1040| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1041| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1042| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1043| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1044| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1045| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1046| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1048| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1049| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1050| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1051| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1053| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1054| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1055| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1057| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1058| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1060| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1061| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1062| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1063| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1066| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1069| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1071| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1081| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1086| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1087| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1106| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_1110| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_2052| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_2070| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_2074| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_2108| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_3082| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.112_16_n.png_3098| 112_16_n.16x16x32.png| | 261| 16-Apr-20| 02:36 \nmb_taskhome.png| mb_taskhome.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1025| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1026| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1027| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1028| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1029| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1030| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1031| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1032| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1033| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1035| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1036| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1037| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1038| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1040| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1041| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1042| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1043| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1044| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1045| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1046| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1048| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1049| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1050| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1051| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1053| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1054| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1055| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1057| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1058| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1060| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1061| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1062| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1063| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1066| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1069| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1071| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1081| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1086| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1087| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1106| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_1110| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_2052| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_2070| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_2074| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_2108| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_3082| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nwac.livebooks.notetags.intl.23_16_n.png_3098| 23_16_n.16x16x32.png| | 266| 16-Apr-20| 02:36 \nsz256_icaccdb.png| 256_icaccdb.png| | 3163| 16-Apr-20| 02:36 \nsz256_icdocm.png| 256_icdocm.png| | 4691| 16-Apr-20| 02:36 \nsz256_icdocx.png| 256_icdocx.png| | 3496| 16-Apr-20| 02:36 \nsz256_icdotm.png| 256_icdotm.png| | 4571| 16-Apr-20| 02:36 \nsz256_icdotx.png| 256_icdotx.png| | 3286| 16-Apr-20| 02:36 \nsz256_icmpd.png| 256_icmpd.png| | 2843| 16-Apr-20| 02:36 \nsz256_icmpp.png| 256_icmpp.png| | 2920| 16-Apr-20| 02:36 \nsz256_icmpt.png| 256_icmpt.png| | 2840| 16-Apr-20| 02:36 \nsz256_icnotebk.png| 256_icnotebk.png| | 2801| 16-Apr-20| 02:36 \nsz256_icodp.png| 256_icodp.png| | 4326| 16-Apr-20| 02:36 \nsz256_icods.png| 256_icods.png| | 4778| 16-Apr-20| 02:36 \nsz256_icodt.png| 256_icodt.png| | 4894| 16-Apr-20| 02:36 \nsz256_icone.png| 256_icone.png| | 2553| 16-Apr-20| 02:36 \nsz256_iconp.png| 256_iconp.png| | 2601| 16-Apr-20| 02:36 \nsz256_icont.png| 256_icont.png| | 2801| 16-Apr-20| 02:36 \nsz256_icpotm.png| 256_icpotm.png| | 4812| 16-Apr-20| 02:36 \nsz256_icpotx.png| 256_icpotx.png| | 3571| 16-Apr-20| 02:36 \nsz256_icpps.png| 256_icpps.png| | 4436| 16-Apr-20| 02:36 \nsz256_icppsm.png| 256_icppsm.png| | 5074| 16-Apr-20| 02:36 \nsz256_icppsx.png| 256_icppsx.png| | 3888| 16-Apr-20| 02:36 \nsz256_icpptm.png| 256_icpptm.png| | 4916| 16-Apr-20| 02:36 \nsz256_icpptx.png| 256_icpptx.png| | 3721| 16-Apr-20| 02:36 \nsz256_icpub.png| 256_icpub.png| | 2844| 16-Apr-20| 02:36 \nsz256_icvdx.png| 256_icvdx.png| | 4317| 16-Apr-20| 02:36 \nsz256_icvsx.png| 256_icvsx.png| | 2932| 16-Apr-20| 02:36 \nsz256_icvtx.png| 256_icvtx.png| | 4256| 16-Apr-20| 02:36 \nsz256_icxlsb.png| 256_icxlsb.png| | 3236| 16-Apr-20| 02:36 \nsz256_icxlsm.png| 256_icxlsm.png| | 4694| 16-Apr-20| 02:36 \nsz256_icxltm.png| 256_icxltm.png| | 4561| 16-Apr-20| 02:36 \nsz256_icxltx.png| 256_icxltx.png| | 3227| 16-Apr-20| 02:36 \nsz256_icxsn.png| 256_icxsn.png| | 2466| 16-Apr-20| 02:36 \naddhero.20x20x32.png| addhero.20x20x32.png| | 437| 16-Apr-20| 02:36 \naddimagecamera.11x11x32.png| addimagecamera.11x11x32.png| | 236| 16-Apr-20| 02:36 \naddimagecamera.16x16x32.png| addimagecamera.16x16x32.png| | 289| 16-Apr-20| 02:36 \naddlink.11x11x32.png| addlink.11x11x32.png| | 210| 16-Apr-20| 02:36 \naddlink.16x16x32.png| addlink.16x16x32.png| | 267| 16-Apr-20| 02:36 \naddr_getmap.16x16x32.png| addr_getmap.16x16x32.png| | 603| 16-Apr-20| 02:36 \naddrbook.png| addressbook.png| | 235| 16-Apr-20| 02:36 \naddtasktotimeline.png| addtasktotimeline.png| | 236| 16-Apr-20| 02:36 \npwa.images.addtasktotimeline.png| addtasktotimeline.png| | 236| 16-Apr-20| 02:36 \nannouncements.11x11x32.png| announcements.11x11x32.png| | 320| 16-Apr-20| 02:36 \naskmeaboutupdated.11x11x32.png| askmeaboutupdated.11x11x32.png| | 199| 16-Apr-20| 02:36 \nattractmodefollowstar.128x128x32.png| attractmodefollowstar.128x128x32.png| | 1398| 16-Apr-20| 02:36 \naudiopreview.png| audiopreview.png| | 13196| 16-Apr-20| 02:36 \nbirthday.11x11x32.png| birthday.11x11x32.png| | 156| 16-Apr-20| 02:36 \nblogabout96.png| blogabout96.png| | 1390| 16-Apr-20| 02:36 \ncancelglyph.16x16x32.png| cancelglyph.16x16x32.png| | 183| 16-Apr-20| 02:36 \ncentraladmin_apps.48x48x32.png| centraladmin_apps.48x48x32.png| | 585| 16-Apr-20| 02:36 \ncentraladmin_apps_appmanagement.32x32x32.png| centraladmin_apps_appmanagement.32x32x32.png| | 721| 16-Apr-20| 02:36 \ncentraladmin_apps_marketplace.32x32x32.png| centraladmin_apps_marketplace.32x32x32.png| | 515| 16-Apr-20| 02:36 \ncentraladmin_office365.32x32x24.png| centraladmin_office365.32x32x24.png| | 395| 16-Apr-20| 02:36 \ncentraladmin_office365.48x48x24.png| centraladmin_office365.48x48x24.png| | 546| 16-Apr-20| 02:36 \nchecknames.png| checknames.png| | 379| 16-Apr-20| 02:36 \ncoauth_placeholderneedrefresh.16x16x32.png| coauth_placeholderneedrefresh.16x16x32.png| | 283| 16-Apr-20| 02:36 \ncoauth_placeholderneedrefresh.24x24x32.png| coauth_placeholderneedrefresh.24x24x32.png| | 378| 16-Apr-20| 02:36 \ncommentcollapse12.png| commentcollapse12.png| | 164| 16-Apr-20| 02:36 \ncommentcollapse12rtl.png| commentcollapse12rtl.png| | 166| 16-Apr-20| 02:36 \ncommentexpand12.png| commentexpand12.png| | 238| 16-Apr-20| 02:36 \ncommentexpand12rtl.png| commentexpand12rtl.png| | 222| 16-Apr-20| 02:36 \ndeletefilterglyph.png| deletefilterglyph.png| | 352| 16-Apr-20| 02:36 \ndisableddeletefilterglyph.png| disableddeletefilterglyph.png| | 352| 16-Apr-20| 02:36 \ndwnarsml.png| downarrowsmall.11x7x32.png| | 272| 16-Apr-20| 02:36 \necbtn.png| ecbbutton.png| | 132| 16-Apr-20| 02:36 \necbtnr.png| ecbbuttonrtl.png| | 118| 16-Apr-20| 02:36 \nellipsis.11x11x32.png| ellipsis.11x11x32.png| | 140| 16-Apr-20| 02:36 \nellipsis.16x16x32.png| ellipsis.16x16x32.png| | 161| 16-Apr-20| 02:36 \nerrorbck.png| errorbck.png| | 318| 16-Apr-20| 02:36 \nexit.png| exit.png| | 249| 16-Apr-20| 02:36 \nexit.png_14| exit.png| | 249| 16-Apr-20| 02:36 \nfirstrundocmove48.png| firstrundocmove48.png| | 834| 16-Apr-20| 02:36 \nfirstrunfoldersync48.png| firstrunfoldersync48.png| | 816| 16-Apr-20| 02:36 \nfirstrunfollow48.png| firstrunfollow48.png| | 1262| 16-Apr-20| 02:36 \nfirstrunmobile48.png| firstrunmobile48.png| | 530| 16-Apr-20| 02:36 \nfirstrunprivacyemail48.png| firstrunprivacyemail48.png| | 1070| 16-Apr-20| 02:36 \nfirstrunprivacysettings48.png| firstrunprivacysettings48.png| | 1117| 16-Apr-20| 02:36 \nfirstrunupdateprofile48.png| firstrunupdateprofile48.png| | 617| 16-Apr-20| 02:36 \nmb_folder.png| mb_folder.png| | 323| 16-Apr-20| 02:36 \nfolder.gif_0001| folder.gif| | 73| 16-Apr-20| 02:36 \nhelpbullet.5x15x32.png| helpbullet.5x15x32.png| | 99| 16-Apr-20| 02:36 \nhelpscrolldown.15x15x32.png| helpscrolldown.15x15x32.png| | 109| 16-Apr-20| 02:36 \nhelpscrollleft.15x15x32.png| helpscrollleft.15x15x32.png| | 107| 16-Apr-20| 02:36 \nhelpscrollright.15x15x32.png| helpscrollright.15x15x32.png| | 108| 16-Apr-20| 02:36 \nhelpscrollup.15x15x32.png| helpscrollup.15x15x32.png| | 108| 16-Apr-20| 02:36 \nicaccdb.png| icaccdb.png| | 1376| 16-Apr-20| 02:36 \nicaccde.png| icaccde.png| | 1376| 16-Apr-20| 02:36 \nicdoc.png| icdoc.png| | 1375| 16-Apr-20| 02:36 \nicdocm.png| icdocm.png| | 1474| 16-Apr-20| 02:36 \nicdocx.png| icdocx.png| | 1398| 16-Apr-20| 02:36 \nicdot.png| icdot.png| | 1329| 16-Apr-20| 02:36 \nicdotm.png| icdotm.png| | 1414| 16-Apr-20| 02:36 \nicdotx.png| icdotx.png| | 1360| 16-Apr-20| 02:36 \nicgen.gif| icgen.gif| | 90| 16-Apr-20| 02:36 \nicmpd.png| icmpd.png| | 1394| 16-Apr-20| 02:36 \nicmpp.png| icmpp.png| | 1387| 16-Apr-20| 02:36 \nicmpt.png| icmpt.png| | 1356| 16-Apr-20| 02:36 \nicnotebk.png| icnotebk.png| | 1332| 16-Apr-20| 02:36 \nicodp.png| icodp.png| | 1535| 16-Apr-20| 02:36 \nicods.png| icods.png| | 1603| 16-Apr-20| 02:36 \nicodt.png| icodt.png| | 1545| 16-Apr-20| 02:36 \nicone.png| icone.png| | 1339| 16-Apr-20| 02:36 \niconp.png| iconp.png| | 1382| 16-Apr-20| 02:36 \nicont.png| icont.png| | 1332| 16-Apr-20| 02:36 \nicpdf.png| icpdf.png| | 236| 16-Apr-20| 02:36 \nicpot.png| icpot.png| | 1343| 16-Apr-20| 02:36 \nicpotm.png| icpotm.png| | 1441| 16-Apr-20| 02:36 \nicpotx.png| icpotx.png| | 1373| 16-Apr-20| 02:36 \nicppa.png| icppa.png| | 1278| 16-Apr-20| 02:36 \nicppam.png| icppam.png| | 1309| 16-Apr-20| 02:36 \nicpps.png| icpps.png| | 1394| 16-Apr-20| 02:36 \nicppsm.png| icppsm.png| | 1425| 16-Apr-20| 02:36 \nicppsx.png| icppsx.png| | 1335| 16-Apr-20| 02:36 \nicppt.png| icppt.png| | 1395| 16-Apr-20| 02:36 \nicpptm.png| icpptm.png| | 1464| 16-Apr-20| 02:36 \nicpptx.png| icpptx.png| | 1413| 16-Apr-20| 02:36 \nicpub.png| icpub.png| | 1395| 16-Apr-20| 02:36 \nicspdgeneric.png| icspdgeneric.png| | 1430| 16-Apr-20| 02:36 \nicvdx.png| icvdx.png| | 1407| 16-Apr-20| 02:36 \nicvisiogeneric.png| icvisiogeneric.png| | 1407| 16-Apr-20| 02:36 \nicvsx.png| icvsx.png| | 1321| 16-Apr-20| 02:36 \nicvtx.png| icvtx.png| | 1376| 16-Apr-20| 02:36 \nicxla.png| icxla.png| | 1362| 16-Apr-20| 02:36 \nicxlam.png| icxlam.png| | 1373| 16-Apr-20| 02:36 \nicxls.png| icxls.png| | 1460| 16-Apr-20| 02:36 \nicxlsb.png| icxlsb.png| | 1430| 16-Apr-20| 02:36 \nicxlsm.png| icxlsm.png| | 1535| 16-Apr-20| 02:36 \nicxlsx.png| icxlsx.png| | 1474| 16-Apr-20| 02:36 \nicxlt.png| icxlt.png| | 1428| 16-Apr-20| 02:36 \nicxltm.png| icxltm.png| | 1470| 16-Apr-20| 02:36 \nicxltx.png| icxltx.png| | 1409| 16-Apr-20| 02:36 \nicxsn.png| icxsn.png| | 1326| 16-Apr-20| 02:36 \nmb_picture.png| mb_picture.png| | 469| 16-Apr-20| 02:36 \nitagnda.png| itagnda.png| | 220| 16-Apr-20| 02:36 \nitann.png| itann.png| | 392| 16-Apr-20| 02:36 \nitappcat.png| itappcatalog.png| | 265| 16-Apr-20| 02:36 \nitappreq.png| itapprequests.png| | 294| 16-Apr-20| 02:36 \nitcat.gif| itcat.gif| | 115| 16-Apr-20| 02:36 \nitcommcat.png| itcommcat.png| | 271| 16-Apr-20| 02:36 \nitcommem.png| itcommem.png| | 280| 16-Apr-20| 02:36 \nitcommnt.gif| itcommnt.gif| | 189| 16-Apr-20| 02:36 \nitcontct.gif| itcontct.gif| | 208| 16-Apr-20| 02:36 \nitcontct.png| itcontct.png| | 280| 16-Apr-20| 02:36 \nitdatash.png| itdatash.png| | 165| 16-Apr-20| 02:36 \nitdecis.png| itdecis.png| | 300| 16-Apr-20| 02:36 \nitdisc.png| itdisc.png| | 298| 16-Apr-20| 02:36 \nitdl.png| itdl.png| | 277| 16-Apr-20| 02:36 \nitebl.png| itebl.png| | 224| 16-Apr-20| 02:36 \nitevent.png| itevent.png| | 223| 16-Apr-20| 02:36 \nitfl.png| itfl.png| | 177| 16-Apr-20| 02:36 \nitgbcall.gif| itgbcall.gif| | 308| 16-Apr-20| 02:36 \nitgbfaci.gif| itgbfaci.gif| | 127| 16-Apr-20| 02:36 \nitgbwher.gif| itgbwher.gif| | 222| 16-Apr-20| 02:36 \nitgen.png| itgen.png| | 165| 16-Apr-20| 02:36 \nitil.png| itil.png| | 292| 16-Apr-20| 02:36 \nitime.png| itime.png| | 177| 16-Apr-20| 02:36 \nitiss.png| itiss.png| | 345| 16-Apr-20| 02:36 \nitissue.png| itissue.png| | 343| 16-Apr-20| 02:36 \nitlink.png| itlink.png| | 482| 16-Apr-20| 02:36 \nitobject.png| itobject.png| | 307| 16-Apr-20| 02:36 \nitposts.gif| itposts.gif| | 81| 16-Apr-20| 02:36 \nittask.png| ittask.png| | 343| 16-Apr-20| 02:36 \nitthgbrg.png| itthgbrg.png| | 323| 16-Apr-20| 02:36 \nitwp.png| itwp.png| | 590| 16-Apr-20| 02:36 \nmb_gear.png| mb_gear.png| | 455| 16-Apr-20| 02:36 \nmb_audio.png| mb_audio.png| | 671| 16-Apr-20| 02:36 \nlg_icdoc.png| lg_icdoc.png| | 1542| 16-Apr-20| 02:36 \nlg_icdocm.png| lg_icdocm.png| | 1874| 16-Apr-20| 02:36 \nlg_icdocx.png| lg_icdocx.png| | 1656| 16-Apr-20| 02:36 \nlg_icdot.png| lg_icdot.png| | 1492| 16-Apr-20| 02:36 \nlg_icdotm.png| lg_icdotm.png| | 1779| 16-Apr-20| 02:36 \nlg_icdotx.png| lg_icdotx.png| | 1573| 16-Apr-20| 02:36 \nlg_gen.gif| lg_icgen.gif| | 171| 16-Apr-20| 02:36 \nlg_mpd.png| lg_icmpd.png| | 1587| 16-Apr-20| 02:36 \nlg_mpp.png| lg_icmpp.png| | 1583| 16-Apr-20| 02:36 \nlg_mpt.png| lg_icmpt.png| | 1552| 16-Apr-20| 02:36 \nlg_icodp.png| lg_icodp.png| | 1786| 16-Apr-20| 02:36 \nlg_icods.png| lg_icods.png| | 1845| 16-Apr-20| 02:36 \nlg_icodt.png| lg_icodt.png| | 1861| 16-Apr-20| 02:36 \nlg_icone.png| lg_icone.png| | 1484| 16-Apr-20| 02:36 \nlg_iconp.png| lg_iconp.png| | 1558| 16-Apr-20| 02:36 \nlg_icont.png| lg_icont.png| | 1544| 16-Apr-20| 02:36 \nlg_icpdf.png| lg_icpdf.png| | 451| 16-Apr-20| 02:36 \nlg_icpot.png| lg_icpot.png| | 1495| 16-Apr-20| 02:36 \nlg_icpotm.png| lg_icpotm.png| | 1785| 16-Apr-20| 02:36 \nlg_icpotx.png| lg_icpotx.png| | 1593| 16-Apr-20| 02:36 \nlg_icppa.png| lg_icppa.png| | 1397| 16-Apr-20| 02:36 \nlg_icppam.png| lg_icppam.png| | 1506| 16-Apr-20| 02:36 \nlg_icpps.png| lg_icpps.png| | 1696| 16-Apr-20| 02:36 \nlg_icppsm.png| lg_icppsm.png| | 1823| 16-Apr-20| 02:36 \nlg_icppsx.png| lg_icppsx.png| | 1603| 16-Apr-20| 02:36 \nlg_icppt.png| lg_icppt.png| | 1607| 16-Apr-20| 02:36 \nlg_icpptm.png| lg_icpptm.png| | 1894| 16-Apr-20| 02:36 \nlg_icpptx.png| lg_icpptx.png| | 1709| 16-Apr-20| 02:36 \nlg_pub.png| lg_icpub.png| | 1587| 16-Apr-20| 02:36 \nlgvdw.gif| lg_icvdw.gif| | 464| 16-Apr-20| 02:36 \nlg_vdx.png| lg_icvdx.png| | 1839| 16-Apr-20| 02:36 \nlg_vsdm.gif| lg_icvsdm.gif| | 577| 16-Apr-20| 02:36 \nlg_vsdx.gif| lg_icvsdx.gif| | 540| 16-Apr-20| 02:36 \nlg_vssm.gif| lg_icvssm.gif| | 468| 16-Apr-20| 02:36 \nlg_vssx.gif| lg_icvssx.gif| | 468| 16-Apr-20| 02:36 \nlg_vstm.gif| lg_icvstm.gif| | 502| 16-Apr-20| 02:36 \nlg_vsx.png| lg_icvsx.png| | 1549| 16-Apr-20| 02:36 \nlg_vtx.png| lg_icvtx.png| | 1686| 16-Apr-20| 02:36 \nlg_icxla.png| lg_icxla.png| | 1553| 16-Apr-20| 02:36 \nlg_icxlam.png| lg_icxlam.png| | 1579| 16-Apr-20| 02:36 \nlg_icxls.png| lg_icxls.png| | 1558| 16-Apr-20| 02:36 \nlg_icxlsb.png| lg_icxlsb.png| | 1598| 16-Apr-20| 02:36 \nlg_icxlsm.png| lg_icxlsm.png| | 1856| 16-Apr-20| 02:36 \nlg_icxlsx.png| lg_icxlsx.png| | 1635| 16-Apr-20| 02:36 \nlg_icxlt.png| lg_icxlt.png| | 1498| 16-Apr-20| 02:36 \nlg_icxltm.png| lg_icxltm.png| | 1783| 16-Apr-20| 02:36 \nlg_xltx.gif| lg_icxltx.gif| | 377| 16-Apr-20| 02:36 \nlg_icxltx.png| lg_icxltx.png| | 1570| 16-Apr-20| 02:36 \nlg_xsn.png| lg_icxsn.png| | 1418| 16-Apr-20| 02:36 \nlink.gif| link.gif| | 359| 16-Apr-20| 02:36 \nltagnda.png| ltagnda.png| | 594| 16-Apr-20| 02:36 \nltann.png| ltann.png| | 905| 16-Apr-20| 02:36 \nltappcat.png| ltappcatalog.png| | 1167| 16-Apr-20| 02:36 \nltappreq.png| ltapprequests.png| | 1504| 16-Apr-20| 02:36 \nltcat.gif| ltcat.gif| | 402| 16-Apr-20| 02:36 \nltcommcat.png| ltcommcat.png| | 492| 16-Apr-20| 02:36 \nltcommem.png| ltcommem.png| | 589| 16-Apr-20| 02:36 \nltcommnt.gif| ltcommnt.gif| | 375| 16-Apr-20| 02:36 \nltcontct.gif| ltcontct.gif| | 409| 16-Apr-20| 02:36 \nltcontct.png| ltcontct.png| | 579| 16-Apr-20| 02:36 \nltdatash.png| ltdatash.png| | 195| 16-Apr-20| 02:36 \nltdecis.png| ltdecis.png| | 785| 16-Apr-20| 02:36 \nltdisc.png| ltdisc.png| | 472| 16-Apr-20| 02:36 \nltdl.png| ltdl.png| | 417| 16-Apr-20| 02:36 \nltebl.png| ltebl.png| | 459| 16-Apr-20| 02:36 \nltevent.png| ltevent.png| | 209| 16-Apr-20| 02:36 \nltfl.png| ltfl.png| | 409| 16-Apr-20| 02:36 \nltgbcall.gif| ltgbcall.gif| | 396| 16-Apr-20| 02:36 \nltgbfaci.gif| ltgbfaci.gif| | 390| 16-Apr-20| 02:36 \nltgbwher.gif| ltgbwher.gif| | 422| 16-Apr-20| 02:36 \nltgen.png| ltgen.png| | 195| 16-Apr-20| 02:36 \nltil.png| ltil.png| | 543| 16-Apr-20| 02:36 \nltime.png| ltime.png| | 346| 16-Apr-20| 02:36 \nltiss.png| ltiss.png| | 1426| 16-Apr-20| 02:36 \nltissue.png| ltissue.png| | 681| 16-Apr-20| 02:36 \nltlink.png| ltlink.png| | 2074| 16-Apr-20| 02:36 \nltobject.png| ltobject.png| | 821| 16-Apr-20| 02:36 \nltposts.gif| ltposts.gif| | 385| 16-Apr-20| 02:36 \nltsurvey.png| ltsurvey.png| | 225| 16-Apr-20| 02:36 \nlttask.png| lttask.png| | 1176| 16-Apr-20| 02:36 \nltthgbrg.png| ltthgbrg.png| | 754| 16-Apr-20| 02:36 \nltwp.png| ltwp.png| | 706| 16-Apr-20| 02:36 \nmb_video.png| mb_video.png| | 209| 16-Apr-20| 02:36 \nmappushpin.25x39x32.png| mappushpin.25x39x32.png| | 1070| 16-Apr-20| 02:36 \nmappushpindisabled.25x39x32.png| mappushpindisabled.25x39x32.png| | 1026| 16-Apr-20| 02:36 \nmappushpinhover.25x39x32.png| mappushpinhover.25x39x32.png| | 1037| 16-Apr-20| 02:36 \nmapview.31x22x32.png| mapview.31x22x32.png| | 672| 16-Apr-20| 02:36 \nmb_button_bg.png| mb_button_bg.png| | 194| 16-Apr-20| 02:36 \nmention.11x11x32.png| mention.11x11x32.png| | 274| 16-Apr-20| 02:36 \nmtagnda.png| mtagnda.png| | 413| 16-Apr-20| 02:36 \nmtann.png| mtann.png| | 520| 16-Apr-20| 02:36 \nmtappcat.png| mtappcatalog.png| | 414| 16-Apr-20| 02:36 \nmtappreq.png| mtapprequests.png| | 548| 16-Apr-20| 02:36 \nmtcat.gif| mtcat.gif| | 197| 16-Apr-20| 02:36 \nmtcommcat.png| mtcommcat.png| | 330| 16-Apr-20| 02:36 \nmtcommem.png| mtcommem.png| | 388| 16-Apr-20| 02:36 \nmtcommnt.gif| mtcommnt.gif| | 193| 16-Apr-20| 02:36 \nmtcontct.gif| mtcontct.gif| | 137| 16-Apr-20| 02:36 \nmtcontct.png| mtcontct.png| | 293| 16-Apr-20| 02:36 \nmtdatash.png| mtdatash.png| | 129| 16-Apr-20| 02:36 \nmtdecis.png| mtdecis.png| | 516| 16-Apr-20| 02:36 \nmtdisc.png| mtdisc.png| | 307| 16-Apr-20| 02:36 \nmtdl.png| mtdl.png| | 252| 16-Apr-20| 02:36 \nmtebl.png| mtebl.png| | 245| 16-Apr-20| 02:36 \nmtevent.png| mtevent.png| | 135| 16-Apr-20| 02:36 \nmtfl.png| mtfl.png| | 227| 16-Apr-20| 02:36 \nmtgbcall.gif| mtgbcall.gif| | 396| 16-Apr-20| 02:36 \nmtgbfaci.gif| mtgbfaci.gif| | 377| 16-Apr-20| 02:36 \nmtgbwher.gif| mtgbwher.gif| | 390| 16-Apr-20| 02:36 \nmtgen.png| mtgen.png| | 129| 16-Apr-20| 02:36 \nmtil.png| mtil.png| | 280| 16-Apr-20| 02:36 \nmtime.png| mtime.png| | 188| 16-Apr-20| 02:36 \nmtiss.png| mtiss.png| | 534| 16-Apr-20| 02:36 \nmtissue.png| mtissue.png| | 447| 16-Apr-20| 02:36 \nmtlink.png| mtlink.png| | 565| 16-Apr-20| 02:36 \nmtobject.png| mtobject.png| | 460| 16-Apr-20| 02:36 \nmtposts.gif| mtposts.gif| | 197| 16-Apr-20| 02:36 \nmtsurvey.png| mtsurvey.png| | 141| 16-Apr-20| 02:36 \nmttask.png| mttask.png| | 405| 16-Apr-20| 02:36 \nmtthgbrg.png| mtthgbrg.png| | 526| 16-Apr-20| 02:36 \nmtwp.png| mtwp.png| | 391| 16-Apr-20| 02:36 \nmb_file.png| mb_file.png| | 215| 16-Apr-20| 02:36 \nnowfollowing.11x11x32.png| nowfollowing.11x11x32.png| | 257| 16-Apr-20| 02:36 \no365brandsuite.png| o365brandsuite.png| | 2122| 16-Apr-20| 02:36 \npersonplaceholder200.png| personplaceholder.200x150x32.png| | 2438| 16-Apr-20| 02:36 \npersonplaceholder32.png| personplaceholder.32x32x32.png| | 737| 16-Apr-20| 02:36 \npersonplaceholder42.png| personplaceholder.42x42x32.png| | 728| 16-Apr-20| 02:36 \npersonplaceholder96.png| personplaceholder.96x96x32.png| | 1500| 16-Apr-20| 02:36 \nprojectmanagedeliverables.16x16x32.png| projectmanagedeliverables.16x16x32.png| | 219| 16-Apr-20| 02:36 \npromotedsitetile.150x150x32.png| promotedsitetile.150x150x32.png| | 2530| 16-Apr-20| 02:36 \nrepliedto.11x11x32.png| repliedto.11x11x32.png| | 257| 16-Apr-20| 02:36 \nmb_excel.png| mb_excel.png| | 572| 16-Apr-20| 02:36 \nmb_onenote.png| mb_onenote.png| | 456| 16-Apr-20| 02:36 \nmb_text.png| mb_text.png| | 268| 16-Apr-20| 02:36 \nmb_ppt.png| mb_ppt.png| | 577| 16-Apr-20| 02:36 \nmb_word.png| mb_word.png| | 535| 16-Apr-20| 02:36 \nmb_site.png| mb_siteworkspace.png| | 822| 16-Apr-20| 02:36 \nselectioncheckmarkcolumn.10x10x32.png| selectioncheckmarkcolumn.10x10x32.png| | 229| 16-Apr-20| 02:36 \nsharepointfoundation16.png| sharepointfoundation16.png| | 560| 16-Apr-20| 02:36 \nfavicon.ico| favicon.ico| | 7886| 16-Apr-20| 02:36 \nsharepointdesigner32.png| sharepointdesigner32.png| | 1613| 16-Apr-20| 02:36 \nsharepointmetroapptile.png| sharepointmetroapptile.png| | 3992| 16-Apr-20| 02:36 \nsiteicon.png| siteicon.png| | 2345| 16-Apr-20| 02:36 \naccsrv.images.progcircle16.gif| hig_progcircle_loading16.gif| | 420| 16-Apr-20| 02:35 \nloadingcirclests16.gif| loadingcirclests16.gif| | 420| 16-Apr-20| 02:35 \naccsrv.images.progcircle24.gif| hig_progcircle_loading24.gif| | 878| 16-Apr-20| 02:35 \ngears_anv4.gif_0001| gears_anv4.gif| | 878| 16-Apr-20| 02:35 \nloadin24.gif| hig_progcircle_loading24.gif| | 878| 16-Apr-20| 02:35 \nloadin24.png| hig_progcircle_loading24.gif| | 878| 16-Apr-20| 02:35 \nprogress_circle_24.gif| progress-circle-24.gif| | 878| 16-Apr-20| 02:35 \nmb_navigation.png| mb_navigation.png| | 255| 16-Apr-20| 02:36 \nspstorefrontappdefault.16x16x32.png| spstorefrontappdefault.16x16x32.png| | 296| 16-Apr-20| 02:36 \nspstorefrontappdefault.96x96x32.png| spstorefrontappdefault.96x96x32.png| | 1036| 16-Apr-20| 02:36 \ntag.11x11x32.png| tag.11x11x32.png| | 228| 16-Apr-20| 02:36 \nupdatelink.16x16x32.png| updatelink.16x16x32.png| | 320| 16-Apr-20| 02:36 \nusquig.png| usersquiggle.png| | 150| 16-Apr-20| 02:36 \nvideopreview.png| videopreview.png| | 7110| 16-Apr-20| 02:36 \nmb_page.png| mb_page.png| | 710| 16-Apr-20| 02:36 \nmb_xml.png| mb_xml.png| | 464| 16-Apr-20| 02:36 \nbusdata.dll| microsoft.businessdata.dll| 15.0.4420.1017| 116920| 15-Apr-20| 07:52 \nbusdatar.dll| microsoft.businessdata.dll| 15.0.4420.1017| 116920| 15-Apr-20| 07:52 \nmicrosoft_web_design_server.dll| microsoft.web.design.server.dll| 15.0.5085.1000| 402208| 15-Apr-20| 07:52 \nmicrosoft_web_design_server_intl.dll| microsoft.web.design.server.intl.dll| 15.0.4420.1017| 21640| 15-Apr-20| 07:52 \nbdcmdsch.xsd| bdcmetadata.xsd| | 26300| | \nbdcmeta.xsd| bdcmetadata.xsd| | 26300| 15-Apr-20| 07:52 \nbdcmdsc2.xsd| bdcmetadataresource.xsd| | 13089| | \nbdcmetar.xsd| bdcmetadataresource.xsd| | 13089| 15-Apr-20| 07:52 \nonetnative.dll| onetnative.dll| 15.0.5223.1000| 517008| 15-Apr-20| 07:52 \nxlsrv.onetnative.dll| onetnative.dll| 15.0.5223.1000| 517008| 15-Apr-20| 07:52 \nonetutil.dll| onetutil.dll| 15.0.5241.1000| 2618464| 15-Apr-20| 07:52 \noffice_extension_manager_js| sp.officeextensionmanager.js| | 35154| 15-Apr-20| 07:52 \nosfserver_client_dll| microsoft.sharepoint.client.workflowservices.dll| 15.0.4599.1000| 39128| 15-Apr-20| 07:52 \nosfserver_silverlight_dll| microsoft.sharepoint.client.workflowservices.silverlight.dll| 15.0.4599.1000| 39152| 15-Apr-20| 07:52 \nosfserver_serverproxy_dll| microsoft.sharepoint.workflowservices.serverproxy.dll| 15.0.4599.1000| 110280| 15-Apr-20| 07:52 \nosfserver_shared_dll| microsoft.sharepoint.workflowservicesbase.dll| 15.0.4877.1000| 88360| 15-Apr-20| 07:52 \nosfserver_shared_dll_intl| microsoft.sharepoint.workflowservicesbase.intl.dll| 15.0.4420.1017| 12464| 15-Apr-20| 07:52 \nproxylibrary.osfserver.xml| proxylibrary.osfserver.xml| | 164| 15-Apr-20| 07:52 \nosfserver_clientdbg_js| sp.workflowservices.debug.js| | 58451| 15-Apr-20| 07:52 \nosfserver_clientdbg_js.x64| sp.workflowservices.debug.js| | 58451| 15-Apr-20| 07:52 \nosfserver_client_js| sp.workflowservices.js| | 34083| 15-Apr-20| 07:52 \nosfserver_client_js.x64| sp.workflowservices.js| | 34083| 15-Apr-20| 07:52 \naddwrkfl.aspx| addwrkfl.aspx| | 61362| 15-Apr-20| 07:52 \nassocwrkfl.aspx| assocwrkfl.aspx| | 4655| 15-Apr-20| 07:52 \navailableworkflow.aspx| availableworkflow.aspx| | 7966| 15-Apr-20| 07:52 \nmytasks.aspx| mytasks.aspx| | 6818| 15-Apr-20| 07:52 \noextnmgr.aspx| officeextensionmanager.aspx| | 2196| 15-Apr-20| 07:52 \nremwrkfl.aspx| remwrkfl.aspx| | 16619| 15-Apr-20| 07:52 \nosfserver.resx| osfserver.resx| | 45025| 15-Apr-20| 07:52 \nrunningworkflows.aspx| runningworkflows.aspx| | 8570| 15-Apr-20| 07:52 \nvalidapp.osfsrv.xml| validappendpoints.osfserver.xml| | 1245| 15-Apr-20| 07:52 \nwfstart.asx| wfstart.aspx| | 202| 15-Apr-20| 07:52 \nworkflow.asx| workflow.aspx| | 25914| 15-Apr-20| 07:52 \nworkflowtaskpane.aspx| workflowtaskpane.aspx| | 1180| 15-Apr-20| 07:52 \nwrksetng.aspx| wrksetng.aspx| | 15843| 15-Apr-20| 07:52 \nwrkstat.aspx| wrkstat.aspx| | 27940| 15-Apr-20| 07:52 \nosfextap.dll| microsoft.sharepoint.officeextension.applicationpages.dll| 15.0.5207.1000| 16480| 15-Apr-20| 07:52 \nwfform.js| wfformtemplates.js| | 5024| 15-Apr-20| 07:52 \nosfap.dll| microsoft.sharepoint.workflowservices.applicationpages.dll| 15.0.4755.1000| 96880| 15-Apr-20| 07:52 \nwebconfig.osfserver.xml| webconfig.osfserver.xml| | 504| 15-Apr-20| 07:52 \naddgallery.xap_silverlight| addgallery.xap| | 367065| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.client.xap| microsoft.sharepoint.client.xap| | 223787| 15-Apr-20| 07:52 \nosscadmn.dll| microsoft.search.server.comadmin.dll| | 36232| 15-Apr-20| 07:53 \nwsstlb.net| microsoft.sharepoint.search.administration.mssitlb.dll| | 90792| 15-Apr-20| 07:53 \nsearchom.dll_0003| microsoft.sharepoint.search.dll| 15.0.5129.1000| 3601488| 15-Apr-20| 07:53 \nsearchom.dll_0005| microsoft.sharepoint.search.dll| 15.0.5129.1000| 3601488| 15-Apr-20| 07:53 \nsrchomnt.dll_1| microsoft.sharepoint.search.native.dll| 15.0.5233.1000| 472464| 15-Apr-20| 07:53 \nwsrchps.dll| microsoft.sharepoint.search.powershell.dll| 15.0.4937.1000| 31520| 15-Apr-20| 07:53 \ncontrol_defaultresult.js| control_searchresults.js| | 32218| 15-Apr-20| 07:52 \nfilter_refinement.js| filter_default.js| | 21014| 15-Apr-20| 07:52 \nfilter_multirefinement.js| filter_multivalue.js| | 6263| 15-Apr-20| 07:52 \ngroup_content.js| group_content.js| | 2159| 15-Apr-20| 07:52 \ngroup_defaultgroup.js| group_default.js| | 6616| 15-Apr-20| 07:52 \nhoverpanel_commonactions.js| item_commonhoverpanel_actions.js| | 12766| 15-Apr-20| 07:52 \nhoverpanel_commonbody.js| item_commonhoverpanel_body.js| | 7771| 15-Apr-20| 07:52 \nhoverpanel_community.js| item_community_hoverpanel.js| | 11080| 15-Apr-20| 07:52 \nhoverpanel_default.js| item_default_hoverpanel.js| | 4222| 15-Apr-20| 07:52 \nhoverpanel_microblog.js| item_microblog_hoverpanel.js| | 17457| 15-Apr-20| 07:52 \nhoverpanel_site.js| item_site_hoverpanel.js| | 7582| 15-Apr-20| 07:52 \nhoverpanel_webpage.js| item_webpage_hoverpanel.js| | 6608| 15-Apr-20| 07:52 \nitem_commonbody.js| item_commonitem_body.js| | 8742| 15-Apr-20| 07:52 \nitem_communityportal.js| item_communityportal.js| | 9225| 15-Apr-20| 07:52 \nitem_microblog.js| item_microblog.js| | 17108| 15-Apr-20| 07:52 \nitem_pdf.js| item_pdf.js| | 4102| 15-Apr-20| 07:52 \nitem_people.js| item_person.js| | 24413| 15-Apr-20| 07:52 \nitem_peopleintent.js| item_person_compacthorizontal.js| | 27705| 15-Apr-20| 07:52 \nitem_site.js| item_site.js| | 4544| 15-Apr-20| 07:52 \nitem_webpage.js| item_webpage.js| | 3827| 15-Apr-20| 07:52 \nitem_word.js| item_word.js| | 4157| 15-Apr-20| 07:52 \nsearch.web.parts.feature.xml| feature.xml| | 5405| 15-Apr-20| 07:52 \nsearch.web.parts.dwpfiles.xml| webpartdwpfiles.xml| | 68278| 15-Apr-20| 07:52 \nwss.searchpowershell.types.ps1xml| wsssearchpowershell.types.ps1xml| | 10901| 15-Apr-20| 07:53 \nwss.intl.dll| microsoft.sharepoint.search.intl.dll| 15.0.5197.1000| 563296| 15-Apr-20| 07:53 \nsetup.exe| setup.exe| 15.0.5233.1000| 1080208| 15-Apr-20| 07:51 \nsvrsetup.exe| setup.exe| 15.0.5233.1000| 1080208| 15-Apr-20| 07:51 \nwsssetup.dll| wsssetup.dll| 15.0.5241.1000| 10405768| 15-Apr-20| 07:52 \ndevftr.xml| feature.xml| | 1225| 15-Apr-20| 07:52 \nappdev.dll| microsoft.sharepoint.appdevelopment.dll| 15.0.5027.1000| 71384| 15-Apr-20| 07:52 \nstsapa.dll| microsoft.sharepoint.applicationpages.administration.dll| 15.0.5163.1000| 662120| 15-Apr-20| 07:52 \nwssadmop.dll_0001| microsoft.sharepoint.administrationoperation.dll| 15.0.4987.1000| 1046352| 15-Apr-20| 07:52 \nwssadmin.exe_0001| wssadmin.exe| 15.0.4420.1017| 17088| 15-Apr-20| 07:52 \nappmng.svc| appmng.svc| | 375| 15-Apr-20| 07:52 \nappmngclient.config| client.config| | 2159| 15-Apr-20| 07:52 \nappmngweb.config| web.config| | 2641| 15-Apr-20| 07:52 \nbgximg.png| bgximg.png| | 1770| 15-Apr-20| 07:52 \nbgyimg.png| bgyimg.png| | 68| 15-Apr-20| 07:52 \nclient.svc| client.svc| | 402| 15-Apr-20| 07:52 \nadmwcfg.xml| adminwebconfig.sts.xml| | 3530| 15-Apr-20| 07:52 \napppermissionprovider.bdcconnection.xml| apppermissionprovider.bdcconnection.xml| | 232| 15-Apr-20| 07:52 \napppermissionprovider.content.xml| apppermissionprovider.content.xml| | 706| 15-Apr-20| 07:52 \ncapabilitycheckers.sts.xml| capabilitycheckers.sts.xml| | 2789| 15-Apr-20| 07:52 \ndocexflt.xml| docextflt.xml| | 4439| 15-Apr-20| 07:52 \ndocparse.xml| docparse.xml| | 2293| 15-Apr-20| 07:52 \ngbwupgrade.xml| gbwupgrade.xml| | 4055| 15-Apr-20| 07:52 \ngbwupgradeb2b.xml| gbwupgradeb2b.xml| | 311| 15-Apr-20| 07:52 \nmdocview.xml| mdocview.xml| | 6975| 15-Apr-20| 07:52 \nmpsupgrade.xml| mpsupgrade.xml| | 15459| 15-Apr-20| 07:52 \nmpsupgradeb2b.xml| mpsupgradeb2b.xml| | 102| 15-Apr-20| 07:52 \nmredirection.xml| mredirection.xml| | 4660| 15-Apr-20| 07:52 \nproxylibrary.stsom.xml| proxylibrary.stsom.xml| | 217| 15-Apr-20| 07:52 \nrgnldflt.xml| rgnldflt.xml| | 81253| 15-Apr-20| 07:52 \ntaupgrade.xml| tenantadminupgrade.xml| | 437| 15-Apr-20| 07:52 \ntimezone.xml| timezone.xml| | 99866| 15-Apr-20| 07:52 \nwebconfig_identitymodel_add| webconfig.identitymodel.add.xml| | 7529| 15-Apr-20| 07:52 \nwebconfig_identitymodel_remove| webconfig.identitymodel.remove.xml| | 3122| 15-Apr-20| 07:52 \nwssupgrade.xml| wssupgrade.xml| | 9043| 15-Apr-20| 07:52 \nwssupgradeb2b.xml| wssupgradeb2b.xml| | 4719| 15-Apr-20| 07:52 \noleprsx.dll| oleparser.dll| 15.0.4454.1000| 31880| 15-Apr-20| 07:52 \nmicrosoft_sharepoint_dsp.dll| microsoft.sharepoint.dsp.dll| 15.0.4420.1017| 48248| 15-Apr-20| 07:53 \nmicrosoft_sharepoint_dsp_oledb.dll| microsoft.sharepoint.dsp.oledb.dll| 15.0.4420.1017| 112768| 15-Apr-20| 07:53 \nmicrosoft_sharepoint_dsp_soappt.dll| microsoft.sharepoint.dsp.soappt.dll| 15.0.4420.1017| 75912| 15-Apr-20| 07:53 \nmicrosoft_sharepoint_dsp_sts.dll| microsoft.sharepoint.dsp.sts.dll| 15.0.4420.1017| 93312| 15-Apr-20| 07:53 \nmicrosoft_sharepoint_dsp_xmlurl.dll| microsoft.sharepoint.dsp.xmlurl.dll| 15.0.4420.1017| 75912| 15-Apr-20| 07:53 \nschema.xml_accreq| schema.xml| | 21500| 15-Apr-20| 07:52 \naccreq.xml| accessrequests.xml| | 681| 15-Apr-20| 07:52 \nfeature.xml_accreq| feature.xml| | 497| 15-Apr-20| 07:52 \napplications.xml| applications.xml| | 8249| 15-Apr-20| 07:52 \napps.xml| apps.xml| | 3078| 15-Apr-20| 07:52 \nbackups.xml| backups.xml| | 4398| 15-Apr-20| 07:52 \nconfigurationwizards.xml| configurationwizards.xml| | 912| 15-Apr-20| 07:52 \ndefault.xml| default.xml| | 12609| 15-Apr-20| 07:52 \nfeature.xml_sts| feature.xml| | 1712| 15-Apr-20| 07:52 \ngenappsettings.xml| generalapplicationsettings.xml| | 1989| 15-Apr-20| 07:52 \nmonitoring.xml| monitoring.xml| | 3736| 15-Apr-20| 07:52 \no365configuration.xml| office365configuration.xml| | 405| 15-Apr-20| 07:52 \nquicklaunch.xml| quicklaunch.xml| | 555| 15-Apr-20| 07:52 \nsecurity.xml| security.xml| | 5954| 15-Apr-20| 07:52 \nsystemsettings.xml| systemsettings.xml| | 5280| 15-Apr-20| 07:52 \nupgradeandmigration.xml| upgradeandmigration.xml| | 1630| 15-Apr-20| 07:52 \nschema.xml_announce| schema.xml| | 26227| 15-Apr-20| 07:52 \nannounce.xml| announcements.xml| | 456| 15-Apr-20| 07:52 \nfeature.xml_announce| feature.xml| | 500| 15-Apr-20| 07:52 \napplockdown.xml| applockdown.xml| | 2321| 15-Apr-20| 07:52 \nfeature.xml_apploc| feature.xml| | 400| 15-Apr-20| 07:52 \nappreglinks.xml| appregistrationlinks.xml| | 793| 15-Apr-20| 07:52 \nfeature.xml_appreg| feature.xml| | 554| 15-Apr-20| 07:52 \nschema.xml_apprequestslist| schema.xml| | 10229| 15-Apr-20| 07:52 \napprequestscontenttypes.xml_apprequestslist| apprequestscontenttypes.xml| | 1748| 15-Apr-20| 07:52 \napprequestsfields.xml_apprequestslist| apprequestsfields.xml| | 5336| 15-Apr-20| 07:52 \napprequestslistinstance.xml_apprequestslist| apprequestslistinstance.xml| | 403| 15-Apr-20| 07:52 \napprequestslisttemplate.xml_apprequestslist| apprequestslisttemplate.xml| | 627| 15-Apr-20| 07:52 \nfeature.xml_apprequestslist| feature.xml| | 1516| 15-Apr-20| 07:52 \nautohostedlicensing_fields.xml_autohostedapplicensing| autohostedapplicensingfields.xml| | 771| 15-Apr-20| 07:52 \nfeature.xml_autohostedapplicensing| feature.xml| | 744| 15-Apr-20| 07:52 \nautohostedlicensing_controls.xml_autohostedapplicensing| resourcebar.xml| | 412| 15-Apr-20| 07:52 \nfeature.xml_autohostedapplicensingstapling| feature.xml| | 487| 15-Apr-20| 07:52 \nelements.xml_autohostedapplicensingstapling| staplingelements.xml| | 223| 15-Apr-20| 07:52 \nblog.dwp_admintools| blogadmin.dwp| | 468| 15-Apr-20| 07:52 \nblog.dwp_archives| blogarchives.dwp| | 462| 15-Apr-20| 07:52 \nblog.webpart_notifications| blognotifications.webpart| | 883| 15-Apr-20| 07:52 \nelements.xml_basicwebparts| elements.xml| | 1652| 15-Apr-20| 07:52 \nelements14.xml_basicwebparts| elements14.xml| | 629| 15-Apr-20| 07:52 \nelements15.xml_basicwebparts| elements15.xml| | 1407| 15-Apr-20| 07:52 \nfeature.xml_basicwebparts| feature.xml| | 3149| 15-Apr-20| 07:52 \ngettingstarted.webpart_basicwebparts| gettingstarted.webpart| | 834| 15-Apr-20| 07:52 \nmscontenteditor.dwp_basicwebparts| mscontenteditor.dwp| | 506| 15-Apr-20| 07:52 \nmsimage.dwp_basicwebparts| msimage.dwp| | 483| 15-Apr-20| 07:52 \nmsmembers.dwp_basicwebparts| msmembers.dwp| | 487| 15-Apr-20| 07:52 \nmspageviewer.dwp_basicwebparts| mspageviewer.dwp| | 498| 15-Apr-20| 07:52 \nmspiclibslideshow.webpart_basicwebparts| mspicturelibraryslideshow.webpart| | 733| 15-Apr-20| 07:52 \nmsscripteditor.webpart_basicwebparts| msscripteditor.webpart| | 739| 15-Apr-20| 07:52 \nmssimpleform.dwp_basicwebparts| mssimpleform.dwp| | 799| 15-Apr-20| 07:52 \nmsuserdocs.dwp_basicwebparts| msuserdocs.dwp| | 492| 15-Apr-20| 07:52 \nmsusertasks.dwp_basicwebparts| msusertasks.dwp| | 495| 15-Apr-20| 07:52 \nmsxml.dwp_basicwebparts| msxml.dwp| | 475| 15-Apr-20| 07:52 \nsilverlight.webpart_basicwebparts| silverlight.webpart| | 669| 15-Apr-20| 07:52 \ntimeline.webpart_basicwebparts| timeline.webpart| | 831| 15-Apr-20| 07:52 \nextsubsh_feature.xml| feature.xml| | 570| 15-Apr-20| 07:52 \nallcategories.asp_blog_categories| allcategories.aspx| | 2718| 15-Apr-20| 07:52 \neditcategory.asp_blog_categories| editcategory.aspx| | 4167| 15-Apr-20| 07:52 \nmycategories.asp_blog_categories| mycategories.aspx| | 2718| 15-Apr-20| 07:52 \nnewcategory.asp_blog_categories| newcategory.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_blog_categories| schema.xml| | 18153| 15-Apr-20| 07:52 \nviewcategory.asp_blog_categories| viewcategory.aspx| | 4190| 15-Apr-20| 07:52 \nallcomments.asp_blog_comments| allcomments.aspx| | 2718| 15-Apr-20| 07:52 \nbyauthor.asp_blog_comments| byauthor.aspx| | 2718| 15-Apr-20| 07:52 \neditcomment.asp_blog_comments| editcomment.aspx| | 4167| 15-Apr-20| 07:52 \nmycomments.asp_blog_comments| mycomments.aspx| | 2718| 15-Apr-20| 07:52 \nnewcomment.asp_blog_comments| newcomment.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_blog_comments| schema.xml| | 35968| 15-Apr-20| 07:52 \nviewcomment.asp_blog_comments| viewcomment.aspx| | 4190| 15-Apr-20| 07:52 \nallposts.asp_blog_posts| allposts.aspx| | 2718| 15-Apr-20| 07:52 \narchive.asp_blog_posts| archive.aspx| | 2718| 15-Apr-20| 07:52 \nbyauthor.asp_blog_posts| byauthor.aspx| | 2718| 15-Apr-20| 07:52 \nbycategory.asp_blog_posts| bycategory.aspx| | 2718| 15-Apr-20| 07:52 \ncalendar.asp_blog_posts| calendar.aspx| | 2718| 15-Apr-20| 07:52 \neditpost.asp_blog_posts| editpost.aspx| | 4167| 15-Apr-20| 07:52 \nmyposts.asp_blog_posts| myposts.aspx| | 2718| 15-Apr-20| 07:52 \nnewpost.asp_blog_posts| newpost.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_blog_posts| schema.xml| | 81082| 15-Apr-20| 07:52 \nviewpost.asp_blog_posts| viewpost.aspx| | 4190| 15-Apr-20| 07:52 \nelements.xml_blog| elements.xml| | 1207| 15-Apr-20| 07:52 \nfeature.xml_blog| feature.xml| | 1326| 15-Apr-20| 07:52 \ncategory.asp_blogcon| category.aspx| | 2649| 15-Apr-20| 07:52 \ndate.asp_blog_blogcon| date.aspx| | 2643| 15-Apr-20| 07:52 \nelements.xml_blogcon| elements.xml| | 29090| 15-Apr-20| 07:52 \nfeature.xml_blogcon| feature.xml| | 517| 15-Apr-20| 07:52 \nmonthlyarchive.asp_blogcon| monthlyarchive.aspx| | 2737| 15-Apr-20| 07:52 \npost.asp_blogcon| post.aspx| | 3153| 15-Apr-20| 07:52 \nsummary.asp_blog_blogcon| summary.aspx| | 3200| 15-Apr-20| 07:52 \ndefault.asp_blog_bloghp| default.aspx| | 2682| 15-Apr-20| 07:52 \nelements.xml_bloghp| elements.xml| | 8483| 15-Apr-20| 07:52 \nfeature.xml_bloghp| feature.xml| | 501| 15-Apr-20| 07:52 \nschema.xml_calltrack| schema.xml| | 314515| 15-Apr-20| 07:52 \ncalltrack.xml| calltracklist.xml| | 5563| 15-Apr-20| 07:52 \nfeature.xml_calltrack| feature.xml| | 1178| 15-Apr-20| 07:52 \nschema.xml_circulation| schema.xml| | 313711| 15-Apr-20| 07:52 \ncirculation.xml| circulationlist.xml| | 6489| 15-Apr-20| 07:52 \nfeature.xml_circulation| feature.xml| | 1196| 15-Apr-20| 07:52 \nschema.xml_contacts| schema.xml| | 8715| 15-Apr-20| 07:52 \ncontacts.xml| contacts.xml| | 451| 15-Apr-20| 07:52 \nfeature.xml_contacts| feature.xml| | 480| 15-Apr-20| 07:52 \nsrcharea.xml| searcharea.xml| | 1279| 15-Apr-20| 07:52 \nfeature.xml_0004| feature.xml| | 527| 15-Apr-20| 07:52 \ncontenttypesettings.xml| contenttypesettings.xml| | 4678| 15-Apr-20| 07:52 \nfeature.xml_0010| feature.xml| | 537| 15-Apr-20| 07:52 \nschema.xml_corpcatalog| schema.xml| | 32074| 15-Apr-20| 07:52 \ncorporatecatalogcustomactions.xml_corpcatalog| corporatecatalogcustomactions.xml| | 8553| 15-Apr-20| 07:52 \ncorporatecatalogfields.xml_corpcatalog| corporatecatalogfields.xml| | 11303| 15-Apr-20| 07:52 \ncorporatecataloginstance.xml_corpcatalog| corporatecataloginstance.xml| | 422| 15-Apr-20| 07:52 \ncorporatecatalogtemplate.xml_corpcatalog| corporatecatalogtemplate.xml| | 665| 15-Apr-20| 07:52 \nfeature.xml_corpcatalog| feature.xml| | 2174| 15-Apr-20| 07:52 \nwebeventreceiver.xml_corpcatalog| webeventreceiver.xml| | 578| 15-Apr-20| 07:52 \nfeature.xml_corpgallerysettings| feature.xml| | 408| 15-Apr-20| 07:52 \nctypswss.xml| ctypeswss.xml| | 48192| 15-Apr-20| 07:52 \nctpswss2.xml| ctypeswss2.xml| | 26052| 15-Apr-20| 07:52 \nctpswss3.xml| ctypeswss3.xml| | 2093| 15-Apr-20| 07:52 \nfeature_0004.xml| feature.xml| | 3974| 15-Apr-20| 07:52 \nschema.xml_custom| schema.xml| | 3427| 15-Apr-20| 07:52 \ncustlist.xml| customlist.xml| | 442| 15-Apr-20| 07:52 \nfeature.xml_custom| feature.xml| | 479| 15-Apr-20| 07:52 \nschema.xml_dsl| schema.xml| | 4343| 15-Apr-20| 07:52 \ndsl.xml| datasourcelibrary.xml| | 512| 15-Apr-20| 07:52 \nfeature.xml_dsl| feature.xml| | 477| 15-Apr-20| 07:52 \nribbon.xml| ribbon.xml| | 4984| 15-Apr-20| 07:52 \nschema.xml_discuss| schema.xml| | 266868| 15-Apr-20| 07:52 \ndiscuss.xml| discussions.xml| | 1715| 15-Apr-20| 07:52 \nfeature.xml_discuss| feature.xml| | 1750| 15-Apr-20| 07:52 \neditdlg.htm_doclib| editdlg.htm| | 4892| 15-Apr-20| 07:52 \neditdlg.htm_ldoclib| editdlg.htm| | 4892| 15-Apr-20| 07:52 \neditdlg.htm_pubfeap| editdlg.htm| | 4892| 15-Apr-20| 07:52 \neditdlg.htm_pubresfeat| editdlg.htm| | 4892| 15-Apr-20| 07:52 \nreportcenterdoclibeditdlg_htm| editdlg.htm| | 4892| 15-Apr-20| 07:52 \nrleditdlg.htm| editdlg.htm| | 4892| 15-Apr-20| 07:52 \nfiledlg.htm_doclib| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nfiledlg.htm_ldoclib| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nfiledlg.htm_pubfeap| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nfiledlg.htm_pubresfeat| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nreportcenterdoclibfiledlg_htm| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nrlfiledlg.htm_ldoclib| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nrepair.aspx_doclib| repair.aspx| | 3259| 15-Apr-20| 07:52 \nrepair.aspx_ldoclib| repair.aspx| | 3259| 15-Apr-20| 07:52 \nrepair.aspx_pubfeap| repair.aspx| | 3259| 15-Apr-20| 07:52 \nrepair.aspx_pubresfeat| repair.aspx| | 3259| 15-Apr-20| 07:52 \nreportcenterdoclibrepair_aspx| repair.aspx| | 3259| 15-Apr-20| 07:52 \nreportcenterdoclibschema_xml| schema.xml| | 31199| 15-Apr-20| 07:52 \nschema.xml_doclib| schema.xml| | 31199| 15-Apr-20| 07:52 \nschema.xml_pubfeap| schema.xml| | 31199| 15-Apr-20| 07:52 \nreportcenterdoclibupload_aspx| upload.aspx| | 5911| 15-Apr-20| 07:52 \nrlupload.aspx| upload.aspx| | 5911| 15-Apr-20| 07:52 \nupload.aspx_doclib| upload.aspx| | 5911| 15-Apr-20| 07:52 \nupload.aspx_ldoclib| upload.aspx| | 5911| 15-Apr-20| 07:52 \nupload.aspx_pubfeap| upload.aspx| | 5911| 15-Apr-20| 07:52 \nupload.aspx_pubresfeat| upload.aspx| | 5911| 15-Apr-20| 07:52 \ndoclib.xml| documentlibrary.xml| | 476| 15-Apr-20| 07:52 \nfeature.xml_doclib| feature.xml| | 499| 15-Apr-20| 07:52 \nelements.xml_downloadfromofficedotcom| elements.xml| | 114| 15-Apr-20| 07:52 \nfeature.xml_downloadfromofficedotcom| feature.xml| | 521| 15-Apr-20| 07:52 \nemltemplates.xml| emailtemplates.xml| | 2233| 15-Apr-20| 07:52 \nemltemplates.xml_14| emailtemplates.xml| | 2233| 15-Apr-20| 07:52 \nevalnoupg.xml| evalsitecreatewithnoupgrade.xml| | 1443| 15-Apr-20| 07:52 \nevalnoupg.xml_14| evalsitecreatewithnoupgrade.xml| | 1443| 15-Apr-20| 07:52 \nevalupg.xml| evalsitecreationwithupgrade.xml| | 1184| 15-Apr-20| 07:52 \nevalupg.xml_14| evalsitecreationwithupgrade.xml| | 1184| 15-Apr-20| 07:52 \nevaldelete.xml| evalsitedeleted.xml| | 440| 15-Apr-20| 07:52 \nevaldelete.xml_14| evalsitedeleted.xml| | 440| 15-Apr-20| 07:52 \nevalexp.xml| evalsitenearingexpiry.xml| | 1030| 15-Apr-20| 07:52 \nevalexp.xml_14| evalsitenearingexpiry.xml| | 1030| 15-Apr-20| 07:52 \nevalrequest.xml| evalsiterequested.xml| | 363| 15-Apr-20| 07:52 \nevalrequest.xml_14| evalsiterequested.xml| | 363| 15-Apr-20| 07:52 \nemltemplatefeat.xml| feature.xml| | 518| 15-Apr-20| 07:52 \nemltemplatefeat.xml_14| feature.xml| | 518| 15-Apr-20| 07:52 \nsiteupg.xml| siteupgraded.xml| | 922| 15-Apr-20| 07:52 \nsiteupg.xml_14| siteupgraded.xml| | 922| 15-Apr-20| 07:52 \nsiteupgfailed.xml| siteupgradefailed.xml| | 807| 15-Apr-20| 07:52 \nsiteupgfailed.xml_14| siteupgradefailed.xml| | 807| 15-Apr-20| 07:52 \nupgavail.xml| upgradeavailable.xml| | 1129| 15-Apr-20| 07:52 \nupgavail.xml_14| upgradeavailable.xml| | 1129| 15-Apr-20| 07:52 \nschema.xml_events| schema.xml| | 27131| 15-Apr-20| 07:52 \nevents.xml| events.xml| | 481| 15-Apr-20| 07:52 \nfeature.xml_events| feature.xml| | 975| 15-Apr-20| 07:52 \nschema.xml_external| schema.xml| | 3389| 15-Apr-20| 07:52 \nextlist.xml| externallist.xml| | 437| 15-Apr-20| 07:52 \nfeature.xml_external| feature.xml| | 485| 15-Apr-20| 07:52 \nextsubs_schema.xml| schema.xml| | 2775| 15-Apr-20| 07:52 \nextsubs.xml| extsubs.xml| | 470| 15-Apr-20| 07:52 \nextsubs_feature.xml| feature.xml| | 1216| 15-Apr-20| 07:52 \nextsubs_listinstance.xml| listinstance.xml| | 446| 15-Apr-20| 07:52 \nschema.xml_facility| schema.xml| | 5279| 15-Apr-20| 07:52 \nfacility.xml| facilitylist.xml| | 552| 15-Apr-20| 07:52 \nfeature.xml_facility| feature.xml| | 1064| 15-Apr-20| 07:52 \nschema.xml_fcgroups| schema.xml| | 5266| 15-Apr-20| 07:52 \nfcgroups.xml| fcgroupslist.xml| | 518| 15-Apr-20| 07:52 \nfeature.xml_fcgroups| feature.xml| | 546| 15-Apr-20| 07:52 \nfeature_0003.xml| feature.xml| | 1346| 15-Apr-20| 07:52 \nfldswss.xml| fieldswss.xml| | 222599| 15-Apr-20| 07:52 \nfldswss2.xml| fieldswss2.xml| | 469| 15-Apr-20| 07:52 \nfldswss3.xml| fieldswss3.xml| | 50780| 15-Apr-20| 07:52 \nfldswss4.xml| fieldswss4.xml| | 11512| 15-Apr-20| 07:52 \nschema.xml_gantt| schema.xml| | 15783| 15-Apr-20| 07:52 \ngantttl.xml| gantttaskslist.xml| | 496| 15-Apr-20| 07:52 \nfeature.xml_gantt| feature.xml| | 475| 15-Apr-20| 07:52 \nfeature_gbwprovision.xml| feature.xml| | 710| 15-Apr-20| 07:52 \nlistinstance_gbwprovision.xml| listinstance.xml| | 816| 15-Apr-20| 07:52 \nelements.xml_gbwwebparts| elements.xml| | 596| 15-Apr-20| 07:52 \nfeature.xml_gbwwebparts| feature.xml| | 346| 15-Apr-20| 07:52 \ntimecard.dwp_gbwwebparts| timecard.dwp| | 442| 15-Apr-20| 07:52 \nwhatsnew.dwp_gbwwebparts| whatsnew.dwp| | 448| 15-Apr-20| 07:52 \nwhereabouts.dwp_gbwwebparts| whereabouts.dwp| | 445| 15-Apr-20| 07:52 \nelements.xml| elements.xml| | 1584| 15-Apr-20| 07:52 \nfeature_gettingstarted.xml| feature.xml| | 957| 15-Apr-20| 07:52 \ngettingstarted.asx| gettingstarted.aspx| | 2904| 15-Apr-20| 07:52 \nelements.xml_gsappcatsite| elements.xml| | 483| 15-Apr-20| 07:52 \nfeature.xml_gsappcatsite| feature.xml| | 769| 15-Apr-20| 07:52 \ngettingstartedwithappcatalogsite.webpart_gsappcatsite| gettingstartedwithappcatalogsite.webpart| | 915| 15-Apr-20| 07:52 \nschema.xml_gridlist| schema.xml| | 2824| 15-Apr-20| 07:52 \ngridlist.xml| gridlist.xml| | 454| 15-Apr-20| 07:52 \nfeature.xml_gridlist| feature.xml| | 477| 15-Apr-20| 07:52 \nfeature_groupwork.xml| feature.xml| | 728| 15-Apr-20| 07:52 \nlistinstance_groupwork.xml| listinstance.xml| | 962| 15-Apr-20| 07:52 \nschema.xml_helplibrary| schema.xml| | 18584| 15-Apr-20| 07:52 \nhelplibrary.xml| helplibrary.xml| | 587| 15-Apr-20| 07:52 \nfeature.xml_helplibrary| feature.xml| | 566| 15-Apr-20| 07:52 \nhelpcontenttypes| helpcontenttypes.xml| | 3976| 15-Apr-20| 07:52 \nhelpsitecolumns| helpsitecolumns.xml| | 7052| 15-Apr-20| 07:52 \nschema.xml_hierarchy| schema.xml| | 20345| 15-Apr-20| 07:52 \nhierarchyl.xml| hierarchytaskslist.xml| | 1459| 15-Apr-20| 07:52 \nfeature.xml_hierarchy| feature.xml| | 3460| 15-Apr-20| 07:52 \nschema.xml_holiday| schema.xml| | 7813| 15-Apr-20| 07:52 \nholiday.xml| holidayslist.xml| | 541| 15-Apr-20| 07:52 \nfeature.xml_holiday| feature.xml| | 1048| 15-Apr-20| 07:52 \nfeature.xml_ifedependentapps| feature.xml| | 412| 15-Apr-20| 07:52 \nschema.xml_imedic| schema.xml| | 5726| 15-Apr-20| 07:52 \nimedic.xml| imediclist.xml| | 1655| 15-Apr-20| 07:52 \nfeature.xml_imedic| feature.xml| | 894| 15-Apr-20| 07:52 \nschema.xml_issues| schema.xml| | 9760| 15-Apr-20| 07:52 \nissues.xml| issues.xml| | 446| 15-Apr-20| 07:52 \nfeature.xml_issues| feature.xml| | 466| 15-Apr-20| 07:52 \nschema.xml_links| schema.xml| | 41072| 15-Apr-20| 07:52 \nlinks.xml| links.xml| | 441| 15-Apr-20| 07:52 \nfeature.xml_links| feature.xml| | 476| 15-Apr-20| 07:52 \nschema.xml_mainlo| schema.xml| | 2006| 15-Apr-20| 07:52 \nschema.xml_mainlo_v14| schema.xml| | 2006| 15-Apr-20| 07:52 \nfeature.xml_mainlo| feature.xml| | 706| 15-Apr-20| 07:52 \nfeature.xml_mainlo_v14| feature.xml| | 706| 15-Apr-20| 07:52 \nmaintenancelogsinstance.xml_mainlo| maintenancelogsinstance.xml| | 412| 15-Apr-20| 07:52 \nmaintenancelogsinstance.xml_mainlo_v14| maintenancelogsinstance.xml| | 412| 15-Apr-20| 07:52 \nmaintenancelogstemplate.xml_mainlo| maintenancelogstemplate.xml| | 728| 15-Apr-20| 07:52 \nmaintenancelogstemplate.xml_mainlo_v14| maintenancelogstemplate.xml| | 728| 15-Apr-20| 07:52 \nfeature.xml_mbrowserredirect| feature.xml| | 418| 15-Apr-20| 07:52 \nfeature.xml_mbrowserredirectstapling| feature.xml| | 437| 15-Apr-20| 07:52 \nfeature.xml_mbrowserredirectfeaturestp| featurestapling.xml| | 637| 15-Apr-20| 07:52 \nfeature.xml_mds| feature.xml| | 520| 15-Apr-20| 07:52 \nmriddflt.xml| default.aspx| | 1270| 15-Apr-20| 07:52 \nmridelms.xml| elements.xml| | 210| 15-Apr-20| 07:52 \nmridfeat.xml| feature.xml| | 461| 15-Apr-20| 07:52 \nelements.xml_mpswebparts| elements.xml| | 583| 15-Apr-20| 07:52 \nfeature.xml_mpswebparts| feature.xml| | 469| 15-Apr-20| 07:52 \nncwfl.xml| nocodeworkflowlibrary.xml| | 1118| 15-Apr-20| 07:52 \nschema.xml_nocodepublicwf| schema.xml| | 4515| 15-Apr-20| 07:52 \nschema.xml_nocodewf| schema.xml| | 4455| 15-Apr-20| 07:52 \nfeature.xml_nocodewf| feature.xml| | 493| 15-Apr-20| 07:52 \nschema.xml_oecatalog| schema.xml| | 24259| 15-Apr-20| 07:52 \nfeature.xml_oecatalog| feature.xml| | 1840| 15-Apr-20| 07:52 \noecatalogfields.xml_oecatalog| oecatalogfields.xml| | 7204| 15-Apr-20| 07:52 \noecataloginstance.xml_oecatalog| oecataloginstance.xml| | 436| 15-Apr-20| 07:52 \noecatalogtemplate.xml_oecatalog| oecatalogtemplate.xml| | 718| 15-Apr-20| 07:52 \nfeature.xml_openinclient| feature.xml| | 435| 15-Apr-20| 07:52 \npnsubr.xml| pnsubscriberreceivers.xml| | 516| 15-Apr-20| 07:52 \npnsubs.xml| pnsubscribers.xml| | 425| 15-Apr-20| 07:52 \nschema.xml_pnsubs| schema.xml| | 1204| 15-Apr-20| 07:52 \nfeature.xml_pnsubs| feature.xml| | 883| 15-Apr-20| 07:52 \nlistinstance.xml_pnsubs| listinstance.xml| | 446| 15-Apr-20| 07:52 \npiclib.xml| picturelibrary.xml| | 473| 15-Apr-20| 07:52 \nallitems.aspx_piclib| allitems.aspx| | 3916| 15-Apr-20| 07:52 \ndispform.aspx_piclib| dispform.aspx| | 4735| 15-Apr-20| 07:52 \neditform.aspx_piclib| editform.aspx| | 4393| 15-Apr-20| 07:52 \nschema.xml| schema.xml| | 43005| 15-Apr-20| 07:52 \nselected.aspx_piclib| selected.aspx| | 3916| 15-Apr-20| 07:52 \nslidshow.aspx_piclib| slidshow.aspx| | 4133| 15-Apr-20| 07:52 \nupload.aspx_piclib| upload.aspx| | 6294| 15-Apr-20| 07:52 \nwebfldr.aspx_piclib| webfldr.aspx| | 2521| 15-Apr-20| 07:52 \nfeature.xml_piclib| feature.xml| | 864| 15-Apr-20| 07:52 \npromotedlinks.xml| promotedlinks.xml| | 495| 15-Apr-20| 07:52 \nschema.xml_promotedlinks| schema.xml| | 8219| 15-Apr-20| 07:52 \nfeature.xml_promotedlinks| feature.xml| | 497| 15-Apr-20| 07:52 \nschedule.xml| schedulelist.xml| | 526| 15-Apr-20| 07:52 \nfeature.xml_schedule| feature.xml| | 546| 15-Apr-20| 07:52 \nschema.xml_schedule| schema.xml| | 23502| 15-Apr-20| 07:52 \nfeature.xml_sharewitheveryone| feature.xml| | 622| 15-Apr-20| 07:52 \nfeature.xml_sharewitheveryonestapling| feature.xml| | 449| 15-Apr-20| 07:52 \nfeature.xml_sharewitheveryonefeaturestp| featurestapling.xml| | 215| 15-Apr-20| 07:52 \nfeature.xml_siteassets| feature.xml| | 526| 15-Apr-20| 07:52 \nfeature.xml_sitehelp| feature.xml| | 804| 15-Apr-20| 07:52 \nfeature.xml_sitenotebook| feature.xml| | 703| 15-Apr-20| 07:52 \nfeature.xml_0002| feature.xml| | 516| 15-Apr-20| 07:52 \nsitesettings.xml| sitesettings.xml| | 21358| 15-Apr-20| 07:52 \nelements.xml_sitestat| elements.xml| | 334| 15-Apr-20| 07:52 \nelements14.xml_sitestat| elements.xml| | 334| 15-Apr-20| 07:52 \nfeature.xml_sitestat| feature.xml| | 397| 15-Apr-20| 07:52 \nfeature14.xml_sitestat| feature.xml| | 397| 15-Apr-20| 07:52 \nupgfeature.xml| feature.xml| | 528| 15-Apr-20| 07:52 \nupgfeature.xml_14| feature.xml| | 528| 15-Apr-20| 07:52 \nsiteupgrade.xml| siteupgradelinks.xml| | 970| 15-Apr-20| 07:52 \nsiteupgrade.xml_14| siteupgradelinks.xml| | 970| 15-Apr-20| 07:52 \nelements.xml_suitenav| elements.xml| | 478| 15-Apr-20| 07:52 \nfeature.xml_suitenav| feature.xml| | 366| 15-Apr-20| 07:52 \nsurveys.xml| surveys.xml| | 477| 15-Apr-20| 07:52 \nfeature.xml_surveys| feature.xml| | 478| 15-Apr-20| 07:52 \nschema.xml_surveys| schema.xml| | 40244| 15-Apr-20| 07:52 \ntasks.xml| tasks.xml| | 468| 15-Apr-20| 07:52 \nfeature.xml_tasks| feature.xml| | 476| 15-Apr-20| 07:52 \nschema.xml_tasks| schema.xml| | 17465| 15-Apr-20| 07:52 \nfeature_teamcollab.xml| feature.xml| | 3223| 15-Apr-20| 07:52 \ndefault.xml_tenantadminbdc| default.xml| | 347| 15-Apr-20| 07:52 \nfeature.xml_tenantadminbdc| feature.xml| | 514| 15-Apr-20| 07:52 \nfeature.xml_tenantadminbdcstapling| feature.xml| | 443| 15-Apr-20| 07:52 \nfeature.xml_tenantadminbdcfeaturestp| featurestapling.xml| | 222| 15-Apr-20| 07:52 \ndefault.xml_tenantadminlinks| default.xml| | 3573| 15-Apr-20| 07:52 \nfeature.xml_tenantadminlinks| feature.xml| | 517| 15-Apr-20| 07:52 \ntimecard.xml| timecardlist.xml| | 8045| 15-Apr-20| 07:52 \nfeature.xml_timecard| feature.xml| | 916| 15-Apr-20| 07:52 \nschema.xml_timecard| schema.xml| | 8517| 15-Apr-20| 07:52 \nfeature.xml_excelserveredit| feature.xml| | 749| 15-Apr-20| 07:52 \nfeature.xml_excelserveredit_14| feature.xml| | 749| 15-Apr-20| 07:52 \nfeature.xml_officewebapps| feature.xml| | 752| 15-Apr-20| 07:52 \nfeature.xml_officewebapps_14| feature.xml| | 752| 15-Apr-20| 07:52 \nfeature.xml_onenoteserverviewing| feature.xml| | 752| 15-Apr-20| 07:52 \nfeature.xml_onenoteserverviewing_14| feature.xml| | 752| 15-Apr-20| 07:52 \nfeature.xml_wordserverviewing| feature.xml| | 752| 15-Apr-20| 07:52 \nfeature.xml_wordserverviewing_14| feature.xml| | 752| 15-Apr-20| 07:52 \nwbpglib.xml| webpagelibrary.xml| | 496| 15-Apr-20| 07:52 \nfeature.xml_webpagelib| feature.xml| | 478| 15-Apr-20| 07:52 \nschema.xml_webpagelib| schema.xml| | 16443| 15-Apr-20| 07:52 \nupload.aspx_webpagelib| upload.aspx| | 5911| 15-Apr-20| 07:52 \nwhatsnew.xml| whatsnewlist.xml| | 518| 15-Apr-20| 07:52 \nfeature.xml_whatsnew| feature.xml| | 521| 15-Apr-20| 07:52 \nschema.xml_whatsnew| schema.xml| | 21487| 15-Apr-20| 07:52 \nwhereabouts.xml| whereaboutslist.xml| | 1704| 15-Apr-20| 07:52 \nfeature.xml_whereabouts| feature.xml| | 1067| 15-Apr-20| 07:52 \nschema.xml_whereabouts| schema.xml| | 149506| 15-Apr-20| 07:52 \nfeature.xml_wikipagehomepage| feature.xml| | 902| 15-Apr-20| 07:52 \nfeature.xml_wikiwelcome| feature.xml| | 594| 15-Apr-20| 07:52 \nworkflowhistory.xml| workflowhistory.xml| | 489| 15-Apr-20| 07:52 \nfeature.xml_wrkflhis| feature.xml| | 482| 15-Apr-20| 07:52 \nschema.xml_wrkflhis| schema.xml| | 8019| 15-Apr-20| 07:52 \nworkflowprocess.xml| workflowprocess.xml| | 496| 15-Apr-20| 07:52 \nfeature.xml_wrkflproc| feature.xml| | 531| 15-Apr-20| 07:52 \nschema.xml_wrkflprc| schema.xml| | 629| 15-Apr-20| 07:52 \nformlib.xml| xmlformlibrary.xml| | 477| 15-Apr-20| 07:52 \nfeature.xml_xmlform| feature.xml| | 472| 15-Apr-20| 07:52 \neditdlg.htm_xmlform| editdlg.htm| | 4892| 15-Apr-20| 07:52 \nfiledlg.htm_xmlform| filedlg.htm| | 4754| 15-Apr-20| 07:52 \nrepair.aspx_xmlform| repair.aspx| | 3272| 15-Apr-20| 07:52 \nschema.xml_xmlform| schema.xml| | 20593| 15-Apr-20| 07:52 \nupload.aspx_xmlform| upload.aspx| | 5911| 15-Apr-20| 07:52 \nfgimg.png| fgimg.png| | 11776| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.health.dll| microsoft.sharepoint.health.dll| 15.0.4989.1000| 109896| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.identitymodel.dll| microsoft.sharepoint.identitymodel.dll| 15.0.5241.1000| 261216| 15-Apr-20| 07:52 \nadmin.dll_0001| admin.dll| 15.0.4454.1000| 18528| 15-Apr-20| 07:52 \nauthor.dll_0001| author.dll| 15.0.4454.1000| 18528| 15-Apr-20| 07:52 \nshtml.dll_0001| shtml.dll| 15.0.4454.1000| 18544| 15-Apr-20| 07:52 \njsgridcluster.png| jsgridcluster.png| | 2003| 15-Apr-20| 07:52 \nmicrosoft.online.sharepoint.dedicated.tenantadmin.dll| microsoft.online.sharepoint.dedicated.tenantadmin.dll| 15.0.4605.1000| 48832| 15-Apr-20| 07:52 \nmicrosoft.online.sharepoint.dedicated.tenantadmin.serverstub.dll| microsoft.online.sharepoint.dedicated.tenantadmin.serverstub.dll| 15.0.4535.1000| 79608| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.client.dll| microsoft.sharepoint.client.dll| 15.0.5223.1000| 499088| 15-Apr-20| 07:12 \nmicrosoft.sharepoint.client.dll_0001| microsoft.sharepoint.client.dll| 15.0.5223.1000| 499088| 15-Apr-20| 07:12 \ntaps_client.dll| microsoft.sharepoint.client.dll| 15.0.5223.1000| 499088| | \nmicrosoft.sharepoint.client.phone.dll| microsoft.sharepoint.client.phone.dll| 15.0.5223.1000| 434568| 15-Apr-20| 07:51 \nmicrosoft.sharepoint.client.phone.runtime.dll| microsoft.sharepoint.client.phone.runtime.dll| 15.0.4859.1000| 206616| 15-Apr-20| 07:51 \nmicrosoft.sharepoint.client.runtime.dll| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| 15-Apr-20| 07:12 \nmicrosoft.sharepoint.client.runtime.dll_0001| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| 15-Apr-20| 07:12 \ntaps_client.runtime.dll| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| | \nmicrosoft.sharepoint.client.serverruntime.dll| microsoft.sharepoint.client.serverruntime.dll| 15.0.4905.1000| 630608| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.client.serverruntime.dll_0001| microsoft.sharepoint.client.serverruntime.dll| 15.0.4905.1000| 630608| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.client.silverlight.dll| microsoft.sharepoint.client.silverlight.dll| 15.0.5223.1000| 433552| 15-Apr-20| 07:12 \nmicrosoft.sharepoint.client.silverlight.runtime.dll| microsoft.sharepoint.client.silverlight.runtime.dll| 15.0.4859.1000| 197424| 15-Apr-20| 07:12 \nspmintl.dll| microsoft.sharepoint.linq.codegeneration.intl.dll| 15.0.4420.1017| 17032| 15-Apr-20| 07:52 \nspldtsvc.dll| microsoft.sharepoint.linq.dataservice.dll| 15.0.4633.1000| 42720| 15-Apr-20| 07:52 \nsplinq.dll| microsoft.sharepoint.linq.dll| 15.0.4843.1000| 376032| 15-Apr-20| 07:52 \nsplinqvs.dll| microsoft.sharepoint.linq.dll| 15.0.4843.1000| 376032| 15-Apr-20| 07:52 \nsplintl.dll| microsoft.sharepoint.linq.intl.dll| 15.0.4420.1017| 26784| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.serverstub.dll| microsoft.sharepoint.serverstub.dll| 15.0.4987.1000| 1427768| 15-Apr-20| 07:52 \nspnativerequestmoduledll_0001| spnativerequestmodule.dll| | 42064| 15-Apr-20| 07:52 \noffprsx.dll| offparser.dll| 15.0.5233.1000| 1489296| 15-Apr-20| 07:52 \noisimg.dll| oisimg.dll| 15.0.5085.1000| 96848| 15-Apr-20| 07:52 \nstslib.dll_0001| microsoft.sharepoint.library.dll| 15.0.4971.1000| 184576| 15-Apr-20| 07:52 \nowssvr.dll_0001| owssvr.dll| 15.0.5241.1000| 6378888| 15-Apr-20| 07:52 \nsts11plc.config| policy.11.0.microsoft.sharepoint.config| | 590| 15-Apr-20| 07:52 \nsts11plc.dll| policy.11.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12456| 15-Apr-20| 07:52 \nspsec11.config| policy.11.0.microsoft.sharepoint.security.config| | 599| 15-Apr-20| 07:52 \nspsec11.dll| policy.11.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12496| 15-Apr-20| 07:52 \nsts12plc.config| policy.12.0.microsoft.sharepoint.config| | 590| 15-Apr-20| 07:52 \nsts12plc.dll| policy.12.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12456| 15-Apr-20| 07:52 \nspsec12.config| policy.12.0.microsoft.sharepoint.security.config| | 599| 15-Apr-20| 07:52 \nspsec12.dll| policy.12.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12456| 15-Apr-20| 07:52 \nwfa12plc.config| policy.12.0.microsoft.sharepoint.workflowactions.config| | 606| 15-Apr-20| 07:52 \nwfa12plc.dll| policy.12.0.microsoft.sharepoint.workflowactions.dll| 15.0.4420.1017| 12488| 15-Apr-20| 07:52 \nwfs12plc.config| policy.12.0.microsoft.sharepoint.workflows.config| | 600| 15-Apr-20| 07:52 \nwfs12plc.dll| policy.12.0.microsoft.sharepoint.workflows.dll| 15.0.4420.1017| 12496| 15-Apr-20| 07:52 \nbusinessdata14.config| policy.14.0.microsoft.businessdata.config| | 592| 15-Apr-20| 07:52 \nbusinessdata14.dll| policy.14.0.microsoft.businessdata.dll| 15.0.4420.1017| 12464| 15-Apr-20| 07:52 \nclt14plc.config| policy.14.0.microsoft.sharepoint.client.config| | 597| 15-Apr-20| 07:52 \nclt14plc.dll| policy.14.0.microsoft.sharepoint.client.dll| 15.0.4420.1017| 12472| 15-Apr-20| 07:52 \ncltrtm14.config| policy.14.0.microsoft.sharepoint.client.runtime.config| | 605| 15-Apr-20| 07:52 \ncltrtm14.dll| policy.14.0.microsoft.sharepoint.client.runtime.dll| 15.0.4420.1017| 12488| 15-Apr-20| 07:52 \ncltsvr14.config| policy.14.0.microsoft.sharepoint.client.serverruntime.config| | 611| 15-Apr-20| 07:52 \ncltsvr14.dll| policy.14.0.microsoft.sharepoint.client.serverruntime.dll| 15.0.4420.1017| 12496| 15-Apr-20| 07:52 \nsts14plc.config| policy.14.0.microsoft.sharepoint.config| | 590| 15-Apr-20| 07:52 \nsts14plc.dll| policy.14.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12472| 15-Apr-20| 07:52 \nlinq14.config| policy.14.0.microsoft.sharepoint.linq.config| | 595| 15-Apr-20| 07:52 \nlinq14.dll| policy.14.0.microsoft.sharepoint.linq.dll| 15.0.4420.1017| 12464| 15-Apr-20| 07:52 \npowshl14.config| policy.14.0.microsoft.sharepoint.powershell.config| | 601| 15-Apr-20| 07:52 \npowshl14.dll| policy.14.0.microsoft.sharepoint.powershell.dll| 15.0.4420.1017| 12480| 15-Apr-20| 07:52 \nspsec14.config| policy.14.0.microsoft.sharepoint.security.config| | 599| 15-Apr-20| 07:52 \nspsec14.dll| policy.14.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12456| 15-Apr-20| 07:52 \nwfa14plc.config| policy.14.0.microsoft.sharepoint.workflowactions.config| | 606| 15-Apr-20| 07:52 \nwfa14plc.dll| policy.14.0.microsoft.sharepoint.workflowactions.dll| 15.0.4420.1017| 12488| 15-Apr-20| 07:52 \nwfs14plc.config| policy.14.0.microsoft.sharepoint.workflows.config| | 600| 15-Apr-20| 07:52 \nwfs14plc.dll| policy.14.0.microsoft.sharepoint.workflows.dll| 15.0.4420.1017| 12496| 15-Apr-20| 07:52 \ncmdui14.config| policy.14.0.microsoft.web.commandui.config| | 593| 15-Apr-20| 07:52 \ncmdui14.dll| policy.14.0.microsoft.web.commandui.dll| 15.0.4420.1017| 12464| 15-Apr-20| 07:52 \nformat.ps1xml| sharepointpowershell.format.ps1xml| | 61362| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.powershell.dll_0001| microsoft.sharepoint.powershell.dll| 15.0.4949.1000| 993024| 15-Apr-20| 07:52 \nmicrosoft.sharepoint.powershell.intl.dll| microsoft.sharepoint.powershell.intl.dll| 15.0.4863.1000| 95488| 15-Apr-20| 07:52 \npsconsole.psc1| psconsole.psc1| | 181| 15-Apr-20| 07:52 \nsharepoint.ps1| sharepoint.ps1| | 9838| 15-Apr-20| 07:52 \nspcmdletschema.xsd| spcmdletschema.xsd| | 1114| 15-Apr-20| 07:52 \nwsscmdlet.xml| wsscmdlet.xml| | 113235| 15-Apr-20| 07:52 \ntypes.ps1xml| sharepointpowershell.types.ps1xml| | 18000| 15-Apr-20| 07:52 \npscintl.dll| microsoft.sharepoint.setupconfiguration.intl.dll| 15.0.5197.1000| 2087008| 15-Apr-20| 07:52 \npsconfig.exe| psconfig.exe| 15.0.4939.1000| 564544| 15-Apr-20| 07:52 \npsconfig.exe.config| psconfig.exe.config| | 273| 15-Apr-20| 07:52 \npsconfigui.exe| psconfigui.exe| 15.0.4939.1000| 825664| 15-Apr-20| 07:52 \npsconfigui.exe.config| psconfigui.exe.config| | 273| 15-Apr-20| 07:52 \ncore_0.rsx| core.resx| | 490005| 15-Apr-20| 07:52 \nadmincfg.xml| adminconfig.xml| | 1288| 15-Apr-20| 07:52 \nbdcservice.xml| bdcservice.xml| | 632| 15-Apr-20| 07:52 \njoinfarm.xml| joinfarm.xml| | 648| 15-Apr-20| 07:52 \nsilverlight.js_script| silverlight.js| | 7950| 15-Apr-20| 07:52 \nsts_addgallery_ooprovider| addgallery.officeonlineprovider.dll| 15.0.4420.1017| 43144| 15-Apr-20| 07:52 \naddgallery.aspx_silverlight| addgallery.aspx| | 11755| 15-Apr-20| 07:52 \ndldsln16.png| dldsln16.png| | 912| 15-Apr-20| 07:52 \ndldsln32.png| dldsln32.png| | 2612| 15-Apr-20| 07:52 \nsts_addgallery_server| microsoft.sharepoint.addgallery.server.dll| 15.0.4508.1000| 115904| 15-Apr-20| 07:52 \nsp.datetimeutil.res_0.resx| sp.datetimeutil.res.resx| | 5825| 15-Apr-20| 07:52 \nsp.datetimeutil.res_0.resx_0.scriptx| sp.datetimeutil.res.resx.scriptx| | 255| 15-Apr-20| 07:52 \nsp.jsgrid.res_0.resx| sp.jsgrid.res.resx| | 16415| 15-Apr-20| 07:52 \nsp.jsgrid.res_0.resx_0.scriptx| sp.jsgrid.res.resx.scriptx| | 249| 15-Apr-20| 07:52 \nsp.res_0.resx| sp.res.resx| | 73515| 15-Apr-20| 07:52 \nspmetal.exe| spmetal.exe| 15.0.4420.1017| 140488| 15-Apr-20| 07:52 \nsts.spuchostservice.exe| spuchostservice.exe| 15.0.4525.1000| 118040| 15-Apr-20| 07:52 \nsts.spuchostservice.exe.config| spuchostservice.exe.config| | 644| 15-Apr-20| 07:52 \nsts.spucworkerprocess.exe| spucworkerprocess.exe| 15.0.4510.1000| 46856| 15-Apr-20| 07:52 \nsts.spucworkerprocess.exe.config| spucworkerprocess.exe.config| | 654| 15-Apr-20| 07:52 \nsts.spucworkerprocessproxy.exe| spucworkerprocessproxy.exe| 15.0.4420.1017| 115440| 15-Apr-20| 07:52 \nsts.spucworkerprocessproxy.exe.config| spucworkerprocessproxy.exe.config| | 644| 15-Apr-20| 07:52 \nspusercode.dll_0001| microsoft.sharepoint.usercode.dll| 15.0.4525.1000| 26816| 15-Apr-20| 07:52 \nadmsoap.dll| admsoap.dll| 15.0.4420.1017| 15496| 15-Apr-20| 07:52 \nadmin.amx| admin.asmx| | 86| 15-Apr-20| 07:52 \nadmdisco.asx| admindisco.aspx| | 1283| 15-Apr-20| 07:52 \nadmwsdl.asx| adminwsdl.aspx| | 9474| 15-Apr-20| 07:52 \nweb.cfg_0001| web.config| | 445| 15-Apr-20| 07:52 \nstsadm.exe| stsadm.exe| 15.0.4420.1017| 350392| 15-Apr-20| 07:52 \nstsadm.exe.config| stsadm.exe.config| | 272| 15-Apr-20| 07:52 \nstscfg.exe| stscfg.exe| 15.0.4420.1017| 14944| 15-Apr-20| 07:52 \nbecwebserviceclientconfig| client.config| | 1437| 15-Apr-20| 07:52 \nsecuritytokenappsvc| appsts.svc| | 452| 15-Apr-20| 07:52 \nappwrweb.cfg| appwpresweb.config| | 1210| 15-Apr-20| 07:52 \ncloudweb.cfg| cloudweb.config| | 64941| 15-Apr-20| 07:52 \nstsomdia.dll| microsoft.sharepoint.diagnostics.dll| 15.0.4420.1017| 18080| 15-Apr-20| 07:52 \nstsom.dll| microsoft.sharepoint.dll| 15.0.5241.1000| 26860424| 16-Apr-20| 02:36 \nstsom.dll_0001| microsoft.sharepoint.dll| 15.0.5241.1000| 26860424| 16-Apr-20| 02:36 \nxlsrv.ecs.stsom.dll| microsoft.sharepoint.dll| 15.0.5241.1000| 26860424| 16-Apr-20| 02:36 \nxlsrv.ecswatchdog.stsom.dll| microsoft.sharepoint.dll| 15.0.5241.1000| 26860424| 16-Apr-20| 02:36 \nxlsrv.stsom.dll| microsoft.sharepoint.dll| 15.0.5241.1000| 26860424| 16-Apr-20| 02:36 \nstsomdr.dll| microsoft.sharepoint.intl.dll| 15.0.5197.1000| 1260640| 15-Apr-20| 07:52 \nbdcservice.svc| bdcservice.svc| | 383| 15-Apr-20| 07:52 \nbdcwebclient.config| client.config| | 2125| 15-Apr-20| 07:52 \nbdcserviceweb.config| web.config| | 3156| 15-Apr-20| 07:52 \nsecuritytokenclientconfig| client.config| | 3448| 15-Apr-20| 07:52 \nsecuritytokenconfig| web.config| | 6235| 15-Apr-20| 07:52 \nsecuritytokensvc| securitytoken.svc| | 443| 15-Apr-20| 07:52 \nwintokcachesvc| windowstokencache.svc| | 395| 15-Apr-20| 07:52 \nsubscriptionsettingsclientconfig| client.config| | 2369| 15-Apr-20| 07:52 \nsubscriptionsettingsservicesvc| subscriptionsettings.svc| | 367| 15-Apr-20| 07:52 \nsubscriptionsettingsserviceconfig| web.config| | 2647| 15-Apr-20| 07:52 \ntopologyclientconfig| client.config| | 982| 15-Apr-20| 07:52 \ntopologyservicesvc| topology.svc| | 347| 15-Apr-20| 07:52 \ntopologyserviceconfig| web.config| | 1604| 15-Apr-20| 07:52 \nusercodeweb.cfg| web.config| | 1002| 15-Apr-20| 07:52 \nweb.cfg| web.config| | 64941| 15-Apr-20| 07:52 \nweb.cfg_0003| web.config| | 258| 15-Apr-20| 07:52 \nstsap.dll| microsoft.sharepoint.applicationpages.dll| 15.0.5119.1000| 1487952| 15-Apr-20| 07:52 \nstsomsec.dll| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-20| 07:12 \nstsomsec.dll_0001| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-20| 07:12 \nxlsrv.spsec.dll| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-20| 07:12 \nsppimps.xml| sharepointpermission.impersonate.xml| | 207| 15-Apr-20| 07:52 \nsppom.xml| sharepointpermission.objectmodel.xml| | 207| 15-Apr-20| 07:52 \nsppusog.xml| sharepointpermission.unsafesaveonget.xml| | 211| 15-Apr-20| 07:52 \nwssmedtr.cfg| wss_mediumtrust.config| | 13782| 15-Apr-20| 07:52 \nwssmintr.cfg| wss_minimaltrust.config| | 9149| 15-Apr-20| 07:52 \nusercode.cfg| wss_usercode.config| | 5855| 15-Apr-20| 07:52 \nsub.amx| alerts.asmx| | 88| 15-Apr-20| 07:52 \nsubdisco.asx| alertsdisco.aspx| | 1313| 15-Apr-20| 07:52 \nsubwsdl.asx| alertswsdl.aspx| | 8824| 15-Apr-20| 07:52 \nauth.amx| authentication.asmx| | 96| 15-Apr-20| 07:52 \nautdisco.asx| authenticationdisco.aspx| | 1301| 15-Apr-20| 07:52 \nautwsdl.asx| authenticationwsdl.aspx| | 5968| 15-Apr-20| 07:52 \nbdcadminservice.svc| bdcadminservice.svc| | 332| 15-Apr-20| 07:52 \nbdcexecutionservice.svc| bdcremoteexecutionservice.svc| | 197| 15-Apr-20| 07:52 \nbdcresolverpickerservice.svc| bdcresolverpickerservice.svc| | 402| 15-Apr-20| 07:52 \ncellstorage.https.svc| cellstorage.https.svc| | 205| 15-Apr-20| 07:52 \ncellstorage.svc| cellstorage.svc| | 200| 15-Apr-20| 07:52 \ncopy.amx| copy.asmx| | 86| 15-Apr-20| 07:52 \ncopdisco.asx| copydisco.aspx| | 1281| 15-Apr-20| 07:52 \ncopwsdl.asx| copywsdl.aspx| | 11267| 15-Apr-20| 07:52 \ndiagnostics.amx| diagnostics.asmx| | 103| 15-Apr-20| 07:52 \ndiagdata.svc| diagnosticsdata.svc| | 391| 15-Apr-20| 07:52 \ndiagnosticsdisco.asx| diagnosticsdisco.aspx| | 1329| 15-Apr-20| 07:52 \ndiagnosticswsdl.asx| diagnosticswsdl.aspx| | 4677| 15-Apr-20| 07:52 \ndocumentsharing.svc| documentsharing.svc| | 331| 15-Apr-20| 07:52 \ndspsts.amx| dspsts.asmx| | 179| 15-Apr-20| 07:53 \ndspstsdi.asx_0001| dspstsdisco.aspx| | 1289| 15-Apr-20| 07:53 \ndspstsws.asx_0001| dspstswsdl.aspx| | 10966| 15-Apr-20| 07:53 \ndws.amx| dws.asmx| | 85| 15-Apr-20| 07:52 \ndwsdisco.asx| dwsdisco.aspx| | 1287| 15-Apr-20| 07:52 \ndwswsdl.asx| dwswsdl.aspx| | 20223| 15-Apr-20| 07:52 \nexcelrest.asx| excelrest.aspx| | 202| 15-Apr-20| 07:52 \nexportwp.asx| exportwp.aspx| | 498| 15-Apr-20| 07:52 \nexpurlwp.asx| expurlwp.aspx| | 243| 15-Apr-20| 07:52 \nforms.amx| forms.asmx| | 87| 15-Apr-20| 07:52 \nfordisco.asx| formsdisco.aspx| | 1283| 15-Apr-20| 07:52 \nforwsdl.asx| formswsdl.aspx| | 5644| 15-Apr-20| 07:52 \nimaging.amx| imaging.asmx| | 89| 15-Apr-20| 07:52 \nimadisco.asx| imagingdisco.aspx| | 1295| 15-Apr-20| 07:52 \nimawsdl.asx| imagingwsdl.aspx| | 24227| 15-Apr-20| 07:52 \nlistdata.svc| listdata.svc| | 392| 15-Apr-20| 07:52 \nlists.amx| lists.asmx| | 87| 15-Apr-20| 07:52 \nlisdisco.asx| listsdisco.aspx| | 1283| 15-Apr-20| 07:52 \nliswsdl.asx| listswsdl.aspx| | 73094| 15-Apr-20| 07:52 \nmeetings.amx| meetings.asmx| | 90| 15-Apr-20| 07:52 \nmeedisco.asx| meetingsdisco.aspx| | 1307| 15-Apr-20| 07:52 \nmeewsdl.asx| meetingswsdl.aspx| | 26921| 15-Apr-20| 07:52 \nonenote.ashx| onenote.ashx| | 89| 15-Apr-20| 07:52 \npeople.amx| people.asmx| | 88| 15-Apr-20| 07:52 \nppldisco.asx| peopledisco.aspx| | 1285| 15-Apr-20| 07:52 \npplwsdl.asx| peoplewsdl.aspx| | 9093| 15-Apr-20| 07:52 \nperms.amx| permissions.asmx| | 94| 15-Apr-20| 07:52 \nperdisco.asx| permissionsdisco.aspx| | 1315| 15-Apr-20| 07:52 \nperwsdl.asx| permissionswsdl.aspx| | 13698| 15-Apr-20| 07:52 \nsharedaccess.amx| sharedaccess.asmx| | 94| 15-Apr-20| 07:52 \nsharedaccessdisco.asx| sharedaccessdisco.aspx| | 1297| 15-Apr-20| 07:52 \nsharedaccesswsdl.asx| sharedaccesswsdl.aspx| | 4036| 15-Apr-20| 07:52 \nsharepointemailws.amx| sharepointemailws.asmx| | 98| 15-Apr-20| 07:52 \nsharepointemailwsdisco.asx| sharepointemailwsdisco.aspx| | 1349| 15-Apr-20| 07:52 \nsharepointemailwswsdl.asx| sharepointemailwswsdl.aspx| | 25799| 15-Apr-20| 07:52 \nsitedata.amx| sitedata.asmx| | 90| 15-Apr-20| 07:52 \nsdadisco.asx| sitedatadisco.aspx| | 1289| 15-Apr-20| 07:52 \nsdawsdl.asx| sitedatawsdl.aspx| | 36711| 15-Apr-20| 07:52 \nsites.amx| sites.asmx| | 87| 15-Apr-20| 07:52 \nsitdisco.asx| sitesdisco.aspx| | 1283| 15-Apr-20| 07:52 \nsitwsdl.asx| siteswsdl.aspx| | 22976| 15-Apr-20| 07:52 \nspclaimproviderwebservice.https.svc| spclaimproviderwebservice.https.svc| | 115| 15-Apr-20| 07:52 \nspclaimproviderwebservice.svc| spclaimproviderwebservice.svc| | 110| 15-Apr-20| 07:52 \nspdisco.asx| spdisco.aspx| | 11428| 15-Apr-20| 07:52 \nspsearchdisco.asx| spsearchdisco.aspx| | 1319| 15-Apr-20| 07:52 \nspsearchwsdl.asx| spsearchwsdl.aspx| | 8629| 15-Apr-20| 07:52 \nspsecuritytokenservice.svc| spsecuritytokenservice.svc| | 476| 15-Apr-20| 07:52 \nweb.config_sts| web.config| | 4845| 15-Apr-20| 07:52 \nusergrp.amx| usergroup.asmx| | 92| 15-Apr-20| 07:52 \nusedisco.asx| usergroupdisco.aspx| | 1311| 15-Apr-20| 07:52 \nusewsdl.asx| usergroupwsdl.aspx| | 82880| 15-Apr-20| 07:52 \nversions.amx| versions.asmx| | 90| 15-Apr-20| 07:52 \nverdisco.asx| versionsdisco.aspx| | 1289| 15-Apr-20| 07:52 \nverwsdl.asx| versionswsdl.aspx| | 9474| 15-Apr-20| 07:52 \nviews.amx| views.asmx| | 87| 15-Apr-20| 07:52 \nviedisco.asx| viewsdisco.aspx| | 1283| 15-Apr-20| 07:52 \nviewsdl.asx| viewswsdl.aspx| | 25520| 15-Apr-20| 07:52 \nweb.cfg_0010| web.config| | 13944| 15-Apr-20| 07:52 \nwppages.amx| webpartpages.asmx| | 186| 15-Apr-20| 07:52 \nwppdisco.asx| webpartpagesdisco.aspx| | 1315| 15-Apr-20| 07:52 \nwppwsdl.asx| webpartpageswsdl.aspx| | 56408| 15-Apr-20| 07:52 \nwebs.amx| webs.asmx| | 86| 15-Apr-20| 07:52 \nwebdisco.asx| websdisco.aspx| | 1281| 15-Apr-20| 07:52 \nwebwsdl.asx| webswsdl.aspx| | 41302| 15-Apr-20| 07:52 \nwopi.ashx| wopi.ashx| | 86| 15-Apr-20| 07:52 \nwsdisco.asx| wsdisco.aspx| | 1806| 15-Apr-20| 07:52 \nwswsdl.asx| wswsdl.aspx| | 1904| 15-Apr-20| 07:52 \nstssoap.dll| stssoap.dll| 15.0.5172.1000| 554088| 15-Apr-20| 07:52 \nsubsetproxy.dll_0001| microsoft.sharepoint.subsetproxy.dll| 15.0.5241.1000| 841824| 15-Apr-20| 07:52 \nsubsetshim.dll_0001| microsoft.sharepoint.dll| 15.900.5241.1000| 2133384| 15-Apr-20| 07:52 \nalerttmp.xml| alerttemplates.xml| | 458234| 15-Apr-20| 07:52 \nalerttms.xml| alerttemplates_sms.xml| | 51863| 15-Apr-20| 07:52 \ndefault.aspx_app| default.aspx| | 1168| 15-Apr-20| 07:52 \nonet.xml_app| onet.xml| | 4911| 15-Apr-20| 07:52 \ndefault.aspx_appcatalog| default.aspx| | 4026| 15-Apr-20| 07:52 \nonet.xml_appcatalog| onet.xml| | 6262| 15-Apr-20| 07:52 \napphostwebfeatures.xsd| apphostwebfeatures.xsd| | 17579| 15-Apr-20| 07:52 \nappmanifest.xsd| appmanifest.xsd| | 20392| 15-Apr-20| 07:52 \napppartconfig.xsd| apppartconfig.xsd| | 2826| 15-Apr-20| 07:52 \nappsolution.xsd| appsolution.xsd| | 101258| 15-Apr-20| 07:52 \nblog.xsl| blog.xsl| | 37369| 15-Apr-20| 07:52 \nonet.xml_blog| onet.xml| | 6549| 15-Apr-20| 07:52 \ncamlqry.xsd| camlquery.xsd| | 10890| 15-Apr-20| 07:52 \ncamlview.xsd| camlview.xsd| | 19014| 15-Apr-20| 07:52 \ncpchkers.xsd| capabilitycheckers.xsd| | 1924| 15-Apr-20| 07:52 \nschema.xml_0010| schema.xml| | 16975| 15-Apr-20| 07:52 \ndmslstallitems_aspx| allitems.aspx| | 2731| 15-Apr-20| 07:52 \ndmslstcreatedls_aspx| createdls.aspx| | 2731| 15-Apr-20| 07:52 \ndmslstdeletedls_aspx| deletedls.aspx| | 2731| 15-Apr-20| 07:52 \ndmslstdispform_aspx| dispform.aspx| | 4190| 15-Apr-20| 07:52 \ndmslsteditform_aspx| editform.aspx| | 4167| 15-Apr-20| 07:52 \ndmslstmodifydls_aspx| modifydls.aspx| | 2731| 15-Apr-20| 07:52 \ndmslstnewform_aspx| newform.aspx| | 4197| 15-Apr-20| 07:52 \ndmslstschema_xml| schema.xml| | 22840| 15-Apr-20| 07:52 \ntopology.dwp| topologyview.dwp| | 495| 15-Apr-20| 07:52 \nschema.xml_1221| schema.xml| | 9478| 15-Apr-20| 07:52 \nschema.xml_1220| schema.xml| | 7583| 15-Apr-20| 07:52 \napplications.asx_0014| applications.aspx| | 3724| 15-Apr-20| 07:52 \napps.asx_0014| apps.aspx| | 3708| 15-Apr-20| 07:52 \nbackups.asx_0014| backups.aspx| | 3714| 15-Apr-20| 07:52 \nconfigurationwizards.asx_0014| configurationwizards.aspx| | 3740| 15-Apr-20| 07:52 \ndefault.asx_0014| default.aspx| | 5454| 15-Apr-20| 07:52 \ngenappsettings.asx_0014| generalapplicationsettings.aspx| | 3753| 15-Apr-20| 07:52 \nmonitoring.asx_0014| monitoring.aspx| | 3720| 15-Apr-20| 07:52 \no365config.asx_0015| office365configuration.aspx| | 3838| 15-Apr-20| 07:52 \nsecurity.asx_0014| security.aspx| | 3716| 15-Apr-20| 07:52 \nsysset.asx_0014| systemsettings.aspx| | 3728| 15-Apr-20| 07:52 \nupgandmig.asx_0014| upgradeandmigration.aspx| | 3738| 15-Apr-20| 07:52 \nonet.xml_0006| onet.xml| | 10552| 15-Apr-20| 07:52 \ncoredefs.xsd| coredefinitions.xsd| | 3308| 15-Apr-20| 07:52 \ndeplset.xsd| deploymentexportsettings.xsd| | 4494| 15-Apr-20| 07:52 \ndepllook.xsd| deploymentlookuplistmap.xsd| | 1632| 15-Apr-20| 07:52 \ndepl.xsd| deploymentmanifest.xsd| | 79362| 15-Apr-20| 07:52 \ndeplreq.xsd| deploymentrequirements.xsd| | 1262| 15-Apr-20| 07:52 \ndeplroot.xsd| deploymentrootobjectmap.xsd| | 1642| 15-Apr-20| 07:52 \ndeplsys.xsd| deploymentsystemdata.xsd| | 3065| 15-Apr-20| 07:52 \ndepluser.xsd| deploymentusergroupmap.xsd| | 3386| 15-Apr-20| 07:52 \ndeplform.xsd| deploymentviewformslist.xsd| | 877| 15-Apr-20| 07:52 \ndip.css| dip.css| | 1781| 15-Apr-20| 07:52 \ndip.css_14| dip.css| | 1781| 15-Apr-20| 07:52 \ndip.html| dip.html| | 4328| 15-Apr-20| 07:52 \ndip.html_14| dip.html| | 4328| 15-Apr-20| 07:52 \ndip.js| dip.js| | 63039| 15-Apr-20| 07:52 \ndip.js_14| dip.js| | 63039| 15-Apr-20| 07:52 \nmessagebanner.js| messagebanner.js| | 4968| 15-Apr-20| 07:52 \nmessagebanner.js_14| messagebanner.js| | 4968| 15-Apr-20| 07:52 \ndocicon.xml| docicon.xml| | 16363| 15-Apr-20| 07:52 \nwkpstd.asx_wiki| wkpstd.aspx| | 3356| 15-Apr-20| 07:52 \nfldtypes.xml| fldtypes.xml| | 256018| 15-Apr-20| 07:52 \nfldtypes.xsl| fldtypes.xsl| | 133234| 15-Apr-20| 07:52 \nftacpl.xml| fldtypes_accessrequestspermissionlevel.xml| | 753| 15-Apr-20| 07:52 \nfluidapp.xsd| fluidapplicationsettings.xsd| | 2721| 15-Apr-20| 07:52 \nformxml.xsl| formxml.xsl| | 20914| 15-Apr-20| 07:52 \ngbwdef.asc| gbwdefaulttemplates.ascx| | 57071| 15-Apr-20| 07:52 \ngbwmdef.asc| gbwmobiledefaulttemplates.ascx| | 13722| 15-Apr-20| 07:52 \ndispsr.asx_mobile| dispsr.aspx| | 2702| 15-Apr-20| 07:52 \neditsr.asx_mobile| editsr.aspx| | 2574| 15-Apr-20| 07:52 \nnewsr.asx_mobile| newsr.aspx| | 2570| 15-Apr-20| 07:52 \nviewdaily.asx_mobile| viewdaily.aspx| | 4994| 15-Apr-20| 07:52 \nwaview.asx_mobile| waview.aspx| | 2986| 15-Apr-20| 07:52 \ndefault.aspx_gbw| default.aspx| | 3458| 15-Apr-20| 07:52 \nonet.xml_gbw| onet.xml| | 10911| 15-Apr-20| 07:52 \nschema.xml_appdatalib| schema.xml| | 314| 15-Apr-20| 07:52 \ndefault.spc| default.spcolor| | 5243| 15-Apr-20| 07:52 \npalette001.spcolor| palette001.spcolor| | 5243| 15-Apr-20| 07:52 \npalette002.spcolor| palette002.spcolor| | 5251| 15-Apr-20| 07:52 \npalette003.spcolor| palette003.spcolor| | 5247| 15-Apr-20| 07:52 \npalette004.spcolor| palette004.spcolor| | 5246| 15-Apr-20| 07:52 \npalette005.spcolor| palette005.spcolor| | 5247| 15-Apr-20| 07:52 \npalette006.spcolor| palette006.spcolor| | 5249| 15-Apr-20| 07:52 \npalette007.spcolor| palette007.spcolor| | 5251| 15-Apr-20| 07:52 \npalette008.spcolor| palette008.spcolor| | 5251| 15-Apr-20| 07:52 \npalette009.spcolor| palette009.spcolor| | 5248| 15-Apr-20| 07:52 \npalette010.spcolor| palette010.spcolor| | 5250| 15-Apr-20| 07:52 \npalette011.spcolor| palette011.spcolor| | 5248| 15-Apr-20| 07:52 \npalette012.spcolor| palette012.spcolor| | 5243| 15-Apr-20| 07:52 \npalette013.spcolor| palette013.spcolor| | 5243| 15-Apr-20| 07:52 \npalette014.spcolor| palette014.spcolor| | 5243| 15-Apr-20| 07:52 \npalette015.spcolor| palette015.spcolor| | 5243| 15-Apr-20| 07:52 \npalette016.spcolor| palette016.spcolor| | 5243| 15-Apr-20| 07:52 \npalette017.spcolor| palette017.spcolor| | 5243| 15-Apr-20| 07:52 \npalette018.spcolor| palette018.spcolor| | 5243| 15-Apr-20| 07:52 \npalette019.spcolor| palette019.spcolor| | 5243| 15-Apr-20| 07:52 \npalette020.spcolor| palette020.spcolor| | 5243| 15-Apr-20| 07:52 \npalette021.spcolor| palette021.spcolor| | 5243| 15-Apr-20| 07:52 \npalette022.spcolor| palette022.spcolor| | 5246| 15-Apr-20| 07:52 \npalette023.spcolor| palette023.spcolor| | 5246| 15-Apr-20| 07:52 \npalette024.spcolor| palette024.spcolor| | 5246| 15-Apr-20| 07:52 \npalette025.spcolor| palette025.spcolor| | 5246| 15-Apr-20| 07:52 \npalette026.spcolor| palette026.spcolor| | 5246| 15-Apr-20| 07:52 \npalette027.spcolor| palette027.spcolor| | 5246| 15-Apr-20| 07:52 \npalette028.spcolor| palette028.spcolor| | 5246| 15-Apr-20| 07:52 \npalette029.spcolor| palette029.spcolor| | 5246| 15-Apr-20| 07:52 \npalette030.spcolor| palette030.spcolor| | 5246| 15-Apr-20| 07:52 \npalette031.spcolor| palette031.spcolor| | 5246| 15-Apr-20| 07:52 \npalette032.spcolor| palette032.spcolor| | 5245| 15-Apr-20| 07:52 \npalette1.spcolor| palette1.spcolor| | 3110| 15-Apr-20| 07:52 \npalette2.spcolor| palette2.spcolor| | 3121| 15-Apr-20| 07:52 \npalette3.spcolor| palette3.spcolor| | 3122| 15-Apr-20| 07:52 \npalette4.spcolor| palette4.spcolor| | 3121| 15-Apr-20| 07:52 \npalette5.spcolor| palette5.spcolor| | 3116| 15-Apr-20| 07:52 \npalette6.spcolor| palette6.spcolor| | 3118| 15-Apr-20| 07:52 \nschema.xml_designlib| schema.xml| | 4033| 15-Apr-20| 07:52 \nfnt001.spfont| fontscheme001.spfont| | 15354| 15-Apr-20| 07:52 \nfnt002.spfont| fontscheme002.spfont| | 13545| 15-Apr-20| 07:52 \nfnt003.spfont| fontscheme003.spfont| | 15461| 15-Apr-20| 07:52 \nfnt004.spfont| fontscheme004.spfont| | 15884| 15-Apr-20| 07:52 \nfnt005.spfont| fontscheme005.spfont| | 16065| 15-Apr-20| 07:52 \nfnt006.spfont| fontscheme006.spfont| | 14209| 15-Apr-20| 07:52 \nfnt007.spfont| fontscheme007.spfont| | 15880| 15-Apr-20| 07:52 \ndefault.spf| default.spfont| | 13976| 15-Apr-20| 07:52 \nsharepoint.spfont| sharepointpersonality.spfont| | 13976| 15-Apr-20| 07:52 \nschema.xml_listtemp| schema.xml| | 80036| 15-Apr-20| 07:52 \nupload.asx_listtemp| upload.aspx| | 6141| 15-Apr-20| 07:52 \napp.mas_mplib| app.master| | 19062| 15-Apr-20| 07:52 \ndefault.mas| default.master| | 26292| 15-Apr-20| 07:52 \ndefault.mas_mplib| default.master| | 26292| 15-Apr-20| 07:52 \nlv3.mas| layoutsv3.master| | 13587| 15-Apr-20| 07:52 \nminimal.mas| minimal.master| | 8825| 15-Apr-20| 07:52 \nminimal.mas_mplib| minimal.master| | 8825| 15-Apr-20| 07:52 \nmwsdef.mas_mplib| mwsdefault.master| | 26950| 15-Apr-20| 07:52 \nmwsv15.mas_mplib| mwsdefaultv15.master| | 30580| 15-Apr-20| 07:52 \nmwsv4.mas_mplib| mwsdefaultv4.master| | 27509| 15-Apr-20| 07:52 \noslo.mas_mplib| oslo.master| | 29416| 15-Apr-20| 07:52 \noslo.prev| oslo.preview| | 10159| 15-Apr-20| 07:52 \nschema.xml_mplib| schema.xml| | 84417| 15-Apr-20| 07:52 \nseattle.mas| seattle.master| | 29925| 15-Apr-20| 07:52 \nseattle.mas_mplib| seattle.master| | 29925| 15-Apr-20| 07:52 \nseattle.prev| seattle.preview| | 10725| 15-Apr-20| 07:52 \nupload.asp_mplib| upload.aspx| | 5911| 15-Apr-20| 07:52 \nv4.mas| v4.master| | 26916| 15-Apr-20| 07:52 \nv4.mas_mplib| v4.master| | 26916| 15-Apr-20| 07:52 \nactivate.asx_solutionslib| activate.aspx| | 3861| 15-Apr-20| 07:52 \nschema.xml_solutionslib| schema.xml| | 83463| 15-Apr-20| 07:52 \nupload.asx_solutionslib| upload.aspx| | 5914| 15-Apr-20| 07:52 \nviewpage.asx_solutionslib| viewpage.aspx| | 2718| 15-Apr-20| 07:52 \nschema.xml_themeslib| schema.xml| | 1849| 15-Apr-20| 07:52 \nschema.xml_users| schema.xml| | 392079| 15-Apr-20| 07:52 \neditdlg.htm_webtemp| editdlg.htm| | 4892| 15-Apr-20| 07:52 \nschema.xml_webtemp| schema.xml| | 166908| 15-Apr-20| 07:52 \nupload.asx_webtemp| upload.aspx| | 6141| 15-Apr-20| 07:52 \nschema.xml_wplib| schema.xml| | 92345| 15-Apr-20| 07:52 \nupload.asx_wplib| upload.aspx| | 5914| 15-Apr-20| 07:52 \ncmdui.xml_global| cmdui.xml| | 631119| 15-Apr-20| 07:52 \nonet.xml_global| onet.xml| | 313439| 15-Apr-20| 07:52 \nstdview.xml_global| stdview.xml| | 54852| 15-Apr-20| 07:52 \nvwstyles.xml_global| vwstyles.xml| | 422824| 15-Apr-20| 07:52 \ngroupbd.xsl| groupboard.xsl| | 14233| 15-Apr-20| 07:52 \nhtrinfo.xml_0001| htmltransinfo.xml| | 5136| 15-Apr-20| 07:52 \ndefault.asx_forms| default.aspx| | 2788| 15-Apr-20| 07:52 \nweb.cfg_forms| web.config| | 216| 15-Apr-20| 07:52 \ndefault.asx_multilogin| default.aspx| | 2284| 15-Apr-20| 07:52 \nweb.cfg_multilogin| web.config| | 216| 15-Apr-20| 07:52 \ndefault.asx_trust| default.aspx| | 530| 15-Apr-20| 07:52 \nweb.cfg_trust| web.config| | 2190| 15-Apr-20| 07:52 \ndefault.asx_windows| default.aspx| | 522| 15-Apr-20| 07:52 \nweb.cfg_windows| web.config| | 214| 15-Apr-20| 07:52 \ninternal.xsl| internal.xsl| | 11095| 15-Apr-20| 07:52 \naccreqctl.debug.js| accessrequestscontrol.debug.js| | 18870| 15-Apr-20| 07:52 \naccreqctl.js| accessrequestscontrol.js| | 10674| 15-Apr-20| 07:52 \naccreqctl.xml| accessrequestscontrol.xml| | 103| 15-Apr-20| 07:52 \naccreqviewtmpl.debug.js| accessrequestsviewtemplate.debug.js| | 28650| 15-Apr-20| 07:52 \naccreqviewtmpl.js| accessrequestsviewtemplate.js| | 11376| 15-Apr-20| 07:52 \naccreqviewtmpl.xml| accessrequestsviewtemplate.xml| | 108| 15-Apr-20| 07:52 \nappcatalogfieldtemplate.debug.js| appcatalogfieldtemplate.debug.js| | 9040| 15-Apr-20| 07:52 \nappcatalogfieldtemplate.js| appcatalogfieldtemplate.js| | 3342| 15-Apr-20| 07:52 \nappdeveloperdash.debug.js| appdeveloperdash.debug.js| | 22542| 15-Apr-20| 07:52 \nappdeveloperdash.js| appdeveloperdash.js| | 11197| 15-Apr-20| 07:52 \naddb.xml| appdeveloperdash.xml| | 158| 15-Apr-20| 07:52 \nautofill.debug.js| autofill.debug.js| | 18404| 15-Apr-20| 07:52 \nautofill.js| autofill.js| | 10322| 15-Apr-20| 07:52 \nautohostedlicensingtemplates.debug.js| autohostedlicensingtemplates.debug.js| | 20576| 15-Apr-20| 07:52 \nautohostedlicensingtemplates.js| autohostedlicensingtemplates.js| | 8623| 15-Apr-20| 07:52 \nautohostedlicensingtemplates.xml| autohostedlicensingtemplates.xml| | 110| 15-Apr-20| 07:52 \nbform.debug.js| bform.debug.js| | 459758| 15-Apr-20| 07:52 \nbform.js| bform.js| | 258656| 15-Apr-20| 07:52 \nbform.xml| bform.xml| | 87| 15-Apr-20| 07:52 \nblank.debug.js| blank.debug.js| | 164| 15-Apr-20| 07:52 \nblank.js| blank.js| | 119| 15-Apr-20| 07:52 \ncallout.debug.js| callout.debug.js| | 84762| 15-Apr-20| 07:52 \ncallout.js| callout.js| | 26526| 15-Apr-20| 07:52 \ncallout.xml| callout.xml| | 155| 15-Apr-20| 07:52 \nchoicebuttonfieldtemplate.debug.js| choicebuttonfieldtemplate.debug.js| | 5782| 15-Apr-20| 07:52 \nchoicebuttonfieldtemplate.js| choicebuttonfieldtemplate.js| | 2388| 15-Apr-20| 07:52 \ncbft.xml| choicebuttonfieldtemplate.xml| | 97| 15-Apr-20| 07:52 \nclientforms.debug.js| clientforms.debug.js| | 153736| 15-Apr-20| 07:52 \nclientforms.js| clientforms.js| | 77613| 15-Apr-20| 07:52 \nclientforms.xml| clientforms.xml| | 145| 15-Apr-20| 07:52 \nclientpeoplepicker.debug.js| clientpeoplepicker.debug.js| | 77565| 15-Apr-20| 07:52 \nclientpeoplepicker.js| clientpeoplepicker.js| | 41210| 15-Apr-20| 07:52 \nclientrenderer.debug.js| clientrenderer.debug.js| | 23510| 15-Apr-20| 07:52 \nclientrenderer.js| clientrenderer.js| | 9805| 15-Apr-20| 07:52 \nclienttemplates.debug.js| clienttemplates.debug.js| | 294384| 15-Apr-20| 07:52 \nclienttemplates.js| clienttemplates.js| | 150425| 15-Apr-20| 07:52 \nclienttemplates.xml| clienttemplates.xml| | 101| 15-Apr-20| 07:52 \ncommonvalidation.debug.js| commonvalidation.debug.js| | 5376| 15-Apr-20| 07:52 \ncomval.js| commonvalidation.js| | 3369| 15-Apr-20| 07:52 \ncommonvalidation.xml| commonvalidation.xml| | 98| 15-Apr-20| 07:52 \ncore.debug.js| core.debug.js| | 636512| 15-Apr-20| 07:52 \ncore.js_0001| core.js| | 331719| 15-Apr-20| 07:52 \ncore.xml| core.xml| | 86| 15-Apr-20| 07:52 \ndatepicker.debug.js| datepicker.debug.js| | 48715| 15-Apr-20| 07:52 \ndatepick.js| datepicker.js| | 27099| 15-Apr-20| 07:52 \ndatepicker.xml| datepicker.xml| | 92| 15-Apr-20| 07:52 \ndesigngallery.debug.js| designgallery.debug.js| | 46223| 15-Apr-20| 07:52 \ndesigngallery.js| designgallery.js| | 28550| 15-Apr-20| 07:52 \ndesigngallery.xml| designgallery.xml| | 95| 15-Apr-20| 07:52 \ndevdash.debug.js| devdash.debug.js| | 86004| 15-Apr-20| 07:52 \ndevdash.js| devdash.js| | 36366| 15-Apr-20| 07:52 \ndragdrop.debug.js| dragdrop.debug.js| | 160299| 15-Apr-20| 07:52 \ndragdrop.js| dragdrop.js| | 85346| 15-Apr-20| 07:52 \ndragdrop.xml| dragdrop.xml| | 90| 15-Apr-20| 07:52 \nentityeditor.debug.js| entityeditor.debug.js| | 73212| 15-Apr-20| 07:52 \nentityeditor.js| entityeditor.js| | 38537| 15-Apr-20| 07:52 \nfilepreview.debug.js| filepreview.debug.js| | 18731| 15-Apr-20| 07:52 \nfilepreview.js| filepreview.js| | 10123| 15-Apr-20| 07:52 \nfilepreview.xml| filepreview.xml| | 91| 15-Apr-20| 07:52 \nfoldhyperlink.debug.js| foldhyperlink.debug.js| | 3360| 15-Apr-20| 07:52 \nfoldhyperlink.js| foldhyperlink.js| | 1544| 15-Apr-20| 07:52 \nform.debug.js| form.debug.js| | 240967| 15-Apr-20| 07:52 \nform.js| form.js| | 128992| 15-Apr-20| 07:52 \nform.xml| form.xml| | 86| 15-Apr-20| 07:52 \nganttscript.debug.js| ganttscript.debug.js| | 8826| 15-Apr-20| 07:52 \nganttscr.js| ganttscript.js| | 4787| 15-Apr-20| 07:52 \ngeolocationfieldtemplate.debug.js| geolocationfieldtemplate.debug.js| | 40185| 15-Apr-20| 07:52 \ngeolocationfieldtemplate.js| geolocationfieldtemplate.js| | 14886| 15-Apr-20| 07:52 \nglft.xml| geolocationfieldtemplate.xml| | 88| 15-Apr-20| 07:52 \ngroupboard.debug.js| groupboard.debug.js| | 15630| 15-Apr-20| 07:52 \ngroupboard.js| groupboard.js| | 9088| 15-Apr-20| 07:52 \ngroupboard.xml| groupboard.xml| | 92| 15-Apr-20| 07:52 \ngroupeditempicker.debug.js| groupeditempicker.debug.js| | 20302| 15-Apr-20| 07:52 \ngip.js| groupeditempicker.js| | 11630| 15-Apr-20| 07:52 \nhierarchytaskslist.debug.js| hierarchytaskslist.debug.js| | 59315| 15-Apr-20| 07:52 \nhierarchytaskslist.js| hierarchytaskslist.js| | 19494| 15-Apr-20| 07:52 \nhierarchytaskslist.xml| hierarchytaskslist.xml| | 57| 15-Apr-20| 07:52 \nimglib.debug.js| imglib.debug.js| | 85024| 15-Apr-20| 07:52 \nimglib.js| imglib.js| | 50445| 15-Apr-20| 07:52 \nimglib.xml| imglib.xml| | 88| 15-Apr-20| 07:52 \ninit.debug.js| init.debug.js| | 304096| 15-Apr-20| 07:52 \ninit.js_0001| init.js| | 161957| 15-Apr-20| 07:52 \ninplview.debug.js| inplview.debug.js| | 136957| 15-Apr-20| 07:52 \ninplview.js| inplview.js| | 69236| 15-Apr-20| 07:52 \ninplview.xml| inplview.xml| | 158| 15-Apr-20| 07:52 \njsgrid.debug.js| jsgrid.debug.js| | 1164592| 15-Apr-20| 07:52 \njsgrid.gantt.debug.js| jsgrid.gantt.debug.js| | 109470| 15-Apr-20| 07:52 \njsgrid.gantt.js| jsgrid.gantt.js| | 41962| 15-Apr-20| 07:52 \njsgrid.gantt.xml| jsgrid.gantt.xml| | 84| 15-Apr-20| 07:52 \njsgrid.js| jsgrid.js| | 436852| 15-Apr-20| 07:52 \njsgrid.xml| jsgrid.xml| | 60| 15-Apr-20| 07:52 \nlanguagepickercontrol.js| languagepickercontrol.js| | 11175| 15-Apr-20| 07:52 \nmapviewtemplate.debug.js| mapviewtemplate.debug.js| | 37816| 15-Apr-20| 07:52 \nmapviewtemplate.js| mapviewtemplate.js| | 15210| 15-Apr-20| 07:52 \nmapvt.xml| mapviewtemplate.xml| | 106| 15-Apr-20| 07:52 \nmenu.debug.js| menu.debug.js| | 101574| 15-Apr-20| 07:52 \nmenu.htc| menu.htc| | 21872| 15-Apr-20| 07:52 \nmenu.js_0001| menu.js| | 51332| 15-Apr-20| 07:52 \nmenubar.htc| menubar.htc| | 13961| 15-Apr-20| 07:52 \nmquery.debug.js| mquery.debug.js| | 59856| 15-Apr-20| 07:52 \nmquery.js| mquery.js| | 22239| 15-Apr-20| 07:52 \nmquery.xml| mquery.xml| | 89| 15-Apr-20| 07:52 \noffline.debug.js| offline.debug.js| | 7585| 15-Apr-20| 07:52 \noffline.js| offline.js| | 3595| 15-Apr-20| 07:52 \nows.debug.js| ows.debug.js| | 511037| 15-Apr-20| 07:52 \nows.js| ows.js| | 265328| 15-Apr-20| 07:52 \nows.xml| ows.xml| | 85| 15-Apr-20| 07:52 \nowsbrows.debug.js| owsbrows.debug.js| | 9579| 15-Apr-20| 07:52 \nowsbrows.js| owsbrows.js| | 6113| 15-Apr-20| 07:52 \npickerhierarchycontrol.js| pickerhierarchycontrol.js| | 85910| 15-Apr-20| 07:52 \npivotcontrol.debug.js| pivotcontrol.debug.js| | 16089| 15-Apr-20| 07:52 \npivotcontrol.js| pivotcontrol.js| | 8700| 15-Apr-20| 07:52 \nquicklaunch.debug.js| quicklaunch.debug.js| | 130124| 15-Apr-20| 07:52 \nquicklaunch.js| quicklaunch.js| | 69543| 15-Apr-20| 07:52 \nquicklaunch.js.xml| quicklaunch.xml| | 120| 15-Apr-20| 07:52 \nradiobuttonwithchildren.js| radiobuttonwithchildren.js| | 3208| 15-Apr-20| 07:52 \nroamingapps.debug.js| roamingapps.debug.js| | 46291| 15-Apr-20| 07:52 \nroamingapps.js| roamingapps.js| | 19190| 15-Apr-20| 07:52 \nroamingapp.xml| roamingapps.xml| | 93| 15-Apr-20| 07:52 \nsharing.debug.js| sharing.debug.js| | 71639| 15-Apr-20| 07:52 \nsharing.js| sharing.js| | 27124| 15-Apr-20| 07:52 \nsharing.xml| sharing.xml| | 171| 15-Apr-20| 07:52 \nsiteupgrade.debug.js| siteupgrade.debug.js| | 1135| 15-Apr-20| 07:52 \nsiteupgrade.debug.js_14| siteupgrade.debug.js| | 1135| 15-Apr-20| 07:52 \nsiteupgrade.js| siteupgrade.js| | 808| 15-Apr-20| 07:52 \nsiteupgrade.js_14| siteupgrade.js| | 808| 15-Apr-20| 07:52 \nsp.core.debug.js| sp.core.debug.js| | 73924| 15-Apr-20| 07:52 \nsp.core.js| sp.core.js| | 40446| 15-Apr-20| 07:52 \nsp.core.xml| sp.core.xml| | 150| 15-Apr-20| 07:52 \nsp.datetimeutil.debug.js| sp.datetimeutil.debug.js| | 115909| 15-Apr-20| 07:52 \nsp.datetimeutil.debug.js.x64| sp.datetimeutil.debug.js| | 115909| 15-Apr-20| 07:52 \nsp.datetimeutil.js| sp.datetimeutil.js| | 69042| 15-Apr-20| 07:52 \nsp.datetimeutil.js.x64| sp.datetimeutil.js| | 69042| 15-Apr-20| 07:52 \nsp.datetimeutil.xml| sp.datetimeutil.xml| | 69| 15-Apr-20| 07:52 \nsp.debug.js| sp.debug.js| | 1003871| 15-Apr-20| 07:52 \nsp.debug.js.x64| sp.debug.js| | 1003871| 15-Apr-20| 07:52 \nsp.exp.debug.js| sp.exp.debug.js| | 40770| 15-Apr-20| 07:52 \nsp.exp.js| sp.exp.js| | 24528| 15-Apr-20| 07:52 \nsp.exp.xml| sp.exp.xml| | 48| 15-Apr-20| 07:52 \nsp.init.debug.js| sp.init.debug.js| | 55563| 15-Apr-20| 07:52 \nsp.init.js| sp.init.js| | 32205| 15-Apr-20| 07:52 \nsp.js| sp.js| | 626040| 15-Apr-20| 07:52 \nsp.js.x64| sp.js| | 626040| 15-Apr-20| 07:52 \nspmap.debug.js| sp.map.debug.js| | 15227| 15-Apr-20| 07:52 \nspmap.js| sp.map.js| | 8235| 15-Apr-20| 07:52 \nspmap.xml| sp.map.xml| | 65| 15-Apr-20| 07:52 \nsp.requestexecutor.debug.js| sp.requestexecutor.debug.js| | 81201| 15-Apr-20| 07:52 \nsp.requestexecutor.debug.js.x64| sp.requestexecutor.debug.js| | 81201| 15-Apr-20| 07:52 \nsp.requestexecutor.js| sp.requestexecutor.js| | 51540| 15-Apr-20| 07:52 \nsp.requestexecutor.js.x64| sp.requestexecutor.js| | 51540| 15-Apr-20| 07:52 \nsp.requestexecutor.xml| sp.requestexecutor.xml| | 46| 15-Apr-20| 07:52 \nsp.ribbon.debug.js| sp.ribbon.debug.js| | 363159| 15-Apr-20| 07:52 \nsp.ribbon.js| sp.ribbon.js| | 224039| 15-Apr-20| 07:52 \nsp.ribbon.xml| sp.ribbon.xml| | 321| 15-Apr-20| 07:52 \nsp.runtime.debug.js| sp.runtime.debug.js| | 185617| 15-Apr-20| 07:52 \nsp.runtime.debug.js.x64| sp.runtime.debug.js| | 185617| 15-Apr-20| 07:52 \nsp.runtime.js| sp.runtime.js| | 111493| 15-Apr-20| 07:52 \nsp.runtime.js.x64| sp.runtime.js| | 111493| 15-Apr-20| 07:52 \nsp.runtime.xml| sp.runtime.xml| | 46| 15-Apr-20| 07:52 \nsp.storefront.debug.js| sp.storefront.debug.js| | 422688| 15-Apr-20| 07:52 \nsp.storefront.js| sp.storefront.js| | 294435| 15-Apr-20| 07:52 \nsp.storefront.xml| sp.storefront.xml| | 346| 15-Apr-20| 07:52 \nsp.ui.admin.debug.js| sp.ui.admin.debug.js| | 18342| 15-Apr-20| 07:52 \nsp.ui.admin.js| sp.ui.admin.js| | 11378| 15-Apr-20| 07:52 \nsp.ui.allapps.debug.js| sp.ui.allapps.debug.js| | 42395| 15-Apr-20| 07:52 \nsp.ui.allapps.js| sp.ui.allapps.js| | 26257| 15-Apr-20| 07:52 \nsp.ui.applicationpages.calendar.debug.js| sp.ui.applicationpages.calendar.debug.js| | 277454| 15-Apr-20| 07:52 \nsp.ui.applicationpages.calendar.js| sp.ui.applicationpages.calendar.js| | 144914| 15-Apr-20| 07:52 \nsp.ui.applicationpages.calendar.xml| sp.ui.applicationpages.calendar.xml| | 225| 15-Apr-20| 07:52 \nsp.ui.applicationpages.debug.js| sp.ui.applicationpages.debug.js| | 10163| 15-Apr-20| 07:52 \nsp.ui.applicationpages.js| sp.ui.applicationpages.js| | 6953| 15-Apr-20| 07:52 \nsp.ui.applicationpages.xml| sp.ui.applicationpages.xml| | 213| 15-Apr-20| 07:52 \nsp.ui.bdcadminpages.debug.js| sp.ui.bdcadminpages.debug.js| | 16063| 15-Apr-20| 07:52 \nsp.ui.bdcadminpages.js| sp.ui.bdcadminpages.js| | 11315| 15-Apr-20| 07:52 \nspblogd.js| sp.ui.blogs.debug.js| | 50644| 15-Apr-20| 07:52 \nspblog.js| sp.ui.blogs.js| | 31017| 15-Apr-20| 07:52 \nsp.ui.blogs.xml| sp.ui.blogs.xml| | 94| 15-Apr-20| 07:52 \nsp.ui.combobox.debug.js| sp.ui.combobox.debug.js| | 99428| 15-Apr-20| 07:52 \nsp.ui.combobox.js| sp.ui.combobox.js| | 52107| 15-Apr-20| 07:52 \nsp.ui.combobox.xml| sp.ui.combobox.xml| | 54| 15-Apr-20| 07:52 \nsp.ui.controls.debug.js| sp.ui.controls.debug.js| | 55987| 15-Apr-20| 07:52 \nsp.ui.controls.js| sp.ui.controls.js| | 38359| 15-Apr-20| 07:52 \nsp.ui.dialog.debug.js| sp.ui.dialog.debug.js| | 69292| 15-Apr-20| 07:52 \nsp.ui.dialog.js| sp.ui.dialog.js| | 40375| 15-Apr-20| 07:52 \nsp.ui.dialog.xml| sp.ui.dialog.xml| | 90| 15-Apr-20| 07:52 \nspdiscd.js| sp.ui.discussions.debug.js| | 136506| 15-Apr-20| 07:52 \nspdisc.js| sp.ui.discussions.js| | 82216| 15-Apr-20| 07:52 \nsp.ui.discussions.xml| sp.ui.discussions.xml| | 94| 15-Apr-20| 07:52 \nspimgcd.js| sp.ui.imagecrop.debug.js| | 27973| 15-Apr-20| 07:52 \nspimgc.js| sp.ui.imagecrop.js| | 27973| 15-Apr-20| 07:52 \nspui_rid.js| sp.ui.relateditems.debug.js| | 28006| 15-Apr-20| 07:52 \nspui_ri.js| sp.ui.relateditems.js| | 17626| 15-Apr-20| 07:52 \nsp.ui.ri.xml| sp.ui.relateditems.xml| | 114| 15-Apr-20| 07:52 \nsp.ui.rte.debug.js| sp.ui.rte.debug.js| | 1011981| 15-Apr-20| 07:52 \nsp.ui.rte.js| sp.ui.rte.js| | 584358| 15-Apr-20| 07:52 \nsp.ui.rte.xml| sp.ui.rte.xml| | 74| 15-Apr-20| 07:52 \nsp.ui.tileview.debug.js| sp.ui.tileview.debug.js| | 65203| 15-Apr-20| 07:52 \nsp.ui.tileview.js| sp.ui.tileview.js| | 40240| 15-Apr-20| 07:52 \nsp.ui.tileview.xml| sp.ui.tileview.xml| | 129| 15-Apr-20| 07:52 \nspui_tld.js| sp.ui.timeline.debug.js| | 434522| 15-Apr-20| 07:52 \nspui_tl.js| sp.ui.timeline.js| | 240067| 15-Apr-20| 07:52 \nspstl.xml| sp.ui.timeline.xml| | 111| 15-Apr-20| 07:52 \nsp.xml| sp.xml| | 106| 15-Apr-20| 07:52 \nspgantt.debug.js| spgantt.debug.js| | 183484| 15-Apr-20| 07:52 \nspgantt.js| spgantt.js| | 66168| 15-Apr-20| 07:52 \nspgantt.xml| spgantt.xml| | 159| 15-Apr-20| 07:52 \nspgridview.debug.js| spgridview.debug.js| | 7321| 15-Apr-20| 07:52 \nspgridvw.js| spgridview.js| | 4593| 15-Apr-20| 07:52 \nspgridview.xml| spgridview.xml| | 92| 15-Apr-20| 07:52 \nstart.debug.js| start.debug.js| | 174744| 15-Apr-20| 07:52 \nstart.js| start.js| | 95780| 15-Apr-20| 07:52 \nstrings.xml| strings.xml| | 140| 15-Apr-20| 07:52 \nsuitelinks.debug.js| suitelinks.debug.js| | 32558| 15-Apr-20| 07:52 \nsuitelnk.js| suitelinks.js| | 13795| 15-Apr-20| 07:52 \nsuitelinks.xml| suitelinks.xml| | 134| 15-Apr-20| 07:52 \nsuitenav.js| suitenav.js| | 34319| 15-Apr-20| 07:52 \ntimecard.debug.js| timecard.debug.js| | 36906| 15-Apr-20| 07:52 \ntimecard.js| timecard.js| | 20888| 15-Apr-20| 07:52 \nwpadder.debug.js| wpadder.debug.js| | 49561| 15-Apr-20| 07:52 \nwpadder.js| wpadder.js| | 31016| 15-Apr-20| 07:52 \nwpcm.debug.js| wpcm.debug.js| | 6894| 15-Apr-20| 07:52 \nwpcm.js| wpcm.js| | 3509| 15-Apr-20| 07:52 \nmain.xsl| main.xsl| | 5653| 15-Apr-20| 07:52 \nallitems.asx_0086| allitems.aspx| | 2463| 15-Apr-20| 07:52 \ndispform.asx_0071| dispform.aspx| | 4190| 15-Apr-20| 07:52 \neditform.asx_0071| editform.aspx| | 4167| 15-Apr-20| 07:52 \nmyitems.asx_0008| myitems.aspx| | 2718| 15-Apr-20| 07:52 \nnewform.asx_0055| newform.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_0012| schema.xml| | 253482| 15-Apr-20| 07:52 \nallitems.asx_0089| allitems.aspx| | 2463| 15-Apr-20| 07:52 \ndispform.asx_0083| dispform.aspx| | 4190| 15-Apr-20| 07:52 \neditform.asx_0083| editform.aspx| | 4167| 15-Apr-20| 07:52 \nmyitems.asx_0009| myitems.aspx| | 2718| 15-Apr-20| 07:52 \nnewform.asx_0062| newform.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_0027| schema.xml| | 245825| 15-Apr-20| 07:52 \nmtgredir.asx_0001| mtgredir.aspx| | 1436| 15-Apr-20| 07:52 \nnewmws.asx| newmws.aspx| | 18858| 15-Apr-20| 07:52 \nmovetodt.asx| movetodt.aspx| | 3075| 15-Apr-20| 07:52 \nschema.xml_0079| schema.xml| | 79705| 15-Apr-20| 07:52 \nallitems.asx_0088| allitems.aspx| | 2463| 15-Apr-20| 07:52 \ndispform.asx_0082| dispform.aspx| | 4190| 15-Apr-20| 07:52 \neditform.asx_0082| editform.aspx| | 4167| 15-Apr-20| 07:52 \nnewform.asx_0061| newform.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_0026| schema.xml| | 127795| 15-Apr-20| 07:52 \nallitems.asx_0087| allitems.aspx| | 2463| 15-Apr-20| 07:52 \ndispform.asx_0072| dispform.aspx| | 4190| 15-Apr-20| 07:52 \neditform.asx_0072| editform.aspx| | 4167| 15-Apr-20| 07:52 \nmanagea.asx| managea.aspx| | 2718| 15-Apr-20| 07:52 \nnewform.asx_0056| newform.aspx| | 5954| 15-Apr-20| 07:52 \nschema.xml_0021| schema.xml| | 255145| 15-Apr-20| 07:52 \ndefault.aspx_mps| default.aspx| | 4102| 15-Apr-20| 07:52 \nspstd1.asx_0004| spstd1.aspx| | 4134| 15-Apr-20| 07:52 \nallitems.asx_0032| allitems.aspx| | 2463| 15-Apr-20| 07:52 \ndispform.asx_0038| dispform.aspx| | 4190| 15-Apr-20| 07:52 \neditform.asx_0040| editform.aspx| | 4167| 15-Apr-20| 07:52 \nnewform.asx_0021| newform.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_0039| schema.xml| | 42852| 15-Apr-20| 07:52 \nallitems.asx_0090| allitems.aspx| | 2463| 15-Apr-20| 07:52 \ndispform.asx_0084| dispform.aspx| | 4190| 15-Apr-20| 07:52 \neditform.asx_0084| editform.aspx| | 4167| 15-Apr-20| 07:52 \nmyitems.asx_0001| myitems.aspx| | 2718| 15-Apr-20| 07:52 \nnewform.asx_0063| newform.aspx| | 4197| 15-Apr-20| 07:52 \nschema.xml_0028| schema.xml| | 245557| 15-Apr-20| 07:52 \nschema.xml_0033| schema.xml| | 51432| 15-Apr-20| 07:52 \nonet.xml_mps| onet.xml| | 20985| 15-Apr-20| 07:52 \nnotif.clbk.typ.xml| notificationcallbacktypes.xml| | 1267| 15-Apr-20| 07:52 \nform.asp_pages_form| form.aspx| | 4065| 15-Apr-20| 07:52 \nview.asp_pages_viewpage| viewpage.aspx| | 2718| 15-Apr-20| 07:52 \nview.asp_pages_webfldr| webfldr.aspx| | 2521| 15-Apr-20| 07:52 \nresxscriptx.xsd| resxscriptx.xsd| | 1229| 15-Apr-20| 07:52 \nsvrfiles.xml| serverfiles.xml| | 213| 15-Apr-20| 07:52 \nshrulee.xsd| sitehealthruleregistrationerror.xsd| | 1909| 15-Apr-20| 07:52 \nshrulew.xsd| sitehealthruleregistrationwarning.xsd| | 1911| 15-Apr-20| 07:52 \nsitehcwss.xml| sitehealthwssrules.xml| | 1010| 15-Apr-20| 07:52 \nsitehcwss.xml_14| sitehealthwssrules.xml| | 1010| 15-Apr-20| 07:52 \nspkvp.xsd| spkeyvaluepairs.xsd| | 1727| 15-Apr-20| 07:52 \nspmtlprm.xsd| spmetalparameters.xsd| | 3857| 15-Apr-20| 07:52 \nappmng.sql| appmng.sql| | 289219| 15-Apr-20| 07:52 \nappmngup.sql| appmngup.sql| | 282966| 15-Apr-20| 07:52 \nbdc.sql| bdc.sql| | 558446| 15-Apr-20| 07:52 \nconfigdb.sql| configdb.sql| | 189484| 15-Apr-20| 07:52 \nconfigup.sql| configup.sql| | 48486| 15-Apr-20| 07:52 \ncfgupddl.sql| configupddl.sql| | 131| 15-Apr-20| 07:52 \nusgdiag.sql| diagnostics.sql| | 19977| 15-Apr-20| 07:52 \nsigcfg.cer| sigconfigdb.cer| | 689| 15-Apr-20| 07:52 \nsigcfg.dll| sigconfigdb.dll| | 8832| 15-Apr-20| 07:52 \nsigstore.cer| sigstore.cer| | 689| 15-Apr-20| 07:52 \nsigstore.dll| sigstore.dll| | 8816| 15-Apr-20| 07:52 \nstore.sql| store.sql| | 6504340| 15-Apr-20| 07:52 \nstoreup.sql| storeup.sql| | 512275| 15-Apr-20| 07:52 \nstoupddl.sql| storeupddl.sql| | 131| 15-Apr-20| 07:52 \nsubscr.sql| subscriptionsettings.sql| | 33788| 15-Apr-20| 07:52 \nusagedb.sql| usagedb.sql| | 81583| 15-Apr-20| 07:52 \nusgdbup.sql| usgdbup.sql| | 81392| 15-Apr-20| 07:52 \naddbact.asx| addbdcaction.aspx| | 13019| 15-Apr-20| 07:52 \naddbapp.asx| addbdcapplication.aspx| | 9266| 15-Apr-20| 07:52 \naddiurl.asx| addincomingurl.aspx| | 4473| 15-Apr-20| 07:52 \nadmin.smp| admin.sitemap| | 15577| 15-Apr-20| 07:52 \nadmcfgc.asx| adminconfigceip.aspx| | 7764| 15-Apr-20| 07:52 \nadmcfgi.asx| adminconfigintro.aspx| | 8689| 15-Apr-20| 07:52 \nadmcfgr.asx| adminconfigresults.aspx| | 5038| 15-Apr-20| 07:52 \nadmcfgs.asx| adminconfigservices.aspx| | 9937| 15-Apr-20| 07:52 \nadmcfgsr.asx| adminconfigservicesresults.aspx| | 4998| 15-Apr-20| 07:52 \nadminweb.cfg| adminweb.config| | 899| 15-Apr-20| 07:52 \nallappprincipals.asx| allappprincipals.aspx| | 6808| 15-Apr-20| 07:52 \nalturls.asx| alternateurlcollections.aspx| | 7122| 15-Apr-20| 07:52 \nappassoc.asx| applicationassociations.aspx| | 5259| 15-Apr-20| 07:52 \nappasdlg.asx| applicationassociationsdialog.aspx| | 3519| 15-Apr-20| 07:52 \nappcreat.asx| applicationcreated.aspx| | 4106| 15-Apr-20| 07:52 \nauthen.asx| authentication.aspx| | 13828| 15-Apr-20| 07:52 \nauthprov.asx| authenticationproviders.aspx| | 4939| 15-Apr-20| 07:52 \navadmin.asx| avadmin.aspx| | 9653| 15-Apr-20| 07:52 \nbackup.asx| backup.aspx| | 15389| 15-Apr-20| 07:52 \nbackhis.asx| backuphistory.aspx| | 20577| 15-Apr-20| 07:52 \nbackset.asx| backupsettings.aspx| | 8689| 15-Apr-20| 07:52 \nbackupst.asx| backupstatus.aspx| | 10643| 15-Apr-20| 07:52 \nbdcapps.asx| bdcapplications.aspx| | 14415| 15-Apr-20| 07:52 \nbdclobs.asx| bdclobsettings.aspx| | 7037| 15-Apr-20| 07:52 \nblkftyp.asx| blockedfiletype.aspx| | 4045| 15-Apr-20| 07:52 \ncaaapplm.asx| ca_allapplicensesmanagement.aspx| | 8267| 15-Apr-20| 07:52 \ncasapplm.asx| ca_specificapplicensemanagement.aspx| | 29344| 15-Apr-20| 07:52 \ncntdbadm.asx| cntdbadm.aspx| | 6042| 15-Apr-20| 07:52 \nconfgssc.asx| configssc.aspx| | 22074| 15-Apr-20| 07:52 \nconfgapp.asx| configureappsettings.aspx| | 7246| 15-Apr-20| 07:52 \ncreatecorpcatalog.asx| createcorporatecatalog.aspx| | 18174| 15-Apr-20| 07:52 \ncreatexu.asx| createexternalurl.aspx| | 4182| 15-Apr-20| 07:52 \ncreatsit.asx| createsite.aspx| | 17064| 15-Apr-20| 07:52 \ndbstats.asx| databasestatus.aspx| | 5023| 15-Apr-20| 07:52 \ndeacfadm.asx| deactivatefeature.aspx| | 3184| 15-Apr-20| 07:52 \ndftcntdb.asx| defaultcontentdb.aspx| | 6455| 15-Apr-20| 07:52 \ndelstcfg.asx| deletesiteconfig.aspx| | 12279| 15-Apr-20| 07:52 \ndelapp.asx| deletewebapplication.aspx| | 6619| 15-Apr-20| 07:52 \ndelsite.asx| delsite.aspx| | 7267| 15-Apr-20| 07:52 \ndplysoln.asx| deploysolution.aspx| | 10122| 15-Apr-20| 07:52 \ndmscmd.aspx| dmscmd.aspx| | 5593| 15-Apr-20| 07:52 \ndtcusta.asx| doctrancustomizeadmin.aspx| | 7789| 15-Apr-20| 07:52 \ndoctrana.asx| doctransadmin.aspx| | 7797| 15-Apr-20| 07:52 \ndspset.asx| dspsettings.aspx| | 14863| 15-Apr-20| 07:52 \neditacct.asx| editaccount.aspx| | 18305| 15-Apr-20| 07:52 \neditbact.asx| editbdcaction.aspx| | 12661| 15-Apr-20| 07:52 \neditiurl.asx| editincomingurl.aspx| | 4683| 15-Apr-20| 07:52 \neditourl.asx| editoutboundurls.aspx| | 7201| 15-Apr-20| 07:52 \nexpbapp.asx| exportbdcapplication.aspx| | 8043| 15-Apr-20| 07:52 \nextendvs.asx| extendvs.aspx| | 7113| 15-Apr-20| 07:52 \nextvsopt.asx| extendvsoption.aspx| | 5077| 15-Apr-20| 07:52 \nextwebfm.asx| extendwebfarm.aspx| | 5418| 15-Apr-20| 07:52 \nfarmjoin.asx| farmconfigjoinintro.aspx| | 8354| 15-Apr-20| 07:52 \nfarmcred.asx| farmcredentialmanagement.aspx| | 7541| 15-Apr-20| 07:52 \nfarmsvrs.asx| farmservers.aspx| | 4910| 15-Apr-20| 07:52 \ngemlcnfg.asx| globalemailconfig.aspx| | 8560| 15-Apr-20| 07:52 \ngmobcnfg.asx| globalxmsconfig.aspx| | 8407| 15-Apr-20| 07:52 \nhealrepo.asx| healthreport.aspx| | 6265| 15-Apr-20| 07:52 \nhtadmin.asx| htmltransadmin.aspx| | 10141| 15-Apr-20| 07:52 \nincemail.asx| incomingemail.aspx| | 22300| 15-Apr-20| 07:52 \nirmadmin.asx| irmadmin.aspx| | 8837| 15-Apr-20| 07:52 \njobedit.asx| jobedit.aspx| | 8303| 15-Apr-20| 07:52 \nlogusage.asx| logusage.aspx| | 14424| 15-Apr-20| 07:52 \nlropsta.asx| lroperationstatus.aspx| | 4915| 15-Apr-20| 07:52 \nmgbdcper.asx| managebdcpermissions.aspx| | 5485| 15-Apr-20| 07:52 \nmgbdcapp.asx| managebdcserviceapp.aspx| | 6684| 15-Apr-20| 07:52 \nmgappinf.asx| managebdcserviceappstateinfo.aspx| | 4613| 15-Apr-20| 07:52 \nmngcorpcatalog.asx| managecorporatecatalog.aspx| | 9289| 15-Apr-20| 07:52 \nmngaccts.asx| managedaccounts.aspx| | 5952| 15-Apr-20| 07:52 \nmngffeat.asx| managefarmfeatures.aspx| | 3273| 15-Apr-20| 07:52 \nmktplset.asx| managemarketplacesettings.aspx| | 7972| 15-Apr-20| 07:52 \nmngqtmpl.asx| managequotatemplate.aspx| | 18002| 15-Apr-20| 07:52 \nmngsftru.asx| manageservicefarmtrust.aspx| | 4743| 15-Apr-20| 07:52 \nmngtrust.asx| managetrust.aspx| | 6911| 15-Apr-20| 07:52 \nmngwfeat.asx| managewebappfeatures.aspx| | 4334| 15-Apr-20| 07:52 \nmetrics.asx| metrics.aspx| | 15273| 15-Apr-20| 07:52 \nadmin.mas| admin.master| | 29828| 15-Apr-20| 07:52 \nappascvw.asc| applicationassociationsview.ascx| | 4379| 15-Apr-20| 07:52 \napppool.asc| applicationpoolsection.ascx| | 8668| 15-Apr-20| 07:52 \nbsqmopt.asc| browserceipsection.ascx| | 2776| 15-Apr-20| 07:52 \ncerstsec.asc| certificatesettingsection.ascx| | 10758| 15-Apr-20| 07:52 \ncntdbsec.asc| contentdatabasesection.ascx| | 7964| 15-Apr-20| 07:52 \nidprosec.asc| identityprovidersettingsection.ascx| | 16007| 15-Apr-20| 07:52 \niiswsapp.asc| iiswebserviceapplicationpoolsection.ascx| | 8772| 15-Apr-20| 07:52 \niiswbste.asc| iiswebsitesection.ascx| | 14964| 15-Apr-20| 07:52 \npopup.mas| popup.master| | 3088| 15-Apr-20| 07:52 \nproxysel.asx| proxyselectionsection.ascx| | 5393| 15-Apr-20| 07:52 \nregacctl.asc| registeraccountcontrol.ascx| | 10073| 15-Apr-20| 07:52 \nrunjobs.asc| runningtimerjobs.ascx| | 4696| 15-Apr-20| 07:52 \nschedjob.asc| scheduledtimerjobs.ascx| | 3583| 15-Apr-20| 07:52 \ntjobhist.asc| timerjobhistory.ascx| | 5114| 15-Apr-20| 07:52 \ntopology.asc| topologyview.ascx| | 4091| 15-Apr-20| 07:52 \ntstgesec.asc| trustgeneralsettingsection.ascx| | 3656| 15-Apr-20| 07:52 \nnewappmngsvcapp.asx| newappmngserviceapp.aspx| | 6664| 15-Apr-20| 07:52 \nnewcntdb.asx| newcntdb.aspx| | 7208| 15-Apr-20| 07:52 \nofadmin.asx| officialfileadmin.aspx| | 13569| 15-Apr-20| 07:52 \noldcntdb.asx| oldcntdb.aspx| | 13658| 15-Apr-20| 07:52 \nowners.asx| owners.aspx| | 5602| 15-Apr-20| 07:52 \npwdset.asx| passwordsettings.aspx| | 8443| 15-Apr-20| 07:52 \npatchstt.asx| patchstatus.aspx| | 7284| 15-Apr-20| 07:52 \npolc.asx| policy.aspx| | 14387| 15-Apr-20| 07:52 \npolcanon.asx| policyanon.aspx| | 7109| 15-Apr-20| 07:52 \npolcrl.asx| policyrole.aspx| | 116092| 15-Apr-20| 07:52 \npolcrle.asx| policyroleedit.aspx| | 116100| 15-Apr-20| 07:52 \npolcrls.asx| policyroles.aspx| | 10688| 15-Apr-20| 07:52 \npolcusr.asx| policyuser.aspx| | 10142| 15-Apr-20| 07:52 \npolcusre.asx| policyuseredit.aspx| | 12411| 15-Apr-20| 07:52 \nprivacy.asx| privacy.aspx| | 8269| 15-Apr-20| 07:52 \nregacct.asx| registeraccount.aspx| | 4058| 15-Apr-20| 07:52 \nremacct.asx| removeaccount.aspx| | 8676| 15-Apr-20| 07:52 \nreqfeata.asx| reqfeatures.aspx| | 2625| 15-Apr-20| 07:52 \nrestore.asx| restore.aspx| | 16105| 15-Apr-20| 07:52 \nrestore3.asx| restorestep3.aspx| | 22878| 15-Apr-20| 07:52 \nrtctsoln.asx| retractsolution.aspx| | 7381| 15-Apr-20| 07:52 \nschedjob.asx| scheduledtimerjobs.aspx| | 7063| 15-Apr-20| 07:52 \nscprefix.asx_0001| scprefix.aspx| | 11391| 15-Apr-20| 07:52 \nslctauc.asx| selectalternateurlcollection.aspx| | 5141| 15-Apr-20| 07:52 \nslctapp.asx| selectapplication.aspx| | 6801| 15-Apr-20| 07:52 \nslctcfaz.asx| selectcrossfirewallaccesszone.aspx| | 5398| 15-Apr-20| 07:52 \nslctjob.asx| selectjobdefinition.aspx| | 5358| 15-Apr-20| 07:52 \nslctlist.asx| selectlist.aspx| | 8606| 15-Apr-20| 07:52 \nslctserv.asx| selectserver.aspx| | 4908| 15-Apr-20| 07:52 \nslctsvc.asx| selectservice.aspx| | 4982| 15-Apr-20| 07:52 \nslctsite.asx| selectsite.aspx| | 9385| 15-Apr-20| 07:52 \nslctweb.asx| selectweb.aspx| | 8459| 15-Apr-20| 07:52 \nslctwapp.asx| selectwebapplication.aspx| | 5356| 15-Apr-20| 07:52 \nserver.asx| server.aspx| | 9131| 15-Apr-20| 07:52 \nsvcappcn.asx| serviceapplicationconnect.aspx| | 4890| 15-Apr-20| 07:52 \nsvcappcd.asx| serviceapplicationconnectiondetails.aspx| | 4334| 15-Apr-20| 07:52 \nsvcappcp.asx| serviceapplicationconnectpopup.aspx| | 2991| 15-Apr-20| 07:52 \nsvcappdl.asx| serviceapplicationdelete.aspx| | 4443| 15-Apr-20| 07:52 \nsvcapppe.asx| serviceapplicationpermissions.aspx| | 4034| 15-Apr-20| 07:52 \nsvcapppb.asx| serviceapplicationpublish.aspx| | 10169| 15-Apr-20| 07:52 \nsvcapp.asx| serviceapplications.aspx| | 4101| 15-Apr-20| 07:52 \nsvcjdefs.asx| servicejobdefinitions.aspx| | 8692| 15-Apr-20| 07:52 \nsvcrjobs.asx| servicerunningjobs.aspx| | 7059| 15-Apr-20| 07:52 \nspdadmin.asx| sharepointdesigneradmin.aspx| | 6974| 15-Apr-20| 07:52 \nsiteex.asx| siteandlistexport.aspx| | 12299| 15-Apr-20| 07:52 \nsitebaks.asx| sitebackuporexportstatus.aspx| | 10242| 15-Apr-20| 07:52 \nsitecbac.asx| sitecollectionbackup.aspx| | 10522| 15-Apr-20| 07:52 \nsitecoll.asx| sitecollections.aspx| | 9189| 15-Apr-20| 07:52 \nsitcrted.asx| sitecreated.aspx| | 3632| 15-Apr-20| 07:52 \nsitequot.asx| sitequota.aspx| | 24323| 15-Apr-20| 07:52 \nsolns.asx| solutions.aspx| | 4786| 15-Apr-20| 07:52 \nsolnsts.asx| solutionstatus.aspx| | 10835| 15-Apr-20| 07:52 \nsolvmgr.asx| solutionvalidatormanager.aspx| | 10912| 15-Apr-20| 07:52 \nspadmin.rsx| spadmin.resx| | 359899| 15-Apr-20| 07:52 \nspscrstg.asx_0002| spsecuritysettings.aspx| | 7491| 15-Apr-20| 07:52 \nstbackup.asx| startbackup.aspx| | 14510| 15-Apr-20| 07:52 \nsuccessp.asx| successpopup.aspx| | 3735| 15-Apr-20| 07:52 \ntimer.asx| timer.aspx| | 8984| 15-Apr-20| 07:52 \ntjobhist.asx| timerjobhistory.aspx| | 8860| 15-Apr-20| 07:52 \nunatcdbb.asx| unattacheddbbrowse.aspx| | 6276| 15-Apr-20| 07:52 \nunatcdb.asx| unattacheddbselect.aspx| | 6082| 15-Apr-20| 07:52 \nunxtndvs.asx| unextendvs.aspx| | 5541| 15-Apr-20| 07:52 \nupgrstat.asx| upgradestatus.aspx| | 11239| 15-Apr-20| 07:52 \nuser_solution.asx| usersolutions.aspx| | 9435| 15-Apr-20| 07:52 \nviewbapp.asx| viewbdcapplication.aspx| | 17212| 15-Apr-20| 07:52 \nviewbent.asx| viewbdcentity.aspx| | 17275| 15-Apr-20| 07:52 \nvwblobi.asx| viewbdclobsysteminstances.aspx| | 10960| 15-Apr-20| 07:52 \nvwblobs.asx| viewbdclobsystems.aspx| | 14303| 15-Apr-20| 07:52 \nvsemail.asx| vsemail.aspx| | 8991| 15-Apr-20| 07:52 \nvsgenset.asx| vsgeneralsettings.aspx| | 52139| 15-Apr-20| 07:52 \nvsmask.asx| vsmask.aspx| | 65273| 15-Apr-20| 07:52 \nvsxms.asx| vsxms.aspx| | 8803| 15-Apr-20| 07:52 \nweblist.asx| webapplicationlist.aspx| | 5468| 15-Apr-20| 07:52 \nwebapps.asx| webapplications.aspx| | 5350| 15-Apr-20| 07:52 \nwfadmin.asx| workflowadmin.aspx| | 6741| 15-Apr-20| 07:52 \nwftimer.asx| workflowtimer.aspx| | 5101| 15-Apr-20| 07:52 \nacrqdlg.asc| accessrequestsdialog.ascx| | 3059| 15-Apr-20| 07:52 \narplfc.asc| accessrequestspermissionlevelfieldcontrol.ascx| | 1145| 15-Apr-20| 07:52 \nacctpick.asc| accountpickerandlink.ascx| | 2347| 15-Apr-20| 07:52 \nacledito.asc| acleditor.ascx| | 9596| 15-Apr-20| 07:52 \nactnbar.asc_0002| actionbar.ascx| | 2464| 15-Apr-20| 07:52 \nbdcfindc.asc| bdcfinderconfigurator.ascx| | 3309| 15-Apr-20| 07:52 \nbdflded.asc| businessdatafieldeditor.ascx| | 4216| 15-Apr-20| 07:52 \ndefformt.asc| defaulttemplates.ascx| | 178739| 15-Apr-20| 07:52 \ndemocon.asc| designmodeconsole.ascx| | 2329| 15-Apr-20| 07:52 \ndispprev.asc| displaypreview.ascx| | 5491| 15-Apr-20| 07:52 \neditprev.asc| editpreview.ascx| | 6219| 15-Apr-20| 07:52 \nfeatact.asc| featureactivator.ascx| | 2403| 15-Apr-20| 07:52 \nfeatacti.asc| featureactivatoritem.ascx| | 2209| 15-Apr-20| 07:52 \nfeatdep.asc| featuredependees.ascx| | 2172| 15-Apr-20| 07:52 \nflhylk.asc| foldhyperlink.ascx| | 1034| 15-Apr-20| 07:52 \nhptnb.asc| helppagetopnavbar.ascx| | 12286| 15-Apr-20| 07:52 \nlanguagepicker.ascx| languagepicker.ascx| | 5536| 15-Apr-20| 07:52 \nleftnav.asc| leftnavigation.ascx| | 895| 15-Apr-20| 07:52 \nlinksect.asc_0002| linksection.ascx| | 2737| 15-Apr-20| 07:52 \nlkseclv1.asc_0002| linksectionlevel1.ascx| | 1429| 15-Apr-20| 07:52 \nlkseclv2.asc_0002| linksectionlevel2.ascx| | 1317| 15-Apr-20| 07:52 \nlinktabl.asc_0002| linkstable.ascx| | 1282| 15-Apr-20| 07:52 \nmodeftst.asc| mobiledefaultstylesheets.ascx| | 1315| 15-Apr-20| 07:52 \nmodeftmp.asc| mobiledefaulttemplates.ascx| | 67472| 15-Apr-20| 07:52 \nmorecolorspicker.ascx| morecolorspicker.ascx| | 2163| 15-Apr-20| 07:52 \nmuiselec.asc| muiselector.ascx| | 1050| 15-Apr-20| 07:52 \nmuisetng.asc| muisettings.ascx| | 4724| 15-Apr-20| 07:52 \nnavitem.asc| navitem.ascx| | 99| 15-Apr-20| 07:52 \nnewprev.asc| newpreview.ascx| | 5243| 15-Apr-20| 07:52 \nschdpckr.asc| schedulepicker.ascx| | 28102| 15-Apr-20| 07:52 \ntoolbar.asc_0002| toolbar.ascx| | 1588| 15-Apr-20| 07:52 \ntbbutton.asc_0002| toolbarbutton.ascx| | 1301| 15-Apr-20| 07:52 \nviewhdr.asc_0002| viewheader.ascx| | 1527| 15-Apr-20| 07:52 \nwelcome.asc_0002| welcome.ascx| | 3508| 15-Apr-20| 07:52 \naccdny.asx| accessdenied.aspx| | 2154| 15-Apr-20| 07:52 \naccreq.asx| accessrequests.aspx| | 1078| 15-Apr-20| 07:52 \naclinv.asx| aclinv.aspx| | 26945| 15-Apr-20| 07:52 \nactredir.asx| actionredirect.aspx| | 896| 15-Apr-20| 07:52 \naddanapp.asx| addanapp.aspx| | 3652| 15-Apr-20| 07:52 \naddcttl.asx| addcontenttypetolist.aspx| | 7512| 15-Apr-20| 07:52 \naddfft.asx| addfieldfromtemplate.aspx| | 9800| 15-Apr-20| 07:52 \naddrole.asx| addrole.aspx| | 68566| 15-Apr-20| 07:52 \narecycle.asx| adminrecyclebin.aspx| | 21099| 15-Apr-20| 07:52 \nadvsetng.asx_0001| advsetng.aspx| | 31465| 15-Apr-20| 07:52 \naggcustze.asx| aggregationcustomize.aspx| | 13046| 15-Apr-20| 07:52 \naggsetngs.asx| aggregationsettings.aspx| | 8162| 15-Apr-20| 07:52 \nappliaap.asx| allapplicensesmanagement.aspx| | 8143| 15-Apr-20| 07:52 \nalphaimage.htc| alphaimage.htc| | 253| 15-Apr-20| 07:52 \nappcatalogimage.asx| appcatalogimage.ashx| | 213| 15-Apr-20| 07:52 \nappicon.asx| appicons.ashx| | 205| 15-Apr-20| 07:52 \nappinv.asx| appinv.aspx| | 11660| 15-Apr-20| 07:52 \nappprincipals.asx| appprincipals.aspx| | 5678| 15-Apr-20| 07:52 \nappredirect.asx| appredirect.aspx| | 5250| 15-Apr-20| 07:52 \nappregnew.asx| appregnew.aspx| | 11198| 15-Apr-20| 07:52 \napprequest.aspx| apprequest.aspx| | 6876| 15-Apr-20| 07:52 \napprove.asx| approve.aspx| | 8991| 15-Apr-20| 07:52 \nappsrcrd.asx| appsourceredirect.aspx| | 3061| 15-Apr-20| 07:52 \nappwebproxy.asx| appwebproxy.aspx| | 2059| 15-Apr-20| 07:52 \naspxform.asx| aspxform.aspx| | 5396| 15-Apr-20| 07:52 \nassogrps.asx| associatedgroups.aspx| | 4795| 15-Apr-20| 07:52 \natchfile.asx| attachfile.aspx| | 6541| 15-Apr-20| 07:52 \nauthentc.asx| authenticate.aspx| | 1068| 15-Apr-20| 07:52 \navreport.asx| avreport.aspx| | 11898| 15-Apr-20| 07:52 \nblank.htm| blank.htm| | 229| 15-Apr-20| 07:52 \nbpcf.asx| bpcf.aspx| | 14883| 15-Apr-20| 07:52 \nbdsync.asx| businessdatasynchronizer.aspx| | 3836| 15-Apr-20| 07:52 \ncalsvc.asx| calendarservice.ashx| | 205| 15-Apr-20| 07:52 \nctmark.asx| calltrackmark.aspx| | 211| 15-Apr-20| 07:52 \nchgctos.asx| changecontenttypeoptionalsettings.aspx| | 8550| 15-Apr-20| 07:52 \nchgcto.asx| changecontenttypeorder.aspx| | 7816| 15-Apr-20| 07:52 \nchgford.asx| changefieldorder.aspx| | 7536| 15-Apr-20| 07:52 \ncheckin.asx| checkin.aspx| | 16116| 15-Apr-20| 07:52 \nchkperm.asx| chkperm.aspx| | 10498| 15-Apr-20| 07:52 \nclcnfm.asx| circulationconfirm.aspx| | 216| 15-Apr-20| 07:52 \nclose.asx| closeconnection.aspx| | 1866| 15-Apr-20| 07:52 \ncmdui.asx| commandui.ashx| | 203| 15-Apr-20| 07:52 \nconfirm.asx| confirmation.aspx| | 1211| 15-Apr-20| 07:52 \ncfmupg.asx| confirmsiteupgrade.aspx| | 3715| 15-Apr-20| 07:52 \ncfmupg.asx_14| confirmsiteupgrade.aspx| | 3712| 15-Apr-20| 07:53 \nconngps.asx| conngps.aspx| | 8490| 15-Apr-20| 07:52 \ncontpick.asx| containerpicker.aspx| | 443| 15-Apr-20| 07:52 \ncopy.asx| copy.aspx| | 15509| 15-Apr-20| 07:52 \ncopyres.asx| copyresults.aspx| | 10337| 15-Apr-20| 07:52 \ncopyrole.asx| copyrole.aspx| | 68509| 15-Apr-20| 07:52 \ncopyutil.asx| copyutil.aspx| | 2333| 15-Apr-20| 07:52 \ncreate.asx| create.aspx| | 33731| 15-Apr-20| 07:52 \ncrtadact.asx| createadaccount.aspx| | 7233| 15-Apr-20| 07:52 \ncrlstpkr.asx| createlistpickerpage.aspx| | 4809| 15-Apr-20| 07:52 \ncreatenewdoc.asx| createnewdocument.aspx| | 5021| 15-Apr-20| 07:52 \ncreatenewdoc.asx_14| createnewdocument.aspx| | 5021| 15-Apr-20| 07:52 \ncreatews.asx| createws.aspx| | 5078| 15-Apr-20| 07:52 \nctypedit.asx| ctypedit.aspx| | 10808| 15-Apr-20| 07:52 \nctypenew.asx| ctypenew.aspx| | 11913| 15-Apr-20| 07:52 \ndeacfeat.asx| deactivatefeature.aspx| | 4424| 15-Apr-20| 07:52 \ndefcss.asx| defaultcss.ashx| | 193| 15-Apr-20| 07:52 \ndefloc.asx| definelocation.aspx| | 4002| 15-Apr-20| 07:52 \ndeletemu.asx| deletemu.aspx| | 188| 15-Apr-20| 07:52 \ndelweb.asx| deleteweb.aspx| | 8062| 15-Apr-20| 07:52 \ndeptsapp.asx| deploytsapp.aspx| | 15800| 15-Apr-20| 07:52 \ndesnbld.asx| designbuilder.aspx| | 6683| 15-Apr-20| 07:52 \ndesndat.asx| designdata.ashx| | 208| 15-Apr-20| 07:52 \ndesngal.asx| designgallery.aspx| | 3475| 15-Apr-20| 07:52 \ndesnprv.asx| designpreview.aspx| | 5615| 15-Apr-20| 07:52 \ndevdash.asx| devdash.aspx| | 2357| 15-Apr-20| 07:52 \ndiscbar.asx| discbar.aspx| | 2448| 15-Apr-20| 07:52 \ndladvopt.asx| dladvopt.aspx| | 19446| 15-Apr-20| 07:52 \ndoctran.asx| doctrans.aspx| | 11465| 15-Apr-20| 07:52 \ndownload.asx| download.aspx| | 155| 15-Apr-20| 07:52 \ndextdata.asx| downloadexternaldata.aspx| | 870| 15-Apr-20| 07:52 \ndws.asx| dws.aspx| | 4368| 15-Apr-20| 07:52 \neditcopy.asx| editcopyinformation.aspx| | 12731| 15-Apr-20| 07:52 \neditgrp.asx| editgrp.aspx| | 19005| 15-Apr-20| 07:52 \neditidx.asx| editindex.aspx| | 7133| 15-Apr-20| 07:52 \neditnav.asx| editnav.aspx| | 6298| 15-Apr-20| 07:52 \neditprms.asx| editprms.aspx| | 5371| 15-Apr-20| 07:52 \neditrole.asx| editrole.aspx| | 69296| 15-Apr-20| 07:52 \nemaildet.asx| emaildetails.aspx| | 5368| 15-Apr-20| 07:52 \nemailset.asx| emailsettings.aspx| | 25980| 15-Apr-20| 07:52 \nerror.asx| error.aspx| | 5011| 15-Apr-20| 07:52 \nevalupg.asx| evaluatesiteupgrade.aspx| | 5395| 15-Apr-20| 07:52 \nevalupg.asx_14| evaluatesiteupgrade.aspx| | 5386| 15-Apr-20| 07:53 \nexporttr.asx| exporttranslations.aspx| | 7907| 15-Apr-20| 07:52 \nfilesred.xml| filestoredirect.sts.xml| | 3378| 15-Apr-20| 07:52 \nfilter.asx| filter.aspx| | 1679| 15-Apr-20| 07:52 \nfldedit.asx| fldedit.aspx| | 208271| 15-Apr-20| 07:52 \nfldedtex.asx| fldeditex.aspx| | 24858| 15-Apr-20| 07:52 \nfldnew.asx| fldnew.aspx| | 203182| 15-Apr-20| 07:52 \nfldnewex.asx| fldnewex.aspx| | 25047| 15-Apr-20| 07:52 \nfldpick.asx| fldpick.aspx| | 9869| 15-Apr-20| 07:52 \nformedt.asx| formedt.aspx| | 21543| 15-Apr-20| 07:52 \ngear.asx| gear.aspx| | 3255| 15-Apr-20| 07:52 \ngbredir.asx| groupboardredirect.aspx| | 216| 15-Apr-20| 07:52 \ngroups.asx| groups.aspx| | 9600| 15-Apr-20| 07:52 \nguestaccess.asx| guestaccess.aspx| | 158| 15-Apr-20| 07:52 \nhelp.asx| help.aspx| | 6803| 15-Apr-20| 07:52 \nhelpcont.asx| helpcontent.aspx| | 690| 15-Apr-20| 07:52 \nhelpsrch.asx| helpsearch.aspx| | 1473| 15-Apr-20| 07:52 \nhelpstg.asx| helpsettings.aspx| | 6298| 15-Apr-20| 07:52 \ntsksvc.asx| hierarchytasksservice.ashx| | 211| 15-Apr-20| 07:52 \nhtmledit.asx| htmledit.aspx| | 13128| 15-Apr-20| 07:52 \nhtmlfieldsecurity.asx| htmlfieldsecurity.aspx| | 12545| 15-Apr-20| 07:52 \nhtmltran.asx| htmltranslate.aspx| | 862| 15-Apr-20| 07:52 \nhtredir.asx| htmltrredir.aspx| | 6388| 15-Apr-20| 07:52 \nhtverify.asx| htmltrverify.aspx| | 6674| 15-Apr-20| 07:52 \niframe.asx| iframe.aspx| | 2029| 15-Apr-20| 07:52 \nimporttr.asx| importtranslations.aspx| | 5800| 15-Apr-20| 07:52 \nindxcol2.asx| indexedcolumns.aspx| | 5424| 15-Apr-20| 07:52 \nindxcol.asx| indxcol.aspx| | 10385| 15-Apr-20| 07:52 \ninfopage.asx| infopage.aspx| | 3782| 15-Apr-20| 07:52 \ninplview.asx| inplview.aspx| | 2378| 15-Apr-20| 07:52 \ninstpapp.asx| installprojapp.aspx| | 5946| 15-Apr-20| 07:52 \nirm.asx| irm.aspx| | 23151| 15-Apr-20| 07:52 \nirmrept.asx| irmrept.aspx| | 8437| 15-Apr-20| 07:52 \nitemrwfassoc.aspx| itemrwfassoc.aspx| | 52428| 15-Apr-20| 07:52 \njsonmetadata.asx| jsonmetadata.ashx| | 203| 15-Apr-20| 07:52 \nlayouts.smp| layouts.sitemap| | 24335| 15-Apr-20| 07:52 \nlropst.asx| layoutslroperationstatus.aspx| | 5004| 15-Apr-20| 07:52 \nlayotweb.cfg| layoutsweb.config| | 2064| 15-Apr-20| 07:52 \nlistedit.asx| listedit.aspx| | 47609| 15-Apr-20| 07:52 \nlistfeed.asx| listfeed.aspx| | 155| 15-Apr-20| 07:52 \nlistform.asx| listform.aspx| | 871| 15-Apr-20| 07:52 \nlstgenst.asx| listgeneralsettings.aspx| | 11979| 15-Apr-20| 07:52 \nlistsynd.asx| listsyndication.aspx| | 25282| 15-Apr-20| 07:52 \nlogin.asx| login.aspx| | 2598| 15-Apr-20| 07:52 \nlstsetng.asx| lstsetng.aspx| | 62369| 15-Apr-20| 07:52 \nmngcof.asx| managecheckedoutfiles.aspx| | 11768| 15-Apr-20| 07:52 \nmngct.asx| managecontenttype.aspx| | 9523| 15-Apr-20| 07:52 \nmngf.asx| managecontenttypefield.aspx| | 9277| 15-Apr-20| 07:52 \nmngcops.asx| managecopies.aspx| | 13582| 15-Apr-20| 07:52 \nmngfeat.asx| managefeatures.aspx| | 4571| 15-Apr-20| 07:52 \nmcontent.asx| mcontent.aspx| | 4742| 15-Apr-20| 07:52 \nmetablog.asx| metaweblog.aspx| | 172| 15-Apr-20| 07:52 \nmngctype.asx| mngctype.aspx| | 5738| 15-Apr-20| 07:52 \nmngfield.asx| mngfield.aspx| | 5836| 15-Apr-20| 07:52 \nmngstadm.asx| mngsiteadmin.aspx| | 5456| 15-Apr-20| 07:52 \nmngsubwb.asx| mngsubwebs.aspx| | 11725| 15-Apr-20| 07:52 \nbloghome.asx_mobile| bloghome.aspx| | 3210| 15-Apr-20| 07:52 \ndefault.asx_mobile| default.aspx| | 1513| 15-Apr-20| 07:52 \ndelete.asx_mobile| delete.aspx| | 2298| 15-Apr-20| 07:52 \ndispform.asx_mobile| dispform.aspx| | 2428| 15-Apr-20| 07:52 \ndisppost.asx_mobile| disppost.aspx| | 3234| 15-Apr-20| 07:52 \neditform.asx_mobile| editform.aspx| | 4798| 15-Apr-20| 07:52 \ndenied.asx_mobile| mbldenied.aspx| | 1619| 15-Apr-20| 07:52 \nerror.asx_mobile| mblerror.aspx| | 2172| 15-Apr-20| 07:52 \nmbllists.asx_mobile| mbllists.aspx| | 2645| 15-Apr-20| 07:52 \nmbllogin.asx_mobile| mbllogin.aspx| | 5361| 15-Apr-20| 07:52 \nmblogout.asx_mobile| mbllogout.aspx| | 5003| 15-Apr-20| 07:52 \nmltlogin.asx_mobile| mblmultilogin.aspx| | 4957| 15-Apr-20| 07:52 \nmblwiki.asx_mobile| mblwiki.aspx| | 3598| 15-Apr-20| 07:52 \nmblwp.asx_mobile| mblwp.aspx| | 3603| 15-Apr-20| 07:52 \nmblwpdtl.asx_mobile| mblwpdetail.aspx| | 2567| 15-Apr-20| 07:52 \nnewcmt.asx_mobile| newcomment.aspx| | 2762| 15-Apr-20| 07:52 \nnewform.asx_mobile| newform.aspx| | 4796| 15-Apr-20| 07:52 \nnewpost.asx_mobile| newpost.aspx| | 2777| 15-Apr-20| 07:52 \nupload.asx_mobile| upload.aspx| | 3491| 15-Apr-20| 07:52 \nview.asx_mobile| view.aspx| | 2424| 15-Apr-20| 07:52 \nviewcmt.asx_mobile| viewcomment.aspx| | 3223| 15-Apr-20| 07:52 \nviewfilter.asx_mobile| viewfilter.aspx| | 3747| 15-Apr-20| 07:52 \nweb.cfg_mobile| web.config| | 10909| 15-Apr-20| 07:52 \nmorecols.asx| morecolors.aspx| | 4163| 15-Apr-20| 07:52 \napp.mas| application.master| | 13756| 15-Apr-20| 07:52 \nappv4.mas| applicationv4.master| | 20553| 15-Apr-20| 07:52 \nbutsec.asc_0001| buttonsection.ascx| | 3836| 15-Apr-20| 07:52 \ndialog.mas| dialog.master| | 12646| 15-Apr-20| 07:52 \nerrv15.mas| errorv15.master| | 3482| 15-Apr-20| 07:52 \nifcont.asc_0001| inputformcontrol.ascx| | 2568| 15-Apr-20| 07:52 \nifsect.asc_0001| inputformsection.ascx| | 5204| 15-Apr-20| 07:52 \nlayouts.mas| layouts.master| | 13244| 15-Apr-20| 07:52 \nlkfldedt.asc_0001| lookupfieldeditor.ascx| | 10383| 15-Apr-20| 07:52 \nlkreledt.asc_0001| lookuprelationshipseditor.ascx| | 7752| 15-Apr-20| 07:52 \npickerdialog.mas| pickerdialog.master| | 8912| 15-Apr-20| 07:52 \nrtedlg.mas| rtedialog.master| | 3199| 15-Apr-20| 07:52 \nsimple.mas| simple.master| | 10243| 15-Apr-20| 07:52 \nsimpv4.mas| simplev4.master| | 6530| 15-Apr-20| 07:52 \ntmpctl.asc_0001| templatepickercontrol.ascx| | 3264| 15-Apr-20| 07:52 \ntopnavbr.asc_0001| topnavbar.ascx| | 6462| 15-Apr-20| 07:52 \nurfldedt.asc_0001| userfieldeditor.ascx| | 6555| 15-Apr-20| 07:52 \nmuisetng.asx| muisetng.aspx| | 3521| 15-Apr-20| 07:52 \nmwpstg.asx| mwpsettings.aspx| | 14042| 15-Apr-20| 07:52 \nmyprmns.asx| mypermissions.aspx| | 5239| 15-Apr-20| 07:52 \nmysubs.asx| mysubs.aspx| | 13142| 15-Apr-20| 07:52 \nnavopt.asx| navoptions.aspx| | 7337| 15-Apr-20| 07:52 \nnew.asx| new.aspx| | 61372| 15-Apr-20| 07:52 \nnewdwp.asx| newdwp.aspx| | 6557| 15-Apr-20| 07:52 \nnewgrp.asx| newgrp.aspx| | 19741| 15-Apr-20| 07:52 \nnewlink.asx| newlink.aspx| | 9284| 15-Apr-20| 07:52 \nnewnav.asx| newnav.aspx| | 6130| 15-Apr-20| 07:52 \nnewsbweb.asx| newsbweb.aspx| | 18686| 15-Apr-20| 07:52 \nnewslwp.asx| newslwp.aspx| | 10513| 15-Apr-20| 07:52 \noauthauthorize.asx| oauthauthorize.aspx| | 11676| 15-Apr-20| 07:52 \npassword.asx| password.aspx| | 8483| 15-Apr-20| 07:52 \npeople.asx| people.aspx| | 22688| 15-Apr-20| 07:52 \npermstup.asx| permsetup.aspx| | 18411| 15-Apr-20| 07:52 \npicker.asx| picker.aspx| | 7885| 15-Apr-20| 07:52 \nportal.asx| portal.aspx| | 9896| 15-Apr-20| 07:52 \nportalvw.asx_0001| portalview.aspx| | 2248| 15-Apr-20| 07:52 \nprjsetng.asx| prjsetng.aspx| | 16270| 15-Apr-20| 07:52 \nprfredir.asx| profileredirect.aspx| | 1605| 15-Apr-20| 07:52 \npubback.asx| publishback.aspx| | 4934| 15-Apr-20| 07:52 \nqlreord.asx| qlreord.aspx| | 10886| 15-Apr-20| 07:52 \nqstedit.asx| qstedit.aspx| | 217711| 15-Apr-20| 07:52 \nqstnew.asx| qstnew.aspx| | 199982| 15-Apr-20| 07:52 \nquiklnch.asx| quiklnch.aspx| | 8030| 15-Apr-20| 07:52 \nrcxform.asx| rcxform.aspx| | 6023| 15-Apr-20| 07:52 \nrecycle.asx| recyclebin.aspx| | 16593| 15-Apr-20| 07:52 \nredirect.asx_0001| redirect.aspx| | 1394| 15-Apr-20| 07:52 \nreghost.asx| reghost.aspx| | 7879| 15-Apr-20| 07:52 \nrgnlstng.asx| regionalsetng.aspx| | 21661| 15-Apr-20| 07:52 \nrndlstd.asx| reindexlistdialog.aspx| | 1762| 15-Apr-20| 07:52 \nrixsite.asx| reindexsitedialog.aspx| | 1771| 15-Apr-20| 07:52 \nrenamepg.asx| renamepagedialog.aspx| | 3946| 15-Apr-20| 07:52 \nreorder.asx| reorder.aspx| | 11743| 15-Apr-20| 07:52 \nreqacc.asx| reqacc.aspx| | 4357| 15-Apr-20| 07:52 \nreqfeat.asx| reqfeatures.aspx| | 3860| 15-Apr-20| 07:52 \nreqgroup.asx| reqgroup.aspx| | 6562| 15-Apr-20| 07:52 \nreqgrpcf.asx| reqgroupconfirm.aspx| | 6425| 15-Apr-20| 07:52 \nrqstapp.asx| requestanapp.aspx| | 7673| 15-Apr-20| 07:52 \nrfcxform.asx| rfcxform.aspx| | 6160| 15-Apr-20| 07:52 \nrfpxform.asx| rfpxform.aspx| | 6497| 15-Apr-20| 07:52 \nroamapp.asx| roamingapps.aspx| | 4614| 15-Apr-20| 07:52 \nrole.asx| role.aspx| | 11001| 15-Apr-20| 07:52 \nrssxslt.asx| rssxslt.aspx| | 3480| 15-Apr-20| 07:52 \nrtedlg.asx| rtedialog.aspx| | 10212| 15-Apr-20| 07:52 \nrteuplod.asx| rteuploaddialog.aspx| | 8044| 15-Apr-20| 07:52 \nsaveconflict.asx| saveconflict.aspx| | 5198| 15-Apr-20| 07:52 \nsavetmpl.asx| savetmpl.aspx| | 17496| 15-Apr-20| 07:52 \nscriptresx.asx| scriptresx.ashx| | 200| 15-Apr-20| 07:52 \nscsignup.asx| scsignup.aspx| | 11428| 15-Apr-20| 07:52 \nsrchrslt.asx| searchresults.aspx| | 5674| 15-Apr-20| 07:52 \nselfservicecreate.asx| selfservicecreate.aspx| | 12745| 15-Apr-20| 07:52 \nsetanon.asx| setanon.aspx| | 12399| 15-Apr-20| 07:52 \nsetrqacc.asx| setrqacc.aspx| | 7631| 15-Apr-20| 07:52 \nsettings.asx| settings.aspx| | 3673| 15-Apr-20| 07:52 \nsetwa.asx| setwhereabouts.aspx| | 212| 15-Apr-20| 07:52 \nsharedwf.asx| sharedwfform.aspx| | 5297| 15-Apr-20| 07:52 \nspdstngs.asx| sharepointdesignersettings.aspx| | 6769| 15-Apr-20| 07:52 \nsignout.asx| signout.aspx| | 1509| 15-Apr-20| 07:52 \nsitehc.asx| sitehealthcheck.aspx| | 3918| 15-Apr-20| 07:52 \nsitehcr.asx| sitehealthcheckresults.aspx| | 4054| 15-Apr-20| 07:52 \nsitehcr.asx_14| sitehealthcheckresults.aspx| | 4054| 15-Apr-20| 07:53 \nsitehc.asx_14| sitehealthcheck.aspx| | 3915| 15-Apr-20| 07:53 \nsiterss.asx| siterss.aspx| | 10595| 15-Apr-20| 07:52 \nsitesubs.asx| sitesubs.aspx| | 13639| 15-Apr-20| 07:52 \nstupgrad.asx| siteupgrade.aspx| | 5373| 15-Apr-20| 07:52 \nstupgsts.asx| siteupgradestatus.aspx| | 8418| 15-Apr-20| 07:52 \nstupgsts.asx_14| siteupgradestatus.aspx| | 8418| 15-Apr-20| 07:53 \nstupgrad.asx_14| siteupgrade.aspx| | 5416| 15-Apr-20| 07:53 \nspcf.asx| spcf.aspx| | 19428| 15-Apr-20| 07:52 \nspcontnt.asx| spcontnt.aspx| | 12854| 15-Apr-20| 07:52 \napplisap.asx| specificapplicensemanagement.aspx| | 29238| 15-Apr-20| 07:52 \nsrchvis.asx| srchvis.aspx| | 10067| 15-Apr-20| 07:52 \nstart.asx| start.aspx| | 1048| 15-Apr-20| 07:52 \nstorefront.asx| storefront.aspx| | 4349| 15-Apr-20| 07:52 \nstorman.asx| storman.aspx| | 10595| 15-Apr-20| 07:52 \ncorefxup.css| corefixup.css| | 469| 15-Apr-20| 07:52 \ndlgframe.css| dlgframe.css| | 2528| 15-Apr-20| 07:52 \njsgrid.css| jsgrid.css| | 27207| 15-Apr-20| 07:52 \njsgrid.csst| jsgrid.css| | 27207| 15-Apr-20| 07:52 \nsubchoos.asx| subchoos.aspx| | 10435| 15-Apr-20| 07:52 \nsubedit.asx| subedit.aspx| | 14784| 15-Apr-20| 07:52 \nsrepair.asx| submitrepair.aspx| | 156| 15-Apr-20| 07:52 \nsubnew.asx| subnew.aspx| | 15223| 15-Apr-20| 07:52 \nsuccess.asx| success.aspx| | 3172| 15-Apr-20| 07:52 \nsurvedit.asx| survedit.aspx| | 37673| 15-Apr-20| 07:52 \ntmptpick.asx| templatepick.aspx| | 5272| 15-Apr-20| 07:52 \ntenappin.asx| tenantappinfo.ashx| | 207| 15-Apr-20| 07:52 \nthemeweb.asx| themeweb.aspx| | 1339| 15-Apr-20| 07:52 \ntcsetng.asx| timecardsettings.aspx| | 15814| 15-Apr-20| 07:52 \ntnreord.asx| tnreord.aspx| | 8361| 15-Apr-20| 07:52 \ntoolpane.asx| toolpane.aspx| | 2370| 15-Apr-20| 07:52 \ntopnav.asx| topnav.aspx| | 7717| 15-Apr-20| 07:52 \nuniqperm.asx| uniqperm.aspx| | 9818| 15-Apr-20| 07:52 \nupdcops.asx| updatecopies.aspx| | 12032| 15-Apr-20| 07:52 \nupload.asx| upload.aspx| | 13234| 15-Apr-20| 07:52 \nusage.asx| usage.aspx| | 7871| 15-Apr-20| 07:52 \nusagedtl.asx| usagedetails.aspx| | 6089| 15-Apr-20| 07:52 \nuseconf.asx| useconfirmation.aspx| | 3520| 15-Apr-20| 07:52 \nuser.asx| user.aspx| | 27691| 15-Apr-20| 07:52 \nuserdisp.asx| userdisp.aspx| | 4299| 15-Apr-20| 07:52 \nuseredit.asx| useredit.aspx| | 4175| 15-Apr-20| 07:52 \nuserserr.asx| usersettingserror.aspx| | 1848| 15-Apr-20| 07:52 \nversions.asx| versions.aspx| | 35361| 15-Apr-20| 07:52 \nviewedit.asx| viewedit.aspx| | 220325| 15-Apr-20| 07:52 \nvwgrpprm.asx| viewgrouppermissions.aspx| | 5199| 15-Apr-20| 07:52 \nviewlsts.asx| viewlsts.aspx| | 33824| 15-Apr-20| 07:52 \nviewnew.asx| viewnew.aspx| | 218013| 15-Apr-20| 07:52 \nviewtype.asx| viewtype.aspx| | 26314| 15-Apr-20| 07:52 \nvldsetng.asx| vldsetng.aspx| | 8912| 15-Apr-20| 07:52 \nvsmenu.asx| vsmenu.aspx| | 2059| 15-Apr-20| 07:52 \nvsubwebs.asx| vsubwebs.aspx| | 6028| 15-Apr-20| 07:52 \nwebdeltd.asx| webdeleted.aspx| | 1500| 15-Apr-20| 07:52 \nwppicker.asx| webpartgallerypickerpage.aspx| | 7202| 15-Apr-20| 07:52 \nwopiframe.asx| wopiframe.aspx| | 1968| 15-Apr-20| 07:52 \nwopiframe.asx_14| wopiframe.aspx| | 1968| 15-Apr-20| 07:52 \nwopiframe2.asx| wopiframe2.aspx| | 1957| 15-Apr-20| 07:52 \nwopiframe2.asx_14| wopiframe2.aspx| | 1957| 15-Apr-20| 07:52 \nworkspce.asx| workspce.aspx| | 8290| 15-Apr-20| 07:52 \nwpeula.asx| wpeula.aspx| | 5740| 15-Apr-20| 07:52 \nwpprevw.asx| wpprevw.aspx| | 4943| 15-Apr-20| 07:52 \nwpribbon.asx| wpribbon.aspx| | 761| 15-Apr-20| 07:52 \nwsauplod.asx| wsaupload.ashx| | 198| 15-Apr-20| 07:52 \nwss.rsx| wss.resx| | 723698| 15-Apr-20| 07:52 \nproxy.asx| wssproxy.aspx| | 1448| 15-Apr-20| 07:52 \nzoombldr.asx| zoombldr.aspx| | 12801| 15-Apr-20| 07:52 \nbdrdflt.aspx| default.aspx| | 4026| 15-Apr-20| 07:52 \ndefault.aspx_sts| default.aspx| | 4026| 15-Apr-20| 07:52 \ndefault.aspx_dws| defaultdws.aspx| | 4376| 15-Apr-20| 07:52 \nonet.xml_wss| onet.xml| | 12257| 15-Apr-20| 07:52 \nthemedforegroundimages.css| themedforegroundimages.css| | 28675| 15-Apr-20| 07:52 \ntaddconn.aspx_tenantadmin| ta_addappconnection.aspx| | 11735| 15-Apr-20| 07:52 \ntbdcadac.aspx_tenantadmin| ta_addbdcaction.aspx| | 12621| 15-Apr-20| 07:52 \ntbdcadap.aspx_tenantadmin| ta_addbdcapplication.aspx| | 8942| 15-Apr-20| 07:52 \nappliaap.aspx_tenantadmin| ta_allapplicensesmanagement.aspx| | 8178| 15-Apr-20| 07:52 \nappprincipals.aspx_tenantadmin| ta_allappprincipals.aspx| | 6769| 15-Apr-20| 07:52 \ntbcshome.aspx_tenantadmin| ta_bcshome.aspx| | 4633| 15-Apr-20| 07:52 \ntbdcapps.aspx_tenantadmin| ta_bdcapplications.aspx| | 13499| 15-Apr-20| 07:52 \ntbdclobsettings.aspx_tenantadmin| ta_bdclobsettings.aspx| | 6798| 15-Apr-20| 07:52 \ncreatecc.aspx_tenantadmin| ta_createcorporatecatalog.aspx| | 12183| 15-Apr-20| 07:52 \nnewsitec.aspx_tenantadmin| ta_createsitecollection.aspx| | 11081| 15-Apr-20| 07:52 \nnewconfi.aspx_tenantadmin| ta_createsitecollectionconfirmation.aspx| | 3028| 15-Apr-20| 07:52 \ndelsitec.aspx_tenantadmin| ta_deletesitecollectiondialog.aspx| | 3562| 15-Apr-20| 07:52 \ntbdcedac.aspx_tenantadmin| ta_editbdcaction.aspx| | 12268| 15-Apr-20| 07:52 \ntbdcexap.aspx_tenantadmin| ta_exportbdcapplication.aspx| | 7749| 15-Apr-20| 07:52 \ntlropsta.aspx_tenantadmin| ta_lroperationstatus.aspx| | 3645| 15-Apr-20| 07:52 \ntconmeta.aspx_tenantadmin| ta_manageappconnectionmetadata.aspx| | 8491| 15-Apr-20| 07:52 \ntconnsec.aspx_tenantadmin| ta_manageappconnectionsecurity.aspx| | 4495| 15-Apr-20| 07:52 \ntbdcperm.aspx_tenantadmin| ta_managebdcpermissions.aspx| | 4069| 15-Apr-20| 07:52 \ncorpcat.aspx_tenantadmin| ta_managecorporatecatalog.aspx| | 6403| 15-Apr-20| 07:52 \nmktplset.aspx_tenantadmin| ta_managemarketplacesettings.aspx| | 6296| 15-Apr-20| 07:52 \nofadmin.aspx_tenantadmin| ta_officialfileadmin.aspx| | 11323| 15-Apr-20| 07:52 \nsitecdq.aspx_tenantadmin| ta_sitecollectiondiskquotadialog.aspx| | 10735| 15-Apr-20| 07:52 \nsitecown.aspx_tenantadmin| ta_sitecollectionownersdialog.aspx| | 5705| 15-Apr-20| 07:52 \nsitecper.aspx_tenantadmin| ta_sitecollectionpermissionsdialog.aspx| | 2637| 15-Apr-20| 07:52 \nsitecrep.aspx_tenantadmin| ta_sitecollectionreportsdialog.aspx| | 2637| 15-Apr-20| 07:52 \nsitecoll.aspx_tenantadmin| ta_sitecollections.aspx| | 9478| 15-Apr-20| 07:52 \napplisap.aspx_tenantadmin| ta_specificapplicensemanagement.aspx| | 27508| 15-Apr-20| 07:52 \ntviewcon.aspx_tenantadmin| ta_viewappconnections.aspx| | 8814| 15-Apr-20| 07:52 \ntbdcvwap.aspx_tenantadmin| ta_viewbdcapplication.aspx| | 16234| 15-Apr-20| 07:52 \ntbdcvwen.aspx_tenantadmin| ta_viewbdcentity.aspx| | 16454| 15-Apr-20| 07:52 \ntbdcvwli.aspx_tenantadmin| ta_viewbdclobsysteminstances.aspx| | 10289| 15-Apr-20| 07:52 \ntbdcvwlb.aspx_tenantadmin| ta_viewbdclobsystems.aspx| | 13386| 15-Apr-20| 07:52 \nvsitecp.aspx_tenantadmin| ta_viewsitecollectionpropertiesdialog.aspx| | 6189| 15-Apr-20| 07:52 \ndefault.aspx_tenantadmin| default.aspx| | 3882| 15-Apr-20| 07:52 \nonet.xml_tenantadmin| onet.xml| | 5726| 15-Apr-20| 07:52 \nthread.xsl| thread.xsl| | 34542| 15-Apr-20| 07:52 \nusercode.xsd| usercode.xsd| | 4293| 15-Apr-20| 07:52 \nvalidapp.xml| validappendpoints.xml| | 15837| 15-Apr-20| 07:52 \nvwstyles.xsl| vwstyles.xsl| | 130800| 15-Apr-20| 07:52 \nwefman.xsd| wefextensionmanifestschema.xsd| | 51975| 15-Apr-20| 07:52 \nwefma1_1.xsd| wefextensionmanifestschema1_1.xsd| | 57288| 15-Apr-20| 07:52 \nbacklink.aspx_webpagelib| backlinks.aspx| | 4069| 15-Apr-20| 07:52 \ncrtv4pgs.asx| createv4pageslib.aspx| | 3584| 15-Apr-20| 07:52 \ncreatweb.asx| createwebpage.aspx| | 10792| 15-Apr-20| 07:52 \nrecentwp.asx| recentwikipages.aspx| | 3790| 15-Apr-20| 07:52 \nversdiff.aspx_webpagelib| versiondiff.aspx| | 5692| 15-Apr-20| 07:52 \nwikiredr.aspx| wikiredirect.aspx| | 1123| 15-Apr-20| 07:52 \nonet.xml_wiki| onet.xml| | 8372| 15-Apr-20| 07:52 \nwfaction.xsd| workflowactions.xsd| | 14033| 15-Apr-20| 07:52 \nwss.xsd| wss.xsd| | 112463| 15-Apr-20| 07:52 \nbase.xml| base.xml| | 21747| 15-Apr-20| 07:52 \nsts.xml| sts.xml| | 14413| 15-Apr-20| 07:52 \nwssadmin.xml| wssadmin.xml| | 9317| 15-Apr-20| 07:52 \nresqmax.xml_0001| resourcequotamaximum.xml| | 565| 15-Apr-20| 07:52 \nresqwarn.xml_0001| resourcequotawarning.xml| | 563| 15-Apr-20| 07:52 \nowstimer.exe_0001| owstimer.exe| 15.0.4971.1000| 80608| 15-Apr-20| 07:52 \nowstimer.exe.config| owstimer.exe.config| | 481| 15-Apr-20| 07:52 \ntraceman.exe| wsstracing.exe| 15.0.4569.1501| 115904| 15-Apr-20| 07:52 \nspwriter.exe_0001| spwriter.exe| 15.0.4971.1000| 50944| 15-Apr-20| 07:52 \nstswel.dll| stswel.dll| 15.0.5241.1000| 3911560| 15-Apr-20| 07:52 \nstswfacb.dll| microsoft.sharepoint.workflowactions.dll| 15.0.4857.1000| 318728| 15-Apr-20| 07:52 \nstswfact.dll| microsoft.sharepoint.workflowactions.dll| 15.0.4857.1000| 318728| 15-Apr-20| 07:52 \nstswfaci.dll| microsoft.sharepoint.workflowactions.intl.dll| 15.0.4420.1017| 23200| 15-Apr-20| 07:52 \nisswfresources.resx| resources.resx| | 2072| 15-Apr-20| 07:52 \nisswffeature.xml| feature.xml| | 465| 15-Apr-20| 07:52 \nissuetracking.xml| issuetracking.xml| | 749| 15-Apr-20| 07:52 \nsts.workflows.dll| microsoft.sharepoint.workflows.dll| 15.0.4507.1000| 63168| 15-Apr-20| 07:52 \nworkflows_intl.dll| microsoft.sharepoint.workflows.intl.dll| 15.0.4420.1017| 13448| 15-Apr-20| 07:52 \nie50up.debug.js| ie50up.debug.js| | 152255| 15-Apr-20| 07:52 \nie50up.js| ie50up.js| | 80551| 15-Apr-20| 07:52 \nie50up.xml| ie50up.xml| | 65| 15-Apr-20| 07:52 \nie55up.debug.js| ie55up.debug.js| | 151449| 15-Apr-20| 07:52 \nie55up.js| ie55up.js| | 80012| 15-Apr-20| 07:52 \nie55up.xml| ie55up.xml| | 65| 15-Apr-20| 07:52 \nnon_ie.debug.js| non_ie.debug.js| | 101533| 15-Apr-20| 07:52 \nnon_ie.js| non_ie.js| | 59623| 15-Apr-20| 07:52 \nnon_ie.xml| non_ie.xml| | 65| 15-Apr-20| 07:52 \nbpstd.debug.js| bpstd.debug.js| | 7637| 15-Apr-20| 07:52 \nbpstd.js| bpstd.js| | 4356| 15-Apr-20| 07:52 \nbpstd.xml| bpstd.xml| | 65| 15-Apr-20| 07:52 \nctp.debug.js| ctp.debug.js| | 7406| 15-Apr-20| 07:52 \nctp.js| ctp.js| | 3934| 15-Apr-20| 07:52 \nctp.xml| ctp.xml| | 65| 15-Apr-20| 07:52 \ncvtp.debug.js| cvtp.debug.js| | 4529| 15-Apr-20| 07:52 \ncvtp.js| cvtp.js| | 2412| 15-Apr-20| 07:52 \ncvtp.xml| cvtp.xml| | 65| 15-Apr-20| 07:52 \nitp.debug.js| itp.debug.js| | 12586| 15-Apr-20| 07:52 \nitp.js| itp.js| | 9525| 15-Apr-20| 07:52 \nitp.xml| itp.xml| | 65| 15-Apr-20| 07:52 \nxtp.debug.js| xtp.debug.js| | 2979| 15-Apr-20| 07:52 \nxtp.js| xtp.js| | 1491| 15-Apr-20| 07:52 \nsts_sandbox.dll| microsoft.sharepoint.sandbox.dll| 15.0.5241.1000| 180320| 15-Apr-20| 07:52 \naddrbook.gif| addressbook.gif| | 908| 14-Apr-20| 04:17 \ncalview.gif| calview.gif| | 1615| 14-Apr-20| 04:17 \nchecknames.gif| checknames.gif| | 908| 14-Apr-20| 04:17 \nganttvw.gif| ganttview.gif| | 1625| 14-Apr-20| 04:17 \ngrid.gif| grid.gif| | 1610| 14-Apr-20| 04:17 \nicaccdb.gif| icaccdb.gif| | 231| 14-Apr-20| 04:17 \nicaccde.gif| icaccde.gif| | 222| 14-Apr-20| 04:17 \nicbmp.gif| icbmp.gif| | 355| 14-Apr-20| 04:17 \nicdoc.gif| icdoc.gif| | 231| 14-Apr-20| 04:17 \nicdocm.gif| icdocm.gif| | 236| 14-Apr-20| 04:17 \nicdocset.gif| icdocset.gif| | 221| 14-Apr-20| 04:17 \nicdocx.gif| icdocx.gif| | 224| 14-Apr-20| 04:17 \nicdot.gif| icdot.gif| | 223| 14-Apr-20| 04:17 \nicdotm.gif| icdotm.gif| | 235| 14-Apr-20| 04:17 \nicdotx.gif| icdotx.gif| | 221| 14-Apr-20| 04:17 \nicgif.gif| icgif.gif| | 220| 14-Apr-20| 04:17 \nichtmdoc.gif| ichtmdoc.gif| | 229| 14-Apr-20| 04:17 \nichtmppt.gif| ichtmppt.gif| | 227| 14-Apr-20| 04:17 \nichtmpub.gif| ichtmpub.gif| | 227| 14-Apr-20| 04:17 \nichtmxls.gif| ichtmxls.gif| | 239| 14-Apr-20| 04:17 \nicinfopathgeneric.gif| icinfopathgeneric.gif| | 216| 14-Apr-20| 04:17 \nicjfif.gif| icjfif.gif| | 214| 14-Apr-20| 04:17 \nicjpe.gif| icjpe.gif| | 214| 14-Apr-20| 04:17 \nicjpeg.gif| icjpeg.gif| | 214| 14-Apr-20| 04:17 \nicjpg.gif| icjpg.gif| | 214| 14-Apr-20| 04:17 \nicmhtpub.gif| icmhtpub.gif| | 225| 14-Apr-20| 04:17 \nicmpd.gif| icmpd.gif| | 218| 14-Apr-20| 04:17 \nicmpp.gif| icmpp.gif| | 222| 14-Apr-20| 04:17 \nicmpt.gif| icmpt.gif| | 221| 14-Apr-20| 04:17 \nicodp.gif| icodp.gif| | 354| 14-Apr-20| 04:17 \nicods.gif| icods.gif| | 369| 14-Apr-20| 04:17 \nicodt.gif| icodt.gif| | 358| 14-Apr-20| 04:17 \nicone.gif| icone.gif| | 215| 14-Apr-20| 04:17 \niconp.gif| iconp.gif| | 223| 14-Apr-20| 04:17 \nicont.gif| icont.gif| | 216| 14-Apr-20| 04:17 \nicpng.gif| icpng.gif| | 349| 14-Apr-20| 04:17 \nicpot.gif| icpot.gif| | 164| 14-Apr-20| 04:17 \nicpotm.gif| icpotm.gif| | 233| 14-Apr-20| 04:17 \nicpotx.gif| icpotx.gif| | 220| 14-Apr-20| 04:17 \nicppt.gif| icppt.gif| | 168| 14-Apr-20| 04:17 \nicpptm.gif| icpptm.gif| | 236| 14-Apr-20| 04:17 \nicpptx.gif| icpptx.gif| | 222| 14-Apr-20| 04:17 \nicpub.gif| icpub.gif| | 221| 14-Apr-20| 04:17 \nictif.gif| ictif.gif| | 355| 14-Apr-20| 04:17 \nictiff.gif| ictiff.gif| | 355| 14-Apr-20| 04:17 \nicvdw.gif| icvdw.gif| | 219| 14-Apr-20| 04:17 \nicvdx.gif| icvdx.gif| | 231| 14-Apr-20| 04:17 \nicvidset.gif| icvidset.gif| | 92| 14-Apr-20| 04:17 \nicvisiogeneric.gif| icvisiogeneric.gif| | 231| 14-Apr-20| 04:17 \nicvsd.gif| icvsd.gif| | 231| 14-Apr-20| 04:17 \nicvsdm.gif| icvsdm.gif| | 231| 14-Apr-20| 04:17 \nicvsdx.gif| icvsdx.gif| | 231| 14-Apr-20| 04:17 \nicvsl.gif| icvsl.gif| | 211| 14-Apr-20| 04:17 \nicvss.gif| icvss.gif| | 163| 14-Apr-20| 04:17 \nicvssm.gif| icvssm.gif| | 163| 14-Apr-20| 04:17 \nicvssx.gif| icvssx.gif| | 163| 14-Apr-20| 04:17 \nicvst.gif| icvst.gif| | 228| 14-Apr-20| 04:17 \nicvstm.gif| icvstm.gif| | 228| 14-Apr-20| 04:17 \nicvstx.gif| icvstx.gif| | 228| 14-Apr-20| 04:17 \nicvsx.gif| icvsx.gif| | 163| 14-Apr-20| 04:17 \nicvtx.gif| icvtx.gif| | 228| 14-Apr-20| 04:17 \nicxddoc.gif| icxddoc.gif| | 220| 14-Apr-20| 04:17 \nicxls.gif| icxls.gif| | 236| 14-Apr-20| 04:17 \nicxlsb.gif| icxlsb.gif| | 237| 14-Apr-20| 04:17 \nicxlsm.gif| icxlsm.gif| | 352| 14-Apr-20| 04:17 \nicxlsx.gif| icxlsx.gif| | 236| 14-Apr-20| 04:17 \nicxlt.gif| icxlt.gif| | 229| 14-Apr-20| 04:17 \nicxltm.gif| icxltm.gif| | 352| 14-Apr-20| 04:17 \nicxltx.gif| icxltx.gif| | 231| 14-Apr-20| 04:17 \nicxsn.gif| icxsn.gif| | 214| 14-Apr-20| 04:17 \nlg_accdb.gif| lg_icaccdb.gif| | 471| 14-Apr-20| 04:17 \nlg_accdb.png| lg_icaccdb.png| | 1634| 14-Apr-20| 04:17 \nlg_accde.gif| lg_icaccde.gif| | 479| 14-Apr-20| 04:17 \nlg_bmp.gif| lg_icbmp.gif| | 604| 14-Apr-20| 04:17 \nlg_gif.gif| lg_icgif.gif| | 501| 14-Apr-20| 04:17 \nlg_htdoc.gif| lg_ichtmdoc.gif| | 510| 14-Apr-20| 04:17 \nlg_htppt.gif| lg_ichtmppt.gif| | 484| 14-Apr-20| 04:17 \nlg_htpub.gif| lg_ichtmpub.gif| | 482| 14-Apr-20| 04:17 \nlg_htxls.gif| lg_ichtmxls.gif| | 504| 14-Apr-20| 04:17 \nlg_jfif.gif| lg_icjfif.gif| | 433| 14-Apr-20| 04:17 \nlg_jpe.gif| lg_icjpe.gif| | 433| 14-Apr-20| 04:17 \nlg_jpeg.gif| lg_icjpeg.gif| | 433| 14-Apr-20| 04:17 \nlg_jpg.gif| lg_icjpg.gif| | 433| 14-Apr-20| 04:17 \nlg_mpd.gif| lg_icmpd.gif| | 355| 14-Apr-20| 04:17 \nlg_mpp.gif| lg_icmpp.gif| | 363| 14-Apr-20| 04:17 \nlg_mpt.gif| lg_icmpt.gif| | 356| 14-Apr-20| 04:17 \nlg_png.gif| lg_icpng.gif| | 600| 14-Apr-20| 04:17 \nlg_pub.gif| lg_icpub.gif| | 462| 14-Apr-20| 04:17 \nlg_rtf.gif| lg_icrtf.gif| | 481| 14-Apr-20| 04:17 \nlg_tif.gif| lg_ictif.gif| | 604| 14-Apr-20| 04:17 \nlg_tiff.gif| lg_ictiff.gif| | 604| 14-Apr-20| 04:17 \nlg_vdx.gif| lg_icvdx.gif| | 540| 14-Apr-20| 04:17 \nlg_vsd.gif| lg_icvsd.gif| | 540| 14-Apr-20| 04:17 \nlg_vsl.gif| lg_icvsl.gif| | 482| 14-Apr-20| 04:17 \nlg_vss.gif| lg_icvss.gif| | 468| 14-Apr-20| 04:17 \nlg_vst.gif| lg_icvst.gif| | 502| 14-Apr-20| 04:17 \nlg_vstx.gif| lg_icvstx.gif| | 502| 14-Apr-20| 04:17 \nlg_vsx.gif| lg_icvsx.gif| | 468| 14-Apr-20| 04:17 \nlg_vtx.gif| lg_icvtx.gif| | 502| 14-Apr-20| 04:17 \nlg_xddo.gif| lg_icxddoc.gif| | 337| 14-Apr-20| 04:17 \nlg_xsn.gif| lg_icxsn.gif| | 323| 14-Apr-20| 04:17 \nopenfold.gif| openfold.gif| | 142| 14-Apr-20| 04:17 \nituser.gif| ituser.gif| | 1595| 15-Apr-20| 07:52 \nblueprintmtpro.eot| blueprintmtpro.eot| | 24734| 14-Apr-20| 04:17 \nblueprintmtpro.svg| blueprintmtpro.svg| | 105256| 14-Apr-20| 04:17 \nblueprintmtpro.ttf| blueprintmtpro.ttf| | 49468| 14-Apr-20| 04:17 \nblueprintmtpro.woff| blueprintmtpro.woff| | 31724| 14-Apr-20| 04:17 \nblueprintmtprolarge.png| blueprintmtprolarge.png| | 1563| 14-Apr-20| 04:17 \nblueprintmtprosmall.png| blueprintmtprosmall.png| | 1326| 14-Apr-20| 04:17 \ncalibri.eot| calibri.eot| | 167788| 14-Apr-20| 04:17 \ncalibri.svg| calibri.svg| | 365292| 14-Apr-20| 04:17 \ncalibri.ttf| calibri.ttf| | 350124| 14-Apr-20| 04:17 \ncalibri.woff| calibri.woff| | 184156| 14-Apr-20| 04:17 \ncalibrilarge.png| calibrilarge.png| | 1318| 14-Apr-20| 04:17 \ncalibrismall.png| calibrismall.png| | 1170| 14-Apr-20| 04:17 \ncenturygothic.eot| centurygothic.eot| | 60600| 14-Apr-20| 04:17 \ncenturygothic.svg| centurygothic.svg| | 165961| 14-Apr-20| 04:17 \ncenturygothic.ttf| centurygothic.ttf| | 124584| 14-Apr-20| 04:17 \ncenturygothic.woff| centurygothic.woff| | 79732| 14-Apr-20| 04:17 \ncenturygothiclarge.png| centurygothiclarge.png| | 1589| 14-Apr-20| 04:17 \ncenturygothicsmall.png| centurygothicsmall.png| | 1351| 14-Apr-20| 04:17 \ncorbel.eot| corbel.eot| | 96453| 14-Apr-20| 04:17 \ncorbel.svg| corbel.svg| | 185947| 14-Apr-20| 04:17 \ncorbel.ttf| corbel.ttf| | 200316| 14-Apr-20| 04:17 \ncorbel.woff| corbel.woff| | 106184| 14-Apr-20| 04:17 \ncorbellarge.png| corbellarge.png| | 1351| 14-Apr-20| 04:17 \ncorbelsmall.png| corbelsmall.png| | 1171| 14-Apr-20| 04:17 \nimpact.eot| impact.eot| | 56550| 14-Apr-20| 04:17 \nimpact.svg| impact.svg| | 162607| 14-Apr-20| 04:17 \nimpact.ttf| impact.ttf| | 129012| 14-Apr-20| 04:17 \nimpact.woff| impact.woff| | 76992| 14-Apr-20| 04:17 \nimpactlarge.png| impactlarge.png| | 1304| 14-Apr-20| 04:17 \nimpactsmall.png| impactsmall.png| | 1150| 14-Apr-20| 04:17 \nshellicons.eot| shellicons.eot| | 47960| 15-Apr-20| 07:52 \nshellicons.svg| shellicons.svg| | 57730| 15-Apr-20| 07:52 \nshellicons.ttf| shellicons.ttf| | 47768| 15-Apr-20| 07:52 \nshellicons.woff| shellicons.woff| | 26452| 15-Apr-20| 07:52 \ntypewriterelite.eot| typewriterelite.eot| | 27328| 14-Apr-20| 04:17 \ntypewriterelite.svg| typewriterelite.svg| | 77944| 14-Apr-20| 04:17 \ntypewriterelite.ttf| typewriterelite.ttf| | 51708| 14-Apr-20| 04:17 \ntypewriterelite.woff| typewriterelite.woff| | 30976| 14-Apr-20| 04:17 \ntypewriterelitelarge.png| typewriterelitelarge.png| | 1548| 14-Apr-20| 04:17 \ntypewriterelitesmall.png| typewriterelitesmall.png| | 1296| 14-Apr-20| 04:17 \nhelp.xml| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1025| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1026| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1029| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1030| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1032| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1033| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1035| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1037| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1038| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1043| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1044| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1045| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1048| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1050| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1051| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1053| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1054| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1055| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1057| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1058| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1060| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1061| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1062| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1063| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1066| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1081| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1086| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_1087| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_2070| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nwsshelp.xml_2074| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-20| 07:52 \nicvsdm.gif_14| icvsdm.gif| | 1290| 15-Apr-20| 07:53 \nicvsdx.gif_14| icvsdx.gif| | 1288| 15-Apr-20| 07:53 \nlg_icvsdm.gif_14| lg_icvsdm.gif| | 577| 15-Apr-20| 07:53 \nlg_icvsdx.gif_14| lg_icvsdx.gif| | 540| 15-Apr-20| 07:53 \npickerhierarchycontrol.js_14| pickerhierarchycontrol.js| | 126114| 15-Apr-20| 07:53 \nfldswss3.xml_14| fieldswss3.xml| | 50728| 15-Apr-20| 07:53 \ndispform.aspx_piclib_14| dispform.aspx| | 14311| 15-Apr-20| 07:53 \nmicrosoft.sharepoint.client.silverlight.dll_14| microsoft.sharepoint.client.silverlight.dll| 14.0.7006.1000| 273016| 15-Apr-20| 07:53 \nmicrosoft.sharepoint.client.silverlight.runtime.dll_14| microsoft.sharepoint.client.silverlight.runtime.dll| 14.0.7007.1000| 146040| 15-Apr-20| 07:53 \nblog.xsl_14| blog.xsl| | 40342| 15-Apr-20| 07:53 \nviewcategory.asp_blog_categories_14| viewcategory.aspx| | 13786| 15-Apr-20| 07:53 \nschema.xml_blog_comments_14| schema.xml| | 39634| 15-Apr-20| 07:53 \nviewcomment.asp_blog_comments_14| viewcomment.aspx| | 13786| 15-Apr-20| 07:53 \nviewpost.asp_blog_posts_14| viewpost.aspx| | 13786| 15-Apr-20| 07:53 \ndmslstdispform_aspx_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndepl.xsd_14| deploymentmanifest.xsd| | 74297| 15-Apr-20| 07:53 \ndocicon.xml_14| docicon.xml| | 14475| 15-Apr-20| 07:53 \nfldtypes.xsl_14| fldtypes.xsl| | 128231| 15-Apr-20| 07:53 \ndatepicker.debug.js_14| datepicker.debug.js| | 30848| 15-Apr-20| 07:53 \ndatepick.js_14| datepicker.js| | 20413| 15-Apr-20| 07:53 \nentityeditor.debug.js_14| entityeditor.debug.js| | 59260| 15-Apr-20| 07:53 \nentityeditor.js_14| entityeditor.js| | 38002| 15-Apr-20| 07:53 \ninplview.debug.js_14| inplview.debug.js| | 57512| 15-Apr-20| 07:53 \ninplview.js_14| inplview.js| | 39415| 15-Apr-20| 07:53 \njsgrid.debug.js_14| jsgrid.debug.js| | 785068| 15-Apr-20| 07:53 \njsgrid.js_14| jsgrid.js| | 400019| 15-Apr-20| 07:53 \nsp.debug.js_14| sp.debug.js| | 575930| 15-Apr-20| 07:53 \nsp.js_14| sp.js| | 390757| 15-Apr-20| 07:53 \nsp.ribbon.debug.js_14| sp.ribbon.debug.js| | 325227| 15-Apr-20| 07:53 \nsp.runtime.debug.js_14| sp.runtime.debug.js| | 110347| 15-Apr-20| 07:53 \nsp.runtime.js_14| sp.runtime.js| | 68791| 15-Apr-20| 07:53 \nsp.ui.rte.debug.js_14| sp.ui.rte.debug.js| | 594574| 15-Apr-20| 07:53 \nsp.ui.rte.js_14| sp.ui.rte.js| | 365926| 15-Apr-20| 07:53 \nspgantt.debug.js_14| spgantt.debug.js| | 39173| 15-Apr-20| 07:53 \nspgantt.js_14| spgantt.js| | 19338| 15-Apr-20| 07:53 \ndispform.asx_0071_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndispform.asx_0083_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndispform.asx_0082_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndispform.asx_0072_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndispform.asx_0038_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndispform.asx_0084_14| dispform.aspx| | 13786| 15-Apr-20| 07:53 \ndefformt.asc_14| defaulttemplates.ascx| | 170271| 15-Apr-20| 07:53 \nactredir.asx_14| actionredirect.aspx| | 896| 15-Apr-20| 07:53 \naggsetngs.asx_14| aggregationsettings.aspx| | 8163| 15-Apr-20| 07:53 \nctmark.asx_14| calltrackmark.aspx| | 211| 15-Apr-20| 07:53 \nclcnfm.asx_14| circulationconfirm.aspx| | 216| 15-Apr-20| 07:53 \ncreate.asx_14| create.aspx| | 33257| 15-Apr-20| 07:53 \ndeacfeat.asx_14| deactivatefeature.aspx| | 4240| 15-Apr-20| 07:53 \ndeletemu.asx_14| deletemu.aspx| | 188| 15-Apr-20| 07:53 \nfilter.asx_14| filter.aspx| | 1793| 15-Apr-20| 07:53 \ngbredir.asx_14| groupboardredirect.aspx| | 216| 15-Apr-20| 07:53 \niframe.asx_14| iframe.aspx| | 1494| 15-Apr-20| 07:53 \nlistedit.asx_14| listedit.aspx| | 46078| 15-Apr-20| 07:53 \nmngct.asx_14| managecontenttype.aspx| | 10409| 15-Apr-20| 07:53 \nmngfeat.asx_14| managefeatures.aspx| | 4911| 15-Apr-20| 07:53 \nmngsubwb.asx_14| mngsubwebs.aspx| | 12291| 15-Apr-20| 07:53 \ndefault.asx_mobile_14| default.aspx| | 1513| 15-Apr-20| 07:53 \nmbllogin.asx_mobile_14| mbllogin.aspx| | 5337| 15-Apr-20| 07:53 \nmblwiki.asx_mobile_14| mblwiki.aspx| | 3598| 15-Apr-20| 07:53 \nmblwp.asx_mobile_14| mblwp.aspx| | 3603| 15-Apr-20| 07:53 \npickerdialog.mas_14| pickerdialog.master| | 8739| 15-Apr-20| 07:53 \nrtedlg.mas_14| rtedialog.master| | 3153| 15-Apr-20| 07:53 \npicker.asx_14| picker.aspx| | 8613| 15-Apr-20| 07:53 \npckrrst.asx_14| pickerresult.aspx| | 3| 15-Apr-20| 07:53 \nprjsetng.asx_14| prjsetng.aspx| | 16037| 15-Apr-20| 07:53 \nreqfeat.asx_14| reqfeatures.aspx| | 3750| 15-Apr-20| 07:53 \nsrchrslt.asx_14| searchresults.aspx| | 6013| 15-Apr-20| 07:53 \nsettings.asx_14| settings.aspx| | 9565| 15-Apr-20| 07:53 \nsetwa.asx_14| setwhereabouts.aspx| | 212| 15-Apr-20| 07:53 \nsurvedit.asx_14| survedit.aspx| | 36103| 15-Apr-20| 07:53 \nvwgrpprm.asx_14| viewgrouppermissions.aspx| | 5046| 15-Apr-20| 07:53 \nviewlsts.asx_14| viewlsts.aspx| | 16520| 15-Apr-20| 07:53 \nvwstyles.xsl_14| vwstyles.xsl| | 121144| 15-Apr-20| 07:53 \ncui.debug.js| cui.debug.js| | 646903| 15-Apr-20| 07:52 \ncui.js| cui.js| | 362624| 15-Apr-20| 07:52 \nmicrosoft.web.commandui.dll| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-20| 02:36 \nmicrosoft.web.commandui.dll_0001| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-20| 02:36 \nxlsrv.commandui.dll| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-20| 02:36 \n \nInformation about protection and securityProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Foundation 2013: May 12, 2020", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1101", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2020-05-12T07:00:00", "id": "KB4484364", "href": "https://support.microsoft.com/en-us/help/4484364", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-01-11T15:13:51", "description": "According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.\n\n - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.\n\n - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.\n\n - An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).\n\n - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.\n\nNote that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-06-25T00:00:00", "type": "nessus", "title": "Microsoft SharePoint Server 2013 < 15.0.5241.1000 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2022-10-26T00:00:00", "cpe": ["cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*"], "id": "WEB_APPLICATION_SCANNING_112451", "href": "https://www.tenable.com/plugins/was/112451", "sourceData": "No source data", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T15:13:31", "description": "The Microsoft SharePoint Server installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests. (CVE-2020-1099, CVE-2020-1100, CVE-2020-1101, CVE-2020-1106)\n\n - An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).\n When users are simultaneously logged in to Microsoft SharePoint Server and visit a malicious web page, the attacker can, through standard browser functionality, induce the browser to invoke search queries as the logged in user. While the attacker cant access the search results or documents as such, the attacker can determine whether the query did return results or not, and thus by issuing targeted queries discover facts about documents that are searchable for the logged-in user. The security update addresses the vulnerability by running the search queries in a way that doesnt expose them to this browser vulnerability. (CVE-2020-1103)\n\n - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.\n Exploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint. The security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages. (CVE-2020-1023, CVE-2020-1024, CVE-2020-1102)\n\n - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SharePoint server. The attacker who successfully exploited the vulnerability could then perform cross- site scripting attacks on affected systems and run script in the security context of the current user.\n These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SharePoint site on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to ensure that SharePoint Server properly sanitizes web requests. (CVE-2020-1104, CVE-2020-1105, CVE-2020-1107)\n\n - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls. An authenticated attacker who successfully exploited the vulnerability could use a specially crafted page to perform actions in the security context of the SharePoint application pool process. (CVE-2020-1069)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server (May 2020)", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2021-01-28T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_foundation", "cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS20_MAY_OFFICE_SHAREPOINT.NASL", "href": "https://www.tenable.com/plugins/nessus/136514", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136514);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/28\");\n\n script_cve_id(\n \"CVE-2020-1023\",\n \"CVE-2020-1024\",\n \"CVE-2020-1069\",\n \"CVE-2020-1099\",\n \"CVE-2020-1100\",\n \"CVE-2020-1101\",\n \"CVE-2020-1102\",\n \"CVE-2020-1103\",\n \"CVE-2020-1104\",\n \"CVE-2020-1105\",\n \"CVE-2020-1106\",\n \"CVE-2020-1107\"\n );\n script_xref(name:\"MSKB\", value:\"4484336\");\n script_xref(name:\"MSKB\", value:\"4484364\");\n script_xref(name:\"MSKB\", value:\"4484383\");\n script_xref(name:\"MSKB\", value:\"4484352\");\n script_xref(name:\"MSKB\", value:\"4484332\");\n script_xref(name:\"MSFT\", value:\"MS20-4484336\");\n script_xref(name:\"MSFT\", value:\"MS20-4484364\");\n script_xref(name:\"MSFT\", value:\"MS20-4484383\");\n script_xref(name:\"MSFT\", value:\"MS20-4484352\");\n script_xref(name:\"MSFT\", value:\"MS20-4484332\");\n script_xref(name:\"IAVA\", value:\"2020-A-0215-S\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server (May 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server installation on the remote\nhost is missing security updates. It is, therefore, affected\nby multiple vulnerabilities :\n\n - A cross-site-scripting (XSS) vulnerability exists when\n Microsoft SharePoint Server does not properly sanitize a\n specially crafted web request to an affected SharePoint\n server. An authenticated attacker could exploit the\n vulnerability by sending a specially crafted request to\n an affected SharePoint server. The attacker who\n successfully exploited the vulnerability could then\n perform cross-site scripting attacks on affected systems\n and run script in the security context of the current\n user. The attacks could allow the attacker to read\n content that the attacker is not authorized to read, use\n the victim's identity to take actions on the SharePoint\n site on behalf of the user, such as change permissions\n and delete content, and inject malicious content in the\n browser of the user. The security update addresses the\n vulnerability by helping to ensure that SharePoint\n Server properly sanitizes web requests. (CVE-2020-1099,\n CVE-2020-1100, CVE-2020-1101, CVE-2020-1106)\n\n - An information disclosure vulnerability exists where\n certain modes of the search function in Microsoft\n SharePoint Server are vulnerable to cross-site search\n attacks (a variant of cross-site request forgery, CSRF).\n When users are simultaneously logged in to Microsoft\n SharePoint Server and visit a malicious web page, the\n attacker can, through standard browser functionality,\n induce the browser to invoke search queries as the\n logged in user. While the attacker cant access the\n search results or documents as such, the attacker can\n determine whether the query did return results or not,\n and thus by issuing targeted queries discover facts\n about documents that are searchable for the logged-in\n user. The security update addresses the vulnerability by\n running the search queries in a way that doesnt expose\n them to this browser vulnerability. (CVE-2020-1103)\n\n - A remote code execution vulnerability exists in\n Microsoft SharePoint when the software fails to check\n the source markup of an application package. An attacker\n who successfully exploited the vulnerability could run\n arbitrary code in the context of the SharePoint\n application pool and the SharePoint server farm account.\n Exploitation of this vulnerability requires that a user\n uploads a specially crafted SharePoint application\n package to an affected version of SharePoint. The\n security update addresses the vulnerability by\n correcting how SharePoint checks the source markup of\n application packages. (CVE-2020-1023, CVE-2020-1024,\n CVE-2020-1102)\n\n - A spoofing vulnerability exists when Microsoft\n SharePoint Server does not properly sanitize a specially\n crafted web request to an affected SharePoint server. An\n authenticated attacker could exploit the vulnerability\n by sending a specially crafted request to an affected\n SharePoint server. The attacker who successfully\n exploited the vulnerability could then perform cross-\n site scripting attacks on affected systems and run\n script in the security context of the current user.\n These attacks could allow the attacker to read content\n that the attacker is not authorized to read, use the\n victim's identity to take actions on the SharePoint site\n on behalf of the user, such as change permissions and\n delete content, and inject malicious content in the\n browser of the user. The security update addresses the\n vulnerability by helping to ensure that SharePoint\n Server properly sanitizes web requests. (CVE-2020-1104,\n CVE-2020-1105, CVE-2020-1107)\n\n - A remote code execution vulnerability exists in\n Microsoft SharePoint Server when it fails to properly\n identify and filter unsafe ASP.Net web controls. An\n authenticated attacker who successfully exploited the\n vulnerability could use a specially crafted page to\n perform actions in the security context of the\n SharePoint application pool process. (CVE-2020-1069)\");\n # https://support.microsoft.com/en-us/help/4484336/security-update-for-sharepoint-server-2016-may-12-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?16c795ce\");\n # https://support.microsoft.com/en-us/help/4484364/security-update-for-sharepoint-foundation-2013-may\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8fc997cf\");\n # https://support.microsoft.com/en-us/help/4484383/security-update-for-sharepoint-server-2010-may-12-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?753e4507\");\n # https://support.microsoft.com/en-us/help/4484352/security-update-for-sharepoint-enterprise-server-2013-may-12-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?9389843a\");\n # https://support.microsoft.com/en-us/help/4484332/security-update-for-sharepoint-server-2019-may-12-2020\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?381e7ad4\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB4484336\n -KB4484332\n -KB4484352\n -KB4484364\n -KB4484383\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-1102\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_foundation\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('misc_func.inc');\ninclude('install_func.inc');\ninclude('lists.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS20-05';\n\nkbs = make_list(\n '4484336',\n '4484332',\n '4484352',\n '4484364',\n '4484383'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\n\ninstall = get_single_install(app_name:'Microsoft SharePoint Server');\n\nkb_checks =\n{\n '2010':\n { '2': \n {'Server':\n [{\n 'kb' : '4484383',\n 'path' : install['path'],\n 'append' : 'bin',\n 'file' : 'microsoft.sharepoint.publishing.dll',\n 'version' : '14.0.7249.5000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2010 SP 2'\n }]\n }\n },\n '2013':\n { '1':\n {'Foundation':\n [{\n 'kb' : '4484364',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\15\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '15.0.5241.1000',\n 'product_name' : 'Microsoft SharePoint Foundation Server 2013 SP1'\n }],\n 'Server':\n [{\n 'kb' : '4484352',\n 'path' : install['path'],\n 'append' : 'transformapps',\n 'file' : 'docxpageconverter.exe',\n 'version' : '15.0.5241.1000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2013 SP1'\n }]\n }\n },\n '2016':\n { '0':\n {'Server':\n [{ \n 'kb' : '4484336',\n 'path' : install['path'],\n 'append' : 'bin',\n 'file' : 'microsoft.sharepoint.publishing.dll',\n 'version' : '16.0.5005.1000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2016'\n }]\n }\n },\n '2019':\n { '0':\n {'Server':\n [ {\n 'kb' : '4484332',\n 'path' : install['path'],\n 'append' :'bin',\n 'file' : 'ascalc.dll',\n 'version' : '16.0.10359.20000',\n 'product_name' : 'Microsoft SharePoint Server 2019'\n }]\n }\n }\n};\n\n# Get the specific product / path \nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_INST_VER_NOT_VULN, 'Microsoft SharePoint Server');\n\nvuln = FALSE;\nxss = FALSE;\nport = kb_smb_transport();\nreg_keys = get_kb_list('SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/*/DisplayName');\n\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = hotfix_append_path(path:check['path'], value:check['append']);\n\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER)\n {\n vuln = TRUE;\n if (check['kb'] == '4484383' ||\n check['kb'] == '4484332' ||\n check['kb'] == '4484336' ||\n check['kb'] == '4484364' ||\n check['kb'] == '4484352'\n ) xss = TRUE;\n }\n}\n\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n if (xss) replace_kb_item(name:'www/' + port + '/XSS', value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T15:13:54", "description": "According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.\n\n - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.\n\n - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.\n\n - An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).\n\n - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.\n\nNote that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-06-25T00:00:00", "type": "nessus", "title": "Microsoft SharePoint Server 2019 < 16.0.10359.20000 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2022-10-26T00:00:00", "cpe": ["cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*"], "id": "WEB_APPLICATION_SCANNING_112450", "href": "https://www.tenable.com/plugins/was/112450", "sourceData": "No source data", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T15:13:48", "description": "According to its self-reported version number, the Microsoft SharePoint application running on the remote host is affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package.\n\n - A cross-site-scripting (XSS) vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.\n\n - A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.\n\n - An information disclosure vulnerability exists where certain modes of the search function in Microsoft SharePoint Server are vulnerable to cross-site search attacks (a variant of cross-site request forgery, CSRF).\n\n - A spoofing vulnerability exists when Microsoft SharePoint Server does not properly sanitize a specially crafted web request to an affected SharePoint server.\n\nNote that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-06-25T00:00:00", "type": "nessus", "title": "Microsoft SharePoint Server 2016 < 16.0.5005.1000 Multiple Vulnerabilities", "bulletinFamily": "scanner", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2022-10-26T00:00:00", "cpe": ["cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:*:*:*:*"], "id": "WEB_APPLICATION_SCANNING_112449", "href": "https://www.tenable.com/plugins/was/112449", "sourceData": "No source data", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-01-11T15:13:31", "description": "A remote code execution (RCE) vulnerability exists in Visual Studio Code when the Python extension loads configuration files after opening a project. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n\nTo exploit this vulnerability, an attacker would need to convince a target to clone a repository and open it in Visual Studio Code with the Python extension installed. Attacker-specified code would execute when the target opened the integrated terminal.\n\nThe update address the vulnerability by modifying the way Visual Studio Code Python extension handles environment variables.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-05-15T00:00:00", "type": "nessus", "title": "Security Update for Microsoft Visual Studio Code Python Extension (May 2020)", "bulletinFamily": "scanner", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1171", "CVE-2020-1192"], "modified": "2022-05-13T00:00:00", "cpe": ["cpe:/a:microsoft:visual_studio_code"], "id": "MICROSOFT_VISUAL_STUDIO_CODE_MS20_MAY.NASL", "href": "https://www.tenable.com/plugins/nessus/136617", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\n\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(136617);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/13\");\n\n script_cve_id(\"CVE-2020-1171\", \"CVE-2020-1192\");\n script_xref(name:\"IAVA\", value:\"2020-A-0216-S\");\n\n script_name(english:\"Security Update for Microsoft Visual Studio Code Python Extension (May 2020)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has an application installed that is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"A remote code execution (RCE) vulnerability exists in Visual Studio Code when the \nPython extension loads configuration files after opening a project. An attacker \nwho successfully exploited the vulnerability could run arbitrary code in the \ncontext of the current user. If the current user is logged on with administrative \nuser rights, an attacker could take control of the affected system. An attacker \ncould then install programs; view, change, or delete data; or create new accounts \nwith full user rights.\n\nTo exploit this vulnerability, an attacker would need to convince a target to \nclone a repository and open it in Visual Studio Code with the Python extension \ninstalled. Attacker-specified code would execute when the target opened the \nintegrated terminal.\n\nThe update address the vulnerability by modifying the way Visual Studio Code Python \nextension handles environment variables.\");\n # https://github.com/microsoft/vscode-python/releases/tag/2020.5.78807\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?0cf4743e\");\n # https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1171\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?87a8b7a9\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade Python Extensin of VS Code to 2020.5.78807 or later.\");\n script_set_attribute(attribute:\"agent\", value:\"windows\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-1192\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2020-1171\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2020/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2020/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/05/15\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio_code\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2020-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_visual_studio_code_win_extensions_installed.nbin\");\n script_require_keys(\"installed_sw/Microsoft Visual Studio Code\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp_info = vcf::get_app_info(app:'vs-code::python', win_local:TRUE);\n\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { 'fixed_version' : '2020.5.78807' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n\n", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2023-02-08T15:53:23", "description": "### *Detect date*:\n05/12/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to spoof user interface, execute arbitrary code, obtain sensitive information.\n\n### *Affected products*:\nMicrosoft Excel 2010 Service Pack 2 (64-bit editions) \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft Excel 2016 (64-bit edition) \nMicrosoft Office 2016 for Mac \nMicrosoft Excel 2010 Service Pack 2 (32-bit editions) \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nMicrosoft SharePoint Server 2019 \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft SharePoint Enterprise Server 2013 Service Pack 1 \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft SharePoint Server 2010 Service Pack 2 \nMicrosoft Office 2019 for Mac \nMicrosoft 365 Apps for Enterprise for 32-bit Systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-1099](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1099>) \n[CVE-2020-0901](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-0901>) \n[CVE-2020-1069](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1069>) \n[CVE-2020-1024](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1024>) \n[CVE-2020-1100](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1100>) \n[CVE-2020-1101](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1101>) \n[CVE-2020-1023](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1023>) \n[CVE-2020-1103](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1103>) \n[CVE-2020-1102](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1102>) \n[CVE-2020-1105](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1105>) \n[CVE-2020-1104](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1104>) \n[CVE-2020-1107](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1107>) \n[CVE-2020-1106](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1106>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Office](<https://threats.kaspersky.com/en/product/Microsoft-Office/>)\n\n### *CVE-IDS*:\n[CVE-2020-1099](<https://vulners.com/cve/CVE-2020-1099>)3.5Warning \n[CVE-2020-0901](<https://vulners.com/cve/CVE-2020-0901>)7.5Critical \n[CVE-2020-1069](<https://vulners.com/cve/CVE-2020-1069>)6.5High \n[CVE-2020-1024](<https://vulners.com/cve/CVE-2020-1024>)6.5High \n[CVE-2020-1100](<https://vulners.com/cve/CVE-2020-1100>)3.5Warning \n[CVE-2020-1101](<https://vulners.com/cve/CVE-2020-1101>)3.5Warning \n[CVE-2020-1023](<https://vulners.com/cve/CVE-2020-1023>)6.5High \n[CVE-2020-1103](<https://vulners.com/cve/CVE-2020-1103>)4.3Warning \n[CVE-2020-1102](<https://vulners.com/cve/CVE-2020-1102>)6.5High \n[CVE-2020-1105](<https://vulners.com/cve/CVE-2020-1105>)3.5Warning \n[CVE-2020-1104](<https://vulners.com/cve/CVE-2020-1104>)3.5Warning \n[CVE-2020-1107](<https://vulners.com/cve/CVE-2020-1107>)3.5Warning \n[CVE-2020-1106](<https://vulners.com/cve/CVE-2020-1106>)4.3Warning\n\n### *KB list*:\n[4484364](<http://support.microsoft.com/kb/4484364>) \n[4484383](<http://support.microsoft.com/kb/4484383>) \n[4484338](<http://support.microsoft.com/kb/4484338>) \n[4484336](<http://support.microsoft.com/kb/4484336>) \n[4484384](<http://support.microsoft.com/kb/4484384>) \n[4484332](<http://support.microsoft.com/kb/4484332>) \n[4484365](<http://support.microsoft.com/kb/4484365>) \n[4484352](<http://support.microsoft.com/kb/4484352>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 9.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T00:00:00", "type": "kaspersky", "title": "KLA11774 Multiple vulnerabilities in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0901", "CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1069", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107"], "modified": "2020-06-03T00:00:00", "id": "KLA11774", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11774/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-02-08T15:53:25", "description": "### *Detect date*:\n05/12/2020\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to gain privileges, cause denial of service, execute arbitrary code.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nMicrosoft .NET Framework 3.5 \nMicrosoft .NET Framework 4.5.2 \nASP.NET Core 3.1 \nMicrosoft .NET Framework 4.6 \nMicrosoft Visual Studio 2019 version 16.5 \nMicrosoft Visual Studio 2017 version 15.9 (includes 15.1 - 15.8) \nMicrosoft .NET Framework 3.5 AND 4.6/4.6.1/4.6.2 \nMicrosoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) \nMicrosoft .NET Framework 3.5 AND 4.6.2/4.7/4.7.1/4.7.2 \nMicrosoft .NET Framework 3.5 AND 4.7.1/4.7.2 \nMicrosoft .NET Framework 2.0 Service Pack 2 \nMicrosoft .NET Framework 4.8 \n.NET Core 3.1 \nMicrosoft .NET Framework 3.5.1 \nMicrosoft .NET Framework 3.5 AND 4.7.2 \n.NET Core 5.0 \n.NET Core 2.1 \nVisual Studio Code \nMicrosoft .NET Framework 3.5 AND 4.8 \nMicrosoft Visual Studio 2019 version 16.0 \nMicrosoft .NET Framework 3.0 Service Pack 2 \nMicrosoft .NET Framework 4.6/4.6.1/4.6.2/4.7/4.7.1/4.7.2\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2020-1066](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1066>) \n[CVE-2020-1108](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1108>) \n[CVE-2020-1161](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1161>) \n[CVE-2020-1171](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1171>) \n[CVE-2020-1192](<https://portal.msrc.microsoft.com/api/security-guidance/en-US/CVE/CVE-2020-1192>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft .NET Framework](<https://threats.kaspersky.com/en/product/Microsoft-.NET-Framework/>)\n\n### *CVE-IDS*:\n[CVE-2020-1066](<https://vulners.com/cve/CVE-2020-1066>)4.6Warning \n[CVE-2020-1108](<https://vulners.com/cve/CVE-2020-1108>)5.0Critical \n[CVE-2020-1161](<https://vulners.com/cve/CVE-2020-1161>)5.0Critical \n[CVE-2020-1171](<https://vulners.com/cve/CVE-2020-1171>)9.3Critical \n[CVE-2020-1192](<https://vulners.com/cve/CVE-2020-1192>)9.3Critical\n\n### *KB list*:\n[4556826](<http://support.microsoft.com/kb/4556826>) \n[4556813](<http://support.microsoft.com/kb/4556813>) \n[4556812](<http://support.microsoft.com/kb/4556812>) \n[4556807](<http://support.microsoft.com/kb/4556807>) \n[4556406](<http://support.microsoft.com/kb/4556406>) \n[4556405](<http://support.microsoft.com/kb/4556405>) \n[4556404](<http://support.microsoft.com/kb/4556404>) \n[4556403](<http://support.microsoft.com/kb/4556403>) \n[4556402](<http://support.microsoft.com/kb/4556402>) \n[4556401](<http://support.microsoft.com/kb/4556401>) \n[4556400](<http://support.microsoft.com/kb/4556400>) \n[4556441](<http://support.microsoft.com/kb/4556441>) \n[4552929](<http://support.microsoft.com/kb/4552929>) \n[4552926](<http://support.microsoft.com/kb/4552926>) \n[4552931](<http://support.microsoft.com/kb/4552931>) \n[4556399](<http://support.microsoft.com/kb/4556399>) \n[4552928](<http://support.microsoft.com/kb/4552928>)\n\n### *Microsoft official advisories*:", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-05-12T00:00:00", "type": "kaspersky", "title": "KLA11772 Multiple vulnerabilities in Microsoft Developer Tools", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1066", "CVE-2020-1108", "CVE-2020-1161", "CVE-2020-1171", "CVE-2020-1192"], "modified": "2020-06-18T00:00:00", "id": "KLA11772", "href": "https://threats.kaspersky.com/en/vulnerability/KLA11772/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mscve": [{"lastseen": "2022-10-26T18:28:10", "description": "A remote code execution vulnerability exists in Microsoft SharePoint Server when it fails to properly identify and filter unsafe ASP.Net web controls. An authenticated attacker who successfully exploited the vulnerability could use a specially crafted page to perform actions in the security context of the SharePoint application pool process.\n\nTo exploit the vulnerability, an authenticated user must create and invoke a specially crafted page on an affected version of Microsoft SharePoint Server.\n\nThe security update addresses the vulnerability by correcting how Microsoft SharePoint Server handles processing of created content.\n", "edition": 1, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mscve", "title": "Microsoft SharePoint Server Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1069"], "modified": "2020-05-12T07:00:00", "id": "MS:CVE-2020-1069", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1069", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-10-26T18:28:10", "description": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.\n\nExploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.\n\nThe security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.\n", "edition": 1, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mscve", "title": "Microsoft SharePoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1023"], "modified": "2020-05-12T07:00:00", "id": "MS:CVE-2020-1023", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1023", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-10-26T18:28:10", "description": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.\n\nExploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.\n\nThe security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.\n", "edition": 1, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mscve", "title": "Microsoft SharePoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1024"], "modified": "2020-05-12T07:00:00", "id": "MS:CVE-2020-1024", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1024", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2022-10-03T16:29:40", "description": "A remote code execution vulnerability exists in Visual Studio Code when the Python extension loads workspace settings from a notebook file. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the current user. If the current user is logged on with administrative user rights, an attacker could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n\nTo exploit this vulnerability, an attacker would need to convince a target to open a specially crafted file in Visual Studio Code with the Python extension installed.\n\nThe update address the vulnerability by modifying the way Visual Studio Code Python extension enforces user settings.\n", "edition": 1, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 7.8, "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mscve", "title": "Visual Studio Code Python Extension Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1192"], "modified": "2020-05-12T07:00:00", "id": "MS:CVE-2020-1192", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1192", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2022-10-26T18:28:10", "description": "A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the SharePoint application pool and the SharePoint server farm account.\n\nExploitation of this vulnerability requires that a user uploads a specially crafted SharePoint application package to an affected version of SharePoint.\n\nThe security update addresses the vulnerability by correcting how SharePoint checks the source markup of application packages.\n", "edition": 1, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-05-12T07:00:00", "type": "mscve", "title": "Microsoft SharePoint Remote Code Execution Vulnerability", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1102"], "modified": "2020-05-12T07:00:00", "id": "MS:CVE-2020-1102", "href": "https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-1102", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "threatpost": [{"lastseen": "2020-10-14T22:25:16", "description": "Microsoft has released fixes for 111 security vulnerabilities in its May Patch Tuesday update, including 16 critical bugs and 96 that are rated important.\n\nUnlike other [recent monthly updates](<https://threatpost.com/april-patch-tuesday-microsoft-active-exploit/154794/>) from the computing giant this year, none of the flaws are publicly known or under active attack at the time of release.\n\n[](<https://threatpost.com/newsletter-sign/>)\n\nAlong with the expected cache of operating system, browser, Office and SharePoint updates, Microsoft has also released updates for .NET Framework, .NET Core, Visual Studio, Power BI, Windows Defender, and Microsoft Dynamics.\n\n## **Privilege-Escalation Bugs to the Fore**\n\nThe majority of the fixes are important-rated elevation-of-privilege (EoP) bugs. There are a total of 56 of these types of fixes in Microsoft\u2019s May release, primarily impacting various Windows components. This class of vulnerabilities is used by attackers once they\u2019ve managed to gain initial access to a system, in order to execute code on their target systems with elevated privileges.\n\nThree of these bugs have received a rating of \u201cExploitation More Likely,\u201d pointed out Satnam Narang, staff research engineer at Tenable: A pair of flaws in Win32k ([CVE-2020-1054](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1054>), [CVE-2020-1143](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1143>)) and one in the Windows Graphics Component ([CVE-2020-1135](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1135>)).\n\nThe two flaws in Win32k both exist when the Windows kernel-mode driver fails to properly handle objects in memory, according to Microsoft\u2019s advisory. An attacker who successfully exploited either vulnerability could run arbitrary code in kernel mode; thus, an attacker could then install programs; view, change or delete data; or create new accounts with full user rights.\n\nTo exploit these, an attacker would first have to log on to the system. An attacker could then run a specially crafted application that could exploit the vulnerability and take control of an affected system.\n\nThe Windows Graphics Component EoP bug meanwhile is found in most Windows 10 and Windows Server builds, Jay Goodman, strategic product marketing manager at Automox, told Threatpost. \u201cThe vulnerability could allow an exploit that leverages how Windows Graphics handles objects in memory,\u201d he said. \u201cAn attacker could use this vulnerability to elevate a process\u2019 privileges, allowing the attacker to steal credentials or sensitive data, download additional malware, or execute malicious code.\u201d\n\nIt was demonstrated at this year\u2019s Pwn2Own, said Dustin Childs, researcher at Trend Micro\u2019s Zero-Day Initiative.\n\n\u201cWhile Pwn2Own [may have been virtual](<https://threatpost.com/defying-covid-19s-pall-pwn2own-goes-virtual/154002/>) this year, the bugs demonstrated certainly were not,\u201d he said in a [Patch Tuesday analysis](<https://www.zerodayinitiative.com/blog/2020/5/12/the-may-2020-security-update-review>). \u201cThis bug from the Fluoroacetate duo of Richard Zhu and Amat Cama allows a logged-on user to take over a system by running a specially crafted program. They leveraged a use-after-free (UAF) bug in Windows to escalate from a regular user to SYSTEM.\u201d\n\nThere is also one critical EoP bug, in Microsoft Edge ([CVE-2020-1056](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1056>)). This exists because Edge does not properly enforce cross-domain policies, which could allow an attacker to access information from one domain and inject it into another domain, according to Microsoft\u2019s advisory. However, in all cases an attack requires user interaction, such as tricking users into clicking a link that takes them to the attacker\u2019s site.\n\n\u201cIn a web-based attack scenario, an attacker could host a website that is used to attempt to exploit the vulnerability,\u201d it said. \u201cIn addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit the vulnerability.\u201d\n\n## **Critical Patches to Consider**\n\nOther bugs of note include two remote code execution (RCE) flaws in Microsoft Color Management ([CVE-2020-1117](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1117>)) and Windows Media Foundation ([CVE-2020-1126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1126>)), which could both be exploited by tricking a user via social engineering techniques into opening a malicious email attachment or visiting a website that contains the exploit code.\n\n\u201cSuccessful exploitation would allow an attacker to perform actions on the system using the same permissions as the current user that was compromised,\u201d said Tenable\u2019s Narang. \u201cIf the user has administrative privileges, the attacker could then perform a variety of actions, such as installing programs, creating a new account with full user rights, and viewing, changing or deleting data.\u201d\n\nThe critical flaws also include updates for Chakra Core, Internet Explorer and EdgeHTML, while SharePoint has four critical bugs, continuing its dominance in that category from last month.\n\n\u201cMost of the critical vulnerabilities are resolved by the OS and browser updates, but there are four critical vulnerabilities in SharePoint and one in Visual Studio,\u201d Todd Schell, senior product manager, security, for Ivanti said via email.\n\nOn the SharePoint front, [CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>) and [CVE-2020-1102](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102>) are critical RCE vulnerabilities that would allow attackers to access a system and read or delete contents, make changes, or directly run code on the system.\n\n\u201cThis gives an attacker quick and easy access to not only your organization\u2019s most critical data stored in the SQL server but also a platform to perform additional malicious attacks against other devices in your environment,\u201d Automox\u2019 Goodman told Threatpost. \u201cSystems like SharePoint can often be difficult to take offline and patch, allowing RCE vulnerabilities to linger in your infrastructure. This gives attackers the ability to \u2018live off the land\u2019 and move laterally easily once access is gained via an existing exploit.\n\nAlso in SharePoint, an exploit for [CVE-202-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>) would give an attacker the ability to execute arbitrary code from the SharePoint application pool and the SharePoint server farm account, potentially impacting all the users connected into and using the platform.\n\n\u201cIf an attacker is able to access this critical component of the network, lateral movement throughout the connected filesystems would be difficult to contain,\u201d said Richard Melick, Sr., technical product manager at Automox, via email. \u201cWith Microsoft SharePoint\u2019s rise in use to support remote workers, addressing this vulnerability quickly is critical to securing a central hub of access to the full corporate network and data.\u201d\n\nAs for Visual Studio, \u201cusers of the Visual Studio Code Python Extension should take note of the two patches released this month,\u201d Childs noted, which are both RCE issues. \u201cOne is rated critical [[CVE-2020-1192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1192>)] while the other is rated important [[CVE-2020-1171](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1171>)]. There\u2019s no indication as to why one is more severe than the other, and users should treat them both as critical.\u201d\n\n## **Other Bugs of Note**\n\nAdministrators should also pay attention to a handful of other issues in the trove of patches, such as two for VBScript ([CVE-2020-1060](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1060>) and [CVE-2020-1058](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1058>)).\n\nWhen exploited, both could allow an attacker to gain the same right as the current user.\n\n\u201cWhile both CVE-2020-1058 and CVE-2020-1060 are not rated critical in severity, it\u2019s very possible to see them used by attackers in the wild; both vulnerabilities impact VBScript and how the scripting engine handles objects in memory,\u201d Chris Hass, director of information security and research for Automox, told Threatpost. \u201cDue to the versatility of VBScript in Windows, these vulnerabilities allow for several attack vectors to be explored by malicious actors.\u201d\n\nFor instance, an attacker could host a malicious webpage with a specially crafted payload to exploit any user visiting the page using Internet Explorer, inject code into a compromised webpage, or even launch a malvertising campaign to serve the payload via malicious advertisements on popular websites, he said.\n\nHe added, \u201cAn attacker could also embed an Active X control object in an application or Office document that could be used in a phishing campaign to gain code execution on the machine. It\u2019s likely only a matter of time till attackers, such as DarkHotel, incorporate these into their arsenal.\u201d DarkHotel [has been known to use VBScript bugs](<https://threatpost.com/darkhotel-exploits-microsoft-zero-day-vbscript-flaw/136685/>) in the past.\n\nThere\u2019s also an interesting denial-of-service vulnerability ([CVE-2020-1118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1118>)) in Microsoft Windows Transport Layer Security. It allows a remote, unauthenticated attacker to abnormally reboot, resulting in a denial-of-service condition.\n\n\u201cA NULL pointer dereference vulnerability exists in the Windows implementation of the Diffie-Hellman protocol,\u201d explained Childs. \u201cAn attacker can exploit this vulnerability by sending a malicious Client Key Exchange message during a TLS handshake. The vulnerability affects both TLS clients and TLS servers, so just about any system could be shut down by an attacker. Either way, successful exploitation will cause the lsass.exe process to terminate.\u201d\n\nIn terms of patching prioritization, \u201cWhat is interesting and often overlooked is seven of the 10 CVEs at higher risk of exploit are only rated as important,\u201d Ivanti\u2019s Schell said. \u201cIt is not uncommon to look to the critical vulnerabilities as the most concerning, but many of the vulnerabilities that end up being exploited are rated as important vs. critical. If your prioritization stops at vendor severity or even CVSS scores above a certain level, you may want to reassess your metrics. Look to other risk metrics like publicly disclosed, exploited (obviously) and exploitability assessment (Microsoft specific) to expand your prioritization process.\u201d\n\nMelick added that the critical bug in Visual Studio Code, which stems from how the Python extension loads workspace settings from a notebook file, should be a top priority, given that it\u2019s one of the most popular developer environment tools.\n\n\u201cAccounting for over 50 percent of the market share of developer tools, an attacker is not short of potential targets, and if successful, would have the ability to take control of the victim machine acting as the current user,\u201d he said. \u201cOnce an attacker has gained access, they could be capable of stealing critical information like source codes, inserting malicious code or backdoors into current projects, and install, modify or delete data. Due to the importance and popularity of Visual Studio Code, it is critical that organizations deploy this patch within 24 hours before this vulnerability is weaponized and deployed.\u201d\n\nMicrosoft has been on a bug-fixing roll lately; this month marks three months in a row that Microsoft has released patches for more than 110 CVEs.\n\n\u201cWe\u2019ll see if they maintain that pace throughout the year,\u201d said Childs.\n\n**_Inbox security is your best defense against today\u2019s fastest growing security threat \u2013 phishing and Business Email Compromise attacks. _**[**_On May 13 at 2 p.m. ET_**](<https://register.gotowebinar.com/register/5064791868226032141?source=ART>)**_, join Valimail security experts and Threatpost for a FREE webinar, _**[**_5 Proven Strategies to Prevent Email Compromise_**](<https://register.gotowebinar.com/register/5064791868226032141?source=ART>)**_. Get exclusive insights and advanced takeaways on how to lockdown your inbox to fend off the latest phishing and BEC assaults. Please _**[**_register here _**](<https://register.gotowebinar.com/register/5064791868226032141?source=ART>)**_for this sponsored webinar._**\n\n_**Also, don\u2019t miss our latest on-demand webinar from DivvyCloud and Threatpost, **_[_**A Practical Guide to Securing the Cloud in the Face of Crisis**_](<https://attendee.gotowebinar.com/register/4136632530104301068?source=art>)_**, with critical, advanced takeaways on how to avoid cloud disruption and chaos.**_\n", "cvss3": {}, "published": "2020-05-12T20:14:28", "type": "threatpost", "title": "Microsoft Addresses 111 Bugs for May Patch Tuesday", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1054", "CVE-2020-1056", "CVE-2020-1058", "CVE-2020-1060", "CVE-2020-1102", "CVE-2020-1117", "CVE-2020-1118", "CVE-2020-1126", "CVE-2020-1135", "CVE-2020-1143", "CVE-2020-1171", "CVE-2020-1192", "CVE-2020-5135"], "modified": "2020-05-12T20:14:28", "id": "THREATPOST:D3F7F2434B9347169B642A60BEC9FF02", "href": "https://threatpost.com/microsoft-111-bugs-may-patch-tuesday/155669/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "zdi": [{"lastseen": "2022-01-31T22:05:03", "description": "This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft SharePoint. Authentication is required to exploit this vulnerability. The specific flaw exists within the handling of shared forms. It is possible to invoke a shared form in a way that allows arbitrary controls to be instantiated. An attacker can leverage this vulnerability to execute code in the context of the SharePoint web server process.", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-05-12T00:00:00", "type": "zdi", "title": "Microsoft SharePoint Shared Forms Incomplete Blacklist Remote Code Execution Vulnerability", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1102"], "modified": "2020-05-12T00:00:00", "id": "ZDI-20-648", "href": "https://www.zerodayinitiative.com/advisories/ZDI-20-648/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "nvidia": [{"lastseen": "2022-08-05T18:06:24", "description": "NVIDIA has released a software update for Jetson AGX Xavier\u2122, Jetson Xavier NX, Jetson\u2122 TX1, Jetson TX2, Jetson Nano\u2122, and Jetson Nano 2GB in the NVIDIA\u00ae JetPack\u2122 software development kit (SDK) 4.5. The update addresses security issues that may lead to denial of service, data loss, and information disclosure. To protect your system, download and install the latest NVIDIA JetPack SDK from [NVIDIA DevZone](<https://developer.nvidia.com/embedded/downloads>). Go to [NVIDIA Product Security.](<https://www.nvidia.com/security/>)\n\n### Details\n\nThis section provides a summary of potential vulnerabilities and their impact that this security update addresses. Descriptions use [CWE\u2122](<https://cwe.mitre.org/>), and base scores and vectors use [CVSS v3.1](<https://www.first.org/cvss/v3.1/user-guide>) standards.\n\n**CVE IDs** | **Description** | **Base Score** | **Vector** \n---|---|---|--- \nCVE\u20112021\u20111070 | NVIDIA L4T contains a vulnerability in the `apply_binaries.sh` script used to install NVIDIA components into the root file system image, in which improper access control is applied, which may lead to an unprivileged user being able to modify system device tree files, leading to denial of service. | 7.1 | [AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H>) \nCVE\u20112021\u20111069 | \n\nNVIDIA Tegra\u00ae kernel driver contains a vulnerability in `NVHost` in which the variable can be null, which may lead to a null pointer dereference and unexpected reboot, leading to data loss.\n\n| 6.1 | [AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H>) \nCVE\u20112021\u20111071 | NVIDIA Tegra kernel contains a vulnerability in the INA3221 driver in which improper access control may lead to unauthorized users gaining access to system power usage data, which may lead to information disclosure. | 5.6 | [AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N](<https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N>) \n \nThe NVIDIA risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk to your local installation. NVIDIA recommends consulting a security or IT professional to evaluate the risk to your specific configuration.\n\n### Security Updates\n\nThe following table lists the NVIDIA software products affected, versions affected, and the updated version that includes this security update.\n\n**CVE IDs Addressed** | **Software Product** | **Operating System** | **Affected Versions** | **Updated Version** \n---|---|---|---|--- \nCVE\u20112021\u20111069 CVE\u20112021\u20111070 CVE\u20112021\u20111071 | Jetson TX1, TX2 series,Jetson AGX Xavier series, Jetson Xavier NX, Jetson Nano, and Jetson Nano 2GB | Linux for Tegra (L4T) | All versions prior to L4T release r32.5 | L4T release r32.5 \n \n**Notes:**\n\n * Earlier software branch releases that support this product are also affected. If you are using an earlier branch release, upgrade to the latest branch release.\n\n### Mitigations\n\nSee Security Updates for the version to install.\n\n### Acknowledgements\n\nNVIDIA thanks following individuals for reporting the issues:\n\n * CVE-2020-1069: Billy Laws\n * CVE\u20112021\u20111070: Michael de Gans\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-01-01T00:00:00", "type": "nvidia", "title": "Security Bulletin: NVIDIA Jetson AGX Xavier Series, Jetson Xavier NX, TX1, TX2, Nano and Nano 2GB - January 2021", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-1069", "CVE-2021-1069", "CVE-2021-1070", "CVE-2021-1071"], "modified": "2021-01-01T00:00:00", "id": "NVIDIA:5147", "href": "https://nvidia.custhelp.com/app/answers/detail/a_id/5147", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "githubexploit": [{"lastseen": "2022-04-02T19:35:55", "description": "This repository contains the patches for [CVE-2020-11022](https:...", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2020-04-14T19:12:01", "type": "githubexploit", "title": "Exploit for Cross-site Scripting in Jquery", "bulletinFamily": "exploit", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-11358", "CVE-2019-5428", "CVE-2020-1102", "CVE-2020-11022", "CVE-2020-11023"], "modified": "2022-04-02T09:19:46", "id": "C0148A2C-75C9-5375-AE2F-DBEDCCD0999F", "href": "", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}, "privateArea": 1}], "avleonov": [{"lastseen": "2020-12-20T04:20:58", "description": "This will be my third Microsoft Patch Tuesday report in video and audio format. And for the third time in a row, Microsoft has addressed over a hundred vulnerabilities. With my [Microsoft Patch Tuesday parser](<https://avleonov.com/2020/04/26/microsoft-patch-tuesday-april-2020/#classification-script>), it was possible to generate a report almost on the same day. But, of course, it takes much more time to describe the vulnerabilities manually.\n\n\n\n * All vulnerabilities: 111\n * Critical: 16\n * Important: 95\n * Moderate: 0\n * Low: 0\n\n[Last time](<https://avleonov.com/2020/04/26/microsoft-patch-tuesday-april-2020/>) I complained that different VM vendors release completely different reports for Microsoft Patch Tuesday. This time I decided that it's not a bug, but a feature. I upgraded my script to not only show vulnerabilities, but also show how these vulnerabilities were mentioned in the reports of various VM vendors ([Tenable](<https://www.tenable.com/blog/microsoft-s-may-2020-patch-tuesday-addresses-111-cves>), [Qualys](<https://blog.qualys.com/laws-of-vulnerabilities/2020/05/12/may-2020-patch-tuesday-111-vulns-16-critical-sharepoint-vs-code-adobe-patches>), [Rapid7](<https://blog.rapid7.com/2020/05/12/patch-tuesday-may-2020/>) and [ZDI](<https://www.thezdi.com/blog/2020/5/12/the-may-2020-security-update-review>)). In my opinion, it seems pretty useful.\n\n### Exploitation detected (0)\n\nIn the old report, we can see that there are no vulnerabilities actively used in attacks.\n\n### Exploitation more likely (8)\n\nThere are 8 vulnerabilities that MS considers more likely to be exploited. We see the types of these vulnerabilities and what products they affect. But all other details should be googled.\n\n#### Remote Code Execution\n\n * Internet Explorer ([CVE-2020-1062](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1062>))\n * Microsoft Graphics Components ([CVE-2020-1153](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1153>))\n * VBScript ([CVE-2020-1035](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1035>), [CVE-2020-1058](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1058>), [CVE-2020-1060](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1060>))\n\n#### Elevation of Privilege\n\n * Windows Graphics Component ([CVE-2020-1135](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1135>))\n * Windows Kernel ([CVE-2020-1054](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1054>), [CVE-2020-1143](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1143>))\n\nAnd here my script adds comments about vulnerabilities from the vendors and highlights vulnerabilities that were mentioned (or not mentioned).\n\n\n\nWe can see right away that Rapid7 recommends paying attention to RCE in Internet Explorer (CVE-2020-1062), although other vendors ignore this vulnerability.\n\nAccording to W3Counter, the current IE11 share is only 1.75%. But, on the other hand, it can still be used in some organizations to access legacy systems. And so this vulnerability may be exploited in targeted attacks.\n\nTenable pays attention to RCE in Microsoft Graphics Components. "The attacker would need to utilize social engineering tactics to convince a user to open a specially crafted file". Finally, ZDI claims that VBScript RCE (CVE-2020-1060) is especially interesting because "does't involve some form of user interaction".\n\nAgree that looking at Microsoft Patch Tuesday vulnerabilities in this way is much more fun. \n\nRegarding the Elevation of Privilege, ZDI claims that Windows Graphics Component EoP (CVE-2020-1135) is a real exploitable thing. Tenable mentions vulnerabilities of this type in Windows Kernel (CVE-2020-1054, CVE-2020-1143).\n\nThese were all "more likely to be exploited" vulnerabilities, according to Microsoft.\n\n### Other Product based (36)\n\nWhat about other vulnerabilities? Let's see the large groups of vulnerabilities in the same product. Strictly speaking, there is only one product, Microsoft SharePoint, with a bunch of different vulnerabilities. The rest are EoPs in Windows components that no VM vendor mentions.\n\n#### Microsoft SharePoint\n\n * Remote Code Execution ([CVE-2020-1023](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1023>), [CVE-2020-1024](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1024>), [CVE-2020-1102](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1102>), [CVE-2020-1069](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1069>))\n * Information Disclosure ([CVE-2020-1103](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1103>))\n * Cross Site Scripting ([CVE-2020-1099](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1099>), [CVE-2020-1100](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1100>), [CVE-2020-1101](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1101>), [CVE-2020-1106](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1106>))\n * Spoofing ([CVE-2020-1104](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1104>), [CVE-2020-1105](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1105>), [CVE-2020-1107](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1107>))\n\n#### Windows Runtime\n\n * Elevation of Privilege ([CVE-2020-1077](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1077>), [CVE-2020-1086](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1086>), [CVE-2020-1090](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1090>), [CVE-2020-1125](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1125>), [CVE-2020-1139](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1139>), [CVE-2020-1149](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1149>), [CVE-2020-1151](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1151>), [CVE-2020-1155](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1155>), [CVE-2020-1156](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1156>), [CVE-2020-1157](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1157>), [CVE-2020-1158](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1158>), [CVE-2020-1164](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1164>))\n\n#### Windows State Repository Service\n\n * Elevation of Privilege ([CVE-2020-1124](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1124>), [CVE-2020-1131](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1131>), [CVE-2020-1134](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1134>), [CVE-2020-1144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1144>), [CVE-2020-1184](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1184>), [CVE-2020-1185](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1185>), [CVE-2020-1186](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1186>), [CVE-2020-1187](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1187>), [CVE-2020-1188](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1188>), [CVE-2020-1189](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1189>), [CVE-2020-1190](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1190>), [CVE-2020-1191](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1191>))\n\nBut they write a lot about SharePoint, especially about RCEs (CVE-2020-1023, CVE-2020-1024, CVE-2020-1069, CVE-2020-1102). Three of the four RCEs involve uploading a malicious application package to exploit the vulnerabilities, while the other involves uploading a malicious page. In short, if you use SharePoint in your organization, you need to patch again.\n\n### Other Vulnerability Type based (67)\n\nAnd what about the remaining vulnerabilities in various products. Of course, the RCEs that can be used in phishing attacks are most interesting. These are vulnerabilities in Microsoft Color Management (CVE-2020-1117), Edge PDF (CVE-2020-1096) and Excel (CVE-2020-0901).\n\nVendors paid a lot of attention to RCEs in Visual Studio Code Python Extension (CVE-2020-1171, CVE-2020-1192). But IMHO this is just a funny case. It is unlikely that attacks that require opening a specially crafted file or a repository with malicious code in Visual Studio Code will be massive.\n\nIt is also worth noting the RCE vulnerability in Windows (CVE-2020-1067). ZDI guys write that: "the only thing keeping this from being Critical is the fact that the attacker needs a domain user account for their specially crafted request to succeed. This makes the bug a prime target for insider threats, as well as penetration testers looking to expand their foothold in a target enterprise."\n\n#### Remote Code Execution\n\n * Chakra Scripting Engine ([CVE-2020-1037](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1037>), [CVE-2020-1065](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1065>))\n * Internet Explorer ([CVE-2020-1092](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1092>))\n * Jet Database Engine ([CVE-2020-1051](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1051>), [CVE-2020-1174](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1174>), [CVE-2020-1175](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1175>), [CVE-2020-1176](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1176>))\n * MSHTML Engine ([CVE-2020-1064](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1064>))\n * Microsoft Color Management ([CVE-2020-1117](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1117>))\n * Microsoft Edge PDF ([CVE-2020-1096](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1096>))\n * Microsoft Excel ([CVE-2020-0901](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0901>))\n * Microsoft Script Runtime ([CVE-2020-1061](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1061>))\n * VBScript ([CVE-2020-1093](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1093>))\n * Visual Studio Code Python Extension ([CVE-2020-1171](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1171>), [CVE-2020-1192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1192>))\n * Windows ([CVE-2020-1067](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1067>))\n\n#### Denial of Service\n\n * .NET Core & .NET Framework ([CVE-2020-1108](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1108>))\n * ASP.NET Core ([CVE-2020-1161](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1161>))\n * Connected User Experiences and Telemetry Service ([CVE-2020-1084](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1084>), [CVE-2020-1123](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1123>))\n * Microsoft Windows Transport Layer Security ([CVE-2020-1118](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1118>))\n * Windows ([CVE-2020-1076](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1076>))\n * Windows Hyper-V ([CVE-2020-0909](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0909>))\n\n#### Memory Corruption\n\n * Media Foundation ([CVE-2020-1150](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1150>), [CVE-2020-1028](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1028>), [CVE-2020-1126](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1126>), [CVE-2020-1136](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1136>))\n\n#### Elevation of Privilege\n\n * .NET Framework ([CVE-2020-1066](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1066>))\n * DirectX ([CVE-2020-1140](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1140>))\n * Microsoft Edge ([CVE-2020-1056](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1056>))\n * Microsoft Windows ([CVE-2020-1010](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1010>), [CVE-2020-1068](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1068>), [CVE-2020-1079](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1079>))\n * Windows Background Intelligent Transfer Service ([CVE-2020-1112](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1112>))\n * Windows Clipboard Service ([CVE-2020-1111](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1111>), [CVE-2020-1121](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1121>), [CVE-2020-1165](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1165>), [CVE-2020-1166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1166>))\n * Windows Common Log File System Driver ([CVE-2020-1154](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1154>))\n * Windows Error Reporting ([CVE-2020-1021](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1021>), [CVE-2020-1082](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1082>), [CVE-2020-1088](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1088>))\n * Windows Error Reporting Manager ([CVE-2020-1132](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1132>))\n * Windows GDI ([CVE-2020-1142](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1142>))\n * Windows Installer ([CVE-2020-1078](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1078>))\n * Windows Kernel ([CVE-2020-1087](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1087>), [CVE-2020-1114](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1114>))\n * Windows Print Spooler ([CVE-2020-1048](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1048>), [CVE-2020-1070](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1070>))\n * Windows Printer Service ([CVE-2020-1081](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1081>))\n * Windows Push Notification Service ([CVE-2020-1137](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1137>))\n * Windows Remote Access Common Dialog ([CVE-2020-1071](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1071>))\n * Windows Storage Service ([CVE-2020-1138](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1138>))\n * Windows Update Stack ([CVE-2020-1109](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1109>), [CVE-2020-1110](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1110>))\n\n#### Security Feature Bypass\n\n * Windows Task Scheduler ([CVE-2020-1113](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1113>))\n\n#### Information Disclosure\n\n * Windows CSRSS ([CVE-2020-1116](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1116>))\n * Windows GDI ([CVE-2020-0963](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0963>), [CVE-2020-1141](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1141>), [CVE-2020-1145](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1145>), [CVE-2020-1179](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1179>))\n * Windows Kernel ([CVE-2020-1072](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1072>))\n * Windows Subsystem for Linux ([CVE-2020-1075](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1075>))\n\n#### Cross Site Scripting\n\n * Microsoft Active Directory Federation Services ([CVE-2020-1055](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1055>))\n * Microsoft Dynamics 365 (On-Premise) ([CVE-2020-1063](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1063>))\n\n#### Spoofing\n\n * Microsoft Edge ([CVE-2020-1059](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1059>))\n * Microsoft Power BI Report Server ([CVE-2020-1173](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1173>))\n\nAmong DoS vulnerabilities, the most promising is DoS in TLS (CVE-2020-1118). An attacker sends a malicious Client Key Exchange message to TLS client or server during a handshake. This flaw can cause the target system to stop responding or automatically reboot.\n\nMemory Corruption in Media Foundation (CVE-2020-1150, CVE-2020-1028, CVE-2020-1126, CVE-2020-1136) is in fact RCE that can allow full system access to an attacker.\n\nAmong many Elevation of Privilege vulnerabilities, vendors pay attention to the EoP in Microsoft Edge (CVE-2020-1056) and Windows Remote Access Common Dialog (CVE-2020-1071). Among other vulnerabilities, they mention\u0442 Cross Site Scripting in Microsoft Active Directory Federation Services (CVE-2020-1055) and Spoofing in Microsoft Edge (CVE-2020-1059).\n\nThat's all for the May Microsoft Patch Tuesday vulnerabilities.\n\n### Older vulnerabilities\n\n * The PoC for previous month RCE in Microsoft SharePoint (CVE-2020-0932) was [demonstrated by ZDI](<https://www.thezdi.com/blog/2020/4/28/cve-2020-0932-remote-code-execution-on-microsoft-sharepoint-using-typeconverters>). \u201cYou can download all the necessary files to try this yourself.\u201d\n * Windows SMBv3 Client/Server Remote Code Execution Vulnerability (CVE-2020-0796) now has [POC by Ricerca Security](<https://ricercasecurity.blogspot.com/2020/04/ill-ask-your-body-smbghost-pre-auth-rce.html>). The code is still not available.\n * And nothing new for .LNK files processing (CVE-2020-0684) and Mysterious Windows RCE (CVE-2020-0662) from [February](<https://avleonov.com/2020/02/13/microsoft-patch-tuesday-february-2020/>).\n", "edition": 2, "cvss3": {"exploitabilityScore": 1.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2020-05-13T00:49:16", "type": "avleonov", "title": "Microsoft Patch Tuesday May 2020: comments from VM vendors, promising stuff for phishing, troubles with SharePoint and lulz with Visual Studio", "bulletinFamily": "blog", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 10.0, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-0662", "CVE-2020-0684", "CVE-2020-0796", "CVE-2020-0901", "CVE-2020-0909", "CVE-2020-0932", "CVE-2020-0963", "CVE-2020-1010", "CVE-2020-1021", "CVE-2020-1023", "CVE-2020-1024", "CVE-2020-1028", "CVE-2020-1035", "CVE-2020-1037", "CVE-2020-1048", "CVE-2020-1051", "CVE-2020-1054", "CVE-2020-1055", "CVE-2020-1056", "CVE-2020-1058", "CVE-2020-1059", "CVE-2020-1060", "CVE-2020-1061", "CVE-2020-1062", "CVE-2020-1063", "CVE-2020-1064", "CVE-2020-1065", "CVE-2020-1066", "CVE-2020-1067", "CVE-2020-1068", "CVE-2020-1069", "CVE-2020-1070", "CVE-2020-1071", "CVE-2020-1072", "CVE-2020-1075", "CVE-2020-1076", "CVE-2020-1077", "CVE-2020-1078", "CVE-2020-1079", "CVE-2020-1081", "CVE-2020-1082", "CVE-2020-1084", "CVE-2020-1086", "CVE-2020-1087", "CVE-2020-1088", "CVE-2020-1090", "CVE-2020-1092", "CVE-2020-1093", "CVE-2020-1096", "CVE-2020-1099", "CVE-2020-1100", "CVE-2020-1101", "CVE-2020-1102", "CVE-2020-1103", "CVE-2020-1104", "CVE-2020-1105", "CVE-2020-1106", "CVE-2020-1107", "CVE-2020-1108", "CVE-2020-1109", "CVE-2020-1110", "CVE-2020-1111", "CVE-2020-1112", "CVE-2020-1113", "CVE-2020-1114", "CVE-2020-1116", "CVE-2020-1117", "CVE-2020-1118", "CVE-2020-1121", "CVE-2020-1123", "CVE-2020-1124", "CVE-2020-1125", "CVE-2020-1126", "CVE-2020-1131", "CVE-2020-1132", "CVE-2020-1134", "CVE-2020-1135", "CVE-2020-1136", "CVE-2020-1137", "CVE-2020-1138", "CVE-2020-1139", "CVE-2020-1140", "CVE-2020-1141", "CVE-2020-1142", "CVE-2020-1143", "CVE-2020-1144", "CVE-2020-1145", "CVE-2020-1149", "CVE-2020-1150", "CVE-2020-1151", "CVE-2020-1153", "CVE-2020-1154", "CVE-2020-1155", "CVE-2020-1156", "CVE-2020-1157", "CVE-2020-1158", "CVE-2020-1161", "CVE-2020-1164", "CVE-2020-1165", "CVE-2020-1166", "CVE-2020-1171", "CVE-2020-1173", "CVE-2020-1174", "CVE-2020-1175", "CVE-2020-1176", "CVE-2020-1179", "CVE-2020-1184", "CVE-2020-1185", "CVE-2020-1186", "CVE-2020-1187", "CVE-2020-1188", "CVE-2020-1189", "CVE-2020-1190", "CVE-2020-1191", "CVE-2020-1192"], "modified": "2020-05-13T00:49:16", "id": "AVLEONOV:D8BE9238C3E35C438BC4D8515D78E548", "href": "http://feedproxy.google.com/~r/avleonov/~3/k3TPd7XE0GM/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}]}