Description
### Microsoft Patch Tuesday – May 2021
Microsoft patched 55 CVEs in their May 2021 Patch Tuesday release, of which 4 are rated as critical severity. Three 0-day vulnerability patches were included in the release. As of this publication date, none have been exploited.
Qualys released 12 QIDs on the same day, providing vulnerability detection and patch management coverage (where applicable) for all 55 CVEs and the related KBs.
#### Critical Microsoft vulnerabilities patched:
**CVE-2021-31181 **- SharePoint Remote Code Execution Vulnerability
Microsoft released patches addressing a critical RCE vulnerability in SharePoint (CVE-2021-31181). This CVE has a high likelihood of exploitability and is assigned a CVSSv3 base score of 8.8 by the vendor.
**CVE-2021-31166 **- HTTP Protocol Stack Remote Code Execution Vulnerability
Microsoft released patches addressing a critical RCE vulnerability in Windows. This vulnerability allows an unauthenticated attacker to remotely execute code as kernel. This is a wormable vulnerability where an attacker can simply send a malicious crafted packet to the target impacted web-server. CVE has a high likelihood of exploitability and is assigned a CVSSv3 base score of 9.8 by the vendor.
**CVE-2021-28476** - Hyper-V Remote Code Execution Vulnerability
Microsoft released patches addressing a critical RCE in Windows Server that impacts Hyper-V. Though the exploitation of this vulnerability is less likely (according to Microsoft), this should be prioritized for patching since adversaries can abuse this vulnerability and cause Denial of Service (DoS) in the form of a bug check. This CVE is assigned a CVSSv3 base score of 9.9 by the vendor.
#### Three 0-day vulnerabilities patched:
* CVE-2021-31204 - .NET and Visual Studio Elevation of Privilege Vulnerability
* CVE-2021-31207 - Microsoft Exchange Server Security Feature Bypass Vulnerability
* CVE-2021-31200 - Common Utilities Remote Code Execution Vulnerability
#### Qualys QIDs Providing Coverage
QID| Title| Severity| CVE ID
---|---|---|---
100415| Microsoft Internet Explorer Security Update for May 2021| Medium| CVE-2021-26419
91762| Microsoft SharePoint Enterprise Server Multiple Vulnerabilities May 2021| High| CVE-2021-31181
CVE-2021-31173
CVE-2021-31172
CVE-2021-31171
CVE-2021-26418
CVE-2021-28478
CVE-2021-28474
110381| Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2021| High| CVE-2021-31180
CVE-2021-31179
CVE-2021-31178
CVE-2021-31177
CVE-2021-31176
CVE-2021-31175
CVE-2021-31174
CVE-2021-28455
110382| Microsoft Skype for Business Server Security and Lync Server Update for May 2021| High| CVE-2021-26421
CVE-2021-26422
375556| Visual Studio Code Remote Code Execution Vulnerability| High| CVE-2021-31214
CVE-2021-31211
375557| Visual Studio Code Remote Development for Containers Extension Remote Code Execution Vulnerability| Medium| CVE-2021-31213
50111| Microsoft Exchange Server Multiple Vulnerabilities - May 2021| High| CVE-2021-31209
CVE-2021-31207
CVE-2021-31198
CVE-2021-31195
91762| Microsoft Windows Security Update for May 2021| Critical| CVE-2021-31192
CVE-2021-31188
CVE-2021-31170
CVE-2021-28476
CVE-2021-31184
CVE-2021-31190
CVE-2021-31167
CVE-2021-31168
CVE-2021-31208
CVE-2021-31169
CVE-2021-31165
CVE-2021-1720
CVE-2021-28479
CVE-2021-31185
CVE-2021-31194
CVE-2021-31191
CVE-2021-31186
CVE-2021-31205
CVE-2021-31193
CVE-2021-31187
CVE-2020-26144
CVE-2020-24587
CVE-2020-24588
91763| Microsoft Visual Studio Security Update for May 2021| High| CVE-2021-27068
CVE-2021-31204
91764| Microsoft Windows Web Media Extensions Remote Code Execution Vulnerability| High| CVE-2021-28465
91766| Microsoft .NET Core Security Update May 2021| Medium| CVE-2021-31204
91767| Microsoft Windows HTTP Protocol Stack Remote Code Execution Vulnerability - May 2021| Critical| CVE-2021-31166
### Adobe Patch Tuesday – May 2021
Adobe addressed 46 CVEs this Patch Tuesday, of which 26 are rated as critical severity, including one critical 0-day (CVE-2021-28550) impacting Adobe Acrobat and Reader product.
Adobe products patches include the following: Experience Manager, InDesign, Illustrator, InCopy, Genuine Service, Acrobat and Reader, Magento, Creative Cloud Desktop Application, Media Encoder, After Effects, Medium, and Animate products.
Qualys released 5 QIDs on the same day, providing vulnerability detection for 30 of the 46 CVEs, including 8 rated as critical.
#### One 0-day vulnerability patched:
**CVE-2021-28550**
This is a Remote Code Execution vulnerability impacting Adobe Acrobat and Reader and is being actively exploited in the wild on Windows devices. Adversaries are able to execute arbitrary code in windows, including installing malicious applications and gaining complete access to target machines.
Adobe Security Bulletin| QID| Severity| CVE ID
---|---|---|---
[APSB21-22 Security updates available for Adobe InDesign](<https://helpx.adobe.com/security/products/indesign/apsb21-22.html>)| 375549| Critical
Critical
Critical| CVE-2021-21098
CVE-2021-21099
CVE-2021-21043
[APSB21-24 Security update available for Adobe Illustrator](<https://helpx.adobe.com/security/products/illustrator/apsb21-24.html>)| 375551| Critical
Critical
Critical
Critical
Critical| CVE-2021-21101
CVE-2021-21103
CVE-2021-21104
CVE-2021-21105
CVE-2021-21102
[APSB21-29 Security update available for Adobe Acrobat and Reader](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>)| 375547| Important
Critical
Important
Critical
Important
Critical
Critical
Critical
Critical
Critical
Important
Critical
Critical
Critical| CVE-2021-28561
CVE-2021-28560
CVE-2021-28558
CVE-2021-28557
CVE-2021-28555
CVE-2021-28565
CVE-2021-28564
CVE-2021-21044
CVE-2021-21038
CVE-2021-21086
CVE-2021-28559
CVE-2021-28562
CVE-2021-28550
CVE-2021-28553
[APSB21-32 Security update available for Adobe Media Encoder](<https://helpx.adobe.com/security/products/media-encoder/apsb21-32.html>)| 375550| Important| CVE-2021-28569
[APSB21-35 Security update available for Adobe Animate7](<https://helpx.adobe.com/security/products/animate/apsb21-35.html>)| 375553| Important
Important
Important
Important
Important
Critical
Critical| CVE-2021-28572
CVE-2021-28573
CVE-2021-28574
CVE-2021-28575
CVE-2021-28576
CVE-2021-28578
CVE-2021-28577
### Discover Patch Tuesday Vulnerabilities in VMDR
[Qualys VMDR](<https://www.qualys.com/apps/vulnerability-management-detection-response/>) automatically detects new Patch Tuesday vulnerabilities using continuous updates to its Knowledge Base (KB).
You can see all your impacted hosts by these vulnerabilities using the following QQL query:
`vulnerabilities.vulnerability:(qid:`50111` OR qid:`91762` OR qid:`91763` OR qid:`91764` OR qid:`91766` OR qid:`91767` OR qid:`100415` OR qid:`110380` OR qid:`110381` OR qid:`110382` OR qid:`375547` OR qid:`375549` OR qid:`375550` OR qid:`375551` OR qid:`375553` OR qid:`375556` OR qid:`375557`)`

### Respond by Patching
VMDR rapidly remediates Windows hosts by deploying the most relevant and applicable per-technology version patches. You can simply select respective QIDs in the Patch Catalog and filter on the “Missing” patches to identify and deploy the applicable, available patches in one go.
The following QQL will return the missing patches pertaining to this Patch Tuesday.
`qid:`50111` OR qid:`91762` OR qid:`91763` OR qid:`91764` OR qid:`91766` OR qid:`91767` OR qid:`100415` OR qid:`110380` OR qid:`110381` OR qid:`110382` OR qid:`375547` OR qid:`375549` OR qid:`375550` OR qid:`375551` OR qid:`375553` OR qid:`375556` OR qid:`375557``

### Patch Tuesday Dashboard
The current updated Patch Tuesday dashboards are available in [Dashboard Toolbox: 2021 Patch Tuesday Dashboard](<https://qualys-secure.force.com/discussions/s/article/000006505>).
### Webinar Series: This Month in Patches
To help customers leverage the seamless integration between Qualys VMDR and Patch Management and reduce the median time to remediate critical vulnerabilities, the Qualys Research team is hosting a monthly webinar series [_This Month in Patches_](<https://www.brighttalk.com/webcast/11673/486394>).
We discuss some of the key vulnerabilities disclosed in the past month and how to patch them:
* 21Nails Exim Mail Server Multiple Vulnerabilities
* Pulse Connect Secure Remote Code Execution Vulnerability (CVE-2021-22893)
* Microsoft Patch Tuesday, May 2021
[Join us live or watch on demand](<https://www.brighttalk.com/webcast/11673/486394>)!
### About Patch Tuesday
Patch Tuesday QIDs are published at [Security Alerts](<https://www.qualys.com/research/security-alerts/>), typically late in the evening of [Patch Tuesday](<https://blog.qualys.com/tag/patch-tuesday>), followed shortly after by [PT dashboards](<https://qualys-secure.force.com/discussions/s/article/000006505>).
Related
{"id": "QUALYSBLOG:A8EE36FB3E891C73934CB1C60E3B3D41", "type": "qualysblog", "bulletinFamily": "blog", "title": "Microsoft & Adobe Patch Tuesday (May 2021) \u2013 Qualys covers 85 Vulnerabilities, 26 Critical", "description": "### Microsoft Patch Tuesday \u2013 May 2021\n\nMicrosoft patched 55 CVEs in their May 2021 Patch Tuesday release, of which 4 are rated as critical severity. Three 0-day vulnerability patches were included in the release. As of this publication date, none have been exploited.\n\nQualys released 12 QIDs on the same day, providing vulnerability detection and patch management coverage (where applicable) for all 55 CVEs and the related KBs.\n\n#### Critical Microsoft vulnerabilities patched: \n\n**CVE-2021-31181 **- SharePoint Remote Code Execution Vulnerability\n\nMicrosoft released patches addressing a critical RCE vulnerability in SharePoint (CVE-2021-31181). This CVE has a high likelihood of exploitability and is assigned a CVSSv3 base score of 8.8 by the vendor. \n\n**CVE-2021-31166 **- HTTP Protocol Stack Remote Code Execution Vulnerability\n\nMicrosoft released patches addressing a critical RCE vulnerability in Windows. This vulnerability allows an unauthenticated attacker to remotely execute code as kernel. This is a wormable vulnerability where an attacker can simply send a malicious crafted packet to the target impacted web-server. CVE has a high likelihood of exploitability and is assigned a CVSSv3 base score of 9.8 by the vendor.\n\n**CVE-2021-28476** - Hyper-V Remote Code Execution Vulnerability\n\nMicrosoft released patches addressing a critical RCE in Windows Server that impacts Hyper-V. Though the exploitation of this vulnerability is less likely (according to Microsoft), this should be prioritized for patching since adversaries can abuse this vulnerability and cause Denial of Service (DoS) in the form of a bug check. This CVE is assigned a CVSSv3 base score of 9.9 by the vendor.\n\n#### Three 0-day vulnerabilities patched: \n\n * CVE-2021-31204 - .NET and Visual Studio Elevation of Privilege Vulnerability \n * CVE-2021-31207 - Microsoft Exchange Server Security Feature Bypass Vulnerability\n * CVE-2021-31200 - Common Utilities Remote Code Execution Vulnerability\n\n#### Qualys QIDs Providing Coverage\n\nQID| Title| Severity| CVE ID \n---|---|---|--- \n100415| Microsoft Internet Explorer Security Update for May 2021| Medium| CVE-2021-26419 \n91762| Microsoft SharePoint Enterprise Server Multiple Vulnerabilities May 2021| High| CVE-2021-31181 \nCVE-2021-31173 \nCVE-2021-31172 \nCVE-2021-31171 \nCVE-2021-26418 \nCVE-2021-28478 \nCVE-2021-28474 \n110381| Microsoft Office and Microsoft Office Services and Web Apps Security Update May 2021| High| CVE-2021-31180 \nCVE-2021-31179 \nCVE-2021-31178 \nCVE-2021-31177 \nCVE-2021-31176 \nCVE-2021-31175 \nCVE-2021-31174 \nCVE-2021-28455 \n110382| Microsoft Skype for Business Server Security and Lync Server Update for May 2021| High| CVE-2021-26421 \nCVE-2021-26422 \n375556| Visual Studio Code Remote Code Execution Vulnerability| High| CVE-2021-31214 \nCVE-2021-31211 \n375557| Visual Studio Code Remote Development for Containers Extension Remote Code Execution Vulnerability| Medium| CVE-2021-31213 \n50111| Microsoft Exchange Server Multiple Vulnerabilities - May 2021| High| CVE-2021-31209 \nCVE-2021-31207 \nCVE-2021-31198 \nCVE-2021-31195 \n91762| Microsoft Windows Security Update for May 2021| Critical| CVE-2021-31192 \nCVE-2021-31188 \nCVE-2021-31170 \nCVE-2021-28476 \nCVE-2021-31184 \nCVE-2021-31190 \nCVE-2021-31167 \nCVE-2021-31168 \nCVE-2021-31208 \nCVE-2021-31169 \nCVE-2021-31165 \nCVE-2021-1720 \nCVE-2021-28479 \nCVE-2021-31185 \nCVE-2021-31194 \nCVE-2021-31191 \nCVE-2021-31186 \nCVE-2021-31205 \nCVE-2021-31193 \nCVE-2021-31187 \nCVE-2020-26144 \nCVE-2020-24587 \nCVE-2020-24588 \n91763| Microsoft Visual Studio Security Update for May 2021| High| CVE-2021-27068 \nCVE-2021-31204 \n91764| Microsoft Windows Web Media Extensions Remote Code Execution Vulnerability| High| CVE-2021-28465 \n91766| Microsoft .NET Core Security Update May 2021| Medium| CVE-2021-31204 \n91767| Microsoft Windows HTTP Protocol Stack Remote Code Execution Vulnerability - May 2021| Critical| CVE-2021-31166 \n \n### Adobe Patch Tuesday \u2013 May 2021\n\nAdobe addressed 46 CVEs this Patch Tuesday, of which 26 are rated as critical severity, including one critical 0-day (CVE-2021-28550) impacting Adobe Acrobat and Reader product.\n\nAdobe products patches include the following: Experience Manager, InDesign, Illustrator, InCopy, Genuine Service, Acrobat and Reader, Magento, Creative Cloud Desktop Application, Media Encoder, After Effects, Medium, and Animate products.\n\nQualys released 5 QIDs on the same day, providing vulnerability detection for 30 of the 46 CVEs, including 8 rated as critical.\n\n#### One 0-day vulnerability patched:\n\n**CVE-2021-28550**\n\nThis is a Remote Code Execution vulnerability impacting Adobe Acrobat and Reader and is being actively exploited in the wild on Windows devices. Adversaries are able to execute arbitrary code in windows, including installing malicious applications and gaining complete access to target machines.\n\nAdobe Security Bulletin| QID| Severity| CVE ID \n---|---|---|--- \n[APSB21-22 Security updates available for Adobe InDesign](<https://helpx.adobe.com/security/products/indesign/apsb21-22.html>)| 375549| Critical \nCritical \nCritical| CVE-2021-21098 \nCVE-2021-21099 \nCVE-2021-21043 \n[APSB21-24 Security update available for Adobe Illustrator](<https://helpx.adobe.com/security/products/illustrator/apsb21-24.html>)| 375551| Critical \nCritical \nCritical \nCritical \nCritical| CVE-2021-21101 \nCVE-2021-21103 \nCVE-2021-21104 \nCVE-2021-21105 \nCVE-2021-21102 \n[APSB21-29 Security update available for Adobe Acrobat and Reader](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>)| 375547| Important \nCritical \nImportant \nCritical \nImportant \nCritical \nCritical \nCritical \nCritical \nCritical \nImportant \nCritical \nCritical \nCritical| CVE-2021-28561 \nCVE-2021-28560 \nCVE-2021-28558 \nCVE-2021-28557 \nCVE-2021-28555 \nCVE-2021-28565 \nCVE-2021-28564 \nCVE-2021-21044 \nCVE-2021-21038 \nCVE-2021-21086 \nCVE-2021-28559 \nCVE-2021-28562 \nCVE-2021-28550 \nCVE-2021-28553 \n[APSB21-32 Security update available for Adobe Media Encoder](<https://helpx.adobe.com/security/products/media-encoder/apsb21-32.html>)| 375550| Important| CVE-2021-28569 \n[APSB21-35 Security update available for Adobe Animate7](<https://helpx.adobe.com/security/products/animate/apsb21-35.html>)| 375553| Important \nImportant \nImportant \nImportant \nImportant \nCritical \nCritical| CVE-2021-28572 \nCVE-2021-28573 \nCVE-2021-28574 \nCVE-2021-28575 \nCVE-2021-28576 \nCVE-2021-28578 \nCVE-2021-28577 \n \n### Discover Patch Tuesday Vulnerabilities in VMDR \n\n[Qualys VMDR](<https://www.qualys.com/apps/vulnerability-management-detection-response/>) automatically detects new Patch Tuesday vulnerabilities using continuous updates to its Knowledge Base (KB).\n\nYou can see all your impacted hosts by these vulnerabilities using the following QQL query:\n\n`vulnerabilities.vulnerability:(qid:`50111` OR qid:`91762` OR qid:`91763` OR qid:`91764` OR qid:`91766` OR qid:`91767` OR qid:`100415` OR qid:`110380` OR qid:`110381` OR qid:`110382` OR qid:`375547` OR qid:`375549` OR qid:`375550` OR qid:`375551` OR qid:`375553` OR qid:`375556` OR qid:`375557`)`\n\n\n\n### Respond by Patching\n\nVMDR rapidly remediates Windows hosts by deploying the most relevant and applicable per-technology version patches. You can simply select respective QIDs in the Patch Catalog and filter on the \u201cMissing\u201d patches to identify and deploy the applicable, available patches in one go.\n\nThe following QQL will return the missing patches pertaining to this Patch Tuesday.\n\n`qid:`50111` OR qid:`91762` OR qid:`91763` OR qid:`91764` OR qid:`91766` OR qid:`91767` OR qid:`100415` OR qid:`110380` OR qid:`110381` OR qid:`110382` OR qid:`375547` OR qid:`375549` OR qid:`375550` OR qid:`375551` OR qid:`375553` OR qid:`375556` OR qid:`375557``\n\n\n\n### Patch Tuesday Dashboard \n\nThe current updated Patch Tuesday dashboards are available in [Dashboard Toolbox: 2021 Patch Tuesday Dashboard](<https://qualys-secure.force.com/discussions/s/article/000006505>).\n\n### Webinar Series: This Month in Patches\n\nTo help customers leverage the seamless integration between Qualys VMDR and Patch Management and reduce the median time to remediate critical vulnerabilities, the Qualys Research team is hosting a monthly webinar series [_This Month in Patches_](<https://www.brighttalk.com/webcast/11673/486394>).\n\nWe discuss some of the key vulnerabilities disclosed in the past month and how to patch them:\n\n * 21Nails Exim Mail Server Multiple Vulnerabilities\n * Pulse Connect Secure Remote Code Execution Vulnerability (CVE-2021-22893)\n * Microsoft Patch Tuesday, May 2021\n\n[Join us live or watch on demand](<https://www.brighttalk.com/webcast/11673/486394>)!\n\n### About Patch Tuesday \n\nPatch Tuesday QIDs are published at [Security Alerts](<https://www.qualys.com/research/security-alerts/>), typically late in the evening of [Patch Tuesday](<https://blog.qualys.com/tag/patch-tuesday>), followed shortly after by [PT dashboards](<https://qualys-secure.force.com/discussions/s/article/000006505>).", "published": "2021-05-11T21:53:37", "modified": "2021-05-11T21:53:37", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}, "href": "https://blog.qualys.com/category/vulnerabilities-threat-research", "reporter": "Anand Paturi", "references": [], "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-1720", "CVE-2021-21038", "CVE-2021-21043", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-21098", "CVE-2021-21099", "CVE-2021-21101", "CVE-2021-21102", "CVE-2021-21103", "CVE-2021-21104", "CVE-2021-21105", "CVE-2021-22893", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565", "CVE-2021-28569", "CVE-2021-28572", "CVE-2021-28573", "CVE-2021-28574", "CVE-2021-28575", "CVE-2021-28576", "CVE-2021-28577", "CVE-2021-28578", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214"], "immutableFields": [], "lastseen": "2021-06-14T06:32:34", "viewCount": 307, "enchantments": {"dependencies": {"references": [{"type": "adobe", "idList": ["APSB21-09", "APSB21-22", "APSB21-24", "APSB21-29", "APSB21-32", "APSB21-35", "APSB21-73"]}, {"type": "almalinux", "idList": ["ALSA-2021:2036", "ALSA-2021:2037", "ALSA-2021:4356"]}, {"type": "androidsecurity", "idList": ["ANDROID:2021-10-01"]}, {"type": "archlinux", "idList": ["ASA-202105-20", "ASA-202105-21", "ASA-202105-22", "ASA-202105-23", "ASA-202107-34"]}, {"type": "attackerkb", "idList": ["AKB:06AF540E-3C8A-44E7-9CB1-65398AA456D2", "AKB:116FDAE6-8C6E-473E-8D39-247560D01C09", "AKB:132606CF-7B8C-4EE8-BE1C-308811E7B813", "AKB:223AC3BF-AD6E-4AEA-960A-DE258EE301A0", "AKB:2F48FB8A-EF4C-468F-9F4F-8BB9BB5FEC97", "AKB:50EC30BE-5E8C-4158-8AA0-06397441F8A5", "AKB:5BE82C1E-061F-4C04-93A2-1C15BBDE9337", "AKB:5E706DDA-98EC-49CA-AB21-4814DAF26444", "AKB:72CB57AD-D32C-43D3-86B8-F8B617707C5B", "AKB:BAAFFD25-660E-40C6-8978-DD33365E66B6", "AKB:DBAEA288-D224-49E1-877D-628DFD1CF161", "AKB:E5053BCC-1FA9-431D-9668-D386D6CA18EB"]}, {"type": "avleonov", "idList": ["AVLEONOV:9D3D76F4CC74C7ABB8000BC6AFB2A2CE", "AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34"]}, {"type": "cert", "idList": ["VU:213092"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2021-0053", "CPAI-2021-0054", "CPAI-2021-0259", "CPAI-2021-0260", "CPAI-2021-0261", "CPAI-2021-0262", "CPAI-2021-0278", "CPAI-2021-0279", "CPAI-2021-0292", "CPAI-2021-0877", "CPAI-2021-0900"]}, {"type": "checkpoint_security", "idList": ["CPS:SK173718"]}, {"type": "cisa", "idList": ["CISA:8C51810D4AACDCCDBF9D526B4C21660C", "CISA:B788AAE055F3DE2C255FCC0E7BE16B4B"]}, {"type": "cisco", "idList": ["CISCO-SA-WIFI-FAF-22EPCEWU"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:58E18367C5A247865E715DF802E7BD7E"]}, {"type": "cve", "idList": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-21038", "CVE-2021-21043", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-21098", "CVE-2021-21099", "CVE-2021-21101", "CVE-2021-21102", "CVE-2021-21103", "CVE-2021-21104", "CVE-2021-21105", "CVE-2021-22893", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565", "CVE-2021-28569", "CVE-2021-28573", "CVE-2021-28574", "CVE-2021-28575", "CVE-2021-28576", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2689-1:31A23", "DEBIAN:DLA-2690-1:EA198"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2020-24587", "DEBIANCVE:CVE-2020-24588"]}, {"type": "fedora", "idList": ["FEDORA:004B430A6E02", "FEDORA:8B35130B73F7", "FEDORA:971FF30B86D6", "FEDORA:A44F930A5958", "FEDORA:C53B3304C267", "FEDORA:D3BC1304C267"]}, {"type": "fireeye", "idList": ["FIREEYE:61901D6D8B7FE74193954DA723EA43FC", "FIREEYE:9CF80EFF287EE06F7EC0094727FE9C26", "FIREEYE:FC60CAB5C936FF70E94A7C9307805695"]}, {"type": "freebsd", "idList": ["8D20BD48-A4F3-11EC-90DE-1C697AA5A594"]}, {"type": "github", "idList": ["GHSA-7R83-W6R8-FH6W"]}, {"type": "githubexploit", "idList": ["0499644A-D703-5DE7-B8D9-37D85E3DEFBF", "0749209C-E3ED-5482-966B-DB35E546B4E5", "16151C06-C052-5C5E-B50B-5B202C40307C", "18D1D069-9D98-5B5F-9E5B-A5CA5559E4CB", "241CA368-5AF2-555C-91EE-5D10B229F97D", "247E32F5-B5A0-5A30-A422-8A0959F210DD", "2D0AC1C7-F656-5D6B-9FC2-79525014BE1E", "37A7F912-7A7F-50EA-BE80-8CDA0CE05B74", "390843FD-A5C7-51F1-A64D-24276740A4A6", "4F6243AC-FA60-570C-B6BB-D6612F9A0D92", "51858F11-1259-5A40-82DF-DD7D62A7B11A", "5A6190EE-8872-5D1B-B2E3-06AE49CBE93C", "706706C2-DB81-5EEA-AF28-6C5376B4E752", "730EEC4F-BE81-5690-BA8D-B89482C5C3D0", "7CEBB62C-173B-50CD-A252-B6522523EE57", "7F0937CB-B94F-52F5-ADE5-6399C85C5EAC", "8279F799-BC4C-5125-BCB1-401A95424586", "8D82AE30-2266-5373-9043-5C953D16A98E", "8DBBEAEC-C905-52CD-B95C-87663EA9C145", "A30CCA66-2F05-5D40-824F-80B389B32AE9", "A4D0164D-F0CA-51A5-B04B-2B8EE628E329", "B05281EC-9A0B-5C9A-BDC9-83FBF67FA348", "B3DDE0DD-F0B0-542D-8154-F61DCD2E49D9", "CA94B7F0-0AED-5C64-8BBB-D2A90BBCD553", "DE509642-15E1-5430-9B59-A6C3540D0721", "E458F533-4B97-51A1-897B-1AF58218F2BF", "E90678A1-4183-5E58-A4E2-5E48E8767D92", "F1BF4059-3C3E-5A65-BD42-BC991FB503F0", "F6326682-0713-5826-ACCC-D065B9E8AE42", "FCE0B03C-A225-5F8F-84EF-B22F29700B8D"]}, {"type": "gitlab", "idList": ["GITLAB-E2A130CCAD4C12A73F4A8292342DAA65"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:C8077AF60F0E22ECAD33F23194C38BB6"]}, {"type": "hackerone", "idList": ["H1:1238470"]}, {"type": "hivepro", "idList": ["HIVEPRO:09525E3475AC1C5F429611A90182E82F", "HIVEPRO:10B372979ED5F121D7A84FB66487023E", "HIVEPRO:92FF0246065B21E79C7D8C800F2DED76", "HIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74", "HIVEPRO:DB06BB609FE1B4E7C95CDC5CB2A38B28", "HIVEPRO:E7F36EC1E4DCF018F94ECD22747B7093", "HIVEPRO:F2305684A25C735549865536AA4254BF"]}, {"type": "hp", "idList": ["HPSBHF03725", "HPSBHF03743"]}, {"type": "huntr", "idList": ["1-PYPI-NNI"]}, {"type": "ics", "idList": ["ICSA-21-236-01", "ICSA-22-102-04", "ICSA-22-104-04"]}, {"type": "intel", "idList": ["INTEL:INTEL-SA-00473"]}, {"type": "kaspersky", "idList": ["KLA12167", "KLA12169", "KLA12170", "KLA12171", "KLA12173", "KLA12174", "KLA12175", "KLA12187"]}, {"type": "krebs", "idList": ["KREBS:4E22686F3C4E2536C402F6568B8E659A", "KREBS:E374075CAB55D7AB06EBD73CB87D33CD"]}, {"type": "lenovo", "idList": ["LENOVO:PS500405-INTEL-PROSET-AND-WIRELESS-WIFI-INTEL-VPRO-CSME-WIFI-AND-INTEL-KILLER-WIFI-ADVISORY-NOSID", "LENOVO:PS500411-AGGREGATION-AND-FRAGMENTATION-ATTACKS-AGAINST-WI-FI-FRAGATTACKS-VULNERABILITIES-NOSID"]}, {"type": "mageia", "idList": ["MGASA-2021-0257", "MGASA-2021-0258"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:28CA5946147FC0561948BA2EF52A8329", "MALWAREBYTES:60B52235DCBD12E98C7DB46F859F885C", "MALWAREBYTES:6A4862332586F98DA4761BE2B684752F", "MALWAREBYTES:8B41C7471B07595F7246D3DCB8794894", "MALWAREBYTES:B0F2474F776241731FE08EA7972E6239", "MALWAREBYTES:B830332817B5D5BEE99EF296E8EC7E2A", "MALWAREBYTES:B8C767042833344389F6158273089954"]}, {"type": "metasploit", "idList": ["MSF:AUXILIARY-DOS-WINDOWS-HTTP-HTTP_SYS_ACCEPT_ENCODING_DOS_CVE_2021_31166-", "MSF:EXPLOIT-WINDOWS-HTTP-EXCHANGE_PROXYSHELL_RCE-", "MSF:EXPLOIT-WINDOWS-HTTP-SHAREPOINT_UNSAFE_CONTROL-"]}, {"type": "mmpc", "idList": ["MMPC:27EEFD67E5E7E712750B1472E15C5A0B", "MMPC:85647D37E79AFEF2BFF74B4682648C5E"]}, {"type": "mscve", "idList": ["MS:CVE-2020-24587", "MS:CVE-2020-24588", "MS:CVE-2020-26144", "MS:CVE-2021-26418", "MS:CVE-2021-26419", "MS:CVE-2021-26421", "MS:CVE-2021-26422", "MS:CVE-2021-27068", "MS:CVE-2021-28455", "MS:CVE-2021-28465", "MS:CVE-2021-28474", "MS:CVE-2021-28476", "MS:CVE-2021-28478", "MS:CVE-2021-28479", "MS:CVE-2021-31165", "MS:CVE-2021-31166", "MS:CVE-2021-31167", "MS:CVE-2021-31168", "MS:CVE-2021-31169", "MS:CVE-2021-31170", "MS:CVE-2021-31171", "MS:CVE-2021-31172", "MS:CVE-2021-31173", "MS:CVE-2021-31174", "MS:CVE-2021-31175", "MS:CVE-2021-31176", "MS:CVE-2021-31177", "MS:CVE-2021-31178", "MS:CVE-2021-31179", "MS:CVE-2021-31180", "MS:CVE-2021-31181", "MS:CVE-2021-31184", "MS:CVE-2021-31185", "MS:CVE-2021-31186", "MS:CVE-2021-31187", "MS:CVE-2021-31188", "MS:CVE-2021-31190", "MS:CVE-2021-31191", "MS:CVE-2021-31192", "MS:CVE-2021-31193", "MS:CVE-2021-31194", "MS:CVE-2021-31195", "MS:CVE-2021-31198", "MS:CVE-2021-31199", "MS:CVE-2021-31200", "MS:CVE-2021-31201", "MS:CVE-2021-31204", "MS:CVE-2021-31205", "MS:CVE-2021-31207", "MS:CVE-2021-31208", "MS:CVE-2021-31209", "MS:CVE-2021-31211", "MS:CVE-2021-31213", "MS:CVE-2021-31214"]}, {"type": "mskb", "idList": ["KB4464542", "KB4484527", "KB4493197", "KB4493206", "KB4504711", "KB5001914", "KB5001916", "KB5001917", "KB5001918", "KB5001919", "KB5001920", "KB5001923", "KB5001925", "KB5001927", "KB5001928", "KB5001931", "KB5001935", "KB5001936", "KB5003165", "KB5003169", "KB5003171", "KB5003172", "KB5003173", "KB5003174", "KB5003197", "KB5003203", "KB5003208", "KB5003209", "KB5003210", "KB5003220", "KB5003225", "KB5003228", "KB5003233", "KB5003435", "KB5003729"]}, {"type": "mssecure", "idList": ["MSSECURE:27EEFD67E5E7E712750B1472E15C5A0B", "MSSECURE:85647D37E79AFEF2BFF74B4682648C5E"]}, {"type": "nessus", "idList": ["ADOBE_ACROBAT_APSB21-09.NASL", "ADOBE_ACROBAT_APSB21-29.NASL", "ADOBE_ANIMATE_APSB21-35.NASL", "ADOBE_ILLUSTRATOR_APSB21-24.NASL", "ADOBE_INDESIGN_APSB21-22.NASL", "ADOBE_MEDIA_ENCODER_APSB21-32.NASL", "ADOBE_READER_APSB21-09.NASL", "ADOBE_READER_APSB21-29.NASL", "AL2_ALASKERNEL-5_10-2022-002.NASL", "AL2_ALASKERNEL-5_4-2022-004.NASL", "ALMA_LINUX_ALSA-2021-4356.NASL", "CENTOS8_RHSA-2021-2036.NASL", "CENTOS8_RHSA-2021-2037.NASL", "CENTOS8_RHSA-2021-4140.NASL", "CENTOS8_RHSA-2021-4356.NASL", "DEBIAN_DLA-2689.NASL", "DEBIAN_DLA-2690.NASL", "EULEROS_SA-2021-2530.NASL", "EULEROS_SA-2021-2663.NASL", "EULEROS_SA-2022-1366.NASL", "EULEROS_SA-2022-1681.NASL", "EULEROS_SA-2022-1735.NASL", "FREEBSD_PKG_8D20BD48A4F311EC90DE1C697AA5A594.NASL", "MACOS_ADOBE_ACROBAT_APSB21-09.NASL", "MACOS_ADOBE_ACROBAT_APSB21-29.NASL", "MACOS_ADOBE_READER_APSB21-09.NASL", "MACOS_ADOBE_READER_APSB21-29.NASL", "MACOS_MS21_MAY_DOTNET_CORE.NASL", "MACOS_MS21_MAY_OFFICE.NASL", "MICROSOFT_VISUAL_STUDIO_CODE_REMOTE_CONTAINERS_MS21_MAY.NASL", "OPENSUSE-2021-1975.NASL", "OPENSUSE-2021-1977.NASL", "OPENSUSE-2021-2427.NASL", "OPENSUSE-2021-843.NASL", "OPENSUSE-2021-947.NASL", "ORACLELINUX_ELSA-2021-2036.NASL", "ORACLELINUX_ELSA-2021-2037.NASL", "ORACLELINUX_ELSA-2021-4356.NASL", "ORACLELINUX_ELSA-2021-9404.NASL", "ORACLELINUX_ELSA-2021-9406.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "ORACLEVM_OVMSA-2021-0035.NASL", "PULSE_CONNECT_SECURE-SA44784.NASL", "REDHAT-RHSA-2021-1546.NASL", "REDHAT-RHSA-2021-1547.NASL", "REDHAT-RHSA-2021-2036.NASL", "REDHAT-RHSA-2021-2037.NASL", "REDHAT-RHSA-2021-4140.NASL", "REDHAT-RHSA-2021-4356.NASL", "SLACKWARE_SSA_2021-202-01.NASL", "SMB_NT_MS21_MAY_5003169.NASL", "SMB_NT_MS21_MAY_5003171.NASL", "SMB_NT_MS21_MAY_5003172.NASL", "SMB_NT_MS21_MAY_5003173.NASL", "SMB_NT_MS21_MAY_5003174.NASL", "SMB_NT_MS21_MAY_5003197.NASL", "SMB_NT_MS21_MAY_5003208.NASL", "SMB_NT_MS21_MAY_5003209.NASL", "SMB_NT_MS21_MAY_5003210.NASL", "SMB_NT_MS21_MAY_5003233.NASL", "SMB_NT_MS21_MAY_DOTNET_CORE.NASL", "SMB_NT_MS21_MAY_EXCEL.NASL", "SMB_NT_MS21_MAY_EXCEL_C2R.NASL", "SMB_NT_MS21_MAY_EXCHANGE.NASL", "SMB_NT_MS21_MAY_INTERNET_EXPLORER.NASL", "SMB_NT_MS21_MAY_OFFICE.NASL", "SMB_NT_MS21_MAY_OFFICE_C2R.NASL", "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2013.NASL", "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2016.NASL", "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2019.NASL", "SMB_NT_MS21_MAY_OFFICE_WEB.NASL", "SMB_NT_MS21_MAY_SKYPE.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO_CODE.NASL", "SMB_NT_MS21_MAY_WEB_MEDIA.NASL", "SMB_NT_MS21_MAY_WORD.NASL", "SMB_NT_MS21_MAY_WORD_C2R.NASL", "SUSE_SU-2021-14764-1.NASL", "SUSE_SU-2021-1887-1.NASL", "SUSE_SU-2021-1888-1.NASL", "SUSE_SU-2021-1889-1.NASL", "SUSE_SU-2021-1890-1.NASL", "SUSE_SU-2021-1891-1.NASL", "SUSE_SU-2021-1899-1.NASL", "SUSE_SU-2021-1912-1.NASL", "SUSE_SU-2021-1913-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "SUSE_SU-2021-2208-1.NASL", "SUSE_SU-2021-2321-1.NASL", "SUSE_SU-2021-2324-1.NASL", "SUSE_SU-2021-2349-1.NASL", "SUSE_SU-2021-2406-1.NASL", "SUSE_SU-2021-2421-1.NASL", "SUSE_SU-2021-2422-1.NASL", "SUSE_SU-2021-2427-1.NASL", "SUSE_SU-2021-2451-1.NASL", "UBUNTU_USN-4997-1.NASL", "UBUNTU_USN-4997-2.NASL", "UBUNTU_USN-4999-1.NASL", "UBUNTU_USN-5000-1.NASL", "UBUNTU_USN-5000-2.NASL", "UBUNTU_USN-5001-1.NASL", "UBUNTU_USN-5018-1.NASL", "WEB_APPLICATION_SCANNING_112932", "WEB_APPLICATION_SCANNING_112933"]}, {"type": "oraclelinux", "idList": ["ELSA-2021-2036", "ELSA-2021-2037", "ELSA-2021-4356", "ELSA-2021-9404", "ELSA-2021-9406", "ELSA-2021-9452", "ELSA-2021-9453", "ELSA-2021-9459"]}, {"type": "osv", "idList": ["OSV:DLA-2689-1", "OSV:DLA-2690-1", "OSV:GHSA-7R83-W6R8-FH6W"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:162570", "PACKETSTORM:163208", "PACKETSTORM:163895"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:0082A77BD8EFFF48B406D107FEFD0DD3", "QUALYSBLOG:8DC9B53E981BBE193F6EC369D7FA85F8", "QUALYSBLOG:BC22CE22A3E70823D5F0E944CBD5CE4A", "QUALYSBLOG:CAF5B766E6B0E6C1A5ADF56D442E7BB2", "QUALYSBLOG:DC0F3E59C4DA6EB885E6BCAB292BCA7D"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:03B1EB65D8A7CFE486943E2472225BA1", "RAPID7BLOG:05A653A5E863B78EDD56FD74F059E02E", "RAPID7BLOG:20364300767E58631FFE0D21622E63A3", "RAPID7BLOG:24E0BE5176F6D3963E1824AD4A55019E", "RAPID7BLOG:44DA27D91BE223465957FC7CDF7A31A6", "RAPID7BLOG:5CDF95FB2AC31414FD390E0E0A47E057", "RAPID7BLOG:6C7EC9C9D6FC18A2D4965916E84077B9", "RAPID7BLOG:7B1DD656DC72802EE7230867267A5A16", "RAPID7BLOG:D47FB88807F2041B8820156ECFB85720", "RAPID7BLOG:F4F1A7CFCF2440B1B23C1904402DDAF2"]}, {"type": "redhat", "idList": ["RHSA-2021:1546", "RHSA-2021:1547", "RHSA-2021:2036", "RHSA-2021:2037", "RHSA-2021:4140", "RHSA-2021:4356", "RHSA-2021:4627", "RHSA-2021:5137"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-24587", "RH:CVE-2020-24588", "RH:CVE-2020-26144", "RH:CVE-2021-31204"]}, {"type": "securelist", "idList": ["SECURELIST:5147443B0EBD7DFCCB942AD0E2F92CCF", "SECURELIST:BB0230F9CE86B3F1994060AA0A809C08", "SECURELIST:C540EBB7FD8B7FB9E54E119E88DB5C48"]}, {"type": "seebug", "idList": ["SSV:99245", "SSV:99263", "SSV:99265", "SSV:99294", "SSV:99334"]}, {"type": "slackware", "idList": ["SSA-2021-202-01"]}, {"type": "srcincite", "idList": ["SRC-2021-0018"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2021:0843-1", "OPENSUSE-SU-2021:0947-1", "OPENSUSE-SU-2021:1975-1", "OPENSUSE-SU-2021:1977-1", "OPENSUSE-SU-2021:2427-1"]}, {"type": "talos", "idList": ["TALOS-2021-1233"]}, {"type": "talosblog", "idList": ["TALOSBLOG:0043F629DC5E8DA26934B2407F1C76CC"]}, {"type": "thn", "idList": ["THN:1DDE95EA33D4D9F304973569FC787451", "THN:25143CA85A0297381CEBBBD35F24F85B", "THN:4F47385B2D66DCA6F584F23C5F1AE0D0", "THN:5BE77895D84D1FB816C73BB1661CE8EB", "THN:603F844B99A1CC0CF1DE580659626B57", "THN:76EF51D1EBDAA5B92DD55E9E74F5B542", "THN:8243BE07E124CAD984B8B4895550A7CC", "THN:84E53E1CA489F43A3D68EC1B18D6C2E2", "THN:AE2E46F59043F97BE70DB77C163186E6", "THN:B95DC27A89565323F0F8E6350D24D801", "THN:C210D3FA71F1ED44D3BA1BF0CA368767", "THN:DFA2CC41C78DFA4BED87B1410C21CE2A", "THN:E95B6A75073DA71CEC73B2E4F0B13622", "THN:FA40708E1565483D14F9A31FC019FCE1", "THN:FA7EFA3A74BF3490AD84EA169EA6C4CA"]}, {"type": "threatpost", "idList": ["THREATPOST:16A4E4FD8C0D84305D5ABABEBBC6343E", "THREATPOST:18D24326B561A78A05ACB7E8EE54F396", "THREATPOST:2BD1A92D071EE3E52CB5EA7DD865F60A", "THREATPOST:2DBC4E237FAA8188A19D53BBB3356C62", "THREATPOST:33E56DEB736406F9DD08C7533BF1812B", "THREATPOST:354BF51EC880C48C85D9302EDB1227D6", "THREATPOST:35511A26A276E34B781D66037866F771", "THREATPOST:474207FB444B779CD6B86ABEA0D24054", "THREATPOST:4B2E19CAF27A3EFBCB2F777C6E528317", "THREATPOST:52923238811C7BFD39E0529C85317249", "THREATPOST:55873F60362AA114632D0D7DC95FF63C", "THREATPOST:604B67FD6EFB0E72DDD87DF07C8F456D", "THREATPOST:61CC1EAC83030C2B053946454FE77AC3", "THREATPOST:83C349A256695022C2417F465CEB3BB2", "THREATPOST:8D6D4C10987CBF3434080EFF240D2E74", "THREATPOST:905F5C5FE38CC3228FF94F798221B3D5", "THREATPOST:90D2E9044C556AC1A56C89A7F86742BE", "THREATPOST:960DA04864E083F2EAA36F3764D13603", "THREATPOST:A2FE619CD27EBEC2F6B0C62ED026F02C", "THREATPOST:A7148BBF3E2EDF9B0EA2E2C67C7CAC4E", "THREATPOST:A78361BA1DB99FF96F9399B2AE9F1EA4", "THREATPOST:B2DDD79594EACBEAC10B02C533235986", "THREATPOST:D7E3369CE997E9EF8A0586B994225257", "THREATPOST:DD8030D774C6B1FBB3DEDAFC836B8B80", "THREATPOST:EDFBDF12942A6080DE3FAE980A53F496", "THREATPOST:F006B56821C572012C6CBF003C78C596", "THREATPOST:F084C5D91E4F66092F5449922C34C4CE"]}, {"type": "ubuntu", "idList": ["USN-4997-1", "USN-4997-2", "USN-4999-1", "USN-5000-1", "USN-5000-2", "USN-5001-1", "USN-5018-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-24587", "UB:CVE-2020-24588", "UB:CVE-2020-26144"]}, {"type": "veracode", "idList": ["VERACODE:29230", "VERACODE:31029", "VERACODE:33005", "VERACODE:33006", "VERACODE:33011"]}, {"type": "zdi", "idList": ["ZDI-21-172", "ZDI-21-571", "ZDI-21-572", "ZDI-21-573", "ZDI-21-574", "ZDI-21-575", "ZDI-21-576", "ZDI-21-577", "ZDI-21-578", "ZDI-21-579", "ZDI-21-580", "ZDI-21-581", "ZDI-21-582", "ZDI-21-583", "ZDI-21-584", "ZDI-21-615", "ZDI-21-819", "ZDI-21-894"]}, {"type": "zdt", "idList": ["1337DAY-ID-36242", "1337DAY-ID-36442", "1337DAY-ID-36667"]}]}, "score": {"value": 0.0, "vector": "NONE"}, "backreferences": {"references": [{"type": "adobe", "idList": ["APSB21-09", "APSB21-22", "APSB21-24", "APSB21-29", "APSB21-32", "APSB21-35", "APSB21-73"]}, {"type": "almalinux", "idList": ["ALSA-2021:2036", "ALSA-2021:2037"]}, {"type": "androidsecurity", "idList": ["ANDROID:2021-10-01"]}, {"type": "archlinux", "idList": ["ASA-202105-20", "ASA-202105-21", "ASA-202105-22", "ASA-202105-23", "ASA-202107-34"]}, {"type": "attackerkb", "idList": ["AKB:06AF540E-3C8A-44E7-9CB1-65398AA456D2", "AKB:116FDAE6-8C6E-473E-8D39-247560D01C09", "AKB:132606CF-7B8C-4EE8-BE1C-308811E7B813", "AKB:2F48FB8A-EF4C-468F-9F4F-8BB9BB5FEC97", "AKB:50EC30BE-5E8C-4158-8AA0-06397441F8A5", "AKB:5BE82C1E-061F-4C04-93A2-1C15BBDE9337", "AKB:72CB57AD-D32C-43D3-86B8-F8B617707C5B", "AKB:BAAFFD25-660E-40C6-8978-DD33365E66B6", "AKB:DBAEA288-D224-49E1-877D-628DFD1CF161", "AKB:E5053BCC-1FA9-431D-9668-D386D6CA18EB"]}, {"type": "avleonov", "idList": ["AVLEONOV:9D3D76F4CC74C7ABB8000BC6AFB2A2CE", "AVLEONOV:B0F649A99B171AC3032AF71B1DCCFE34"]}, {"type": "cert", "idList": ["VU:213092"]}, {"type": "checkpoint_advisories", "idList": ["CPAI-2021-0053", "CPAI-2021-0054", "CPAI-2021-0259", "CPAI-2021-0260", "CPAI-2021-0261", "CPAI-2021-0262", "CPAI-2021-0278", "CPAI-2021-0279", "CPAI-2021-0292"]}, {"type": "checkpoint_security", "idList": ["CPS:SK173718"]}, {"type": "cisa", "idList": ["CISA:8C51810D4AACDCCDBF9D526B4C21660C", "CISA:B788AAE055F3DE2C255FCC0E7BE16B4B"]}, {"type": "cisco", "idList": ["CISCO-SA-WIFI-FAF-22EPCEWU"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:58E18367C5A247865E715DF802E7BD7E"]}, {"type": "cve", "idList": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-21038", "CVE-2021-21043", "CVE-2021-21044", "CVE-2021-21098", "CVE-2021-21099", "CVE-2021-21101", "CVE-2021-21102", "CVE-2021-22893", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-28562", "CVE-2021-28573", "CVE-2021-28574", "CVE-2021-28575", "CVE-2021-28576", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214"]}, {"type": "debian", "idList": ["DEBIAN:DLA-2689-1:31A23", "DEBIAN:DLA-2690-1:EA198"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2020-24587", "DEBIANCVE:CVE-2020-24588"]}, {"type": "fedora", "idList": ["FEDORA:004B430A6E02", "FEDORA:8B35130B73F7", "FEDORA:971FF30B86D6", "FEDORA:A44F930A5958", "FEDORA:C53B3304C267", "FEDORA:D3BC1304C267"]}, {"type": "fireeye", "idList": ["FIREEYE:61901D6D8B7FE74193954DA723EA43FC", "FIREEYE:9CF80EFF287EE06F7EC0094727FE9C26"]}, {"type": "freebsd", "idList": ["8D20BD48-A4F3-11EC-90DE-1C697AA5A594"]}, {"type": "github", "idList": ["GHSA-7R83-W6R8-FH6W"]}, {"type": "githubexploit", "idList": ["18D1D069-9D98-5B5F-9E5B-A5CA5559E4CB", "241CA368-5AF2-555C-91EE-5D10B229F97D", "247E32F5-B5A0-5A30-A422-8A0959F210DD", "2D0AC1C7-F656-5D6B-9FC2-79525014BE1E", "390843FD-A5C7-51F1-A64D-24276740A4A6", "51858F11-1259-5A40-82DF-DD7D62A7B11A", "5A6190EE-8872-5D1B-B2E3-06AE49CBE93C", "706706C2-DB81-5EEA-AF28-6C5376B4E752", "730EEC4F-BE81-5690-BA8D-B89482C5C3D0", "7F0937CB-B94F-52F5-ADE5-6399C85C5EAC", "8D82AE30-2266-5373-9043-5C953D16A98E", "A4D0164D-F0CA-51A5-B04B-2B8EE628E329", "B05281EC-9A0B-5C9A-BDC9-83FBF67FA348", "B3DDE0DD-F0B0-542D-8154-F61DCD2E49D9", "CA94B7F0-0AED-5C64-8BBB-D2A90BBCD553", "E458F533-4B97-51A1-897B-1AF58218F2BF", "F1BF4059-3C3E-5A65-BD42-BC991FB503F0", "F6326682-0713-5826-ACCC-D065B9E8AE42", "FC78B69A-549A-5869-8897-E30AA6CEA990", "FCE0B03C-A225-5F8F-84EF-B22F29700B8D"]}, {"type": "googleprojectzero", "idList": ["GOOGLEPROJECTZERO:C8077AF60F0E22ECAD33F23194C38BB6"]}, {"type": "hackerone", "idList": ["H1:1238470"]}, {"type": "hivepro", "idList": ["HIVEPRO:C0B03D521C5882F1BE07ECF1550A5F74"]}, {"type": "hp", "idList": ["HPSBHF03725", "HPSBHF03743"]}, {"type": "kaspersky", "idList": ["KLA12167", "KLA12169", "KLA12170", "KLA12171", "KLA12173", "KLA12174", "KLA12175", "KLA12187"]}, {"type": "krebs", "idList": ["KREBS:4E22686F3C4E2536C402F6568B8E659A", "KREBS:E374075CAB55D7AB06EBD73CB87D33CD"]}, {"type": "lenovo", "idList": ["LENOVO:PS500405-INTEL-PROSET-AND-WIRELESS-WIFI-INTEL-VPRO-CSME-WIFI-AND-INTEL-KILLER-WIFI-ADVISORY-NOSID", "LENOVO:PS500411-AGGREGATION-AND-FRAGMENTATION-ATTACKS-AGAINST-WI-FI-FRAGATTACKS-VULNERABILITIES-NOSID"]}, {"type": "malwarebytes", "idList": ["MALWAREBYTES:28CA5946147FC0561948BA2EF52A8329", "MALWAREBYTES:60B52235DCBD12E98C7DB46F859F885C", "MALWAREBYTES:6A4862332586F98DA4761BE2B684752F", "MALWAREBYTES:8B41C7471B07595F7246D3DCB8794894"]}, {"type": "metasploit", "idList": ["MSF:EXPLOIT/WINDOWS/HTTP/EXCHANGE_PROXYSHELL_RCE/", "MSF:ILITIES/ACROBAT-CVE-2021-28550/", "MSF:ILITIES/ACROBAT-CVE-2021-28562/", "MSF:ILITIES/FOXIT_READER-CVE-2019-5131/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-28455/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31174/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31177/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31178/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31179/", "MSF:ILITIES/MICROSOFT-OFFICE-CVE-2021-31180/", "MSF:ILITIES/MSFT-CVE-2020-24588/", "MSF:ILITIES/MSFT-CVE-2020-26144/", "MSF:ILITIES/MSFT-CVE-2021-26418/", "MSF:ILITIES/MSFT-CVE-2021-26419/", "MSF:ILITIES/MSFT-CVE-2021-28474/", "MSF:ILITIES/MSFT-CVE-2021-28478/", "MSF:ILITIES/MSFT-CVE-2021-31165/", "MSF:ILITIES/MSFT-CVE-2021-31166/", "MSF:ILITIES/MSFT-CVE-2021-31167/", "MSF:ILITIES/MSFT-CVE-2021-31168/", "MSF:ILITIES/MSFT-CVE-2021-31169/", "MSF:ILITIES/MSFT-CVE-2021-31172/", "MSF:ILITIES/MSFT-CVE-2021-31175/", "MSF:ILITIES/MSFT-CVE-2021-31176/", "MSF:ILITIES/MSFT-CVE-2021-31179/", "MSF:ILITIES/MSFT-CVE-2021-31181/", "MSF:ILITIES/MSFT-CVE-2021-31184/", "MSF:ILITIES/MSFT-CVE-2021-31185/", "MSF:ILITIES/MSFT-CVE-2021-31186/", "MSF:ILITIES/MSFT-CVE-2021-31187/", "MSF:ILITIES/MSFT-CVE-2021-31190/", "MSF:ILITIES/MSFT-CVE-2021-31192/", "MSF:ILITIES/MSFT-CVE-2021-31193/", "MSF:ILITIES/MSFT-CVE-2021-31195/", "MSF:ILITIES/MSFT-CVE-2021-31198/"]}, {"type": "mscve", "idList": ["MS:CVE-2020-24587", "MS:CVE-2020-24588", "MS:CVE-2020-26144", "MS:CVE-2021-26418", "MS:CVE-2021-26419", "MS:CVE-2021-26421", "MS:CVE-2021-26422", "MS:CVE-2021-27068", "MS:CVE-2021-28455", "MS:CVE-2021-28465", "MS:CVE-2021-28474", "MS:CVE-2021-28476", "MS:CVE-2021-28478", "MS:CVE-2021-28479", "MS:CVE-2021-31165", "MS:CVE-2021-31166", "MS:CVE-2021-31167", "MS:CVE-2021-31168", "MS:CVE-2021-31169", "MS:CVE-2021-31170", "MS:CVE-2021-31171", "MS:CVE-2021-31172", "MS:CVE-2021-31173", "MS:CVE-2021-31174", "MS:CVE-2021-31175", "MS:CVE-2021-31176", "MS:CVE-2021-31177", "MS:CVE-2021-31178", "MS:CVE-2021-31179", "MS:CVE-2021-31180", "MS:CVE-2021-31181", "MS:CVE-2021-31184", "MS:CVE-2021-31185", "MS:CVE-2021-31186", "MS:CVE-2021-31187", "MS:CVE-2021-31188", "MS:CVE-2021-31190", "MS:CVE-2021-31191", "MS:CVE-2021-31192", "MS:CVE-2021-31193", "MS:CVE-2021-31194", "MS:CVE-2021-31195", "MS:CVE-2021-31198", "MS:CVE-2021-31199", "MS:CVE-2021-31200", "MS:CVE-2021-31201", "MS:CVE-2021-31204", "MS:CVE-2021-31205", "MS:CVE-2021-31207", "MS:CVE-2021-31208", "MS:CVE-2021-31209", "MS:CVE-2021-31211", "MS:CVE-2021-31213", "MS:CVE-2021-31214"]}, {"type": "mskb", "idList": ["KB4464542", "KB4484527", "KB4504711", "KB5001931", "KB5003165", "KB5003203", "KB5003209", "KB5003225", "KB5003729"]}, {"type": "nessus", "idList": ["ADOBE_ACROBAT_APSB21-09.NASL", "ADOBE_ACROBAT_APSB21-29.NASL", "ADOBE_ANIMATE_APSB21-35.NASL", "ADOBE_ILLUSTRATOR_APSB21-24.NASL", "ADOBE_INDESIGN_APSB21-22.NASL", "ADOBE_MEDIA_ENCODER_APSB21-32.NASL", "ADOBE_READER_APSB21-09.NASL", "ADOBE_READER_APSB21-29.NASL", "CENTOS8_RHSA-2021-2036.NASL", "CENTOS8_RHSA-2021-2037.NASL", "DEBIAN_DLA-2689.NASL", "DEBIAN_DLA-2690.NASL", "MACOS_ADOBE_ACROBAT_APSB21-09.NASL", "MACOS_ADOBE_ACROBAT_APSB21-29.NASL", "MACOS_ADOBE_READER_APSB21-09.NASL", "MACOS_MS21_MAY_DOTNET_CORE.NASL", "MACOS_MS21_MAY_OFFICE.NASL", "MICROSOFT_VISUAL_STUDIO_CODE_REMOTE_CONTAINERS_MS21_MAY.NASL", "OPENSUSE-2021-1975.NASL", "OPENSUSE-2021-1977.NASL", "OPENSUSE-2021-2427.NASL", "OPENSUSE-2021-843.NASL", "ORACLELINUX_ELSA-2021-2036.NASL", "ORACLELINUX_ELSA-2021-2037.NASL", "ORACLELINUX_ELSA-2021-9459.NASL", "ORACLEVM_OVMSA-2021-0031.NASL", "PULSE_CONNECT_SECURE-SA44784.NASL", "REDHAT-RHSA-2021-1546.NASL", "REDHAT-RHSA-2021-1547.NASL", "REDHAT-RHSA-2021-2036.NASL", "REDHAT-RHSA-2021-2037.NASL", "SLACKWARE_SSA_2021-202-01.NASL", "SMB_NT_MS21_MAY_5003173.NASL", "SMB_NT_MS21_MAY_DOTNET_CORE.NASL", "SMB_NT_MS21_MAY_EXCHANGE.NASL", "SMB_NT_MS21_MAY_OFFICE_WEB.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO.NASL", "SMB_NT_MS21_MAY_VISUAL_STUDIO_CODE.NASL", "SMB_NT_MS21_MAY_WEB_MEDIA.NASL", "SUSE_SU-2021-14764-1.NASL", "SUSE_SU-2021-1887-1.NASL", "SUSE_SU-2021-1888-1.NASL", "SUSE_SU-2021-1889-1.NASL", "SUSE_SU-2021-1890-1.NASL", "SUSE_SU-2021-1891-1.NASL", "SUSE_SU-2021-1899-1.NASL", "SUSE_SU-2021-1912-1.NASL", "SUSE_SU-2021-1913-1.NASL", "SUSE_SU-2021-1975-1.NASL", "SUSE_SU-2021-1977-1.NASL", "SUSE_SU-2021-2321-1.NASL", "SUSE_SU-2021-2324-1.NASL", "SUSE_SU-2021-2349-1.NASL", "SUSE_SU-2021-2406-1.NASL", "SUSE_SU-2021-2421-1.NASL", "SUSE_SU-2021-2422-1.NASL", "SUSE_SU-2021-2427-1.NASL", "SUSE_SU-2021-2451-1.NASL", "UBUNTU_USN-4997-1.NASL", "UBUNTU_USN-4999-1.NASL", "UBUNTU_USN-5000-1.NASL", "UBUNTU_USN-5001-1.NASL", "UBUNTU_USN-5018-1.NASL", "WEB_APPLICATION_SCANNING_112932", "WEB_APPLICATION_SCANNING_112933"]}, {"type": "oraclelinux", "idList": ["ELSA-2021-2036", "ELSA-2021-2037", "ELSA-2021-9459"]}, {"type": "packetstorm", "idList": ["PACKETSTORM:162570", "PACKETSTORM:163208", "PACKETSTORM:163895"]}, {"type": "qualysblog", "idList": ["QUALYSBLOG:8DC9B53E981BBE193F6EC369D7FA85F8"]}, {"type": "rapid7blog", "idList": ["RAPID7BLOG:03B1EB65D8A7CFE486943E2472225BA1", "RAPID7BLOG:05A653A5E863B78EDD56FD74F059E02E", "RAPID7BLOG:5CDF95FB2AC31414FD390E0E0A47E057", "RAPID7BLOG:6C7EC9C9D6FC18A2D4965916E84077B9", "RAPID7BLOG:7B1DD656DC72802EE7230867267A5A16", "RAPID7BLOG:F4F1A7CFCF2440B1B23C1904402DDAF2"]}, {"type": "redhat", "idList": ["RHSA-2021:4140"]}, {"type": "redhatcve", "idList": ["RH:CVE-2020-24587", "RH:CVE-2020-24588", "RH:CVE-2020-26144", "RH:CVE-2021-31204"]}, {"type": "securelist", "idList": ["SECURELIST:5147443B0EBD7DFCCB942AD0E2F92CCF", "SECURELIST:BB0230F9CE86B3F1994060AA0A809C08"]}, {"type": "seebug", "idList": ["SSV:99245", "SSV:99263", "SSV:99265", "SSV:99294", "SSV:99334"]}, {"type": "slackware", "idList": ["SSA-2021-202-01"]}, {"type": "srcincite", "idList": ["SRC-2021-0018"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2021:0843-1", "OPENSUSE-SU-2021:0947-1", "OPENSUSE-SU-2021:1975-1", "OPENSUSE-SU-2021:1977-1", "OPENSUSE-SU-2021:2427-1"]}, {"type": "talos", "idList": ["TALOS-2021-1233"]}, {"type": "talosblog", "idList": ["TALOSBLOG:0043F629DC5E8DA26934B2407F1C76CC"]}, {"type": "thn", "idList": ["THN:1DDE95EA33D4D9F304973569FC787451", "THN:25143CA85A0297381CEBBBD35F24F85B", "THN:4F47385B2D66DCA6F584F23C5F1AE0D0", "THN:5BE77895D84D1FB816C73BB1661CE8EB", "THN:603F844B99A1CC0CF1DE580659626B57", "THN:76EF51D1EBDAA5B92DD55E9E74F5B542", "THN:8243BE07E124CAD984B8B4895550A7CC", "THN:AE2E46F59043F97BE70DB77C163186E6", "THN:B95DC27A89565323F0F8E6350D24D801", "THN:C210D3FA71F1ED44D3BA1BF0CA368767", "THN:E95B6A75073DA71CEC73B2E4F0B13622", "THN:FA40708E1565483D14F9A31FC019FCE1", "THN:FA7EFA3A74BF3490AD84EA169EA6C4CA"]}, {"type": "threatpost", "idList": ["THREATPOST:16A4E4FD8C0D84305D5ABABEBBC6343E", "THREATPOST:18D24326B561A78A05ACB7E8EE54F396", "THREATPOST:2BD1A92D071EE3E52CB5EA7DD865F60A", "THREATPOST:2DBC4E237FAA8188A19D53BBB3356C62", "THREATPOST:33E56DEB736406F9DD08C7533BF1812B", "THREATPOST:35511A26A276E34B781D66037866F771", "THREATPOST:474207FB444B779CD6B86ABEA0D24054", "THREATPOST:4B2E19CAF27A3EFBCB2F777C6E528317", "THREATPOST:52923238811C7BFD39E0529C85317249", "THREATPOST:55873F60362AA114632D0D7DC95FF63C", "THREATPOST:61CC1EAC83030C2B053946454FE77AC3", "THREATPOST:83C349A256695022C2417F465CEB3BB2", "THREATPOST:8D6D4C10987CBF3434080EFF240D2E74", "THREATPOST:905F5C5FE38CC3228FF94F798221B3D5", "THREATPOST:90D2E9044C556AC1A56C89A7F86742BE", "THREATPOST:960DA04864E083F2EAA36F3764D13603", "THREATPOST:A2FE619CD27EBEC2F6B0C62ED026F02C", "THREATPOST:A7148BBF3E2EDF9B0EA2E2C67C7CAC4E", "THREATPOST:A78361BA1DB99FF96F9399B2AE9F1EA4", "THREATPOST:B2DDD79594EACBEAC10B02C533235986", "THREATPOST:D7E3369CE997E9EF8A0586B994225257", "THREATPOST:EDFBDF12942A6080DE3FAE980A53F496", "THREATPOST:F006B56821C572012C6CBF003C78C596", "THREATPOST:F084C5D91E4F66092F5449922C34C4CE"]}, {"type": "ubuntu", "idList": ["USN-4997-1", "USN-4997-2", "USN-4999-1", "USN-5000-1", "USN-5000-2", "USN-5001-1", "USN-5018-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2020-24587", "UB:CVE-2020-24588", "UB:CVE-2020-26144"]}, {"type": "zdi", "idList": ["ZDI-21-172", "ZDI-21-571", "ZDI-21-572", "ZDI-21-573", "ZDI-21-574", "ZDI-21-575", "ZDI-21-576", "ZDI-21-577", "ZDI-21-578", "ZDI-21-579", "ZDI-21-580", "ZDI-21-581", "ZDI-21-582", "ZDI-21-583", "ZDI-21-584", "ZDI-21-615", "ZDI-21-819", "ZDI-21-894"]}, {"type": "zdt", "idList": ["1337DAY-ID-36242", "1337DAY-ID-36442", "1337DAY-ID-36667"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2020-24587", "epss": "0.000950000", "percentile": "0.384290000", "modified": "2023-03-17"}, {"cve": "CVE-2020-24588", "epss": "0.001510000", "percentile": "0.495280000", "modified": "2023-03-17"}, {"cve": "CVE-2020-26144", "epss": "0.000720000", "percentile": "0.293400000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21038", "epss": "0.001140000", "percentile": "0.434160000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21043", "epss": "0.000790000", "percentile": "0.322290000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21044", "epss": "0.000820000", "percentile": "0.334830000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21086", "epss": "0.001310000", "percentile": "0.463090000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21098", "epss": "0.005050000", "percentile": "0.728240000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21099", "epss": "0.005050000", "percentile": "0.728240000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21101", "epss": "0.003870000", "percentile": "0.690070000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21102", "epss": "0.002780000", "percentile": "0.633470000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21103", "epss": "0.002710000", "percentile": "0.628240000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21104", "epss": "0.003890000", "percentile": "0.690640000", "modified": "2023-03-17"}, {"cve": "CVE-2021-21105", "epss": "0.003890000", "percentile": "0.690640000", "modified": "2023-03-17"}, {"cve": "CVE-2021-22893", "epss": "0.970000000", "percentile": "0.995340000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26418", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26419", "epss": "0.937310000", "percentile": "0.985630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26421", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-26422", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-27068", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28455", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28465", "epss": "0.008750000", "percentile": "0.799600000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28474", "epss": "0.013890000", "percentile": "0.843070000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28476", "epss": "0.091390000", "percentile": "0.936400000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28478", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28479", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28550", "epss": "0.713430000", "percentile": "0.974580000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28553", "epss": "0.015850000", "percentile": "0.853070000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28555", "epss": "0.001570000", "percentile": "0.503500000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28557", "epss": "0.000750000", "percentile": "0.304880000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28558", "epss": "0.094820000", "percentile": "0.937410000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28559", "epss": "0.000750000", "percentile": "0.304880000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28560", "epss": "0.094820000", "percentile": "0.937410000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28561", "epss": "0.005350000", "percentile": "0.736150000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28562", "epss": "0.007210000", "percentile": "0.776060000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28564", "epss": "0.004300000", "percentile": "0.704950000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28565", "epss": "0.005840000", "percentile": "0.748110000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28569", "epss": "0.000660000", "percentile": "0.268170000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28573", "epss": "0.001740000", "percentile": "0.528380000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28574", "epss": "0.000760000", "percentile": "0.306290000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28575", "epss": "0.000760000", "percentile": "0.306290000", "modified": "2023-03-17"}, {"cve": "CVE-2021-28576", "epss": "0.000760000", "percentile": "0.306290000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31165", "epss": "0.000460000", "percentile": "0.127700000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31166", "epss": "0.973700000", "percentile": "0.998030000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31167", "epss": "0.000460000", "percentile": "0.127700000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31168", "epss": "0.000460000", "percentile": "0.128440000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31169", "epss": "0.000460000", "percentile": "0.128440000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31170", "epss": "0.000760000", "percentile": "0.305530000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31171", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31172", "epss": "0.001560000", "percentile": "0.502820000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31173", "epss": "0.104210000", "percentile": "0.940500000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31174", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31175", "epss": "0.002530000", "percentile": "0.613720000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31176", "epss": "0.003390000", "percentile": "0.668360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31177", "epss": "0.003390000", "percentile": "0.668360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31178", "epss": "0.007670000", "percentile": "0.784460000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31179", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31180", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31181", "epss": "0.214010000", "percentile": "0.956490000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31184", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31185", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31186", "epss": "0.004800000", "percentile": "0.720970000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31187", "epss": "0.000460000", "percentile": "0.139440000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31188", "epss": "0.000640000", "percentile": "0.260250000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31190", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31191", "epss": "0.000440000", "percentile": "0.082360000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31192", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31193", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31194", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31195", "epss": "0.965910000", "percentile": "0.993170000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31198", "epss": "0.002200000", "percentile": "0.581560000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31200", "epss": "0.019960000", "percentile": "0.870330000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31204", "epss": "0.000500000", "percentile": "0.170910000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31205", "epss": "0.001640000", "percentile": "0.513610000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31207", "epss": "0.971850000", "percentile": "0.996460000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31208", "epss": "0.000430000", "percentile": "0.073630000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31209", "epss": "0.005650000", "percentile": "0.743690000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31211", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31213", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}, {"cve": "CVE-2021-31214", "epss": "0.004370000", "percentile": "0.707540000", "modified": "2023-03-17"}], "vulnersScore": 0.0}, "cvss2": {}, "cvss3": {}, "_state": {"dependencies": 1660004461, "score": 1684007986, "epss": 1679073339}, "_internal": {"score_hash": "8938b03dc42607c171e62e5aba360178"}}
{"rapid7blog": [{"lastseen": "2021-05-22T09:01:54", "description": "\n\nHere we are again with another installment of Patch Tuesday. When compared to the past few months this one feels a bit light both in severity and number of vulnerabilities addressed. Microsoft has only released patches for 55 CVEs this month, less than half of the usual volume, with only 4 of them being scored as critical. Let's dive into the details.\n\n## HTTP Protocol Stack Remote Code Execution Vulnerability - [[[CVE-2021-31166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>)](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31166>)](<https://blog.rapid7.com/p/a0284057-0a58-48f2-89f5-a9b1d04661c3/CVE-2021-31166>)\n\nThe hottest vulnerability this month is in the HTTP.sys library. If an attacker has network access to a webserver running on an unpatched asset they may be able to send a specially crafted packet which could result in RCE. This was found internally by Microsoft and has not yet been observed in the wild. However, it is only a matter of time before someone figures out how to craft that special packet and we start to see widespread use against Windows 10 and Windows Server machines. Rated at 9.8, this potentially wormable vulnerability should be a high priority for remediation.\n\n## Hyper-V Remote Code Execution - [CVE-2021-28476](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476>)\n\nThere is some debate whether this vulnerability deserves its assigned 9.9 severity score. The limited details indicate that the most likely use of this bug is to cause a DoS on the Hyper-V host. This can cause a good amount of trouble for anyone running virtual machines but is not as damaging as the theoretical RCE this vulnerability could provide. In either case this is a good patch to put at the top of the todo-list.\n\n## Exchange Server Security Feature Bypass - [CVE-2021-31207](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>)\n\nNot to be outdone, Exchange Server is back again with yet another patch. This one is not nearly as high profile as the recent vulnerability which saw widespread use, but still an important patch to apply given that Exchange Servers are almost always exposed to the internet. There are a few other less severe vulnerabilities this month for Exchange which were disclosed at Pwn2Own in April. We expect to see a continued focus on Exchange Server in the months to come.\n\n## Summary Tables\n\n## Azure Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31936](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31936>) | Microsoft Accessibility Insights for Web Information Disclosure Vulnerability | No | No | 7.4 | Yes \n \n## Browser ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-26419](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26419>) | Scripting Engine Memory Corruption Vulnerability | No | No | 7.5 | Yes \n \n## Developer Tools Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-27068](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-27068>) | Visual Studio Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-31213](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31213>) | Visual Studio Code Remote Containers Extension Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31211](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31211>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31214](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31214>) | Visual Studio Code Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31204](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31204>) | .NET and Visual Studio Elevation of Privilege Vulnerability | No | Yes | 7.3 | No \n \n## Exchange Server Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31209](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209>) | Microsoft Exchange Server Spoofing Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-31207](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207>) | Microsoft Exchange Server Security Feature Bypass Vulnerability | No | Yes | 6.6 | Yes \n[CVE-2021-31198](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 7.8 | No \n[CVE-2021-31195](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31195>) | Microsoft Exchange Server Remote Code Execution Vulnerability | No | No | 6.5 | No \n \n## Microsoft Dynamics Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-28461](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28461>) | Dynamics Finance and Operations Cross-site Scripting Vulnerability | No | No | 6.1 | No \n \n## Microsoft Office Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-26421](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26421>) | Skype for Business and Lync Spoofing Vulnerability | No | No | 6.5 | No \n[CVE-2021-26422](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26422>) | Skype for Business and Lync Remote Code Execution Vulnerability | No | No | 7.2 | No \n[CVE-2021-28478](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28478>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 7.6 | No \n[CVE-2021-31172](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31172>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 7.1 | No \n[CVE-2021-26418](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26418>) | Microsoft SharePoint Spoofing Vulnerability | No | No | 4.6 | No \n[CVE-2021-28474](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28474>) | Microsoft SharePoint Server Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n[CVE-2021-31173](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31173>) | Microsoft SharePoint Server Information Disclosure Vulnerability | No | No | 5.3 | Yes \n[CVE-2021-31181](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31181>) | Microsoft SharePoint Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-31171](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31171>) | Microsoft SharePoint Information Disclosure Vulnerability | No | No | 4.1 | Yes \n[CVE-2021-31175](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31175>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31176](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31176>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31177](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31177>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31179](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31179>) | Microsoft Office Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31178](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31178>) | Microsoft Office Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31180](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31180>) | Microsoft Office Graphics Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31174](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31174>) | Microsoft Excel Information Disclosure Vulnerability | No | No | 5.5 | Yes \n \n## Open Source Software Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31200](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31200>) | Common Utilities Remote Code Execution Vulnerability | No | Yes | 7.2 | Yes \n \n## Windows Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-31187](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31187>) | Windows WalletService Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31205](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31205>) | Windows SMB Client Security Feature Bypass Vulnerability | No | No | 4.3 | Yes \n[CVE-2021-31191](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31191>) | Windows Projected File System FS Filter Driver Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31192](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31192>) | Windows Media Foundation Core Remote Code Execution Vulnerability | No | No | 7.3 | No \n[CVE-2021-31170](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31170>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31185](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31185>) | Windows Desktop Bridge Denial of Service Vulnerability | No | No | 5.5 | No \n[CVE-2021-31165](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31165>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31167](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31167>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31168](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31168>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31169](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31169>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31208](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31208>) | Windows Container Manager Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31190](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31190>) | Windows Container Isolation FS Filter Driver Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-28479](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28479>) | Windows CSC Service Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-28465](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28465>) | Web Media Extensions Remote Code Execution Vulnerability | No | No | 7.8 | Yes \n[CVE-2021-31166](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31166>) | HTTP Protocol Stack Remote Code Execution Vulnerability | No | No | 9.8 | Yes \n \n## Windows ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2020-24588](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-24588>) | Windows Wireless Networking Spoofing Vulnerability | No | No | 6.5 | No \n[CVE-2020-26144](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-26144>) | Windows Wireless Networking Spoofing Vulnerability | No | No | 6.5 | No \n[CVE-2020-24587](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-24587>) | Windows Wireless Networking Information Disclosure Vulnerability | No | No | 6.5 | Yes \n[CVE-2021-31193](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31193>) | Windows SSDP Service Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31186](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31186>) | Windows Remote Desktop Protocol (RDP) Information Disclosure Vulnerability | No | No | 7.4 | Yes \n[CVE-2021-31188](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31188>) | Windows Graphics Component Elevation of Privilege Vulnerability | No | No | 7.8 | No \n[CVE-2021-31194](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31194>) | OLE Automation Remote Code Execution Vulnerability | No | No | 8.8 | No \n[CVE-2021-31184](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31184>) | Microsoft Windows Infrared Data Association (IrDA) Information Disclosure Vulnerability | No | No | 5.5 | Yes \n[CVE-2021-31182](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31182>) | Microsoft Bluetooth Driver Spoofing Vulnerability | No | No | 7.1 | No \n[CVE-2021-28476](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28476>) | Hyper-V Remote Code Execution Vulnerability | No | No | 9.9 | Yes \n \n## Windows Microsoft Office ESU Vulnerabilities\n\nCVE | Title | Exploited | Disclosed | CVSS3 | FAQ \n---|---|---|---|---|--- \n[CVE-2021-28455](<https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28455>) | Microsoft Jet Red Database Engine and Access Connectivity Engine Remote Code Execution Vulnerability | No | No | 8.8 | Yes \n \n## Summary Graphs\n\n", "cvss3": {}, "published": "2021-05-11T23:44:00", "type": "rapid7blog", "title": "Patch Tuesday - May 2021", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26418", "CVE-2021-26419", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-27068", "CVE-2021-28455", "CVE-2021-28461", "CVE-2021-28465", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-28478", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31205", "CVE-2021-31207", "CVE-2021-31208", "CVE-2021-31209", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214", "CVE-2021-31936"], "modified": "2021-05-11T23:44:00", "id": "RAPID7BLOG:05A653A5E863B78EDD56FD74F059E02E", "href": "https://blog.rapid7.com/2021/05/11/patch-tuesday-may-2021/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "kaspersky": [{"lastseen": "2023-06-06T15:21:18", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Windows. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, spoof user interface, obtain sensitive information, bypass security restrictions, cause denial of service.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows Server, version 1909 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nWindows 10 Version 1803 for x64-based Systems \nWindows 10 for x64-based Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 8.1 for 32-bit systems \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nWindows 10 Version 1909 for ARM64-based Systems \nWindows Server, version 2004 (Server Core installation) \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 10 Version 1909 for 32-bit Systems \nWindows 10 Version 2004 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows 10 Version 1909 for x64-based Systems \nWindows Server 2012 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows RT 8.1 \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 for 32-bit Systems \nWindows Server 2019 \nWindows 10 Version 1607 for 32-bit Systems \nWindows Server 2016 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 2004 for ARM64-based Systems \nWindows 10 Version 2004 for 32-bit Systems \nWindows Server 2012 R2 \nWindows Server 2016 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows 8.1 for x64-based systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-28476](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28476>) \n[CVE-2021-31188](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31188>) \n[CVE-2020-24588](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24588>) \n[CVE-2021-31166](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31166>) \n[CVE-2021-31192](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31192>) \n[CVE-2021-31184](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31184>) \n[CVE-2021-28465](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28465>) \n[CVE-2021-31167](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31167>) \n[CVE-2021-31191](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31191>) \n[CVE-2021-31205](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31205>) \n[CVE-2021-31208](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31208>) \n[CVE-2021-31187](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31187>) \n[CVE-2020-26144](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-26144>) \n[CVE-2021-31193](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31193>) \n[CVE-2021-28455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455>) \n[CVE-2021-31186](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31186>) \n[CVE-2021-31165](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31165>) \n[CVE-2021-31190](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31190>) \n[CVE-2021-31182](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31182>) \n[CVE-2021-31185](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31185>) \n[CVE-2021-28479](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28479>) \n[CVE-2021-31168](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31168>) \n[CVE-2021-31169](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31169>) \n[CVE-2021-31194](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31194>) \n[CVE-2021-31170](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31170>) \n[CVE-2020-24587](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24587>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Windows](<https://threats.kaspersky.com/en/product/Microsoft-Windows/>)\n\n### *CVE-IDS*:\n[CVE-2021-28476](<https://vulners.com/cve/CVE-2021-28476>)5.0Critical \n[CVE-2021-31188](<https://vulners.com/cve/CVE-2021-31188>)5.0Critical \n[CVE-2021-31186](<https://vulners.com/cve/CVE-2021-31186>)5.0Critical \n[CVE-2020-24588](<https://vulners.com/cve/CVE-2020-24588>)2.9Warning \n[CVE-2021-31184](<https://vulners.com/cve/CVE-2021-31184>)5.0Critical \n[CVE-2021-31182](<https://vulners.com/cve/CVE-2021-31182>)5.0Critical \n[CVE-2020-26144](<https://vulners.com/cve/CVE-2020-26144>)5.0Critical \n[CVE-2021-31193](<https://vulners.com/cve/CVE-2021-31193>)5.0Critical \n[CVE-2021-28455](<https://vulners.com/cve/CVE-2021-28455>)5.0Critical \n[CVE-2021-31194](<https://vulners.com/cve/CVE-2021-31194>)5.0Critical \n[CVE-2020-24587](<https://vulners.com/cve/CVE-2020-24587>)1.8Warning \n[CVE-2021-31166](<https://vulners.com/cve/CVE-2021-31166>)5.0Critical \n[CVE-2021-31192](<https://vulners.com/cve/CVE-2021-31192>)5.0Critical \n[CVE-2021-28465](<https://vulners.com/cve/CVE-2021-28465>)5.0Critical \n[CVE-2021-31167](<https://vulners.com/cve/CVE-2021-31167>)5.0Critical \n[CVE-2021-31191](<https://vulners.com/cve/CVE-2021-31191>)5.0Critical \n[CVE-2021-31205](<https://vulners.com/cve/CVE-2021-31205>)5.0Critical \n[CVE-2021-31208](<https://vulners.com/cve/CVE-2021-31208>)5.0Critical \n[CVE-2021-31187](<https://vulners.com/cve/CVE-2021-31187>)5.0Critical \n[CVE-2021-31165](<https://vulners.com/cve/CVE-2021-31165>)5.0Critical \n[CVE-2021-31190](<https://vulners.com/cve/CVE-2021-31190>)5.0Critical \n[CVE-2021-31185](<https://vulners.com/cve/CVE-2021-31185>)5.0Critical \n[CVE-2021-28479](<https://vulners.com/cve/CVE-2021-28479>)5.0Critical \n[CVE-2021-31168](<https://vulners.com/cve/CVE-2021-31168>)5.0Critical \n[CVE-2021-31169](<https://vulners.com/cve/CVE-2021-31169>)5.0Critical \n[CVE-2021-31170](<https://vulners.com/cve/CVE-2021-31170>)5.0Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[5003209](<http://support.microsoft.com/kb/5003209>) \n[5003197](<http://support.microsoft.com/kb/5003197>) \n[5003174](<http://support.microsoft.com/kb/5003174>) \n[5003208](<http://support.microsoft.com/kb/5003208>) \n[5003171](<http://support.microsoft.com/kb/5003171>) \n[5003172](<http://support.microsoft.com/kb/5003172>) \n[5003169](<http://support.microsoft.com/kb/5003169>) \n[5003173](<http://support.microsoft.com/kb/5003173>) \n[5003203](<http://support.microsoft.com/kb/5003203>) \n[5003220](<http://support.microsoft.com/kb/5003220>)", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12174 Multiple vulnerabilities in Microsoft Windows", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 7.5, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-28455", "CVE-2021-28465", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31205", "CVE-2021-31208"], "modified": "2021-05-27T00:00:00", "id": "KLA12174", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12174/", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-05-27T15:00:43", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Office. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, obtain sensitive information.\n\n### *Affected products*:\nMicrosoft Office Online Server \nMicrosoft SharePoint Enterprise Server 2016 \nMicrosoft Office Web Apps Server 2013 Service Pack 1 \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nMicrosoft Excel 2013 Service Pack 1 (32-bit editions) \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Office 2016 (32-bit edition) \nMicrosoft Office 2013 RT Service Pack 1 \nMicrosoft Word 2016 (64-bit edition) \nMicrosoft Excel 2013 Service Pack 1 (64-bit editions) \nMicrosoft Word 2013 RT Service Pack 1 \nSkype for Business Server 2015 CU11 \nMicrosoft Office 2019 for 32-bit editions \nMicrosoft Excel 2016 (64-bit edition) \nMicrosoft Word 2013 Service Pack 1 (64-bit editions) \nMicrosoft SharePoint Foundation 2013 Service Pack 1 \nSkype for Business Server 2019 CU5 \nMicrosoft Office 2019 for Mac \nMicrosoft Excel 2013 RT Service Pack 1 \nMicrosoft Word 2016 (32-bit edition) \nMicrosoft Office 2019 for 64-bit editions \nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nMicrosoft Lync Server 2013 CU10 \nMicrosoft Excel 2016 (32-bit edition) \nMicrosoft SharePoint Server 2019 \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nMicrosoft Word 2013 Service Pack 1 (32-bit editions)\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31181](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31181>) \n[CVE-2021-26421](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26421>) \n[CVE-2021-26422](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26422>) \n[CVE-2021-31178](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31178>) \n[CVE-2021-28455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455>) \n[CVE-2021-26418](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26418>) \n[CVE-2021-31179](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31179>) \n[CVE-2021-31180](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31180>) \n[CVE-2021-28478](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28478>) \n[CVE-2021-28474](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28474>) \n[CVE-2021-31172](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31172>) \n[CVE-2021-31177](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31177>) \n[CVE-2021-31173](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31173>) \n[CVE-2021-31176](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31176>) \n[CVE-2021-31174](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31174>) \n[CVE-2021-31175](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31175>) \n[CVE-2021-31171](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31171>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Lync](<https://threats.kaspersky.com/en/product/Microsoft-Lync/>)\n\n### *CVE-IDS*:\n[CVE-2021-28455](<https://vulners.com/cve/CVE-2021-28455>)5.0Critical \n[CVE-2021-31181](<https://vulners.com/cve/CVE-2021-31181>)6.5High \n[CVE-2021-26421](<https://vulners.com/cve/CVE-2021-26421>)5.0Critical \n[CVE-2021-26422](<https://vulners.com/cve/CVE-2021-26422>)5.0Critical \n[CVE-2021-31178](<https://vulners.com/cve/CVE-2021-31178>)5.0Critical \n[CVE-2021-26418](<https://vulners.com/cve/CVE-2021-26418>)5.0Critical \n[CVE-2021-31179](<https://vulners.com/cve/CVE-2021-31179>)5.0Critical \n[CVE-2021-31180](<https://vulners.com/cve/CVE-2021-31180>)5.0Critical \n[CVE-2021-28478](<https://vulners.com/cve/CVE-2021-28478>)5.0Critical \n[CVE-2021-28474](<https://vulners.com/cve/CVE-2021-28474>)5.0Critical \n[CVE-2021-31172](<https://vulners.com/cve/CVE-2021-31172>)5.0Critical \n[CVE-2021-31177](<https://vulners.com/cve/CVE-2021-31177>)5.0Critical \n[CVE-2021-31173](<https://vulners.com/cve/CVE-2021-31173>)5.0Critical \n[CVE-2021-31176](<https://vulners.com/cve/CVE-2021-31176>)5.0Critical \n[CVE-2021-31174](<https://vulners.com/cve/CVE-2021-31174>)5.0Critical \n[CVE-2021-31175](<https://vulners.com/cve/CVE-2021-31175>)5.0Critical \n[CVE-2021-31171](<https://vulners.com/cve/CVE-2021-31171>)5.0Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[5001914](<http://support.microsoft.com/kb/5001914>) \n[5001931](<http://support.microsoft.com/kb/5001931>) \n[5001919](<http://support.microsoft.com/kb/5001919>) \n[5001917](<http://support.microsoft.com/kb/5001917>) \n[4493197](<http://support.microsoft.com/kb/4493197>) \n[5003729](<http://support.microsoft.com/kb/5003729>) \n[4464542](<http://support.microsoft.com/kb/4464542>) \n[5001920](<http://support.microsoft.com/kb/5001920>) \n[5001927](<http://support.microsoft.com/kb/5001927>) \n[5001923](<http://support.microsoft.com/kb/5001923>) \n[4493206](<http://support.microsoft.com/kb/4493206>) \n[5001918](<http://support.microsoft.com/kb/5001918>) \n[5001916](<http://support.microsoft.com/kb/5001916>) \n[5001928](<http://support.microsoft.com/kb/5001928>) \n[5001936](<http://support.microsoft.com/kb/5001936>) \n[5001925](<http://support.microsoft.com/kb/5001925>) \n[5001935](<http://support.microsoft.com/kb/5001935>) \n[4504711](<http://support.microsoft.com/kb/4504711>) \n[4484527](<http://support.microsoft.com/kb/4484527>)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12175 Multiple vulnerabilities in Microsoft Office", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-26421", "CVE-2021-26422", "CVE-2021-28455", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180", "CVE-2021-31181"], "modified": "2021-06-22T00:00:00", "id": "KLA12175", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12175/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-06-06T15:21:21", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Products (Extended Support Update). Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges, obtain sensitive information, spoof user interface.\n\n### *Exploitation*:\nMalware exists for this vulnerability. Usually such malware is classified as Exploit. [More details](<https://threats.kaspersky.com/en/class/Exploit/>).\n\n### *Affected products*:\nWindows Server, version 1909 (Server Core installation) \nWindows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation) \nMicrosoft Office 2013 Service Pack 1 (32-bit editions) \nWindows 10 Version 1803 for x64-based Systems \nInternet Explorer 11 \nWindows 10 for x64-based Systems \nWindows 10 Version 1809 for x64-based Systems \nWindows 8.1 for 32-bit systems \nInternet Explorer 9 \nWindows 10 Version 1809 for ARM64-based Systems \nWindows 10 Version 20H2 for ARM64-based Systems \nMicrosoft Office 2016 (64-bit edition) \nMicrosoft Office 2016 (32-bit edition) \nWindows 10 Version 1909 for ARM64-based Systems \nWindows Server, version 2004 (Server Core installation) \nWindows 10 Version 1607 for x64-based Systems \nWindows 10 Version 20H2 for 32-bit Systems \nWindows 10 Version 1909 for 32-bit Systems \nMicrosoft Office 2013 RT Service Pack 1 \nWindows 10 Version 2004 for x64-based Systems \nWindows Server 2019 (Server Core installation) \nMicrosoft Office 2019 for 32-bit editions \nWindows Server 2012 R2 (Server Core installation) \nWindows Server 2008 for x64-based Systems Service Pack 2 \nWindows 10 Version 1909 for x64-based Systems \nWindows Server 2012 \nWindows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation) \nWindows Server 2012 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation) \nWindows RT 8.1 \nWindows 7 for 32-bit Systems Service Pack 1 \nWindows 10 for 32-bit Systems \nMicrosoft 365 Apps for Enterprise for 32-bit Systems \nWindows Server 2019 \nMicrosoft Office 2019 for 64-bit editions \nWindows 10 Version 1607 for 32-bit Systems \nWindows Server 2016 \nWindows Server 2008 for 32-bit Systems Service Pack 2 \nWindows 10 Version 1809 for 32-bit Systems \nWindows 10 Version 1803 for ARM64-based Systems \nWindows 10 Version 20H2 for x64-based Systems \nWindows 10 Version 2004 for ARM64-based Systems \nMicrosoft Office 2013 Service Pack 1 (64-bit editions) \nWindows 10 Version 2004 for 32-bit Systems \nMicrosoft 365 Apps for Enterprise for 64-bit Systems \nWindows Server 2012 R2 \nWindows Server 2016 (Server Core installation) \nWindows Server 2008 R2 for x64-based Systems Service Pack 1 \nWindows 7 for x64-based Systems Service Pack 1 \nWindows 10 Version 1803 for 32-bit Systems \nWindows Server, version 20H2 (Server Core Installation) \nWindows 8.1 for x64-based systems\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-28476](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28476>) \n[CVE-2021-31188](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31188>) \n[CVE-2021-31186](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31186>) \n[CVE-2020-24588](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24588>) \n[CVE-2021-31184](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31184>) \n[CVE-2021-31182](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31182>) \n[CVE-2020-26144](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-26144>) \n[CVE-2021-31193](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31193>) \n[CVE-2021-28455](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-28455>) \n[CVE-2021-31194](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31194>) \n[CVE-2020-24587](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2020-24587>) \n[CVE-2021-26419](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-26419>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Internet Explorer](<https://threats.kaspersky.com/en/product/Microsoft-Internet-Explorer/>)\n\n### *CVE-IDS*:\n[CVE-2021-28476](<https://vulners.com/cve/CVE-2021-28476>)5.0Critical \n[CVE-2021-31188](<https://vulners.com/cve/CVE-2021-31188>)5.0Critical \n[CVE-2021-31186](<https://vulners.com/cve/CVE-2021-31186>)5.0Critical \n[CVE-2020-24588](<https://vulners.com/cve/CVE-2020-24588>)2.9Warning \n[CVE-2021-31184](<https://vulners.com/cve/CVE-2021-31184>)5.0Critical \n[CVE-2021-31182](<https://vulners.com/cve/CVE-2021-31182>)5.0Critical \n[CVE-2020-26144](<https://vulners.com/cve/CVE-2020-26144>)5.0Critical \n[CVE-2021-31193](<https://vulners.com/cve/CVE-2021-31193>)5.0Critical \n[CVE-2021-28455](<https://vulners.com/cve/CVE-2021-28455>)5.0Critical \n[CVE-2021-31194](<https://vulners.com/cve/CVE-2021-31194>)5.0Critical \n[CVE-2020-24587](<https://vulners.com/cve/CVE-2020-24587>)1.8Warning \n[CVE-2021-26419](<https://vulners.com/cve/CVE-2021-26419>)5.0Critical\n\n### *Microsoft official advisories*:\n\n\n### *KB list*:\n[5003228](<http://support.microsoft.com/kb/5003228>) \n[5003233](<http://support.microsoft.com/kb/5003233>) \n[5003210](<http://support.microsoft.com/kb/5003210>) \n[5003165](<http://support.microsoft.com/kb/5003165>) \n[5003225](<http://support.microsoft.com/kb/5003225>)", "cvss3": {"exploitabilityScore": 3.1, "cvssV3": {"baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 9.9, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 6.0}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12167 Multiple vulnerabilities in Microsoft Products (ESU)", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 4.9, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "HIGH", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 7.6, "vectorString": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2021-05-27T00:00:00", "id": "KLA12167", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12167/", "cvss": {"score": 7.6, "vector": "AV:N/AC:H/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T15:00:46", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Developer Tools. Malicious users can exploit these vulnerabilities to execute arbitrary code, gain privileges.\n\n### *Affected products*:\nVisual Studio Code \nMicrosoft Visual Studio 2019 version 16.9 (includes 16.0 - 16.8) \nMicrosoft Visual Studio 2019 version 16.4 (includes 16.0 - 16.3) \nVisual Studio 2019 for Mac version 8.9 \n.NET 5.0 \n.NET Core 3.1 \nMicrosoft Visual Studio 2019 version 16.7 (includes 16.0 \u2013 16.6) \nVisual Studio Code Remote - Containers Extension\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31214](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31214>) \n[CVE-2021-31204](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31204>) \n[CVE-2021-31213](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31213>) \n[CVE-2021-31211](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31211>) \n[CVE-2021-27068](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-27068>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Visual Studio](<https://threats.kaspersky.com/en/product/Microsoft-Visual-Studio/>)\n\n### *CVE-IDS*:\n[CVE-2021-31214](<https://vulners.com/cve/CVE-2021-31214>)5.0Critical \n[CVE-2021-31204](<https://vulners.com/cve/CVE-2021-31204>)5.0Critical \n[CVE-2021-31213](<https://vulners.com/cve/CVE-2021-31213>)5.0Critical \n[CVE-2021-31211](<https://vulners.com/cve/CVE-2021-31211>)5.0Critical \n[CVE-2021-27068](<https://vulners.com/cve/CVE-2021-27068>)5.0Critical", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12173 Multiple vulnerabilities in Microsoft Developer Tools", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-27068", "CVE-2021-31204", "CVE-2021-31211", "CVE-2021-31213", "CVE-2021-31214"], "modified": "2021-05-12T00:00:00", "id": "KLA12173", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12173/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T15:00:52", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nMultiple vulnerabilities were found in Microsoft Exchange Server. Malicious users can exploit these vulnerabilities to execute arbitrary code, spoof user interface, bypass security restrictions.\n\n### *Affected products*:\nMicrosoft Exchange Server 2016 Cumulative Update 20 \nMicrosoft Exchange Server 2019 Cumulative Update 8 \nMicrosoft Exchange Server 2019 Cumulative Update 9 \nMicrosoft Exchange Server 2013 Cumulative Update 23 \nMicrosoft Exchange Server 2016 Cumulative Update 19\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31198](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31198>) \n[CVE-2021-31209](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31209>) \n[CVE-2021-31207](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31207>) \n[CVE-2021-31195](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31195>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Microsoft Exchange Server](<https://threats.kaspersky.com/en/product/Microsoft-Exchange-Server/>)\n\n### *CVE-IDS*:\n[CVE-2021-31198](<https://vulners.com/cve/CVE-2021-31198>)6.8High \n[CVE-2021-31209](<https://vulners.com/cve/CVE-2021-31209>)5.0Critical \n[CVE-2021-31207](<https://vulners.com/cve/CVE-2021-31207>)6.5High \n[CVE-2021-31195](<https://vulners.com/cve/CVE-2021-31195>)5.0Critical\n\n### *KB list*:\n[5003435](<http://support.microsoft.com/kb/5003435>)", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12169 Multiple vulnerabilities in Microsoft Exchange Server", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31207", "CVE-2021-31209"], "modified": "2021-05-12T00:00:00", "id": "KLA12169", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12169/", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2023-05-27T15:00:18", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nCritical\n\n### *Description*:\nMultiple vulnerabilities were found in Adobe Acrobat and Adobe Acrobat Reader. Malicious users can exploit these vulnerabilities to execute arbitrary code, obtain sensitive information, cause denial of service, gain privileges.\n\n### *Affected products*:\nAdobe Acrobat DC Continuous earlier than 2021.001.20155 \nAdobe Acrobat 2020 Classic earlier than 2020.001.30025 \nAdobe Acrobat 2017 Classic earlier than 2017.011.30196 \nAdobe Acrobat Reader DC Continuous earlier than 2021.001.20155 \nAdobe Acrobat Reader 2020 Classic earlier than 2020.001.30025 \nAdobe Acrobat Reader 2017 Classic earlier than 2017.011.30196\n\n### *Solution*:\nUpdate to the latest version \n[Download Adobe Acrobat Reader DC](<https://get2.adobe.com/uk/reader/>)\n\n### *Original advisories*:\n[APSB21-29](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Adobe Acrobat Reader DC Continuous](<https://threats.kaspersky.com/en/product/Adobe-Acrobat-Reader-DC-Continuous/>)\n\n### *CVE-IDS*:\n[CVE-2021-21044](<https://vulners.com/cve/CVE-2021-21044>)9.3Critical \n[CVE-2021-21038](<https://vulners.com/cve/CVE-2021-21038>)6.8High \n[CVE-2021-28562](<https://vulners.com/cve/CVE-2021-28562>)6.8High", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12187 Multiple vulnerabilities in Adobe Acrobat and Adobe Acrobat Reader", "bulletinFamily": "info", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-28562"], "modified": "2021-06-22T00:00:00", "id": "KLA12187", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12187/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T15:00:51", "description": "### *Detect date*:\n05/11/2021\n\n### *Severity*:\nHigh\n\n### *Description*:\nA remote code execution vulnerability was found in Microsoft Open Source Software. Malicious users can exploit this vulnerability to execute arbitrary code.\n\n### *Affected products*:\ncommon_utils.py\n\n### *Solution*:\nInstall necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)\n\n### *Original advisories*:\n[CVE-2021-31200](<https://api.msrc.microsoft.com/sug/v2.0/en-US/vulnerability/CVE-2021-31200>) \n\n\n### *Impacts*:\nACE \n\n### *Related products*:\n[Yammer Desktop App](<https://threats.kaspersky.com/en/product/Yammer-Desktop-App/>)\n\n### *CVE-IDS*:\n[CVE-2021-31200](<https://vulners.com/cve/CVE-2021-31200>)5.0Critical", "cvss3": {"exploitabilityScore": 1.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "baseScore": 7.2, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "kaspersky", "title": "KLA12170 RCE vulnerability in Microsoft Open Source Software", "bulletinFamily": "info", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-31200"], "modified": "2021-05-12T00:00:00", "id": "KLA12170", "href": "https://threats.kaspersky.com/en/vulnerability/KLA12170/", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}], "nessus": [{"lastseen": "2023-05-18T15:28:24", "description": "The version of Adobe Acrobat installed on the remote Windows host is a version prior or equal to 2017.011.30194, 2020.001.30020, or 2021.001.20150. It is, therefore, affected by multiple vulnerabilities.\n\n - Out-of-bounds write vulnerabilities that can result in arbitrary code execution. (CVE-2021-21044, CVE-2021-21038, CVE-2021-21086)\n\n - Use after free vulnerabilities that can result in arbitrary code execution. (CVE-2021-28562, CVE-2021-28550, CVE-2021-28553)\n\n - An out-of-bounds read vulnerability that can result in a memory leak. (CVE-2021-28557)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Adobe Acrobat <= 2017.011.30194 / 2020.001.30020 / 2021.001.20150 Multiple Vulnerabilities (APSB21-29)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565"], "modified": "2023-04-25T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "ADOBE_ACROBAT_APSB21-29.NASL", "href": "https://www.tenable.com/plugins/nessus/149380", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149380);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/25\");\n\n script_cve_id(\n \"CVE-2021-21038\",\n \"CVE-2021-21044\",\n \"CVE-2021-21086\",\n \"CVE-2021-28550\",\n \"CVE-2021-28553\",\n \"CVE-2021-28555\",\n \"CVE-2021-28557\",\n \"CVE-2021-28558\",\n \"CVE-2021-28559\",\n \"CVE-2021-28560\",\n \"CVE-2021-28561\",\n \"CVE-2021-28562\",\n \"CVE-2021-28564\",\n \"CVE-2021-28565\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0229-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"Adobe Acrobat <= 2017.011.30194 / 2020.001.30020 / 2021.001.20150 Multiple Vulnerabilities (APSB21-29)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote Windows host is a version prior or equal to 2017.011.30194,\n2020.001.30020, or 2021.001.20150. It is, therefore, affected by multiple vulnerabilities.\n\n - Out-of-bounds write vulnerabilities that can result in arbitrary code execution. (CVE-2021-21044,\n CVE-2021-21038, CVE-2021-21086)\n\n - Use after free vulnerabilities that can result in arbitrary code execution. (CVE-2021-28562,\n CVE-2021-28550, CVE-2021-28553)\n\n - An out-of-bounds read vulnerability that can result in a memory leak. (CVE-2021-28557)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb21-29.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 2017.011.30196 / 2020.001.30025 / 2021.001.20155 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28565\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/02/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_acrobat_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\napp_info = vcf::get_app_info(app:'Adobe Acrobat', win_local:TRUE);\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.7', 'max_version' : '21.001.20150', 'fixed_version' : '21.001.20155' },\n { 'min_version' : '20.1', 'max_version' : '20.001.30020', 'fixed_version' : '20.001.30025' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30194', 'fixed_version' : '17.011.30196' }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-21T14:04:19", "description": "The version of Adobe Acrobat installed on the remote macOS host is a version prior or equal to 2017.011.30194, 2020.001.30020, or 2021.001.20150. It is, therefore, affected by multiple vulnerabilities.\n\n - Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-21038, CVE-2021-21044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Adobe Acrobat <= 2017.011.30194 / 2020.001.30020 / 2021.001.20150 Multiple Vulnerabilities (APSB21-29) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565"], "modified": "2023-04-25T00:00:00", "cpe": ["cpe:/a:adobe:acrobat"], "id": "MACOS_ADOBE_ACROBAT_APSB21-29.NASL", "href": "https://www.tenable.com/plugins/nessus/149381", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149381);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/25\");\n\n script_cve_id(\n \"CVE-2021-21038\",\n \"CVE-2021-21044\",\n \"CVE-2021-21086\",\n \"CVE-2021-28550\",\n \"CVE-2021-28553\",\n \"CVE-2021-28555\",\n \"CVE-2021-28557\",\n \"CVE-2021-28558\",\n \"CVE-2021-28559\",\n \"CVE-2021-28560\",\n \"CVE-2021-28561\",\n \"CVE-2021-28562\",\n \"CVE-2021-28564\",\n \"CVE-2021-28565\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0229-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"Adobe Acrobat <= 2017.011.30194 / 2020.001.30020 / 2021.001.20150 Multiple Vulnerabilities (APSB21-29) (macOS)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Acrobat installed on the remote macOS host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Acrobat installed on the remote macOS host is a version prior or equal to 2017.011.30194,\n2020.001.30020, or 2021.001.20150. It is, therefore, affected by multiple vulnerabilities.\n\n - Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and\n 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted\n jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code\n execution in the context of the current user. Exploitation of this issue requires user interaction in that\n a victim must open a malicious file. (CVE-2021-21038, CVE-2021-21044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb21-29.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Acrobat version 2017.011.30194 / 2020.001.30020 / 2021.001.20150 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28565\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/02/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_acrobat_installed.nbin\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Acrobat\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('Host/local_checks_enabled');\nos = get_kb_item('Host/MacOSX/Version');\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, 'Mac OS X');\n\napp_info = vcf::get_app_info(app:'Adobe Acrobat');\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.7', 'max_version' : '21.001.20150', 'fixed_version' : '21.001.20155' },\n { 'min_version' : '20.1', 'max_version' : '20.001.30020', 'fixed_version' : '20.001.30025' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30194', 'fixed_version' : '17.011.30196' }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:42", "description": "The version of Adobe Reader installed on the remote Windows host is a version prior or equal to 2017.011.30194, 2020.001.30020, or 2021.001.20150. It is, therefore, affected by multiple vulnerabilities, including the following:\n\n - Out-of-bounds write vulnerabilities that can result in arbitrary code execution. (CVE-2021-21044, CVE-2021-21038, CVE-2021-21086)\n\n - Use after free vulnerabilities that can result in arbitrary code execution. (CVE-2021-28562, CVE-2021-28550, CVE-2021-28553)\n\n - An out-of-bounds read vulnerability that can result in a memory leak. (CVE-2021-28557)\n\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Adobe Reader <= 2017.011.30194 / 2020.001.30020 / 2021.001.20150 Multiple Vulnerabilities (APSB21-29)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565"], "modified": "2023-04-25T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "ADOBE_READER_APSB21-29.NASL", "href": "https://www.tenable.com/plugins/nessus/149379", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149379);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/25\");\n\n script_cve_id(\n \"CVE-2021-21038\",\n \"CVE-2021-21044\",\n \"CVE-2021-21086\",\n \"CVE-2021-28550\",\n \"CVE-2021-28553\",\n \"CVE-2021-28555\",\n \"CVE-2021-28557\",\n \"CVE-2021-28558\",\n \"CVE-2021-28559\",\n \"CVE-2021-28560\",\n \"CVE-2021-28561\",\n \"CVE-2021-28562\",\n \"CVE-2021-28564\",\n \"CVE-2021-28565\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0229-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"Adobe Reader <= 2017.011.30194 / 2020.001.30020 / 2021.001.20150 Multiple Vulnerabilities (APSB21-29)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote Windows host is a version prior or equal to 2017.011.30194,\n2020.001.30020, or 2021.001.20150. It is, therefore, affected by multiple vulnerabilities, including the following:\n\n - Out-of-bounds write vulnerabilities that can result in arbitrary code execution. (CVE-2021-21044,\n CVE-2021-21038, CVE-2021-21086)\n\n - Use after free vulnerabilities that can result in arbitrary code execution. (CVE-2021-28562,\n CVE-2021-28550, CVE-2021-28553)\n\n - An out-of-bounds read vulnerability that can result in a memory leak. (CVE-2021-28557)\n\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb21-29.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 2017.011.30196 / 2020.001.30025 / 2021.001.20155 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28565\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/02/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_reader_installed.nasl\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\napp_info = vcf::get_app_info(app:'Adobe Reader', win_local:TRUE);\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.7', 'max_version' : '21.001.20150', 'fixed_version' : '21.001.20155' },\n { 'min_version' : '20.1', 'max_version' : '20.001.30020', 'fixed_version' : '20.001.30025' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30194', 'fixed_version' : '17.011.30196' }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:24", "description": "The version of Adobe Reader installed on the remote macOS host is a version prior or equal to 2017.011.30194, 2020.001.30020, or 2021.001.20149. It is, therefore, affected by multiple vulnerabilities.\n\n - Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. (CVE-2021-21038, CVE-2021-21044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Adobe Reader <= 2017.011.30194 / 2020.001.30020 / 2021.001.20149 Multiple Vulnerabilities (APSB21-29) (macOS)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565"], "modified": "2023-04-25T00:00:00", "cpe": ["cpe:/a:adobe:acrobat_reader"], "id": "MACOS_ADOBE_READER_APSB21-29.NASL", "href": "https://www.tenable.com/plugins/nessus/149378", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149378);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/04/25\");\n\n script_cve_id(\n \"CVE-2021-21038\",\n \"CVE-2021-21044\",\n \"CVE-2021-21086\",\n \"CVE-2021-28550\",\n \"CVE-2021-28553\",\n \"CVE-2021-28555\",\n \"CVE-2021-28557\",\n \"CVE-2021-28558\",\n \"CVE-2021-28559\",\n \"CVE-2021-28560\",\n \"CVE-2021-28561\",\n \"CVE-2021-28562\",\n \"CVE-2021-28564\",\n \"CVE-2021-28565\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0229-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n\n script_name(english:\"Adobe Reader <= 2017.011.30194 / 2020.001.30020 / 2021.001.20149 Multiple Vulnerabilities (APSB21-29) (macOS)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The version of Adobe Reader installed on the remote macOS host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Reader installed on the remote macOS host is a version prior or equal to 2017.011.30194,\n2020.001.30020, or 2021.001.20149. It is, therefore, affected by multiple vulnerabilities.\n\n - Acrobat Reader DC versions versions 2020.013.20074 (and earlier), 2020.001.30018 (and earlier) and\n 2017.011.30188 (and earlier) are affected by an Out-of-bounds Write vulnerability when parsing a crafted\n jpeg file. An unauthenticated attacker could leverage this vulnerability to achieve arbitrary code\n execution in the context of the current user. Exploitation of this issue requires user interaction in that\n a victim must open a malicious file. (CVE-2021-21038, CVE-2021-21044)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/acrobat/apsb21-29.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Reader version 2017.011.30194 / 2020.001.30020 / 2021.001.20149 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28565\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/02/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:acrobat_reader\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"MacOS X Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"macosx_adobe_reader_installed.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/MacOSX/Version\", \"installed_sw/Adobe Reader\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\nget_kb_item_or_exit('Host/local_checks_enabled');\nos = get_kb_item('Host/MacOSX/Version');\nif (empty_or_null(os)) audit(AUDIT_OS_NOT, 'Mac OS X');\n\napp_info = vcf::get_app_info(app:'Adobe Reader');\n\n# vcf::adobe_reader::check_version_and_report will\n# properly separate tracks when checking constraints.\n# x.y.30zzz = DC Classic\n# x.y.20zzz = DC Continuous\nconstraints = [\n { 'min_version' : '15.7', 'max_version' : '21.001.20149', 'fixed_version' : '21.001.20155' },\n { 'min_version' : '20.1', 'max_version' : '20.001.30020', 'fixed_version' : '20.001.30025' },\n { 'min_version' : '17.8', 'max_version' : '17.011.30194', 'fixed_version' : '17.011.30196' }\n];\nvcf::adobe_reader::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE, max_segs:3);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:25", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003173: Windows 10 version 2004 / Windows 10 version 20H2 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31165", "CVE-2021-31166", "CVE-2021-31167", "CVE-2021-31168", "CVE-2021-31169", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31185", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31191", "CVE-2021-31192", "CVE-2021-31193", "CVE-2021-31194", "CVE-2021-31205", "CVE-2021-31208"], "modified": "2023-01-23T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003173.NASL", "href": "https://www.tenable.com/plugins/nessus/149398", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149398);\n script_version(\"1.13\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/01/23\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31165\",\n \"CVE-2021-31166\",\n \"CVE-2021-31167\",\n \"CVE-2021-31168\",\n \"CVE-2021-31169\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31185\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31191\",\n \"CVE-2021-31192\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\",\n \"CVE-2021-31205\",\n \"CVE-2021-31208\"\n );\n script_xref(name:\"MSKB\", value:\"5003173\");\n script_xref(name:\"MSFT\", value:\"MS21-5003173\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2022/04/27\");\n\n script_name(english:\"KB5003173: Windows 10 version 2004 / Windows 10 version 20H2 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003173\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003173 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31166\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003173'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'19041',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003173])\n|| \n smb_check_rollup(os:'10',\n sp:0,\n os_build:'19042',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003173])\n)\n {\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:23", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003171: Windows 10 version 1809 / Windows Server 2019 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31167", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31190", "CVE-2021-31191", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003171.NASL", "href": "https://www.tenable.com/plugins/nessus/149382", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149382);\n script_version(\"1.12\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31167\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31190\",\n \"CVE-2021-31191\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003171\");\n script_xref(name:\"MSFT\", value:\"MS21-5003171\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003171: Windows 10 version 1809 / Windows Server 2019 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003171\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003171 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003171'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'17763',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003171])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:24", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003169: Windows 10 version 1909 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31167", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31191", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003169.NASL", "href": "https://www.tenable.com/plugins/nessus/149383", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149383);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31167\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31191\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003169\");\n script_xref(name:\"MSFT\", value:\"MS21-5003169\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003169: Windows 10 version 1909 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003169\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003169 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003169'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'18363',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003169])\n)\n {\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:09", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003174: Windows 10 version 1803 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31170", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31191", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003174.NASL", "href": "https://www.tenable.com/plugins/nessus/149391", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149391);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31170\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31191\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003174\");\n script_xref(name:\"MSFT\", value:\"MS21-5003174\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003174: Windows 10 version 1803 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003174\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003174 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003174'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'17134',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003174])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:11", "description": "The version of Adobe Animate installed on the remote Windows host is prior to 21.0.6. It is, therefore, affected by multiple vulnerabilities.\n\n - Adobe Animate is affected by an out-of-bounds read vulnerabilities. Successful exploitation could lead to information disclosure. (CVE-2021-28572, CVE-2021-28573, CVE-2021-28574, CVE-2021-28575, CVE-2021-28576)\n\n -\u00a0Adobe Animate is affected by a use-after-free vulnerability.\u00a0Successful exploitation could lead to arbitrary code execution. (CVE-2021-28578)\n\n - Adobe Animate is affected by an out-of-bounds write vulnerability.\u00a0Successful exploitation could lead to arbitrary code execution. (CVE-2021-28577) Note that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-13T00:00:00", "type": "nessus", "title": "Adobe Animate < 21.0.6 Multiple Vulnerabilities (APSB21-35)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28572", "CVE-2021-28573", "CVE-2021-28574", "CVE-2021-28575", "CVE-2021-28576", "CVE-2021-28577", "CVE-2021-28578"], "modified": "2021-06-11T00:00:00", "cpe": ["cpe:/a:adobe:animate"], "id": "ADOBE_ANIMATE_APSB21-35.NASL", "href": "https://www.tenable.com/plugins/nessus/149451", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149451);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/11\");\n\n script_cve_id(\n \"CVE-2021-28572\",\n \"CVE-2021-28573\",\n \"CVE-2021-28574\",\n \"CVE-2021-28575\",\n \"CVE-2021-28576\",\n \"CVE-2021-28577\",\n \"CVE-2021-28578\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0230-S\");\n\n script_name(english:\"Adobe Animate < 21.0.6 Multiple Vulnerabilities (APSB21-35)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"Adobe Animate installed on the remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Animate installed on the remote Windows host is prior to 21.0.6. It is, therefore, affected by\nmultiple vulnerabilities.\n\n - Adobe Animate is affected by an out-of-bounds read vulnerabilities. Successful exploitation could lead to\n information disclosure. (CVE-2021-28572, CVE-2021-28573, CVE-2021-28574, CVE-2021-28575, CVE-2021-28576)\n\n -\u00c2\u00a0Adobe Animate is affected by a use-after-free vulnerability.\u00c2\u00a0Successful exploitation could lead to\n arbitrary code execution. (CVE-2021-28578)\n\n - Adobe Animate is affected by an out-of-bounds write vulnerability.\u00c2\u00a0Successful exploitation could lead to\n arbitrary code execution. (CVE-2021-28577)\n \nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's\nself-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/animate/apsb21-35.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Animate version 21.0.6 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28578\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:animate\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_animate_installed.nbin\");\n script_require_keys(\"installed_sw/Adobe Animate\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nvar app_info = vcf::get_app_info(app:'Adobe Animate', win_local:TRUE);\n\nvar constraints = [{ 'fixed_version' : '21.0.6' }];\n\nvcf::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_WARNING\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:20", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-12T00:00:00", "type": "nessus", "title": "KB5003208: Windows Server 2012 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003208.NASL", "href": "https://www.tenable.com/plugins/nessus/149440", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149440);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003208\");\n script_xref(name:\"MSKB\", value:\"5003203\");\n script_xref(name:\"MSFT\", value:\"MS21-5003208\");\n script_xref(name:\"MSFT\", value:\"MS21-5003203\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003208: Windows Server 2012 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n # https://support.microsoft.com/en-us/topic/may-11-2021-kb5003208-monthly-rollup-4dae4cbb-5d56-4cc1-9240-ee8a6bc2cc61\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?be5cd6ec\");\n # https://support.microsoft.com/en-us/topic/may-11-2021-kb5003203-security-only-update-b68b5258-e926-41c7-bfdb-bfbc921f3a27\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6d51f72f\");\n script_set_attribute(attribute:\"solution\", value:\n\"Apply Cumulative Update KB5003208.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31194\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/12\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = \"MS21-05\";\nkbs = make_list('5003208', '5003203');\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win8:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\n# Windows 8 EOL\nproductname = get_kb_item_or_exit('SMB/ProductName', exit_code:1);\nif (\"Windows 8\" >< productname) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:\"6.2\",\n sp:0,\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003208, 5003203])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:09", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003210: Windows Server 2008 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003210.NASL", "href": "https://www.tenable.com/plugins/nessus/149389", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149389);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003210\");\n script_xref(name:\"MSKB\", value:\"5003225\");\n script_xref(name:\"MSFT\", value:\"MS21-5003210\");\n script_xref(name:\"MSFT\", value:\"MS21-5003225\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003210: Windows Server 2008 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003210\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003225\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n- KB5003210\n- KB5003225\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003210',\n '5003225'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(vista:'2') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.0', \n sp:2,\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003210, 5003225])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:24", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003172: Windows 10 version 1507 LTS Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003172.NASL", "href": "https://www.tenable.com/plugins/nessus/149396", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149396);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003172\");\n script_xref(name:\"MSFT\", value:\"MS21-5003172\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003172: Windows 10 version 1507 LTS Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003172\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003172 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003172'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'10240',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003172])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:25", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003197: Windows 10 1607 / Windows Server 2016 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-28479", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31187", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-05-10T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003197.NASL", "href": "https://www.tenable.com/plugins/nessus/149390", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149390);\n script_version(\"1.10\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/05/10\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-28479\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31187\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003197\");\n script_xref(name:\"MSFT\", value:\"MS21-5003197\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003197: Windows 10 1607 / Windows Server 2016 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003197\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003197 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003197'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win10:'0') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'10',\n sp:0,\n os_build:'14393',\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003197])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:30:28", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177, CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products C2R (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28455", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS21_MAY_OFFICE_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162095", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162095);\n script_version(\"1.9\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\n \"CVE-2021-28455\",\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31176\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\",\n \"CVE-2021-31180\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n\n script_name(english:\"Security Updates for Microsoft Office Products C2R (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177,\n CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28455\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS21-05';\n\nvar app_info = vcf::microsoft::office::get_app_info(app:'Microsoft Office');\n\nvar constraints = [\n \n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13127.21624','channel': 'Deferred','channel_version': '2008'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21912','channel': 'Microsoft 365 Apps on Windows 7'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.12527.21912','channel': 'Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13901.20516','channel': 'Enterprise Deferred','channel_version': '2103'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13801.20638','channel': 'Enterprise Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13801.20638','channel': 'First Release for Deferred'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13929.20372','channel': '2016 Retail'},\n {'product':'Microsoft Office 2016','file':'graph.exe','fixed_version':'16.0.13929.20372','channel': 'Current'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.13929.20372','channel': '2019 Retail'},\n {'product':'Microsoft Office 2019','file':'graph.exe','fixed_version':'16.0.10374.20040','channel': '2019 Volume'}\n];\n\nvcf::microsoft::office::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_WARNING,\n bulletin:bulletin,\n subproduct:'Office'\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:42", "description": "The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177, CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28455", "CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31176", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179", "CVE-2021-31180"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:office"], "id": "SMB_NT_MS21_MAY_OFFICE.NASL", "href": "https://www.tenable.com/plugins/nessus/149401", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149401);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\n \"CVE-2021-28455\",\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31176\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\",\n \"CVE-2021-31180\"\n );\n script_xref(name:\"MSKB\", value:\"4464542\");\n script_xref(name:\"MSKB\", value:\"4493197\");\n script_xref(name:\"MSKB\", value:\"4493206\");\n script_xref(name:\"MSKB\", value:\"5001920\");\n script_xref(name:\"MSKB\", value:\"5001923\");\n script_xref(name:\"MSKB\", value:\"5001925\");\n script_xref(name:\"MSKB\", value:\"5001927\");\n script_xref(name:\"MSFT\", value:\"MS21-4464542\");\n script_xref(name:\"MSFT\", value:\"MS21-4493206\");\n script_xref(name:\"MSFT\", value:\"MS21-4493197\");\n script_xref(name:\"MSFT\", value:\"MS21-5001920\");\n script_xref(name:\"MSFT\", value:\"MS21-5001923\");\n script_xref(name:\"MSFT\", value:\"MS21-5001925\");\n script_xref(name:\"MSFT\", value:\"MS21-5001927\");\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n\n script_name(english:\"Security Updates for Microsoft Office Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Products are missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-28455, CVE-2021-31175, CVE-2021-31176, CVE-2021-31177,\n CVE-2021-31179, CVE-2021-31180)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4464542\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4493197\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/4493206\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001920\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001923\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001925\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001927\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address these issues: \n -KB4464542\n -KB4493206\n -KB4493197\n -KB5001920\n -KB5001923\n -KB5001925\n -KB5001927\n \nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic updates are enabled or open any office app and\nmanually perform an update.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28455\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '4464542',\n '4493197',\n '4493206',\n '5001920',\n '5001923',\n '5001925',\n '5001927'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar vuln = FALSE;\nvar port = kb_smb_transport();\n\nvar office_vers = hotfix_check_office_version();\nvar office_sp, prod, path, kb, file, version;\n\n# Office 2013 SP1\nif (office_vers['15.0'])\n{\n office_sp = get_kb_item('SMB/Office/2013/SP');\n if (!isnull(office_sp) && office_sp == 1)\n {\n prod = 'Microsoft Office 2013 SP1';\n\n path = hotfix_get_officecommonfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office15');\n kb = '5001925';\n file = 'mso.dll';\n version = '15.0.5345.1002';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office15');\n kb = '5001927';\n file = 'graph.exe';\n version = '15.0.5345.1000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officecommonfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office15');\n kb = '4493206';\n file = 'acecore.dll';\n version = '15.0.5345.1001';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n\n path = hotfix_get_officeprogramfilesdir(officever:'15.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office15');\n kb = '4464542';\n file = 'oart.dll';\n version = '15.0.5345.1000';\n if (hotfix_check_fversion(file:file, version:version, path:path, kb:kb, bulletin:bulletin, product:prod) == HCF_OLDER )\n vuln = TRUE;\n }\n}\n\n# Office 2016\nif (office_vers['16.0'])\n{\n office_sp = get_kb_item('SMB/Office/2016/SP');\n if (!isnull(office_sp) && office_sp == 0)\n {\n prod = 'Microsoft Office 2016';\n \n # MSI graph.exe\n path = hotfix_get_officeprogramfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Office\\\\Office16');\n if (hotfix_check_fversion(file:'graph.exe', version:'16.0.5161.1000', channel:'MSI', channel_product:'Office', path:path, kb:'5001923', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n \n # MSI mso.dll\n path = hotfix_get_officecommonfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office16');\n if (hotfix_check_fversion(file:'mso.dll', version:'16.0.5161.1002', channel:'MSI', channel_product:'Office', path:path, kb:'5001920', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n \n # MSI acecore.dll\n path = hotfix_get_officecommonfilesdir(officever:'16.0');\n path = hotfix_append_path(path:path, value:'Microsoft Shared\\\\Office16');\n if (hotfix_check_fversion(file:'acecore.dll', version:'16.0.5161.1001', channel:'MSI', channel_product:'Office', path:path, kb:'4493197', bulletin:bulletin, product:prod) == HCF_OLDER)\n vuln = TRUE;\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:10", "description": "The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "KB5003233: Windows 7 and Windows Server 2008 R2 Security Update (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2020-24588", "CVE-2020-26144", "CVE-2021-26419", "CVE-2021-28455", "CVE-2021-28476", "CVE-2021-31182", "CVE-2021-31184", "CVE-2021-31186", "CVE-2021-31188", "CVE-2021-31193", "CVE-2021-31194"], "modified": "2022-08-30T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_5003233.NASL", "href": "https://www.tenable.com/plugins/nessus/149392", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149392);\n script_version(\"1.11\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/08/30\");\n\n script_cve_id(\n \"CVE-2020-24587\",\n \"CVE-2020-24588\",\n \"CVE-2020-26144\",\n \"CVE-2021-26419\",\n \"CVE-2021-28455\",\n \"CVE-2021-28476\",\n \"CVE-2021-31182\",\n \"CVE-2021-31184\",\n \"CVE-2021-31186\",\n \"CVE-2021-31188\",\n \"CVE-2021-31193\",\n \"CVE-2021-31194\"\n );\n script_xref(name:\"MSKB\", value:\"5003228\");\n script_xref(name:\"MSKB\", value:\"5003233\");\n script_xref(name:\"MSFT\", value:\"MS21-5003228\");\n script_xref(name:\"MSFT\", value:\"MS21-5003233\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"KB5003233: Windows 7 and Windows Server 2008 R2 Security Update (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing one or more security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote Windows host is missing security updates. It is, therefore, affected by multiple vulnerabilities: Note that\nNessus has not tested for this issue but has instead relied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003228\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5003233\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n- KB5003228\n- KB5003233\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26419\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-28476\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_check_rollup.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\nkbs = make_list(\n '5003233',\n '5003228'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_HOLE);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\nget_kb_item_or_exit('SMB/WindowsVersion', exit_code:1);\n\nif (hotfix_check_sp_range(win7:'1') <= 0) audit(AUDIT_OS_SP_NOT_VULN);\n\nshare = hotfix_get_systemdrive(as_share:TRUE, exit_on_fail:TRUE);\nif (!is_accessible_share(share:share)) audit(AUDIT_SHARE_FAIL, share);\n\nif (\n smb_check_rollup(os:'6.1', \n sp:1,\n rollup_date:'05_2021',\n bulletin:bulletin,\n rollup_kb_list:[5003233, 5003228])\n)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_hole();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, hotfix_get_audit_report());\n}", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:26", "description": "The Microsoft SharePoint Server 2016 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Sharepoint 2016 (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-06-17T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2016.NASL", "href": "https://www.tenable.com/plugins/nessus/149385", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149385);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/17\");\n\n script_cve_id(\n \"CVE-2021-26418\",\n \"CVE-2021-28474\",\n \"CVE-2021-28478\",\n \"CVE-2021-31171\",\n \"CVE-2021-31172\",\n \"CVE-2021-31173\",\n \"CVE-2021-31181\"\n );\n script_xref(name:\"MSKB\", value:\"5001917\");\n script_xref(name:\"IAVA\", value:\"2021-A-0227-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001917\");\n\n script_name(english:\"Security Updates for Microsoft Sharepoint 2016 (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2016 installation on the remote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001917\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001917\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28474\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft SharePoint Unsafe Control and ViewState RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\napp_name = 'Microsoft SharePoint Server';\nkbs = make_list(\n '5001917'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nparanoid_audit = FALSE;\nregistry_init();\ninstall = get_single_install(app_name:app_name);\nkb_checks =\n{\n '2016':\n { '0':\n {'Server':\n [\n {\n 'kb' : '5001917',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\16\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '16.0.5161.1000',\n 'product_name' : 'Microsoft SharePoint Enterprise Server 2016'\n }\n ]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:24", "description": "The Microsoft SharePoint Server 2013 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Foundation Server 2013 (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-06-17T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2013.NASL", "href": "https://www.tenable.com/plugins/nessus/149395", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149395);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/17\");\n\n script_cve_id(\n \"CVE-2021-26418\",\n \"CVE-2021-28474\",\n \"CVE-2021-28478\",\n \"CVE-2021-31171\",\n \"CVE-2021-31172\",\n \"CVE-2021-31173\",\n \"CVE-2021-31181\"\n );\n script_xref(name:\"MSKB\", value:\"5001935\");\n script_xref(name:\"IAVA\", value:\"2021-A-0227-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001935\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Foundation Server 2013 (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2013 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2013 installation on the remote host is missing security updates. It is, therefore, \naffected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001935\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001935\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28474\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft SharePoint Unsafe Control and ViewState RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\napp_name = 'Microsoft SharePoint Server';\n\nkbs = make_list(\n '5001935'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\ninstall = get_single_install(app_name:app_name);\nkb_checks =\n{\n '2013':\n { '1':\n {'Foundation':\n [{\n 'kb' : '5001935',\n 'path' : hotfix_get_commonfilesdir(),\n 'append' : 'microsoft shared\\\\web server extensions\\\\15\\\\bin',\n 'file' : 'onetutil.dll',\n 'version' : '15.0.5345.1000',\n 'product_name' : 'Microsoft SharePoint Server 2013 SP1'\n }]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:12", "description": "The Microsoft SharePoint Server 2019 installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft SharePoint Server 2019 (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-06-17T00:00:00", "cpe": ["cpe:/a:microsoft:sharepoint_server"], "id": "SMB_NT_MS21_MAY_OFFICE_SHAREPOINT_2019.NASL", "href": "https://www.tenable.com/plugins/nessus/149400", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149400);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/17\");\n\n script_cve_id(\n \"CVE-2021-26418\",\n \"CVE-2021-28474\",\n \"CVE-2021-28478\",\n \"CVE-2021-31171\",\n \"CVE-2021-31172\",\n \"CVE-2021-31173\",\n \"CVE-2021-31181\"\n );\n script_xref(name:\"MSKB\", value:\"5001916\");\n script_xref(name:\"IAVA\", value:\"2021-A-0227-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001916\");\n\n script_name(english:\"Security Updates for Microsoft SharePoint Server 2019 (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft SharePoint Server 2019 installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft SharePoint Server 2019 installation on the remote host is missing security updates. It is, therefore,\naffected by multiple vulnerabilities:\n\n - Microsoft SharePoint Server Remote Code Execution Vulnerability (CVE-2021-28474, CVE-2021-31181)\n - Microsoft SharePoint Information Disclosure Vulnerability (CVE-2021-31171, CVE-2021-31173)\n - Microsoft SharePoint Spoofing Vulnerability (CVE-2021-26418, CVE-2021-28478, CVE-2021-31172)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://support.microsoft.com/en-us/help/5001916\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001916\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:F/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:F/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28474\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft SharePoint Unsafe Control and ViewState RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:sharepoint_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_sharepoint_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nbulletin = 'MS21-05';\napp_name = 'Microsoft SharePoint Server';\n\nkbs = make_list(\n '5001916'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\n# Get path information for Windows.\nwindir = hotfix_get_systemroot();\nif (isnull(windir)) exit(1, 'Failed to determine the location of %windir%.');\n\nregistry_init();\ninstall = get_single_install(app_name:app_name);\nkb_checks =\n{\n '2019':\n { '0':\n {'Server':\n [\n {\n 'kb' : '5001916',\n 'path' : install['path'],\n 'append' : 'bin',\n 'file' : 'ascalc.dll',\n 'version' : '16.0.10374.20000',\n 'product_name' : 'Microsoft SharePoint Server 2019 Core'\n }\n ]\n }\n }\n};\n\n# Get the specific product / path\nparam_list = kb_checks[install['Product']][install['SP']][install['Edition']];\n# audit if not affected\nif(isnull(param_list)) audit(AUDIT_HOST_NOT, 'affected');\nport = kb_smb_transport();\n# grab the path otherwise\nforeach check (param_list)\n{\n if (!isnull(check['version']))\n {\n path = check['path'];\n if (!empty_or_null(check['append']))\n path = hotfix_append_path(path:check['path'], value:check['append']);\n are_we_vuln = hotfix_check_fversion(\n file:check['file'],\n version:check['version'],\n path:path,\n kb:check['kb'],\n product:check['product_name']\n );\n }\n else\n {\n report = '\\n';\n if (check['product_name'])\n report += ' Product : ' + check['product_name'] + '\\n';\n if (check['kb'])\n report += ' KB : ' + check['kb'] + '\\n';\n hotfix_add_report(report, kb:check['kb']);\n }\n\n if(are_we_vuln == HCF_OLDER) vuln = TRUE;\n\n}\nif (vuln)\n{\n port = kb_smb_transport();\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_INST_VER_NOT_VULN, app_name);\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:11", "description": "The version of Adobe Illustrator on the remote Windows hosts is prior to 25.2.3. It is, therefore, affected by multiple vulnerabilities. \n\n - A critical out-of-bounds write vulnerability that could lead to arbitrary code execution in the context of the current user. (CVE-2021-21101) \n - Multiple memory corruption vulnerablities that could lead to arbitrary code execution in the context of the current user. (CVE-2021-21103, CVE-2021-21104, CVE-2021-21105) \n - A path traversal write vulnerability that could lead to arbitrary code execution in the context of the current user. (CVE-2021-21102)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-13T00:00:00", "type": "nessus", "title": "Adobe Illustrator CC < 25.2.3 Multiple Vulnerabilities\u202f(APSB21-24)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21101", "CVE-2021-21102", "CVE-2021-21103", "CVE-2021-21104", "CVE-2021-21105"], "modified": "2021-07-16T00:00:00", "cpe": ["cpe:/a:adobe:illustrator"], "id": "ADOBE_ILLUSTRATOR_APSB21-24.NASL", "href": "https://www.tenable.com/plugins/nessus/149466", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149466);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/07/16\");\n\n script_cve_id(\n \"CVE-2021-21101\",\n \"CVE-2021-21102\",\n \"CVE-2021-21103\",\n \"CVE-2021-21104\",\n \"CVE-2021-21105\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0231-S\");\n\n script_name(english:\"Adobe Illustrator CC < 25.2.3 Multiple Vulnerabilities\u00e2\u0080\u00af(APSB21-24)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Windows host contains an application affected by multiple vulnerabilities\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Illustrator on the remote Windows hosts is prior to 25.2.3. It is, therefore, affected by\nmultiple vulnerabilities. \n\n - A critical out-of-bounds write vulnerability that could lead to arbitrary code execution in the context\n of the current user. (CVE-2021-21101)\n \n - Multiple memory corruption vulnerablities that could lead to arbitrary code execution in the context of\n the current user. (CVE-2021-21103, CVE-2021-21104, CVE-2021-21105)\n \n - A path traversal write vulnerability that could lead to arbitrary code execution in the context of the\n current user. (CVE-2021-21102)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://helpx.adobe.com/security/products/illustrator/apsb21-24.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?522b2559\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe Illustrator CC 25.2.3 or later\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21102\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:illustrator\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_illustrator_installed.nasl\");\n script_require_keys(\"SMB/Adobe Illustrator/Installed\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nvar app_info = vcf::get_app_info(app:'Adobe Illustrator', win_local:TRUE);\n\nvar constraints = [{ 'fixed_version': '25.2.3' }];\n\nvcf::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:30:49", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31175, CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Excel Products C2R (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS21_MAY_EXCEL_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162042", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162042);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31177\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0228-S\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products C2R (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31175,\n CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31175\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS21-05';\n\nvar constraints = [\n {'fixed_version':'16.0.13127.21624','channel': 'Deferred','channel_version': '2008'},\n {'fixed_version':'16.0.12527.21912','channel': 'Microsoft 365 Apps on Windows 7'},\n {'fixed_version':'16.0.12527.21912','channel': 'Deferred'},\n {'fixed_version':'16.0.13901.20516','channel': 'Enterprise Deferred','channel_version': '2103'},\n {'fixed_version':'16.0.13801.20638','channel': 'Enterprise Deferred'},\n {'fixed_version':'16.0.13801.20638','channel': 'First Release for Deferred'},\n {'fixed_version':'16.0.13929.20372','channel': '2016 Retail'},\n {'fixed_version':'16.0.13929.20372','channel': 'Current'},\n {'fixed_version':'16.0.10374.20040','channel': '2019 Volume'},\n {'fixed_version':'16.0.13929.20372','channel': '2019 Retail'}\n];\n\nvcf::microsoft::office_product::check_version_and_report(\n constraints:constraints,\n severity:SECURITY_WARNING,\n bulletin:bulletin,\n subproduct:'Excel'\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:42", "description": "The Microsoft Office Web Apps installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31175, CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Office Web Apps (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2021-06-11T00:00:00", "cpe": ["cpe:/a:microsoft:office_web_apps"], "id": "SMB_NT_MS21_MAY_OFFICE_WEB.NASL", "href": "https://www.tenable.com/plugins/nessus/149387", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149387);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/06/11\");\n\n script_cve_id(\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31177\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\"\n );\n script_xref(name:\"MSKB\", value:\"5001914\");\n script_xref(name:\"MSKB\", value:\"5001928\");\n script_xref(name:\"MSFT\", value:\"MS21-5001914\");\n script_xref(name:\"IAVA\", value:\"2021-A-0225-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001928\");\n\n script_name(english:\"Security Updates for Microsoft Office Web Apps (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Office Web Apps installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Office Web Apps installation on the remote\nhost is missing security updates. It is, therefore, affected\nby multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31175,\n CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-office-online-server-may-11-2021-kb5001914-a30f14fa-fc07-47d0-93e0-5beec98dd2a6\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?3ef32b8b\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-office-web-apps-server-2013-may-11-2021-kb5001928-353b9fdc-3732-4900-a73e-6e82dc6183d2\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?97b40ee7\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001914\n -KB5001928\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31175\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:office_web_apps\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_owa_installed.nbin\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar path, vuln;\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list('5001928', '5001914');\n\nif (get_kb_item('Host/patch_management_checks')) \n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar port = kb_smb_transport();\n\n# Get installs of Office Web Apps\nvar owa_installs = get_installs(app_name:'Microsoft Office Web Apps');\n\nif (!empty_or_null(owa_installs))\n{\n var owa_install;\n foreach owa_install (owa_installs[1])\n {\n if (owa_install['Product'] == '2013')\n {\n var owa_2013_path = owa_install['path'];\n var owa_2013_sp = owa_install['SP'];\n }\n else if (owa_install['Product'] == '2016')\n {\n var oos_path = owa_install['path'];\n var oos_sp = owa_install['SP'];\n }\n }\n}\nvuln = FALSE;\n\n####################################################################\n# Office Web Apps 2013 SP1\n####################################################################\nif (owa_2013_path && (!isnull(owa_2013_sp) && owa_2013_sp == '1'))\n{\n path = hotfix_append_path(path:owa_2013_path, value:'WordConversionService\\\\bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'15.0.5345.1000', min_version:'15.0.0.0', path:path, kb:'5001928', product:'Office Web Apps 2013') == HCF_OLDER)\n vuln = TRUE;\n}\n\n####################################################################\n# Office Online Server\n####################################################################\nif (oos_path && (!isnull(oos_sp) && oos_sp == '0'))\n{\n path = hotfix_append_path(path:oos_path, value:'WordConversionService\\\\bin\\\\Converter');\n if (hotfix_check_fversion(file:'sword.dll', version:'16.0.10374.20000', min_version:'16.0.0.0', path:path, kb:'5001914', product:'Office Online Server') == HCF_OLDER)\n vuln = TRUE;\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:24", "description": "The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31175, CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can exploit this to disclose potentially sensitive information. (CVE-2021-31174, CVE-2021-31178)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Excel Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31174", "CVE-2021-31175", "CVE-2021-31177", "CVE-2021-31178", "CVE-2021-31179"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:excel"], "id": "SMB_NT_MS21_MAY_EXCEL.NASL", "href": "https://www.tenable.com/plugins/nessus/149397", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149397);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\n \"CVE-2021-31174\",\n \"CVE-2021-31175\",\n \"CVE-2021-31177\",\n \"CVE-2021-31178\",\n \"CVE-2021-31179\"\n );\n script_xref(name:\"MSKB\", value:\"5001918\");\n script_xref(name:\"MSKB\", value:\"5001936\");\n script_xref(name:\"MSFT\", value:\"MS21-5001918\");\n script_xref(name:\"IAVA\", value:\"2021-A-0228-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001936\");\n\n script_name(english:\"Security Updates for Microsoft Excel Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Excel Products are affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Excel Products are missing security updates.\nIt is, therefore, affected by multiple vulnerabilities:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31175,\n CVE-2021-31177, CVE-2021-31179)\n\n - An information disclosure vulnerability. An attacker can\n exploit this to disclose potentially sensitive\n information. (CVE-2021-31174, CVE-2021-31178)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-excel-2016-may-11-2021-kb5001918-ded10733-528c-4f28-8ad1-65e2956fb2e3\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?354a1fb3\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-excel-2013-may-11-2021-kb5001936-7ce6a5c0-9d60-4278-92f4-6538801e5c2b\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?1df6f8ba\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001918\n -KB5001936\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31175\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:excel\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_office_compatibility_pack_installed.nbin\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '5001918',\n '5001936'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar port = kb_smb_transport();\n\nvar checks = make_array(\n '15.0', make_array('sp', 1, 'version', '15.0.5345.1000', 'kb', '5001936'),\n '16.0', make_nested_list(\n make_array('sp', 0, 'version', '16.0.5161.1000', 'channel', 'MSI', 'kb', '5001918')\n )\n);\n\nif (hotfix_check_office_product(product:'Excel', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-20T14:55:24", "description": "The Microsoft Exchange Server installed on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n - A security feature bypass vulnerability exists. An attacker can exploit this and bypass the security feature and perform unauthorized actions compromising the integrity of the system/application.\n (CVE-2021-31207)\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31195, CVE-2021-31198)\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2021-31209)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Exchange (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31207", "CVE-2021-31209"], "modified": "2023-03-08T00:00:00", "cpe": ["cpe:/a:microsoft:exchange_server"], "id": "SMB_NT_MS21_MAY_EXCHANGE.NASL", "href": "https://www.tenable.com/plugins/nessus/149393", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149393);\n script_version(\"1.14\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2023/03/08\");\n\n script_cve_id(\n \"CVE-2021-31195\",\n \"CVE-2021-31198\",\n \"CVE-2021-31207\",\n \"CVE-2021-31209\"\n );\n script_xref(name:\"MSKB\", value:\"5003435\");\n script_xref(name:\"MSFT\", value:\"MS21-5003435\");\n script_xref(name:\"IAVA\", value:\"2021-A-0221-S\");\n script_xref(name:\"CISA-KNOWN-EXPLOITED\", value:\"2021/11/17\");\n script_xref(name:\"CEA-ID\", value:\"CEA-2021-0040\");\n\n script_name(english:\"Security Updates for Exchange (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Exchange Server installed on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Exchange Server installed on the remote host\nis missing security updates. It is, therefore, affected by\nmultiple vulnerabilities:\n - A security feature bypass vulnerability exists. An\n attacker can exploit this and bypass the security\n feature and perform unauthorized actions compromising\n the integrity of the system/application.\n (CVE-2021-31207)\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31195,\n CVE-2021-31198)\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2021-31209)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-microsoft-exchange-server-2019-2016-and-2013-may-11-2021-kb5003435-028bd051-b2f1-4310-8f35-c41c9ce5a2f1\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?812d3faa\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003435 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:H/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:H/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31198\");\n script_set_attribute(attribute:\"cvss3_score_source\", value:\"CVE-2021-31195\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"Exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"true\");\n script_set_attribute(attribute:\"exploit_framework_core\", value:\"true\");\n script_set_attribute(attribute:\"exploited_by_malware\", value:\"true\");\n script_set_attribute(attribute:\"metasploit_name\", value:'Microsoft Exchange ProxyShell RCE');\n script_set_attribute(attribute:\"exploit_framework_metasploit\", value:\"true\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:exchange_server\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2023 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ms_bulletin_checks_possible.nasl\", \"microsoft_exchange_installed.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_microsoft.inc');\n\nvar app_info = vcf::microsoft::exchange::get_app_info();\n\nvar constraints =\n[\n {\n 'product' : '2013',\n 'unsupported_cu' : 22,\n 'cu' : 23,\n 'min_version': '15.00.1497.0',\n 'fixed_version': '15.00.1497.18',\n 'kb': '5003435'\n },\n {\n 'product' : '2016',\n 'unsupported_cu' : 18,\n 'cu' : 19,\n 'min_version': '15.01.2176.0',\n 'fixed_version': '15.01.2176.14',\n 'kb': '5003435'\n },\n {\n 'product': '2016',\n 'unsupported_cu': 18,\n 'cu' : 20,\n 'min_version': '15.01.2242.0',\n 'fixed_version': '15.01.2242.10',\n 'kb': '5003435'\n },\n {\n 'product' : '2019',\n 'unsupported_cu' : 7,\n 'cu' : 8,\n 'min_version': '15.02.792.0',\n 'fixed_version': '15.02.792.15',\n 'kb': '5003435'\n },\n {\n 'product' : '2019',\n 'unsupported_cu' : 7,\n 'cu' : 9,\n 'min_version': '15.02.858.0',\n 'fixed_version': '15.02.858.12',\n 'kb': '5003435'\n }\n];\n\nvcf::microsoft::exchange::check_version_and_report\n(\n app_info:app_info,\n bulletin:'MS21-05',\n constraints:constraints,\n severity:SECURITY_WARNING\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:29:11", "description": "The version of Adobe InDesign installed on the remote Windows host is prior or equal to 16.2.1. It is, therefore, affected by multiple out-of-bounds write vulnerabilities that could lead to code execution in the context of the current user. \n\nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-14T00:00:00", "type": "nessus", "title": "Adobe InDesign < 16.2.1 Multiple Vulnerabilities (APSB21-22)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-21043", "CVE-2021-21098", "CVE-2021-21099", "CVE-2021-36004"], "modified": "2021-11-18T00:00:00", "cpe": ["cpe:/a:adobe:indesign"], "id": "ADOBE_INDESIGN_APSB21-22.NASL", "href": "https://www.tenable.com/plugins/nessus/149480", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149480);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/11/18\");\n\n script_cve_id(\n \"CVE-2021-21043\",\n \"CVE-2021-21098\",\n \"CVE-2021-21099\",\n \"CVE-2021-36004\"\n );\n script_xref(name:\"IAVA\", value:\"2021-A-0236-S\");\n\n script_name(english:\"Adobe InDesign < 16.2.1 Multiple Vulnerabilities (APSB21-22)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has an application installed that is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe InDesign installed on the remote Windows host is prior or equal to 16.2.1. It is, therefore,\naffected by multiple out-of-bounds write vulnerabilities that could lead to code execution in the context of the current\nuser. \n\nNote that Nessus has not attempted to exploit these issues but has instead relied only on the application's\nself-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://helpx.adobe.com/security/products/indesign/apsb21-22.html\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Adobe InDesign version 16.2.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-21099\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:indesign\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_indesign_installed.nbin\");\n script_require_keys(\"installed_sw/Adobe InDesign\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\nvar app_info = vcf::get_app_info(app:'Adobe InDesign', win_local:TRUE);\n\nvar constraints = [ { 'fixed_version' : '16.1' , 'fixed_display' : '16.2.1' } ];\n\nvcf::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_HOLE\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:53", "description": "The version of Microsoft Visual Studio Code installed on the remote Windows host is prior to 1.56.1. It is, therefore, affected by multiple remote code execution vulnerabilities.", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Update for Microsoft Visual Studio Code (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31211", "CVE-2021-31214"], "modified": "2022-04-11T00:00:00", "cpe": ["cpe:/a:microsoft:visual_studio_code"], "id": "SMB_NT_MS21_MAY_VISUAL_STUDIO_CODE.NASL", "href": "https://www.tenable.com/plugins/nessus/149402", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149402);\n script_version(\"1.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/11\");\n\n script_cve_id(\"CVE-2021-31211\", \"CVE-2021-31214\");\n script_xref(name:\"IAVA\", value:\"2021-A-0219-S\");\n\n script_name(english:\"Security Update for Microsoft Visual Studio Code (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host has an application installed that is missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Microsoft Visual Studio Code installed on the remote Windows host is prior to 1.56.1. It is, therefore,\naffected by multiple remote code execution vulnerabilities.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://code.visualstudio.com/updates/v1_56\");\n script_set_attribute(attribute:\"see_also\", value:\"https://github.com/microsoft/vscode/milestone/155?closed=1\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Microsoft Visual Studio Code 1.56.1 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31214\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio_code\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_set_attribute(attribute:\"thorough_tests\", value:\"true\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"microsoft_visual_studio_code_installed.nbin\", \"microsoft_visual_studio_code_win_user_installed.nbin\");\n script_require_keys(\"installed_sw/Microsoft Visual Studio Code\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\napp_info = vcf::get_app_info(app:'Microsoft Visual Studio Code', win_local:TRUE);\n\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { 'fixed_version' : '1.56.1' }\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:20", "description": "The Microsoft Skype for Business installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities:\n\n - A session spoofing vulnerability exists. An attacker can exploit this to perform actions with the privileges of another user. (CVE-2021-26421)\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-26422)", "cvss3": {}, "published": "2021-05-14T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Skype for Business (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-26421", "CVE-2021-26422"], "modified": "2022-04-27T00:00:00", "cpe": ["cpe:/a:microsoft:skype_for_business"], "id": "SMB_NT_MS21_MAY_SKYPE.NASL", "href": "https://www.tenable.com/plugins/nessus/149479", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149479);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/04/27\");\n\n script_cve_id(\"CVE-2021-26421\", \"CVE-2021-26422\");\n script_xref(name:\"MSKB\", value:\"5003729\");\n script_xref(name:\"MSFT\", value:\"MS21-5003729\");\n script_xref(name:\"IAVA\", value:\"2021-A-0217-S\");\n\n script_name(english:\"Security Updates for Microsoft Skype for Business (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Skype for Business installation on the remote host is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Skype for Business installation on the remote\nhost is missing security updates. It is, therefore, affected\nby multiple vulnerabilities:\n\n - A session spoofing vulnerability exists. An attacker can\n exploit this to perform actions with the privileges of\n another user. (CVE-2021-26421)\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-26422)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-skype-for-business-server-and-lync-server-may-11-2021-kb5003729-3a6def2e-4b74-480e-bf24-fbec151f10a0\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5d97ea49\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released KB5003729 to address this issue.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-26422\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/13\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/13\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/14\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:skype_for_business\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"microsoft_lync_server_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('install_func.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '5003729'\n);\n\nif (get_kb_item('Host/patch_management_checks')) hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('installed_sw/Microsoft Lync');\n\nget_kb_item_or_exit('SMB/Registry/Uninstall/Enumerated', exit_code:1);\n\nvar uninstall_list = get_kb_list('SMB/Registry/HKLM/SOFTWARE/Microsoft/Windows/CurrentVersion/Uninstall/*/DisplayName');\n\nif (isnull(uninstall_list)) exit(1, 'Missing uninstall enumeration list.');\n\nvar vuln = FALSE;\n\nvar name_kb, prod, version_kb, kb, version, info;\n\nforeach name_kb (keys(uninstall_list))\n{\n prod = uninstall_list[name_kb];\n version_kb = name_kb - '/DisplayName' + '/DisplayVersion';\n\n if (\n 'Server' >< prod &&\n (\n 'Core Components' >< prod ||\n 'Macp Web Components' >< prod\n )\n )\n {\n if ('Skype for Business' >< prod)\n {\n if ('2019' >< prod)\n {\n version = get_kb_item(version_kb);\n if (!isnull(version) && (ver_compare(ver:version, minver:'7.0.2046.0', fix:'7.0.2046.369') < 0))\n {\n vuln = TRUE;\n kb = '5003729'; # This is one of the KBs. MS needs to clean up some linking stuff.\n info = '\\n Product : ' + prod +\n '\\n Installed Version : ' + version +\n '\\n Fixed Version : 7.0.2046.369\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n }\n else if ('2015' >< prod && 'Macp' >!< prod)\n {\n version = get_kb_item(version_kb);\n if (!isnull(version) && (ver_compare(ver:version, minver:'6.0.9319.0', fix:'6.0.9319.606') < 0))\n {\n vuln = TRUE;\n kb = '5003729'; # This is one of the KBs. MS needs to clean up some linking stuff.\n # The other relevant KB is KB5000688 but only applies to 2015 and 2013\n info = '\\n Product : ' + prod +\n '\\n Installed Version : ' + version +\n '\\n Fixed Version : 6.0.9319.606\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n }\n }\n else if ('Lync' >< prod && '2013' >< prod && 'Macp' >!< prod)\n {\n version = get_kb_item(version_kb);\n if (!isnull(version) && (ver_compare(ver:version, minver:'5.0.8308.0', fix:'5.0.8308.1144') < 0))\n {\n vuln = TRUE;\n kb = '5003729'; # This is one of the KBs. MS needs to clean up some linking stuff.\n # The other relevant KB is KB5000688 but only applies to 2015 and 2013\n info = '\\n Product : ' + prod +\n '\\n Installed Version : ' + version +\n '\\n Fixed Version : 5.0.8308.1144\\n';\n hotfix_add_report(info, bulletin:bulletin, kb:kb);\n }\n }\n }\n}\n\nif (vuln)\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n exit(0);\n}\nelse\n{\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:54", "description": "The Microsoft Visual Studio Products are missing a security update. It is, therefore, affected by the multiple vulnerabilities, including the following:\n\n - A remote code execution vulnerability exists in Visual Studio. An unauthenticated, remote attacker can exploit this to bypass authentication and execute arbitrary commands (CVE-2021-27068). \n\n - A privilege escalation vulnerability exists in Visual Studio. An authenticated, local attacker can exploit this to escalate their privileges of an affected system (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-12T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Visual Studio Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-27068", "CVE-2021-31204"], "modified": "2022-06-27T00:00:00", "cpe": ["cpe:/a:microsoft:visual_studio"], "id": "SMB_NT_MS21_MAY_VISUAL_STUDIO.NASL", "href": "https://www.tenable.com/plugins/nessus/149436", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149436);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/27\");\n\n script_cve_id(\"CVE-2021-27068\", \"CVE-2021-31204\");\n script_xref(name:\"IAVA\", value:\"2021-A-0220-S\");\n\n script_name(english:\"Security Updates for Microsoft Visual Studio Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Visual Studio Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Visual Studio Products are missing a security update. It is, therefore, affected by the multiple\nvulnerabilities, including the following:\n\n - A remote code execution vulnerability exists in Visual Studio. An unauthenticated, remote attacker can\n exploit this to bypass authentication and execute arbitrary commands (CVE-2021-27068). \n\n - A privilege escalation vulnerability exists in Visual Studio. An authenticated, local attacker can \n exploit this to escalate their privileges of an affected system (CVE-2021-31204)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version \nnumber.\");\n # https://docs.microsoft.com/en-us/visualstudio/releasenotes/vs2017-relnotes#15.9.36\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?5e238a3e\");\n # https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.4#16.4.22\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?8f7f7927\");\n # https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes-v16.7#16.7.15\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6da57842\");\n # https://docs.microsoft.com/en-us/visualstudio/releases/2019/release-notes#16.9.5\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?4b804329\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue:\n - Update 15.9.36 for Visual Studio 2017\n - Update 16.4.22 for Visual Studio 2019\n - Update 16.7.15 for Visual Studio 2019\n - Update 16.9.5 for Visual Studio 2019\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-27068\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:visual_studio\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ms_bulletin_checks_possible.nasl\", \"microsoft_visual_studio_installed.nbin\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\", \"installed_sw/Microsoft Visual Studio\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('install_func.inc');\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\n\nget_kb_item_or_exit('installed_sw/Microsoft Visual Studio');\n\nvar port = kb_smb_transport();\nvar appname = 'Microsoft Visual Studio';\nvar installs = get_installs(app_name:appname, exit_if_not_found:TRUE);\nvar report = '';\n\nforeach var install (installs[1])\n{\n var version = install['version'];\n var path = install['path'];\n var prod = install['product_version'];\n var fix = '';\n\n # https://docs.microsoft.com/en-us/visualstudio/install/visual-studio-build-numbers-and-release-dates?view=vs-2017\n # VS 2017\n if (prod == '2017')\n {\n fix = '15.9.28307.1525';\n\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # https://docs.microsoft.com/en-us/visualstudio/install/visual-studio-build-numbers-and-release-dates?view=vs-2019\n #\n # VS 2019 Version 16.0-4\n else if (prod == '2019' && version =~ \"^16\\.[0-4]\\.\")\n {\n fix = '16.4.31229.387';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.5-7\n else if (prod == '2019' && version =~ \"^16\\.[5-7]\\.\")\n {\n fix = '16.7.31229.181';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n # VS 2019 Version 16.8-9\n else if (prod == '2019' && version =~ \"^16\\.[89]\\.\")\n {\n fix = '16.9.31229.75';\n if (ver_compare(ver: version, fix: fix, strict:FALSE) < 0)\n {\n report +=\n '\\n Path : ' + path +\n '\\n Installed version : ' + version +\n '\\n Fixed version : ' + fix +\n '\\n';\n }\n }\n}\n\nhotfix_check_fversion_end();\n\nif (empty(report))\n audit(AUDIT_INST_VER_NOT_VULN, appname);\n\nsecurity_report_v4(port:port, severity:SECURITY_WARNING, extra:report);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T14:42:55", "description": "The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the 8d20bd48-a4f3-11ec-90de-1c697aa5a594 advisory.\n\n - The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated.\n Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an adversary can abuse this to inject arbitrary network packets. (CVE-2020-24588)\n\n - An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042 (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets independent of the network configuration. (CVE-2020-26144)\n\n - An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP, CCMP, or GCMP data-confidentiality protocol is used. (CVE-2020-26147)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2022-03-16T00:00:00", "type": "nessus", "title": "FreeBSD : FreeBSD-kernel -- Multiple WiFi issues (8d20bd48-a4f3-11ec-90de-1c697aa5a594)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2020-24588", "CVE-2020-26144", "CVE-2020-26147"], "modified": "2022-03-16T00:00:00", "cpe": ["p-cpe:/a:freebsd:freebsd:freebsd-kernel", "cpe:/o:freebsd:freebsd"], "id": "FREEBSD_PKG_8D20BD48A4F311EC90DE1C697AA5A594.NASL", "href": "https://www.tenable.com/plugins/nessus/158985", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# @NOAGENT@\n#\n# The descriptive text and package checks in this plugin were\n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2021 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n#\n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(158985);\n script_version(\"1.2\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/03/16\");\n\n script_cve_id(\"CVE-2020-24588\", \"CVE-2020-26144\", \"CVE-2020-26147\");\n script_xref(name:\"IAVA\", value:\"2021-A-0223-S\");\n script_xref(name:\"IAVA\", value:\"2021-A-0222-S\");\n\n script_name(english:\"FreeBSD : FreeBSD-kernel -- Multiple WiFi issues (8d20bd48-a4f3-11ec-90de-1c697aa5a594)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote FreeBSD host is missing one or more security-related updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of FreeBSD installed on the remote host is prior to tested version. It is, therefore, affected by multiple\nvulnerabilities as referenced in the 8d20bd48-a4f3-11ec-90de-1c697aa5a594 advisory.\n\n - The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent\n Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated.\n Against devices that support receiving non-SSP A-MSDU frames (which is mandatory as part of 802.11n), an\n adversary can abuse this to inject arbitrary network packets. (CVE-2020-24588)\n\n - An issue was discovered on Samsung Galaxy S3 i9305 4.4.4 devices. The WEP, WPA, WPA2, and WPA3\n implementations accept plaintext A-MSDU frames as long as the first 8 bytes correspond to a valid RFC1042\n (i.e., LLC/SNAP) header for EAPOL. An adversary can abuse this to inject arbitrary network packets\n independent of the network configuration. (CVE-2020-26144)\n\n - An issue was discovered in the Linux kernel 5.8.9. The WEP, WPA, WPA2, and WPA3 implementations reassemble\n fragments even though some of them were sent in plaintext. This vulnerability can be abused to inject\n packets and/or exfiltrate selected fragments when another device sends fragmented frames and the WEP,\n CCMP, or GCMP data-confidentiality protocol is used. (CVE-2020-26147)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n # https://vuxml.freebsd.org/freebsd/8d20bd48-a4f3-11ec-90de-1c697aa5a594.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?315ff327\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:A/AC:L/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2020-26144\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2022/03/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/03/16\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:FreeBSD-kernel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nvar flag = 0;\n\nvar packages = [\n 'FreeBSD>=12.2<12.2_14',\n 'FreeBSD>=12.3<12.3_3',\n 'FreeBSD>=13.0<13.0_8'\n];\n\nforeach var package( packages ) {\n if (pkg_test(save_report:TRUE, pkg: package)) flag++;\n}\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_NOTE,\n extra : pkg_report_get()\n );\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:55", "description": "The version of Adobe Media Encoder installed on the remote Windows host is prior to 15.2. It is, therefore, affected by an out-of-bounds read vulnerability. An unauthenticated, remote attacker can exploit this, to escalate their privileges on an affected system.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.", "cvss3": {}, "published": "2021-05-13T00:00:00", "type": "nessus", "title": "Adobe Media Encoder < 15.2 Out-Of-Bounds Read (APSB21-32)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28569"], "modified": "2021-09-20T00:00:00", "cpe": ["cpe:/a:adobe:media_encoder"], "id": "ADOBE_MEDIA_ENCODER_APSB21-32.NASL", "href": "https://www.tenable.com/plugins/nessus/149447", "sourceData": "#%NASL_MIN_LEVEL 70300\n##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149447);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/09/20\");\n\n script_cve_id(\"CVE-2021-28569\");\n script_xref(name:\"IAVA\", value:\"2021-A-0233-S\");\n\n script_name(english:\"Adobe Media Encoder < 15.2 Out-Of-Bounds Read (APSB21-32)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Adobe Media Encoder installed on the remote Windows host is affected by an out-of-bounds read vulnerability\");\n script_set_attribute(attribute:\"description\", value:\n\"The version of Adobe Media Encoder installed on the remote Windows host is prior to 15.2. It is, therefore, affected \nby an out-of-bounds read vulnerability. An unauthenticated, remote attacker can exploit this, to escalate their \nprivileges on an affected system.\n\nNote that Nessus has not tested for these issues but has instead relied only on the application's self-reported version\nnumber.\");\n # https://helpx.adobe.com/security/products/media-encoder/apsb21-32.html\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?c778acc4\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrace Adobe Media Encoder to version 15.2 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28569\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/13\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:adobe:media_encoder\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"adobe_media_encoder_win_installed.nbin\");\n script_require_keys(\"installed_sw/Adobe Media Encoder\", \"SMB/Registry/Enumerated\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\nget_kb_item_or_exit('SMB/Registry/Enumerated');\n\nvar app_info = vcf::get_app_info(app:'Adobe Media Encoder', win_local:TRUE);\nvar constraints = [{'fixed_version' : '15.2'}];\n\nvcf::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_WARNING\n);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:24", "description": "The Windows 'Web Media Extensions' app installed on the remote host is affected by a remote code execution vulnerability. An attacker who successfully exploited the vulnerability could execute arbitrary code. Exploitation of the vulnerability requires that a program process a specially crafted file. (CVE-2021-28465)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Microsoft Windows Web Media Extensions Library RCE (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-28465"], "modified": "2021-05-12T00:00:00", "cpe": ["cpe:/o:microsoft:windows"], "id": "SMB_NT_MS21_MAY_WEB_MEDIA.NASL", "href": "https://www.tenable.com/plugins/nessus/149388", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149388);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/05/12\");\n\n script_cve_id(\"CVE-2021-28465\");\n\n script_name(english:\"Microsoft Windows Web Media Extensions Library RCE (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Windows app installed on the remote host is affected by a remote code execution vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Windows 'Web Media Extensions' app installed on the remote host is affected by a remote code execution\nvulnerability. An attacker who successfully exploited the vulnerability could execute arbitrary code. Exploitation of\nthe vulnerability requires that a program process a specially crafted file. (CVE-2021-28465)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28465\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to app version 1.0.40831.0, or later via the Microsoft Store.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-28465\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:microsoft:windows\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"smb_hotfixes.nasl\", \"wmi_enum_windows_app_store.nbin\");\n script_require_keys(\"SMB/Registry/Enumerated\", \"WMI/Windows App Store/Enumerated\");\n script_require_ports(139, 445);\n\n exit(0);\n}\n\ninclude('vcf.inc');\ninclude('vcf_extras.inc');\n\napps = ['Microsoft.WebMediaExtensions'];\n\napp_info = vcf::microsoft_appstore::get_app_info(app_list:apps);\n\nvcf::check_granularity(app_info:app_info, sig_segments:3);\n\nconstraints = [\n { 'fixed_version' : '1.0.40831.0'}\n];\n\nvcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);\n", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-17T16:31:25", "description": "The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31180)", "cvss3": {}, "published": "2022-06-10T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Word Products C2R (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31180"], "modified": "2022-12-14T00:00:00", "cpe": ["cpe:/a:microsoft:word"], "id": "SMB_NT_MS21_MAY_WORD_C2R.NASL", "href": "https://www.tenable.com/plugins/nessus/162122", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(162122);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/12/14\");\n\n script_cve_id(\"CVE-2021-31180\");\n script_xref(name:\"IAVA\", value:\"2021-A-0226-S\");\n\n script_name(english:\"Security Updates for Microsoft Word Products C2R (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Word Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31180)\");\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?fd4508ff\");\n script_set_attribute(attribute:\"solution\", value:\n\"For Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2022/06/10\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows\");\n\n script_copyright(english:\"This script is Copyright (C) 2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('vcf_extras_office.inc');\n\nvar bulletin = 'MS21-05';\n\nvar constraints = [\n {'fixed_version':'16.0.13127.21624','channel': 'Deferred','channel_version': '2008'},\n {'fixed_version':'16.0.12527.21912','channel': 'Microsoft 365 Apps on Windows 7'},\n {'fixed_version':'16.0.12527.21912','channel': 'Deferred'},\n {'fixed_version':'16.0.13901.20516','channel': 'Enterprise Deferred','channel_version': '2103'},\n {'fixed_version':'16.0.13801.20638','channel': 'Enterprise Deferred'},\n {'fixed_version':'16.0.13801.20638','channel': 'First Release for Deferred'},\n {'fixed_version':'16.0.13929.20372','channel': '2016 Retail'},\n {'fixed_version':'16.0.13929.20372','channel': 'Current'},\n {'fixed_version':'16.0.10374.20040','channel': '2019 Volume'},\n {'fixed_version':'16.0.13929.20372','channel': '2019 Retail'}\n];\n\nvcf::microsoft::office_product::check_version_and_report(\n constraints:constraints,\n severity:SECURITY_WARNING,\n bulletin:bulletin,\n subproduct:'Word'\n);", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2023-05-18T15:28:43", "description": "The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can exploit this to bypass authentication and execute unauthorized arbitrary commands. (CVE-2021-31180)", "cvss3": {}, "published": "2021-05-11T00:00:00", "type": "nessus", "title": "Security Updates for Microsoft Word Products (May 2021)", "bulletinFamily": "scanner", "cvss2": {}, "cvelist": ["CVE-2021-31180"], "modified": "2022-06-10T00:00:00", "cpe": ["cpe:/a:microsoft:word"], "id": "SMB_NT_MS21_MAY_WORD.NASL", "href": "https://www.tenable.com/plugins/nessus/149399", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the Microsoft Security Updates API. The text\n# itself is copyright (C) Microsoft Corporation.\n#\n\ninclude('deprecated_nasl_level.inc');\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(149399);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2022/06/10\");\n\n script_cve_id(\"CVE-2021-31180\");\n script_xref(name:\"MSKB\", value:\"5001919\");\n script_xref(name:\"MSKB\", value:\"5001931\");\n script_xref(name:\"MSFT\", value:\"MS21-5001919\");\n script_xref(name:\"IAVA\", value:\"2021-A-0226-S\");\n script_xref(name:\"MSFT\", value:\"MS21-5001931\");\n\n script_name(english:\"Security Updates for Microsoft Word Products (May 2021)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The Microsoft Word Products are missing a security update.\");\n script_set_attribute(attribute:\"description\", value:\n\"The Microsoft Word Products are missing a security update.\nIt is, therefore, affected by the following vulnerability:\n\n - A remote code execution vulnerability. An attacker can\n exploit this to bypass authentication and execute\n unauthorized arbitrary commands. (CVE-2021-31180)\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-word-2013-may-11-2021-kb5001931-b57d12c6-8413-44a7-8474-11c6c3265340\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?7dbdb2a7\");\n # https://support.microsoft.com/en-us/topic/description-of-the-security-update-for-word-2016-may-11-2021-kb5001919-273a8567-13cc-47ad-8346-3f077b73a2de\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?6c507177\");\n script_set_attribute(attribute:\"solution\", value:\n\"Microsoft has released the following security updates to address this issue: \n -KB5001919\n -KB5001931\n\nFor Office 365, Office 2016 C2R, or Office 2019, ensure automatic\nupdates are enabled or open any office app and manually perform an\nupdate.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2021-31180\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2021/05/11\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2021/05/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:microsoft:word\");\n script_set_attribute(attribute:\"stig_severity\", value:\"I\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Windows : Microsoft Bulletins\");\n\n script_copyright(english:\"This script is Copyright (C) 2021-2022 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"office_installed.nasl\", \"smb_hotfixes.nasl\", \"ms_bulletin_checks_possible.nasl\");\n script_require_keys(\"SMB/MS_Bulletin_Checks/Possible\");\n script_require_ports(139, 445, \"Host/patch_management_checks\");\n\n exit(0);\n}\n\ninclude('smb_func.inc');\ninclude('smb_hotfixes.inc');\ninclude('smb_hotfixes_fcheck.inc');\ninclude('smb_reg_query.inc');\n\nget_kb_item_or_exit('SMB/MS_Bulletin_Checks/Possible');\n\nvar bulletin = 'MS21-05';\nvar kbs = make_list(\n '5001919',\n '5001931'\n);\n\nif (get_kb_item('Host/patch_management_checks'))\n hotfix_check_3rd_party(bulletin:bulletin, kbs:kbs, severity:SECURITY_WARNING);\n\nget_kb_item_or_exit('SMB/Registry/Enumerated', exit_code:1);\n\nvar port = kb_smb_transport();\n\nvar checks = make_array(\n '15.0', make_array('sp', 1, 'version', '15.0.5345.1000', 'kb', '5001931'),\n '16.0', make_nested_list(\n make_array('sp', 0, 'version', '16.0.5161.1000', 'channel', 'MSI', 'kb', '5001919')\n )\n);\n\nif (hotfix_check_office_product(product:'Word', checks:checks, bulletin:bulletin))\n{\n replace_kb_item(name:'SMB/Missing/'+bulletin, value:TRUE);\n hotfix_security_warning();\n hotfix_check_fversion_end();\n exit(0);\n}\nelse\n{\n hotfix_check_fversion_end();\n audit(AUDIT_HOST_NOT, 'affected');\n}\n", "cvss": {"score": 0.0, "vector": "NONE"}}], "adobe": [{"lastseen": "2023-05-27T17:13:01", "description": "Adobe has released security updates for Adobe Acrobat and Reader for Windows and macOS. These updates address multiple [critical]() and [important]() vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "adobe", "title": "APSB21-29 Security\u202fupdate available for Adobe Acrobat and Reader", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-28550", "CVE-2021-28553", "CVE-2021-28555", "CVE-2021-28557", "CVE-2021-28558", "CVE-2021-28559", "CVE-2021-28560", "CVE-2021-28561", "CVE-2021-28562", "CVE-2021-28564", "CVE-2021-28565"], "modified": "2021-05-11T00:00:00", "id": "APSB21-29", "href": "https://helpx.adobe.com/security/products/acrobat/apsb21-29.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T17:13:12", "description": "Adobe has released an update for Adobe Animate. This update resolves multiple [critical]() and [important]() vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 6.5, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 3.6}, "published": "2021-05-11T00:00:00", "type": "adobe", "title": "APSB21-35 Security\u202fupdate available\u202ffor Adobe Animate", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-28572", "CVE-2021-28573", "CVE-2021-28574", "CVE-2021-28575", "CVE-2021-28576", "CVE-2021-28577", "CVE-2021-28578"], "modified": "2021-05-11T00:00:00", "id": "APSB21-35", "href": "https://helpx.adobe.com/security/products/animate/apsb21-35.html", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}, {"lastseen": "2023-05-27T14:32:54", "description": "Adobe has released an update for Adobe Illustrator 2021. This update resolves multiple [critical ]()vulnerabilities that could lead to arbitrary code execution in the context of current user. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "adobe", "title": "APSB21-24 Security update available for Adobe Illustrator", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21101", "CVE-2021-21102", "CVE-2021-21103", "CVE-2021-21104", "CVE-2021-21105"], "modified": "2021-05-11T00:00:00", "id": "APSB21-24", "href": "https://helpx.adobe.com/security/products/illustrator/apsb21-24.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T14:32:57", "description": "Adobe has released a security update for Adobe InDesign. This update addresses multiple [critical]() vulnerabilities. Successful exploitation could lead to arbitrary code execution in the context of the current user. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 5.9}, "published": "2021-05-11T00:00:00", "type": "adobe", "title": "APSB21-22 Security updates available for Adobe InDesign", "bulletinFamily": "software", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "COMPLETE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 9.3, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 10.0, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-21043", "CVE-2021-21098", "CVE-2021-21099", "CVE-2021-36004"], "modified": "2021-05-11T00:00:00", "id": "APSB21-22", "href": "https://helpx.adobe.com/security/products/indesign/apsb21-22.html", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2023-05-27T17:13:48", "description": "Adobe has released an update for Adobe Media Encoder. This update resolves an [important]() vulnerability that could lead to arbitrary code execution in the context of the current user. \n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "baseScore": 4.3, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 1.4}, "published": "2021-05-11T00:00:00", "type": "adobe", "title": "APSB21-32 Security update available for Adobe Media Encoder", "bulletinFamily": "software", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "NONE", "integrityImpact": "NONE", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-28569"], "modified": "2021-05-11T00:00:00", "id": "APSB21-32", "href": "https://helpx.adobe.com/security/products/media-encoder/apsb21-32.html", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:P/I:N/A:N"}}], "threatpost": [{"lastseen": "2021-05-11T23:10:25", "description": "Microsoft\u2019s May Patch Tuesday release addressed a modest 55 cybersecurity vulnerabilities, including just four critical bugs. It\u2019s the smallest monthly update from the computing giant since 2020, but it does contain a patch for a concerning wormable vulnerability found in the Windows OS.\n\nThe good news is that none of the vulnerabilities are being actively exploited in the wild, according to Microsoft, though three are listed as publicly known.\n\n[The fixes](<https://msrc.microsoft.com/update-guide/en-us>) address security flaws across Microsoft Windows, .NET Core and Visual Studio, Internet Explorer (IE), Microsoft Office, SharePoint Server, Open-Source Software, Hyper-V, Skype for Business and Microsoft Lync, and Exchange Server. Besides the four critical bugs, 50 are rated \u201cimportant\u201d and one is moderate in severity.\n\n## **Critical Microsoft Security Patches for May 2021**\n\nThe critical bugs in this month\u2019s Patch Tuesday release are:\n\n * [CVE-2021-31166](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31166>): A wormable HTTP protocol-stack issue in Windows 10 and some versions of Windows Server allowing remote code-execution (RCE)\n * [CVE-2021-26419](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26419>): A scripting-engine memory corruption vulnerability in Internet Explorer 11 and 9 allowing RCE\n * [CVE-2021-31194](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31194>): An RCE bug in the Microsoft Windows Object Linking and Embedding (OLE) Automation\n * [CVE-2021-28476](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28476>): An RCE vulnerability in Microsoft Windows Hyper-V\n\n### **CVE-2021-31166 \u2013 Wormable**\n\nThis most concerning critical bug for researchers is an HTTP protocol-stack issue that would allow RCE with kernel privileges or a denial-of-service (DoS) attack. The HTTP protocol stack enables Windows and applications to communicate with other devices; it can be run standalone or in conjunction with Internet Information Services (IIS).\n\n\u201cIf exploited, this vulnerability could enable an unauthenticated attacker to send a specially crafted packet to a targeted server utilizing the HTTP protocol stack (http.sys) to process packets and ultimately, execute arbitrary code, and take control of the affected system,\u201d Eric Feldman, cybersecurity researcher with Automox, wrote in [an analysis](<https://blog.automox.com/automox-experts-weigh-in-may-patch-tuesday-2021>).\n\nWorse, Microsoft noted that the bug is wormable, so that it could be used to self-replicate across the internal network and affect internal services that may not have been exposed.\n\n\u201cThe vulnerability announced has the potential to be both directly impactful and is also exceptionally simple to exploit, leading to a remote and unauthenticated DoS (Blue Screen of Death) for affected products,\u201d Steve Povolny, head of advanced threat research and principle engineer at McAfee, said via email. \u201cWhile this vulnerability has the potential to lead to code execution in the Windows kernel, this type of weaponization is a much higher bar for exploitation. However, if RCE can be achieved, cybercriminals would likely have the capability to create a worm, leading to self-propagation of the vulnerability across networks and the internet.\u201d\n\n\u201cFor ransomware operators, this kind of vulnerability is a prime target for exploitation,\u201d Kevin Breen, director of cyber-threat research at Immersive Labs, told Threatpost. \u201cWormable exploits should always be a high priority, especially if they are for services that are designed to be public facing. As this specific exploit would not require any form of authentication, it\u2019s even more appealing for attackers, and any organization using HTTP.sys protocol stack should prioritize this patch.\u201d\n\nDustin Childs, researcher with Trend Micro\u2019s Zero Day Initiative (ZDI), noted [in a blog](<https://www.zerodayinitiative.com/blog/2021/5/11/the-may-2021-security-update-review>), \u201cBefore you pass this aside, Windows 10 can also be configured as a web server, so it is impacted as well. Definitely put this on the top of your test-and-deploy list.\u201d\n\n### **CVE-2021-26419**\n\nThis second critical bug affecting Microsoft\u2019s legacy browser allows RCE, and offers several avenues of attack, according to researchers.\n\n\u201cIn a web-based attack scenario, an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website,\u201d explained Feldman. \u201cAn attacker could also embed an ActiveX control marked \u2018safe for initialization\u2019 in an application or Microsoft Office document that hosts the IE rendering engine. The attacker could also take advantage of compromised websites and websites that accept or host user-provided content or advertisements. These websites could contain specially crafted content that could exploit the vulnerability.\u201d\n\nThe best way to counteract this bug is ditching IE, noted Breen.\n\n\u201cInternet Explorer needs to die \u2013 and I\u2019m not the only one that thinks so,\u201d he told Threatpost. \u201cIf you are an organization that has to provide IE11 to support legacy applications, consider enforcing a policy on the users that restricts the domains that can be accessed by IE11 to only those legacy applications. All other web browsing should be performed with a supported browser.\u201d\n\n### **CVE-2021-31194**\n\nThe third critical bug exists in the Microsoft Windows OLE Automation, which in and of itself should place it on the priority-patch list, according to researchers.\n\n\u201cTo exploit the vulnerability, an attacker could host a specially crafted website designed to invoke OLE automation through a web browser,\u201d explained Justin Knapp, Automox researcher. \u201cHowever, this approach requires that the attacker bait a user into visiting the maliciously crafted website.\u201d\n\nHe pointed out that OLE technology has frequently been used to mask malicious code within documents and for linking to external files that infect systems with malware.\n\n\u201cIn 2020, the CISA released an alert detailing the top 10 routinely exploited vulnerabilities, which identified Microsoft\u2019s OLE as the most commonly exploited technology by state-sponsored cyber-actors,\u201d he said. \u201cConsidering the prevalent exploitation of OLE vulnerabilities, including those that had been flagged years ago, organizations should immediately prioritize patching all outstanding OLE vulnerabilities.\u201d\n\n### **CVE-2021-28476**\n\nThe last critical bug is found in Windows Hyper-V, which is a native hypervisor that can create and run virtual machines on x86-64 systems running Windows. It can allow an attacker to execute arbitrary code, Knapp said: \u201cTo exploit this vulnerability, an attacker could run a specially crafted application on a Hyper-V guest that could cause the Hyper-V host operating system to execute arbitrary code when it fails to properly validate vSMB packet data. Successful exploitation could enable an attacker to run malicious binaries on Hyper-V virtual machines or execute arbitrary code on the host system itself.\u201d\n\nThat said, Microsoft noted that an attacker is more likely to abuse the bug for DoS attacks in the form of a system crash rather than RCE, Childs pointed out, which mitigates the vulnerability\u2019s CVSS score of 9.9.\n\n\u201cBecause of this, it could be argued that the attack complexity would be high, which changes the CVSS rating to 8.5,\u201d he said. \u201cThat still rates as high-severity, but not critical. Still, the bug check [system crash] alone is worth making sure your Hyper-V systems get this update.\u201d\n\n## **Publicly Disclosed Vulnerabilities**\n\nChris Goettl, senior director of product management at Ivanti, told Threatpost that the biggest patching priority should be the publicly disclosed bugs \u2013 even though there is as yet no known malicious exploitation.\n\n\u201cThe top concern from the Microsoft updates this month is the update for Microsoft Exchange that includes the fix for [CVE-2021-31207](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31207>), which made its debut in the [2021 Pwn2Own competition](<https://www.zerodayinitiative.com/blog/2021/4/2/pwn2own-2021-schedule-and-live-results>),\u201d he said.\n\nThe bug tracked as CVE-2021-31207 is only rated as \u201cmoderate,\u201d but the \u201csecurity feature-bypass exploit was showcased prominently in the Pwn2Own contest and at some point details of the exploit will be published,\u201d Goettl explained. \u201cAt that point threat actors will be able to take advantage of the vulnerability if they have not already begun attempting to reverse engineer an exploit.\u201d\n\nThere two other publicly disclosed vulnerabilities resolved by Microsoft this month that exist in Common Utilities, found in the NNI open-source toolkit ([CVE-2021-31200](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31200>)), and in .NET and Visual Studio ([CVE-2021-31204](<https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-31204>)).\n\n\u201cCommon Utilities and .NET and Visual Studio are less likely to be targeted, but due to the public disclosures they should not be ignored for long,\u201d Goettl added.\n\n## **Other Notable Microsoft Security Patches for May 2021**\n\nAs for the other patches in the update that stood out to the research community, ZDI\u2019s Childs highlighted a Windows wireless networking information-disclosure bug, tracked as [CVE-2020-24587](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2020-24587>).\n\n\u201cThe ZDI doesn\u2019t normally highlight info disclosure bugs, but this one has the potential to be pretty damaging,\u201d Childs said. \u201cThis patch fixes a vulnerability that could allow an attacker to disclose the contents of encrypted wireless packets on an affected system. It\u2019s not clear what the range on such an attack would be, but you should assume some proximity is needed. You\u2019ll also note this CVE is from 2020, which could indicate Microsoft has been working on this fix for some time.\u201d\n\n### **Windows Graphics, SharePoint Server Patches**\n\nA trio of local privilege escalation flaws \u2013 two in the Windows Graphics Component ([CVE-2021-31188](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31188>), [CVE-2021-31170](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31170>)) and one in SharePoint Server ([CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)) \u2013 caught Breen\u2019s eye.\n\nAs for the first two, he noted they could be chained with another bug, such as the wormable bug listed above, to become highly dangerous and allow for [WannaCry-style attacks](<https://threatpost.com/one-year-after-wannacry-a-fundamentally-changed-threat-landscape/132047/>).\n\n\u201cThis kind of vulnerability is often used by attackers after they have already gained a foothold through an initial infection vector, like phishing or via another exploit like the RCE in HTTP.sys (CVE-2021-31166),\u201d Breen noted via email. \u201cThe attackers are looking to increase their privileges so they can move laterally across a network or gain access to other accounts that may have access to more sensitive information.\u201d\n\nMeanwhile, the SharePoint bug allows an authenticated attacker to run code on remote SharePoint Servers.\n\n\u201cAs this is post-authentication, it\u2019s likely to be used as part of post-exploitation and lateral movement phases of an attack, rather than the initial-infection vector,\u201d Breen said. \u201cAttackers could gain access to sensitive documents or even replace real documents with weaponized versions, enabling the compromise of more user devices across the organization\u2019s network.\u201d\n\n### **Microsoft Exchange Server Patches**\n\nMicrosoft also patched four vulnerabilities in Microsoft Exchange Server. The flaws ([CVE-2021-31198](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31198>), RCE; [CVE-2021-31207](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31207>), spoofing; [CVE-2021-31209](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31209>), security bypass; and [CVE-2021-31195](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31195>), RCE), are all rated important or moderate.\n\n\u201cCVE-2021-31195 is attributed to Orange Tsai of the DEVCORE research team, who was responsible for disclosing the [ProxyLogon Exchange Server](<https://threatpost.com/fbi-proxylogon-web-shells/165400/>) vulnerabilities that [were] patched in an out-of-band release back in March,\u201d Satnam Narang, staff research engineer with Tenable, told Threatpost. \u201cWhile none of these flaws are deemed critical in nature, it is a reminder that researchers and attackers are still looking closely at Exchange Server for additional vulnerabilities, so organizations that have yet to update their systems should do so as soon as possible.\u201d\n\nAnd finally, Ivanti\u2019s Goettl noted that several Microsoft products have reached end-of-life and won\u2019t be getting support going forward.\n\n\u201cThis month marks the final update for several Windows 10 and Server editions, so make sure you have updated any systems to newer branches to avoid a disruption in security update coverage come June,\u201d he said. \u201cWindows 10 1803 and 1809 and Server 1909 all received their final update on May Patch Tuesday 2021.\u201d\n\n**Join Threatpost for \u201c**[**Fortifying Your Business Against Ransomware, DDoS & Cryptojacking Attacks**](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)**\u201d \u2013 a LIVE roundtable event on**[** Wed, May 12 at 2:00 PM EDT**](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinarhttps://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)**. Sponsored by Zoho ManageEngine, Threatpost host Becky Bracken moderates an expert panel discussing best defense strategies for these 2021 threats. Questions and LIVE audience participation encouraged. Join the lively discussion and **[**Register HERE**](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)** for free. **\n", "cvss3": {}, "published": "2021-05-11T20:05:44", "type": "threatpost", "title": "Wormable Windows Bug Opens Door to DoS, RCE", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2020-24587", "CVE-2021-26419", "CVE-2021-28474", "CVE-2021-28476", "CVE-2021-31166", "CVE-2021-31170", "CVE-2021-31188", "CVE-2021-31194", "CVE-2021-31195", "CVE-2021-31198", "CVE-2021-31200", "CVE-2021-31204", "CVE-2021-31207", "CVE-2021-31209"], "modified": "2021-05-11T20:05:44", "id": "THREATPOST:A2FE619CD27EBEC2F6B0C62ED026F02C", "href": "https://threatpost.com/wormable-windows-bug-dos-rce/166057/", "cvss": {"score": 0.0, "vector": "NONE"}}, {"lastseen": "2021-05-11T18:51:27", "description": "Adobe is warning customers of a critical zero-day bug actively exploited in the wild that affects its ubiquitous Adobe Acrobat PDF reader software. A patch is available, as part of the company\u2019s Tuesday roundup of 43 fixes for 12 of its products, including [Adobe Creative Cloud Desktop Application](<https://helpx.adobe.com/security/products/creative-cloud/apsb21-31.html>), [Illustrator](<https://helpx.adobe.com/security/products/illustrator/apsb21-24.html>), [InDesign](<https://helpx.adobe.com/security/products/indesign/apsb21-22.html>), and [Magento](<https://helpx.adobe.com/security/products/magento/apsb21-30.html>).\n\n[](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)\n\nJoin Threatpost for \u201c[Fortifying Your Business Against Ransomware, DDoS & Cryptojacking Attacks](<https://threatpost.com/webinars/fortifying-your-business-against-attacks/?utm_source=ART&utm_medium=ART&utm_campaign=May_Zoho_Webinar>)\u201d a LIVE roundtable event on Wednesday, May 12 at 2:00 PM EDT for this FREE webinar sponsored by Zoho ManageEngine.\n\nAccording to Adobe, the zero-day vulnerability, which is tracked as [CVE-2021-28550](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>), \u201chas been exploited in the wild in limited attacks targeting [Adobe Reader](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>) users on Windows.\u201d\n\nWindows users of Adobe Reader may be the only ones currently targeted. However, the bug affects eight versions of the software, including those running on Windows and macOS systems. Versions include:\n\n * Windows Acrobat DC & Reader DC (versions 2021.001.20150 and earlier)\n * macOS Acrobat DC & Reader DC (versions 2021.001.20149 and earlier)\n * Windows & macOS Acrobat 2020 & Acrobat Reader 2020 (2020.001.30020 and earlier versions)\n * Windows & macOS Acrobat 2017 & Acrobat Reader 2017 (2017.011.30194 and earlier versions)\n\nAdobe did not release technical specifics regarding the zero-day vulnerability. Typically, those details become available after users have had an opportunity to apply the fix. \u201cUsers can update their product installations manually by choosing Help > Check for Updates,\u201d Adobe wrote in its [May security bulletin, posted Tuesday](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>).\n\n## **May Adobe Update Fixes Multiple Critical Bugs **\n\nAlso part of Tuesday\u2019s roundup of 43 fixes are several other bugs rated critical. In all, Adobe Acrobat received [10 critical and four important vulnerability patches](<https://helpx.adobe.com/security/products/acrobat/apsb21-29.html>). Seven out of those bugs included arbitrary code execution bugs. Three (CVE-2021-21044, CVE-2021-21038, CVE-2021-21086) of the vulnerabilities patched on Tuesday open systems up to out-of-bounds write attacks.\n\nAdobe Illustrator received the next highest number of patches on Tuesday, with five critical code execution vulnerabilities fixed. According to Adobe\u2019s description of the flaws, three (CVE-2021-21103, CVE-2021-21104, CVE-2021-21105) are memory corruption bugs that open systems up to hackers, triggering arbitrary code execution on targeted systems. Kushal Arvind Shah, a bug hunter with Fortinet\u2019s FortiGuard Labs, is credited for the three memory corruption bugs.\n\nAdditional Adobe products receiving patches included [Adobe Animate](<https://helpx.adobe.com/security/products/animate/apsb21-35.html>), [Adobe Medium](<https://helpx.adobe.com/security/products/medium/apsb21-34.html>), [Adobe After Effects](<https://helpx.adobe.com/security/products/after_effects/apsb21-33.html>), [Adobe Media Encoder](<https://helpx.adobe.com/security/products/media-encoder/apsb21-32.html>), [Adobe Genuine Service](<https://helpx.adobe.com/security/products/integrity_service/apsb21-27.html>), [Adobe InCopy](<https://helpx.adobe.com/security/products/incopy/apsb21-25.html>) and [Adobe Genuine Service](<https://helpx.adobe.com/security/products/integrity_service/apsb21-27.html>).\n\n**Download our exclusive FREE Threatpost Insider eBook,** **_\u201c[2021: The Evolution of Ransomware](<https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/?utm_source=April_eBook&utm_medium=ART&utm_campaign=ART>),\u201d_**** to help hone your cyber-defense strategies against this growing scourge. We go beyond the status quo to uncover what\u2019s next for ransomware and the related emerging risks. Get the whole story and [DOWNLOAD](<https://threatpost.com/ebooks/2021-the-evolution-of-ransomware/?utm_source=April_eBook&utm_medium=ART&utm_campaign=ART>) the eBook now \u2013 on us!**\n", "cvss3": {}, "published": "2021-05-11T18:38:36", "type": "threatpost", "title": "Hackers Leverage Adobe Zero-Day Bug Impacting Acrobat Reader", "bulletinFamily": "info", "cvss2": {}, "cvelist": ["CVE-2021-21038", "CVE-2021-21044", "CVE-2021-21086", "CVE-2021-21103", "CVE-2021-21104", "CVE-2021-21105", "CVE-2021-28550"], "modified": "2021-05-11T18:38:36", "id": "THREATPOST:474207FB444B779CD6B86ABEA0D24054", "href": "https://threatpost.com/adobe-zero-day-bug-acrobat-reader/166044/", "cvss": {"score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C"}}], "mskb": [{"lastseen": "2023-05-19T10:46:25", "description": "None\n## Summary\n\nThis security update resolves a Microsoft SharePoint Server remote code execution vulnerability and a Microsoft SharePoint spoofing vulnerability and information disclosure vulnerability. To learn more about these vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-26418](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26418>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28478](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28478>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31171](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31171>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31172](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31172>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31173](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31173>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31181](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31181>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft SharePoint Server 2019 installed on the computer.\n\n## Improvements and fixes\n\nThis security update contains improvements and fixes for the following nonsecurity issues in SharePoint Server 2019:\n\n * Adds the ability to update the SQL authentication account username and password when SharePoint uses Azure SQL Managed Instance. To do this, use the following script:`\n \n \r$db = Get-SPDatabase databasename\r$db.Username = \"PlaceholderAccountName\"\r$db.Password = \"PlaceholderPassword\"\r$db.Update()\n\n`\n * Fixes the issue that affects the file path limit of 260 characters for the site collection that's hosted in a web application that's configured with multiple authentication methods.\n * Fixes an issue in which assigned badges don't render on discussions, in a My Membership web part, or a members list.\n * Fixes an issue in which shared columns in a document set are unexpectedly synchronized to a contained folder after the folder is renamed.\nThis update also contains fixes for the following issues. To fix these issues, you have to install KB 5001915 together with this update.\n\n * Fixes an issue in which a link is still added even though you select **Cancel **on the **Add a link** page in the site Edit navigation pane.\n * Fixes an issue in which the focus isn't clearly visible on an Activity list when high contrast mode is on.\n * Fixes an issue in which you can't activate a submenu drop-down box in scan mode.\n * Fixes an issue in which the Persona Component doesn't have the sufficient color contrast.\n * Fixes an issue in which the focus doesn't go to the first interactive element of the submenu in the Documents recent activity feed pane.\n * Fixes an issue in which attachments in a custom list can't be deleted.\n * Fixes an issue in which timestamps of comments are displayed as a link.\n * Fixes an issue in which the focus order is not correct on the Documents page in the Narrator scan mode.\n * Fixes an issue in which the screen reader is not announcing sufficient information for the \"about me\" menu in the upper-right corner of a site.\n * Fixes an issue in which the focus is not visible on the **Hide in SharePoint mobile app** checkbox in the **New link** dialog box.\nThis security update also contains a fix for the following nonsecurity issue in Microsoft Project Server 2019:\n * After you run the ExportWorkspaceItemsByDisplayName2019.sql script from the General Data Protection Regulation (GDPR) for Project Server, you can't find the OwnerUserClaimsAccount field in the query results.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<https://www.catalog.update.microsoft.com/Search.aspx?q=KB5001916>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001916 for the 64-bit version of SharePoint Server 2019](<http://www.microsoft.com/download/details.aspx?familyid=0036da36-a42a-47e3-855d-9485daf73539>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504716](<http://support.microsoft.com/kb/4504716>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nsts2019-kb5001916-fullfile-x64-glb.exe| | 4813DC9B0773667CA3F5844023BD416F0E14B69623D31C2D0D7B7E294C760655 \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nFor all supported x64-based versions of SharePoint Server 2019\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \naccsvcdp.dll| accsvcdp.dll| 16.0.10374.20000| 267672| 13-Apr-21| 07:56 \nmicrosoft.office.access.services.moss.dll| microsoft.office.access.services.moss.dll| 16.0.10374.20000| 767920| 13-Apr-21| 07:56 \nascalc.dll| ascalc.dll| 16.0.10374.20000| 972200| 13-Apr-21| 07:53 \nmicrosoft.office.access.server.application.dll| microsoft.office.access.server.application.dll| 16.0.10374.20000| 614840| 13-Apr-21| 07:53 \nmicrosoft.office.access.server.calculation.interop.dll| microsoft.office.access.server.calculation.interop.dll| 16.0.10374.20000| 62376| 13-Apr-21| 07:53 \nmicrosoft.office.access.server.dll| microsoft.office.access.server.dll| 16.0.10374.20000| 1410480| 13-Apr-21| 07:53 \naccsrv.layouts.root.accsrvscripts.js| accessserverscripts.js| | 575532| 13-Apr-21| 07:57 \nconversion.office.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nppt.conversion.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nppt.edit.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nwac.office.biplatserver.dll| biplatserver.dll| 16.0.10374.20000| 524712| 13-Apr-21| 07:57 \nconversion.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nppt.conversion.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nppt.edit.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nwac.office.chartserver.dll| chartserver.dll| 16.0.10374.20000| 16148912| 13-Apr-21| 07:56 \nprodfeat.xml| feature.xml| | 616| 13-Apr-21| 07:53 \naddgroup.asx| cmsslwpaddeditgroup.aspx| | 6406| 12-Apr-21| 03:35 \nastcmmn_js| assetcommon.js| | 18253| 13-Apr-21| 07:53 \nastpkrs_js| assetpickers.js| | 68292| 13-Apr-21| 07:53 \nsm.js| cmssitemanager.js| | 29279| 13-Apr-21| 07:53 \ncmssummarylinks_js| cmssummarylinks.js| | 6015| 13-Apr-21| 07:53 \neditmenu_js| editingmenu.js| | 11359| 13-Apr-21| 07:53 \nhierlist_js| hierarchicallistbox.js| | 30327| 13-Apr-21| 07:53 \nmediaplayer.js| mediaplayer.js| | 47725| 13-Apr-21| 07:53 \nptdlg.js| pickertreedialog.js| | 2950| 13-Apr-21| 07:53 \nselect_js| select.js| | 2387| 13-Apr-21| 07:53 \nslctctls_js| selectorcontrols.js| | 13288| 13-Apr-21| 07:53 \nserializ_js| serialize.js| | 3219| 13-Apr-21| 07:53 \nsp.ui.assetlibrary.ribbon.debug.js| sp.ui.assetlibrary.debug.js| | 13220| 13-Apr-21| 07:53 \nsp.ui.assetlibrary.js| sp.ui.assetlibrary.js| | 5367| 13-Apr-21| 07:53 \nsp.ui.pub.htmldesign.debug.js| sp.ui.pub.htmldesign.debug.js| | 38342| 13-Apr-21| 07:53 \nsp.ui.pub.htmldesign.js| sp.ui.pub.htmldesign.js| | 19407| 13-Apr-21| 07:53 \nsp.ui.pub.ribbon.debug.js| sp.ui.pub.ribbon.debug.js| | 146313| 13-Apr-21| 07:53 \nsp.ui.pub.ribbon.js| sp.ui.pub.ribbon.js| | 84979| 13-Apr-21| 07:53 \nsp.ui.rte.publishing.debug.js| sp.ui.rte.publishing.debug.js| | 98216| 13-Apr-21| 07:53 \nsp.ui.rte.publishing.js| sp.ui.rte.publishing.js| | 49716| 13-Apr-21| 07:53 \nsp.ui.spellcheck.debug.js| sp.ui.spellcheck.debug.js| | 68393| 13-Apr-21| 07:53 \nsp.ui.spellcheck.js| sp.ui.spellcheck.js| | 36522| 13-Apr-21| 07:53 \nsplchkpg_js| spellcheckentirepage.js| | 6653| 13-Apr-21| 07:53 \nspelchek_js| spellchecker.js| | 34657| 13-Apr-21| 07:53 \nvideoportal.js| videoportal.js| | 14742| 13-Apr-21| 07:53 \nmicrosoft.sharepoint.publishing.dll_isapi| microsoft.sharepoint.publishing.dll| 16.0.10374.20000| 5412808| 13-Apr-21| 07:53 \nsharepointpub.dll| microsoft.sharepoint.publishing.dll| 16.0.10374.20000| 5412808| 13-Apr-21| 07:53 \nsharepointpub_gac.dll| microsoft.sharepoint.publishing.dll| 16.0.10374.20000| 5412808| 13-Apr-21| 07:53 \nsppubint.dll| microsoft.sharepoint.publishing.intl.dll| 16.0.10374.20000| 350656| 13-Apr-21| 07:53 \nsppubint_gac.dll| microsoft.sharepoint.publishing.intl.dll| 16.0.10374.20000| 350656| 13-Apr-21| 07:53 \nschema.xml_pubresfeap| schema.xml| | 44173| 13-Apr-21| 07:56 \nasctyps.xml| assetcontenttypes.xml| | 2846| 13-Apr-21| 07:53 \nasctyps2.xml| assetcontenttypes2.xml| | 2460| 13-Apr-21| 07:53 \nasflds.xml| assetfields.xml| | 1366| 13-Apr-21| 07:53 \nasflds2.xml| assetfields2.xml| | 1045| 13-Apr-21| 07:53 \naslibalt.xml| assetlibrarytemplate.xml| | 555| 13-Apr-21| 07:53 \naslibft.xml| feature.xml| | 2763| 13-Apr-21| 07:53 \naslibui.xml| provisionedui.xml| | 5075| 13-Apr-21| 07:53 \naslibui2.xml| provisionedui2.xml| | 1708| 13-Apr-21| 07:53 \ncdsele.xml| contentdeploymentsource.xml| | 637| 13-Apr-21| 07:57 \ncdsfeatu.xml| feature.xml| | 604| 13-Apr-21| 07:57 \ndocmpgcv.xml| docmpageconverter.xml| | 496| 13-Apr-21| 07:53 \ndocxpgcv.xml| docxpageconverter.xml| | 496| 13-Apr-21| 07:53 \nconvfeat.xml| feature.xml| | 766| 13-Apr-21| 07:53 \nippagecv.xml| infopathpageconverter.xml| | 577| 13-Apr-21| 07:53 \nxslappcv.xml| xslapplicatorconverter.xml| | 575| 13-Apr-21| 07:53 \nanalyticsreports.xml| analyticsreports.xml| | 2850| 13-Apr-21| 07:57 \nxspsset.xml| catalogsitesettings.xml| | 556| 13-Apr-21| 07:57 \nxspfeat.xml| feature.xml| | 1514| 13-Apr-21| 07:57 \ndepoper.xml| deploymentoperations.xml| | 2415| 13-Apr-21| 07:53 \ndepfeat.xml| feature.xml| | 788| 13-Apr-21| 07:53 \npestset.xml| enhancedhtmlediting.xml| | 157| 13-Apr-21| 07:53 \npefeat.xml| feature.xml| | 793| 13-Apr-21| 07:52 \nenthmft.xml| feature.xml| | 564| 13-Apr-21| 07:53 \nenthmset.xml| themingsitesettings.xml| | 1005| 13-Apr-21| 07:53 \nenctb.xml| enterprisewikicontenttypebinding.xml| | 559| 13-Apr-21| 07:54 \nenctb2.xml| enterprisewikicontenttypebinding2.xml| | 390| 13-Apr-21| 07:54 \nenfet.xml| feature.xml| | 1168| 13-Apr-21| 07:54 \nenct.xml| enterprisewikicontenttypes.xml| | 1456| 13-Apr-21| 07:53 \nenct2.xml| enterprisewikicontenttypes2.xml| | 1211| 13-Apr-21| 07:53 \nenlayfet.xml| feature.xml| | 1618| 13-Apr-21| 07:53 \nprov.xml| provisionedfiles.xml| | 1181| 13-Apr-21| 07:53 \nprov2.xml| provisionedfiles2.xml| | 1197| 13-Apr-21| 07:53 \newiki2.xml| feature.xml| | 766| 13-Apr-21| 07:57 \nhtmlfeat.xml| feature.xml| | 11263| 13-Apr-21| 07:56 \nhtmlcolm.xml| htmldesigncolumns.xml| | 909| 13-Apr-21| 07:56 \nhtmlcol2.xml| htmldesigncolumns2.xml| | 543| 13-Apr-21| 07:56 \nhtmlcol3.xml| htmldesigncolumns3.xml| | 597| 13-Apr-21| 07:56 \nhtmlcont.xml| htmldesigncontenttypes.xml| | 2330| 13-Apr-21| 07:56 \nhtmlfile.xml| htmldesignfiles.xml| | 657| 13-Apr-21| 07:56 \nhtmlfil2.xml| htmldesignfiles2.xml| | 771| 13-Apr-21| 07:56 \nhtmlfil3.xml| htmldesignfiles3.xml| | 895| 13-Apr-21| 07:56 \nhtmldpui.xml| htmldesignprovisionedui.xml| | 669| 13-Apr-21| 07:56 \nhtmldrib.xml| htmldesignribbon.xml| | 29320| 13-Apr-21| 07:56 \nhtmldpct.xml| htmldisplaytemplatecontenttypes.xml| | 11361| 13-Apr-21| 07:56 \nhtmldpwp.xml| htmldisplaytemplatefiles.xml| | 9302| 13-Apr-21| 07:56 \nhtmldpwp10.xml| htmldisplaytemplatefiles10.xml| | 575| 13-Apr-21| 07:56 \nhtmldpwp11.xml| htmldisplaytemplatefiles11.xml| | 1091| 13-Apr-21| 07:56 \nhtmldpwp12.xml| htmldisplaytemplatefiles12.xml| | 401| 13-Apr-21| 07:56 \nhtmldpwp13.xml| htmldisplaytemplatefiles13.xml| | 396| 13-Apr-21| 07:56 \nhtmldpwp14.xml| htmldisplaytemplatefiles14.xml| | 856| 13-Apr-21| 07:56 \nhtmldpwp15.xml| htmldisplaytemplatefiles15.xml| | 492| 13-Apr-21| 07:56 \nhtmldpwp2.xml| htmldisplaytemplatefiles2.xml| | 830| 13-Apr-21| 07:56 \nhtmldpwp3.xml| htmldisplaytemplatefiles3.xml| | 497| 13-Apr-21| 07:56 \nhtmldpwp4.xml| htmldisplaytemplatefiles4.xml| | 496| 13-Apr-21| 07:56 \nhtmldpwp5.xml| htmldisplaytemplatefiles5.xml| | 506| 13-Apr-21| 07:56 \nhtmldpwp6.xml| htmldisplaytemplatefiles6.xml| | 412| 13-Apr-21| 07:56 \nhtmldpwp7.xml| htmldisplaytemplatefiles7.xml| | 4003| 13-Apr-21| 07:56 \nhtmldpwp8.xml| htmldisplaytemplatefiles8.xml| | 399| 13-Apr-21| 07:56 \nhtmldpwp9.xml| htmldisplaytemplatefiles9.xml| | 401| 13-Apr-21| 07:56 \nhtmldtcbs.xml| htmldisplaytemplatefilesoobcbs.xml| | 580| 13-Apr-21| 07:56 \nhtmldtqb.xml| htmldisplaytemplatefilesqb.xml| | 598| 13-Apr-21| 07:56 \nhtmldtqbref.xml| htmldisplaytemplatefilesqbref.xml| | 507| 13-Apr-21| 07:56 \nhtmldpwp_recs.xml| htmldisplaytemplatefilesrecs.xml| | 418| 13-Apr-21| 07:56 \nststngimplk.xml| sitesettingsimportlink.xml| | 667| 13-Apr-21| 07:56 \naltmp.xam| alternatemediaplayer.xaml| | 35634| 13-Apr-21| 07:54 \nmwpfeat.xml| feature.xml| | 940| 13-Apr-21| 07:54 \nmwpprovf.xml| provisionedfiles.xml| | 1457| 13-Apr-21| 07:54 \nmwpprovu.xml| provisionedui.xml| | 22914| 13-Apr-21| 07:54 \nmwpprovui2.xml| provisionedui2.xml| | 2690| 13-Apr-21| 07:54 \npnfeat.xml| feature.xml| | 782| 13-Apr-21| 07:55 \npnstset.xml| navigationsitesettings.xml| | 4721| 13-Apr-21| 07:55 \nplnfeat.xml| feature.xml| | 760| 13-Apr-21| 07:56 \nplnstset.xml| navigationsitesettings.xml| | 152| 13-Apr-21| 07:56 \ntpfeat.xml| feature.xml| | 2846| 13-Apr-21| 07:57 \ntpcls.xml| pointpublishingcolumns.xml| | 701| 13-Apr-21| 07:57 \ntpcts.xml| pointpublishingcontenttypes.xml| | 488| 13-Apr-21| 07:57 \ntptltsch.xml| schema.xml| | 4088| 13-Apr-21| 07:56 \npclts.xml| schema.xml| | 2354| 13-Apr-21| 07:52 \npcltf.xml| feature.xml| | 857| 13-Apr-21| 07:55 \npclt.xml| productcataloglisttemplate.xml| | 753| 13-Apr-21| 07:56 \npcfeat.xml| feature.xml| | 1699| 13-Apr-21| 07:56 \npccol.xml| productcatalogcolumns.xml| | 6259| 13-Apr-21| 07:56 \npcct.xml| productcatalogcontenttypes.xml| | 830| 13-Apr-21| 07:56 \npcct2.xml| productcatalogcontenttypes2.xml| | 643| 13-Apr-21| 07:55 \npcprov.xml| provisionedfiles.xml| | 926| 13-Apr-21| 07:56 \npubpubpf.xml| feature.xml| | 551| 13-Apr-21| 07:57 \npppptset.xml| portalsettings.xml| | 584| 13-Apr-21| 07:57 \nctconvst.xml| contenttypeconvertersettings.xml| | 511| 13-Apr-21| 07:54 \ndoclbset.xml| documentlibrarysettings.xml| | 524| 13-Apr-21| 07:54 \neditmenu.xml| editingmenu.xml| | 470| 13-Apr-21| 07:54 \npubfeat.xml| feature.xml| | 2696| 13-Apr-21| 07:54 \npaglttmp.xml| pageslisttemplate.xml| | 516| 13-Apr-21| 07:54 \nprovui.xml| provisionedui.xml| | 40574| 13-Apr-21| 07:54 \nprovui2.xml| provisionedui2.xml| | 1489| 13-Apr-21| 07:54 \nprovui3.xml| provisionedui3.xml| | 2135| 13-Apr-21| 07:54 \npubstset.xml| publishingsitesettings.xml| | 6235| 13-Apr-21| 07:54 \nregext.xml| regionalsettingsextensions.xml| | 328| 13-Apr-21| 07:54 \nsiteacmn.xml| siteactionmenucustomization.xml| | 646| 13-Apr-21| 07:54 \nvarflagc.xml| variationsflagcontrol.xml| | 473| 13-Apr-21| 07:54 \nvarnomin.xml| variationsnomination.xml| | 613| 13-Apr-21| 07:54 \npblyfeat.xml| feature.xml| | 6194| 13-Apr-21| 07:57 \npblyprovfile.xml| provisionedfiles.xml| | 7964| 13-Apr-21| 07:57 \npblyprovfile2.xml| provisionedfiles2.xml| | 610| 13-Apr-21| 07:57 \npblyprovfile4.xml| provisionedfiles4.xml| | 308| 13-Apr-21| 07:57 \npblyprovfile5.xml| provisionedfiles5.xml| | 414| 13-Apr-21| 07:57 \npblyprovfile6.xml| provisionedfiles6.xml| | 385| 13-Apr-21| 07:57 \npblyprovfile7.xml| provisionedfiles7.xml| | 1170| 13-Apr-21| 07:57 \npblyprovfile8.xml| provisionedfiles8.xml| | 507| 13-Apr-21| 07:57 \npblyprovui.xml| provisionedui.xml| | 11330| 13-Apr-21| 07:57 \nxspfeatlayouts.xml| searchboundpagelayouts.xml| | 3671| 13-Apr-21| 07:57 \npubmelem.xml| elements.xml| | 4149| 13-Apr-21| 07:53 \npubmele2.xml| elements2.xml| | 592| 13-Apr-21| 07:53 \npubmfeat.xml| feature.xml| | 1697| 13-Apr-21| 07:53 \npubmprui.xml| provisionedui.xml| | 1548| 13-Apr-21| 07:53 \npubmstng.xml| sitesettings.xml| | 670| 13-Apr-21| 07:53 \npubprft.xml| feature.xml| | 758| 13-Apr-21| 07:54 \npubrfeat.xml| feature.xml| | 4927| 13-Apr-21| 07:56 \nprovfile.xml| provisionedfiles.xml| | 4739| 13-Apr-21| 07:56 \nprovfl4.xml| provisionedfiles4.xml| | 1394| 13-Apr-21| 07:56 \npubrcol.xml| publishingcolumns.xml| | 20566| 13-Apr-21| 07:56 \npubrctt.xml| publishingcontenttypes.xml| | 12093| 13-Apr-21| 07:56 \npubrctt2.xml| publishingcontenttypes2.xml| | 304| 13-Apr-21| 07:56 \npubrctt3.xml| publishingcontenttypes3.xml| | 500| 13-Apr-21| 07:56 \npubrcont.xml| publishingcontrols.xml| | 405| 13-Apr-21| 07:56 \nprsset.xml| publishingresourcessitesettings.xml| | 3506| 13-Apr-21| 07:56 \nupgd1.xml| upgrade1.xml| | 548| 13-Apr-21| 07:56 \nupgd2.xml| upgrade2.xml| | 486| 13-Apr-21| 07:56 \nupgd3.xml| upgrade3.xml| | 600| 13-Apr-21| 07:56 \npubtfeat.xml| feature.xml| | 1477| 13-Apr-21| 07:57 \nrollplf.xml| feature.xml| | 862| 13-Apr-21| 07:54 \nrollplpf.xml| provisionedfiles.xml| | 14529| 13-Apr-21| 07:53 \nrollplct.xml| rolluppagecontenttype.xml| | 742| 13-Apr-21| 07:53 \nrollpf.xml| feature.xml| | 816| 13-Apr-21| 07:53 \nrollps.xml| rolluppagesettings.xml| | 4091| 13-Apr-21| 07:53 \nseofeatu.xml| feature.xml| | 1253| 13-Apr-21| 07:56 \nseoopt.xml| searchengineoptimization.xml| | 3578| 13-Apr-21| 07:56 \nseoopt1.xml| searchengineoptimization1.xml| | 2904| 13-Apr-21| 07:56 \nsppelm.xml| elements.xml| | 1843| 13-Apr-21| 07:56 \nsppfea.xml| feature.xml| | 1015| 13-Apr-21| 07:55 \nsaicona.xml| consoleaction.xml| | 412| 13-Apr-21| 07:56 \nsaifeat.xml| feature.xml| | 1324| 13-Apr-21| 07:56 \nsairibn.xml| ribbon.xml| | 2895| 13-Apr-21| 07:56 \nsaisset.xml| sitesettings.xml| | 584| 13-Apr-21| 07:56 \naddtheme.xml| additionalthemes.xml| | 3819| 13-Apr-21| 07:53 \nsbwcopa.xml| colorpalette.xml| | 4813| 13-Apr-21| 07:52 \nsbwcona.xml| consoleaction.xml| | 692| 13-Apr-21| 07:53 \nsbwct.xml| contenttypes.xml| | 4261| 13-Apr-21| 07:53 \nsbwdesba.xml| designbuilderaction.xml| | 444| 13-Apr-21| 07:53 \nsbwdesea.xml| designeditoraction.xml| | 438| 13-Apr-21| 07:53 \nsbwdpa.xml| designpackageactions.xml| | 418| 13-Apr-21| 07:53 \nsbwdpr.xml| designpreviewaction.xml| | 447| 13-Apr-21| 07:53 \nsbwdmt.xml| disablesystemmasterpagetheming.xml| | 436| 13-Apr-21| 07:53 \nsbwfeat.xml| feature.xml| | 6499| 13-Apr-21| 07:53 \nsbwinsdes.xml| installeddesigns.xml| | 536| 13-Apr-21| 07:53 \nsbwmob.xml| mobilechannel.xml| | 1098| 13-Apr-21| 07:53 \nsbwpagela.xml| pagelayouts.xml| | 4119| 13-Apr-21| 07:53 \nsbwpages.xml| pages.xml| | 13120| 13-Apr-21| 07:53 \npubblogwp.xml| publishingblogwebparts.xml| | 949| 13-Apr-21| 07:53 \nsbwqd.xml| quicklaunchdatasource.xml| | 685| 13-Apr-21| 07:53 \nsbwrb.xml| ribbon.xml| | 44107| 13-Apr-21| 07:53 \nsbwsearch.xml| search.xml| | 2352| 13-Apr-21| 07:52 \nsbwsc.xml| sitecolumns.xml| | 3579| 13-Apr-21| 07:53 \nsbwsec.xml| siteelementcontrols.xml| | 952| 13-Apr-21| 07:53 \nsbwss.xml| sitesettings.xml| | 14657| 13-Apr-21| 07:53 \nsbwcss.xml| styles.xml| | 625| 13-Apr-21| 07:53 \nsbwwps.xml| webparts.xml| | 509| 13-Apr-21| 07:53 \nsbwfsf.xml| feature.xml| | 708| 13-Apr-21| 07:53 \nscfeatr.xml| feature.xml| | 856| 13-Apr-21| 07:57 \nspelchek.xml| spellchecking.xml| | 1033| 13-Apr-21| 07:57 \nspelchk2.xml| spellchecking2.xml| | 2641| 13-Apr-21| 07:57 \ncms_tenantadmindeploymentlinksfeature_feature_xml| feature.xml| | 826| 13-Apr-21| 07:55 \ncms_tenantadmindeploymentlinksfeature_links_xml| links.xml| | 542| 13-Apr-21| 07:55 \ntopicplf.xml| feature.xml| | 732| 13-Apr-21| 07:55 \ntopicpf.xml| feature.xml| | 713| 13-Apr-21| 07:54 \nplnkfeat.xml| feature.xml| | 621| 13-Apr-21| 07:53 \npublcol.xml| publishedlinkscolumns.xml| | 1206| 13-Apr-21| 07:53 \npublctt.xml| publishedlinkscontenttypes.xml| | 948| 13-Apr-21| 07:53 \nv2vpblyfeat.xml| feature.xml| | 540| 13-Apr-21| 07:56 \nv2vpblyprovfil.xml| provisionedfiles.xml| | 1934| 13-Apr-21| 07:56 \nvwfrmlk.xml| feature.xml| | 794| 13-Apr-21| 07:54 \nxmlsfeat.xml| feature.xml| | 818| 13-Apr-21| 07:57 \nxmlsitem.xml| xmlsitemap.xml| | 624| 13-Apr-21| 07:57 \nmicrosoft.cobaltcore.dll| microsoft.cobaltcore.dll| 16.0.10374.20000| 3081640| 13-Apr-21| 07:54 \nmicrosoft.cobalt.base.dll| microsoft.cobalt.base.dll| 16.0.10374.20000| 874912| 13-Apr-21| 07:56 \nsystem.collections.immutable.dll| system.collections.immutable.dll| 4.6.23123.00| 193448| | \nupdate_system.collections.immutable.dll| system.collections.immutable.dll| 4.6.23123.00| 193448| 12-Apr-21| 03:25 \ncsisrv.dll| csisrv.dll| 16.0.10374.20000| 1283528| 13-Apr-21| 07:53 \ncsisrvexe.exe| csisrvexe.exe| 16.0.10374.20000| 328640| 13-Apr-21| 07:53 \nonfda.dll| onfda.dll| 16.0.10374.20000| 2096560| 13-Apr-21| 07:53 \ncolumnfiltering.ascx| columnfiltering.ascx| | 443| 13-Apr-21| 11:26 \ndocsettemplates.ascx| docsettemplates.ascx| | 1459| 13-Apr-21| 11:26 \nmetadatanavkeyfilters.ascx| metadatanavkeyfilters.ascx| | 4647| 13-Apr-21| 11:26 \nmetadatanavtree.ascx| metadatanavtree.ascx| | 2686| 13-Apr-21| 11:26 \nmultilangtemplates.ascx| transmgmtlibtemplates.ascx| | 3287| 13-Apr-21| 11:26 \nvideosettemplates.ascx| videosettemplates.ascx| | 1972| 13-Apr-21| 11:26 \nmicrosoft_office_server_conversions_launcher_exe| microsoft.office.server.conversions.launcher.exe| 16.0.10374.20000| 78744| 13-Apr-21| 11:26 \nmicrosoft_office_server_conversions_loadbalancer_exe| microsoft.office.server.conversions.loadbalancer.exe| 16.0.10374.20000| 37272| 13-Apr-21| 11:26 \nmicrosoft.office.server.conversions.dll| microsoft.office.server.conversions.dll| 16.0.10374.20000| 26504| 13-Apr-21| 11:26 \neditdlg.htm_multilang| editdlg.htm| | 4796| 13-Apr-21| 11:26 \nfiledlg.htm_multilang| filedlg.htm| | 3344| 13-Apr-21| 11:26 \nmicrosoft.office.documentmanagement.pages.dll| microsoft.office.documentmanagement.pages.dll| 16.0.10374.20000| 162184| 13-Apr-21| 11:26 \ndocsetversions.aspx| docsetversions.aspx| | 18741| 13-Apr-21| 11:26 \nsts_odspnextnewux28a4170101ed2c3b56c2de05294311b1| folder-small_flap_media.svg| | 2017| 21-Mar-21| 05:44 \nsts_odspnextnewux73a97fa9644604baf0e8c8e1a0ddfdec| folder-small_frontplate_nopreview.svg| | 2017| 21-Mar-21| 05:44 \nsts_odspnextnewux560fb09bbdefe4a825b09a4a5b42cc1f| folder-small_frontplate_thumbnail.svg| | 2228| 21-Mar-21| 05:44 \nsts_odspnextnewuxfdd387718603b45572c38b0e683a7582| lg-bg.svg| | 1176| 21-Mar-21| 05:44 \nsts_odspnextnewux217c5f49b970807caa544557a4c23025| lg-fg.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewux8c1b0581379a0695a2a49d4118c0caea| lg-fg-media.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewux92d12eb802e7c5644df24bfa3b531c73| sm-bg.svg| | 1129| 21-Mar-21| 05:44 \nsts_odspnextnewux99e54461762d5614d2c71eecc45a942b| sm-fg.svg| | 888| 21-Mar-21| 05:44 \nsts_odspnextnewuxfeb755d64021af10cd2cfc56915ea5d5| sm-fg-media.svg| | 866| 21-Mar-21| 05:44 \nsts_odspnextnewuxee5697f761f94ca16ffd86a4ef02d1a8| recyclebindeferred.js| | 3138043| 10-Apr-21| 08:03 \nsts_odspnextnewux759803f73d82cd669caf6d930c79a020| recyclebinexecutors.js| | 616921| 10-Apr-21| 08:03 \nsts_odspnextnewux736776bec9f6c6dad2f7dda661dc3dfd| recyclebinreactcontrols.js| | 317587| 10-Apr-21| 08:03 \nsts_odspnextnewux93b96c9ec083c1109a79bd3123411cdf| recyclebinscenario.js| | 516383| 21-Mar-21| 05:44 \nsts_odspnextnewux14b2229aa8737494be04fb698fedbc8d| sitehub.js| | 372523| 10-Apr-21| 08:03 \nsts_odspnextnewuxb8931dbbdb97beb330defb6bad1ae332| sitehubdeferred.js| | 2418464| 10-Apr-21| 08:03 \nsts_odspnextnewuxbed2e8db2e84613293dad61e0584dfb2| sitehubexecutors.js| | 759963| 21-Mar-21| 05:44 \nsts_odspnextnewuxafb6081087eefbfe800401ef617122bd| sitehubreactcontrolsbeforeplt.js| | 1455143| 10-Apr-21| 08:03 \nsts_odspnextnewux72bfe35ac1f8fee6cf37ba0be87c481a| sitehubreactcontrolsdeferred.js| | 40363| 21-Mar-21| 05:44 \nsts_odspnextnewux301104ef8046861277fc65372887860d| siteusage.js| | 416367| 10-Apr-21| 08:03 \nsts_odspnextnewuxd4f616ce0ce5d815121f4cb904bab0b2| splist.js| | 853547| 21-Mar-21| 05:44 \nsts_odspnextnewux75199cdb9d900d5ff11f7782399cb17f| splistdeferred.js| | 2264888| 10-Apr-21| 08:03 \nsts_odspnextnewux506c878c67f39538b69ab51117ced233| splistdeferredexpress.js| | 1644946| 10-Apr-21| 08:03 \nsts_odspnextnewuxdc9ebd6c43507fcad50632f22cb166c4| splistexecutors.js| | 386520| 21-Mar-21| 05:44 \nsts_odspnextnewux643043514490c475b8e63daa45587cfb| splistreactcontrolsbeforeplt.js| | 263195| 21-Mar-21| 05:44 \nsts_odspnextnewux95c14b220e8e6a345ca52833f517b678| splistreactcontrolsdeferred.js| | 289667| 10-Apr-21| 08:03 \nsts_odspnextnewux30484b0717864b439efabcb4caaf6538| spoapp.js| | 272977| 21-Mar-21| 05:44 \nsts_odspnextnewuxb680d3a8e2013810dae29dafe4d75340| spofiles.js| | 610898| 21-Mar-21| 05:44 \nsts_odspnextnewuxceea7ee2c5681d1ddacc2916754e6b3b| spooneup.js| | 377558| 21-Mar-21| 05:44 \nsts_odspnextnewuxa1bba3f539805635ed1b4d1828dbd548| spouploadmanager.js| | 71254| 21-Mar-21| 05:44 \nsts_spclientnewux11247c610eb2b35fec6b7d74a26c38f0| 0.0.js| | 398482| 10-Apr-21| 08:03 \nsts_spclientnewuxe5f4fb44132db455bfc5684abc91d769| 0.contentrollupwebpart-propertypanesettings.js| | 13836| 10-Apr-21| 08:03 \nsts_spclientnewuxf8f9524d7aede8aa27335bd307d3283c| 0.developer-tools.js| | 482459| 10-Apr-21| 08:03 \nsts_spclientnewux8f54e1232a604b66101d785f00e07c5d| 0.image-gallery-edit-mode.js| | 39729| 10-Apr-21| 08:03 \nsts_spclientnewuxff8815132906d9df7e1085f59343125e| 0.legacy-third-party-fabric-core.js| | 240168| 21-Mar-21| 05:44 \nsts_spclientnewuxd03d39b7bc05077c4ac3479593f09e2c| 0.live-persona-card-loader.js| | 106951| 21-Mar-21| 05:44 \nsts_spclientnewux10b60c752308e4797414cc1592352c08| 0.page-picker-component.js| | 135945| 10-Apr-21| 08:03 \nsts_spclientnewuxe567272b5c2a010aa70b17e8c313858a| 0.quick-links-property-pane.js| | 13168| 10-Apr-21| 08:03 \nsts_spclientnewux5b94fcc774f1d14f356a8939ad0c76cf| 0.sp-filepickercontrol.js| | 286178| 10-Apr-21| 08:03 \nsts_spclientnewux1a0dd8556ea12fdfdce46c1b97bf966d| 0.sp-pages-panels.js| | 636681| 10-Apr-21| 08:03 \nsts_spclientnewuxf51e90850f93328c38d84d1e68d27fb3| 0.sp-people-contact-card.js| | 13725| 10-Apr-21| 08:03 \nsts_spclientnewux892018044204a190e9f581edcd620dae| 0.sp-rte-propertypane.js| | 39875| 10-Apr-21| 08:03 \nsts_spclientnewuxe8964dd3d437ce4f33115b3bc0557c72| 0.sp-webpart-base-propertypane.js| | 130210| 10-Apr-21| 08:03 \nsts_spclientnewux6bcd61d2c5362c6320b3a14b80a5b5a8| 0.toolbox.js| | 34942| 10-Apr-21| 08:03 \nsts_spclientnewux48cae7c08b68c5b16fa6bb6d1d734fe3| 0ef418ba-5d19-4ade-9db0-b339873291d0.json| | 12533| 10-Apr-21| 08:03 \nsts_spclientnewux1f88042f059a10dcc631cc92435f2162| 1.1.js| | 14524| 21-Mar-21| 05:44 \nsts_spclientnewux0c482d383b518aa8956558dbdc75bd48| 1.debug-prompt-components.js| | 342348| 10-Apr-21| 08:03 \nsts_spclientnewuxb2f3b0a56c9ef61cd2b5cfa27b5fc37e| 1.people-property-pane.js| | 2745| 21-Mar-21| 05:44 \nsts_spclientnewuxe45badc655897ae1f90884f5a1a97ee7| 1.sp-pages-comments.js| | 99693| 10-Apr-21| 08:03 \nsts_spclientnewuxb2c3d8de1fdcb7cca7c4b2044da486f5| 1.sp-title-region-webpart-edit-mode.js| | 5423| 10-Apr-21| 08:03 \nsts_spclientnewux62046735201d3091111f28556666e654| 1.sp-webpart-base-maintenancemode.js| | 4830| 10-Apr-21| 08:03 \nsts_spclientnewuxf9441b622f01689f522ab5fb5fe73335| 1.twitter-web-part-property-pane-configuration.js| | 4502| 10-Apr-21| 08:03 \nsts_spclientnewux41d07474eaad6a249c862dbff5fab353| 10.10.js| | 15664| 21-Mar-21| 05:44 \nsts_spclientnewux2640b3a11359099d8bdf5c5c5f8d0e69| 10.sp-pages-search.js| | 1795915| 10-Apr-21| 08:03 \nsts_spclientnewuxce961279a04d1e9bccb6d8ad5f571796| 11.11.js| | 1285| 21-Mar-21| 05:44 \nsts_spclientnewuxe55cf1ad4778c2077dbf827d2685ec68| 11.sp-pages-service.js| | 111866| 21-Mar-21| 05:44 \nsts_spclientnewux889e4440a3ddc053863f3696a06989bb| 12.12.js| | 1829| 21-Mar-21| 05:44 \nsts_spclientnewuxa36a04dce9a2a71bf262086728c8fca4| 12.sp-news-digest-layout-component.js| | 78475| 10-Apr-21| 08:03 \nsts_spclientnewux2c83e4872ef1e9ff80fe92bd21ba887c| 13.13.js| | 1154| 21-Mar-21| 05:44 \nsts_spclientnewux0abc9921c94a0185a26543546fe69bf9| 13.sp-command-bar.js| | 85469| 10-Apr-21| 08:03 \nsts_spclientnewux02828a3e864c89d73895cd73034ff255| 14.14.js| | 2736| 21-Mar-21| 05:44 \nsts_spclientnewux5fc507cbbaf792d92d7c965bf98229fb| 14.sp-pages-news.js| | 33108| 10-Apr-21| 08:03 \nsts_spclientnewuxff81272d188ed22f063786fc806b6676| 15.15.js| | 2437| 21-Mar-21| 05:44 \nsts_spclientnewux04433df09825dcc90ce9d666db6a231d| 15.odsp-datasources.js| | 33247| 21-Mar-21| 05:44 \nsts_spclientnewuxfae2c3c1e5e77fdb095806d57713a906| 16.16.js| | 1364| 21-Mar-21| 05:44 \nsts_spclientnewux0ac00e19bb36ceac5b16c783f9c57697| 16.sp-pages-sitesseeall.js| | 10059| 10-Apr-21| 08:03 \nsts_spclientnewux0e37c89b1861312b41dbbb30777d87e8| 17.17.js| | 1255| 21-Mar-21| 05:44 \nsts_spclientnewux34bd612300838bb534ab17b955244e64| 17.sp-pages-seeall.js| | 10003| 10-Apr-21| 08:03 \nsts_spclientnewux7e1e2bea49fc00a6adbc89e9987c0963| 18.18.js| | 3528| 21-Mar-21| 05:44 \nsts_spclientnewux703f83fa82314d3646b6336ccfc68c7d| 18.sp-pages-firstrun.js| | 21481| 10-Apr-21| 08:03 \nsts_spclientnewux12874335eb7bbf6e4065aedb0ef64952| 19.19.js| | 334| 21-Mar-21| 05:44 \nsts_spclientnewux7ba0584c61764c54362d49e256636a60| 2.herowebpart-propertypaneconfiguration.js| | 20379| 10-Apr-21| 08:03 \nsts_spclientnewux4ae937081b814e011b3a30f8781ff6a0| 2.sp-list-webpart-setup.js| | 4226| 10-Apr-21| 08:03 \nsts_spclientnewuxd27a762a6f595ea2f447ab2d8ec565da| 2.sp-pages-social.js| | 50017| 10-Apr-21| 08:03 \nsts_spclientnewux959911483362095cb4dd9eb7c9975bc7| 20.20.js| | 1809| 21-Mar-21| 05:44 \nsts_spclientnewuxe24fd72f1cbfb12913e16ac1df4cdcb5| 20745d7d-8581-4a6c-bf26-68279bc123fc.json| | 12654| 10-Apr-21| 08:03 \nsts_spclientnewux7e9feb247bd54a5bb28e3fc5a1539310| 21.21.js| | 3305| 21-Mar-21| 05:44 \nsts_spclientnewux52b9b523aa83665cd001252b93e94ac1| 2161a1c6-db61-4731-b97c-3cdb303f7cbb.json| | 13230| 10-Apr-21| 08:03 \nsts_spclientnewux85f0f717a8093f6e3b01469c62ed8283| 22.22.js| | 2042| 21-Mar-21| 05:44 \nsts_spclientnewux401fd8351c028dd61da35791e25970db| 22.sp-pages-uservoice.js| | 11249| 21-Mar-21| 05:44 \nsts_spclientnewux427709c4b6b83889860a7669c248e340| 23.23.js| | 2780| 21-Mar-21| 05:44 \nsts_spclientnewuxc54eccabfa9009b899cb953abfdf678f| 23.sp-pages-planner.js| | 3542| 10-Apr-21| 08:03 \nsts_spclientnewux43f114275e211f71a6aa28582376f682| 24.24.js| | 1346| 21-Mar-21| 05:44 \nsts_spclientnewuxf6dfe077c4098d2785be12a31e5473d2| 24.sp-pages-mobileupsellview.js| | 1782| 10-Apr-21| 08:03 \nsts_spclientnewuxf6f7df5704468d218c5f3b26fe863bd9| 243166f5-4dc3-4fe2-9df2-a7971b546a0a.json| | 6971| 10-Apr-21| 08:03 \nsts_spclientnewux208981fead3354ada0b720ecfcf4adf3| 25.25.js| | 1313| 21-Mar-21| 05:44 \nsts_spclientnewuxc81847f87b94153a324bd86419f281a7| 25.sp-pages-app.js| | 1875| 10-Apr-21| 08:03 \nsts_spclientnewuxbf4a9d8327022f52c08fc0b8b827fdb6| 26.26.js| | 927| 21-Mar-21| 05:44 \nsts_spclientnewux885bed98cc2c8a6a50ccff7712d30be2| 26.sp-pages-flow.js| | 62267| 21-Mar-21| 05:44 \nsts_spclientnewuxbcc2e41034699e20bab148d3e4a71ba0| 27.27.js| | 1124| 21-Mar-21| 05:44 \nsts_spclientnewux1a6632074e8c351e24f3b2938f603736| 27.editnavchunk.js| | 59395| 10-Apr-21| 08:03 \nsts_spclientnewuxffbcf313abc7966e7e6a8b536675bbe5| 275c0095-a77e-4f6d-a2a0-6a7626911518.json| | 21207| 10-Apr-21| 08:03 \nsts_spclientnewux7ac3cb45c89324cbe52bbdcfc0898043| 28.28.js| | 1684| 21-Mar-21| 05:44 \nsts_spclientnewux9410bcb4de7701afa0ace4d4e855cfc5| 28.sp-pages-newpagedialog.js| | 36075| 10-Apr-21| 08:03 \nsts_spclientnewuxd9fd2b17e7320f97ce6affe2e9c7eab7| 29.officebrowserfeedback-floodgate.js| | 403227| 21-Mar-21| 05:44 \nsts_spclientnewux36bc50758605996dd2de21816e72ee1b| 2ba60960-c928-4ae5-9bb2-f40c17c611b8.json| | 13174| 10-Apr-21| 08:03 \nsts_spclientnewux0ebe3b2589e383ae358631657a956c04| 2e57bdfd-b419-4536-8fc1-e0681be4c1a6.json| | 13203| 10-Apr-21| 08:03 \nsts_spclientnewux9002d42808bdc96a0128827a146586b0| 3.3.js| | 53134| 21-Mar-21| 05:44 \nsts_spclientnewux263fefdcdce7237f0c86c5e707b0cb41| 3.sp-imageeditcontrol.js| | 27070| 10-Apr-21| 08:03 \nsts_spclientnewux97cf7a0b7f088024120f36c9581e9186| 3.sp-pages-events.js| | 203036| 10-Apr-21| 08:03 \nsts_spclientnewuxd021e3ca9b9233f9d967372d073cf77b| 30.sp-pages-pagestatusnotifier.js| | 2550| 10-Apr-21| 08:03 \nsts_spclientnewuxc566a0d999b605794c7046a4418c5166| 31.sp-pages-newsdigest-navbar.js| | 2232| 10-Apr-21| 08:03 \nsts_spclientnewuxb86635d3446dedd3ac668ca110311406| 31e9537e-f9dc-40a4-8834-0e3b7df418bc.json| | 14677| 10-Apr-21| 08:03 \nsts_spclientnewux25567c008f252c3716b1d7bc25a0a230| 32.oauth-token-data-source.js| | 9489| 21-Mar-21| 05:44 \nsts_spclientnewux7c1f37bee238bcafc089f9dbf053a981| 33.sp-pages-migrateblogdialog.js| | 9832| 21-Mar-21| 05:44 \nsts_spclientnewux07d34bca797f60c1a73b0d1676b500e5| 39c4c1c2-63fa-41be-8cc2-f6c0b49b253d.json| | 12263| 10-Apr-21| 08:03 \nsts_spclientnewux055932804d22159a348485cfa217e4f6| 4.4.js| | 7092| 21-Mar-21| 05:44 \nsts_spclientnewux58e18b3d801d33325553bb31ac88885c| 4.image-gallery-light-box.js| | 6463| 10-Apr-21| 08:03 \nsts_spclientnewuxe2421af58d3d88a988faa8ba86b4adba| 4.sp-pages-sharebyemail.js| | 77643| 10-Apr-21| 08:03 \nsts_spclientnewux342db9533a3215a3913c429babe7abdc| 46698648-fcd5-41fc-9526-c7f7b2ace919.json| | 13806| 10-Apr-21| 08:03 \nsts_spclientnewux158a628d96eef5d6058dbfae15012eca| 490d7c76-1824-45b2-9de3-676421c997fa.json| | 15352| 10-Apr-21| 08:03 \nsts_spclientnewuxfc1c21929fc4bc49c3ed006279e9ffcf| 5.5.js| | 4658| 21-Mar-21| 05:44 \nsts_spclientnewuxfb61b8977a1e1fb434df06105e16277f| 5.sp-pages-navigation.js| | 19604| 10-Apr-21| 08:03 \nsts_spclientnewux4986186266f727199b59946626fb8518| 544dd15b-cf3c-441b-96da-004d5a8cea1d.json| | 13834| 10-Apr-21| 08:03 \nsts_spclientnewux2ca3bbec796cba926a39b7ae922c3e53| 6.6.js| | 1062| 21-Mar-21| 05:44 \nsts_spclientnewux4d9926c72355629935d2adcd87c2211d| 6.sp-pages-statemanager.js| | 50866| 21-Mar-21| 05:44 \nsts_spclientnewuxb907f5fcee962e6ea16d517b503603f4| 6410b3b6-d440-4663-8744-378976dc041e.json| | 15198| 10-Apr-21| 08:03 \nsts_spclientnewux9947ff60b8287e06021dd8602e52a729| 6676088b-e28e-4a90-b9cb-d0d0303cd2eb.json| | 14484| 10-Apr-21| 08:03 \nsts_spclientnewuxe573e1c43b252eac8631cfe75d0d91db| 7.7.js| | 1036| 21-Mar-21| 05:44 \nsts_spclientnewux868be7c5142528b6fecf08512ca55648| 7.siteheaderdeferredchunk.js| | 5182| 21-Mar-21| 05:44 \nsts_spclientnewux87639a606cb4eff65fc640a791358fab| 71c19a43-d08c-4178-8218-4df8554c0b0e.json| | 14978| 10-Apr-21| 08:03 \nsts_spclientnewuxa2e20ea074942a4b9cd5953a7cf70276| 7f718435-ee4d-431c-bdbf-9c4ff326f46e.json| | 13553| 10-Apr-21| 08:03 \nsts_spclientnewuxc1cc208490839b3b2af5bf834aac4571| 8.8.js| | 1108| 21-Mar-21| 05:44 \nsts_spclientnewux02a02097d6ed870b775f256f6f0651ec| 8.onepagenavigation-todoclib.js| | 13259| 21-Mar-21| 05:44 \nsts_spclientnewux7b48f61cb957c98d82358746f12289b0| 8654b779-4886-46d4-8ffb-b5ed960ee986.json| | 12583| 10-Apr-21| 08:03 \nsts_spclientnewux1496efe075e30075e96a884d8a074cd1| 893a257e-9c92-49bc-8a36-2f6bb058da34.json| | 141748| 10-Apr-21| 08:03 \nsts_spclientnewuxc5a328833cf912cc5b9867a481094c28| 8c88f208-6c77-4bdb-86a0-0c47b4316588.json| | 12200| 10-Apr-21| 08:03 \nsts_spclientnewuxc1d0be5dcd5e70e48e514cd3645961f4| 9.9.js| | 5393| 21-Mar-21| 05:44 \nsts_spclientnewuxa7df2052c2e0346723a7875f2e78139d| 9.sp-pages-teamstab.js| | 111372| 10-Apr-21| 08:03 \nsts_spclientnewuxcace392aa7eeb0215447d8373ed109d9| 91a50c94-865f-4f5c-8b4e-e49659e69772.json| | 15541| 10-Apr-21| 08:03 \nsts_spclientnewux0682b2fe8e8e6f7cccca4db9a0c29990| 9d7e898c-f1bb-473a-9ace-8b415036578b.json| | 13841| 10-Apr-21| 08:03 \nsts_spclientnewux0fdddb1f7d99376230fe4d4bb49759c8| a5df8fdf-b508-4b66-98a6-d83bc2597f63.json| | 12061| 10-Apr-21| 08:03 \nsts_spclientnewux9b063290a30a8d5d00ea6c82b1f584dd| accdb_16x1_29eca36a7511b70d241d15c0481802cb.png| | 1455| 21-Mar-21| 05:44 \nsts_spclientnewuxf8b36b9a2392f853c12870aca6c08bcb| accdb_16x1_5_2e9a20b483165dae071683e917b3d650.png| | 1563| 21-Mar-21| 05:44 \nsts_spclientnewux6c988bc2126a0c97acc4b91a081b0dc7| accdb_16x2_4232770535c4bfe73d627e871f1b5205.png| | 622| 21-Mar-21| 05:44 \nsts_spclientnewuxac36d113a5cd18c05cc6dce91a26c516| accdb_16x3_4e737595845a04d204c0cd9b44e62876.png| | 803| 21-Mar-21| 05:44 \nsts_spclientnewuxc9082699c347824d9fdf93859d418569| accdb_48x1_5_865a0ff81a029dcfd49cd1e60f2b7bd4.png| | 1991| 21-Mar-21| 05:44 \nsts_spclientnewux2370ef46b4e0aa0a373b5eed1ec4d2d6| accdb_48x1_c19b676f9fab42cad41c9de7b66f3714.png| | 1747| 21-Mar-21| 05:44 \nsts_spclientnewux3f805a435e986a8afd79fff40690df0c| accdb_48x2_b6485e369bd8ec0b44da26a1e4e4cd1c.png| | 1165| 21-Mar-21| 05:44 \nsts_spclientnewux16937efe9fa9f372232c83850229a907| accdb_48x3_806989e96dd3338dc0d9878a786227b3.png| | 1628| 21-Mar-21| 05:44 \nsts_spclientnewux5c01a47d8d1a98c972d11381a56a4485| accdb_96x1_5_2c340919026c41d0650324c6488f17c3.png| | 1592| 21-Mar-21| 05:44 \nsts_spclientnewuxfe54f2cfae0e89651a21c9ec976e4887| accdb_96x1_6dced4441105144a031c4e81f0c92e4e.png| | 2141| 21-Mar-21| 05:44 \nsts_spclientnewuxc2afa7d8529997c56a4e51d04983e222| accdb_96x2_f19a240c216041f8340b2359f6e29f04.png| | 2803| 21-Mar-21| 05:44 \nsts_spclientnewux2ed5d89277491e397d6ec3b71250fae1| accdb_96x3_8e8b5adf844ef4312e7d931766334f45.png| | 3608| 21-Mar-21| 05:44 \nsts_spclientnewux14c8fe43cdc82d9d166d701bd836b8ec| access_16x1_5_6948cb3cea4684b50b85de45f9b82037.png| | 563| 21-Mar-21| 05:44 \nsts_spclientnewux3c2fdf4bd33157d4a3386eefb4744580| access_16x1_653b762c1ed72b0cd5b2164c7a35061d.png| | 420| 21-Mar-21| 05:44 \nsts_spclientnewuxd8f6bfd86b57ea434499bd89e9f22486| access_16x2_5b6264abef342b1f7dc79a4dee157bba.png| | 748| 21-Mar-21| 05:44 \nsts_spclientnewux6890f53aa7f13964d849f8ec6de01de2| access_16x3_b551babd1e8a6affdc154783705f5b1b.png| | 1949| 21-Mar-21| 05:44 \nsts_spclientnewux7f88e1613b37e837b95938a039151a46| access_48x1_5_87c3cb72d13b5a1db3c5ab9f6964639e.png| | 3091| 21-Mar-21| 05:44 \nsts_spclientnewuxc583ff03963ae5cc3195ec74400299a5| access_48x1_b551babd1e8a6affdc154783705f5b1b.png| | 1949| 21-Mar-21| 05:44 \nsts_spclientnewuxe03ddd3385bd20a0bbbdd68ea08b7d64| access_48x2_acaeab4e1dc07494d3c12508ee54e87e.png| | 4121| 21-Mar-21| 05:44 \nsts_spclientnewux8c1601cd0029740cd2e28ec325ddfde6| access_48x3_41d48725aebf48317d44ac138398cbb2.png| | 6499| 21-Mar-21| 05:44 \nsts_spclientnewux8a29272c7a6e1b22baa47e2a554fdbb4| access_96x1_5_87396554873581bffca1ab0bcd2e6d00.png| | 6442| 21-Mar-21| 05:44 \nsts_spclientnewuxfad8527840cb2dba2ea883f4c0ee1311| access_96x1_bb9c816b5bf213c6ac5babe26ba5e7df.png| | 4114| 21-Mar-21| 05:44 \nsts_spclientnewux0cc4b0020573f648597e787d81ed8b05| access_96x2_8614021e7b018cb8dbe7f3f4ca35fd60.png| | 8391| 21-Mar-21| 05:44 \nsts_spclientnewux11ad913a5bc7fde805672e3c890114ed| access_96x3_01528343f06f9f32762c2196fa40279f.png| | 13652| 21-Mar-21| 05:44 \nsts_spclientnewuxcf9063f036a2e975629266aaa103d655| af8be689-990e-492a-81f7-ba3e4cd3ed9c.json| | 15397| 10-Apr-21| 08:03 \nsts_spclientnewuxd98a7a0da89134c14b2cda056449e632| b19b3b9e-8d13-4fec-a93c-401a091c0707.json| | 15301| 10-Apr-21| 08:03 \nsts_spclientnewux79892d83bd937bf01186bd091972e9a1| b7dd04e1-19ce-4b24-9132-b60a1c2b910d.json| | 23126| 10-Apr-21| 08:03 \nsts_spclientnewuxf5e9c8e2184df5b63ca16f1319fa7960| c4bd7b2f-7b6e-4599-8485-16504575f590.json| | 15854| 10-Apr-21| 08:03 \nsts_spclientnewux7e3c7f016142a2f71b28f9d75fc43958| c70391ea-0b10-4ee9-b2b4-006d3fcad0cd.json| | 14970| 10-Apr-21| 08:03 \nsts_spclientnewux408dd0ffcb6b1d88eceefc32163a8518| cbe7b0a9-3504-44dd-a3a3-0e5cacd07788.json| | 14195| 10-Apr-21| 08:03 \nsts_spclientnewuxa3264eecc8f003b168703c1a15995ffa| csv_16x1_4fc16f1723ce4839abdc01f2a901a384.png| | 1477| 21-Mar-21| 05:44 \nsts_spclientnewuxe4618744896cc0d2c40cea603b3b11fb| csv_16x1_5_4dabadab978dd4d83fe47c01e7d23573.png| | 1641| 21-Mar-21| 05:44 \nsts_spclientnewux67f4b89c4654d5a85a60833cf03840bf| csv_16x2_1e5c3167954f56367fa27253c6c56144.png| | 1592| 21-Mar-21| 05:44 \nsts_spclientnewuxe3baff1c9491c7372651ec160e90bb27| csv_16x3_28cdb33a6661b3b060346f31c621495c.png| | 1126| 21-Mar-21| 05:44 \nsts_spclientnewuxfc3f482373df3b4e21bb588dfe2b3155| csv_48x1_07020046013917eefc2be8e1787e9dca.png| | 2027| 21-Mar-21| 05:44 \nsts_spclientnewux9bad21b1c841989e60f9a6df3c789647| csv_48x1_5_d148f7369cd5f3a4d477c5d700fee676.png| | 2321| 21-Mar-21| 05:44 \nsts_spclientnewux4b4a142b159d2e966313038af60d456a| csv_48x2_545383d43974d4a65fb68bd817b54e96.png| | 1769| 21-Mar-21| 05:44 \nsts_spclientnewux1229ccefbc054024523b33fa2629da8b| csv_48x3_de84df743754e9d08851968fcc5c7d12.png| | 2506| 21-Mar-21| 05:44 \nsts_spclientnewuxacf8a484c11f82e55a95826f8f58c551| csv_96x1_5_0518cee3f9d6daa79587500a2ddd5684.png| | 2297| 21-Mar-21| 05:44 \nsts_spclientnewux58d27833e08d1ab492107cc61e123a71| csv_96x1_a70e1383d349d396443bb39efff139ef.png| | 2517| 21-Mar-21| 05:44 \nsts_spclientnewux730859dcb6287e5d9157e4bbff6a941a| csv_96x2_79e6a3717c2033276d4fc5cc74ccecd3.png| | 2850| 21-Mar-21| 05:44 \nsts_spclientnewux7969046426b5a254c6d2a41bc2147e0f| csv_96x3_f8c424976012461927df153d46e9674d.png| | 4326| 21-Mar-21| 05:44 \nsts_spclientnewuxe04b7ba5c57d6efdd1b3f023a9afd70f| d1d91016-032f-456d-98a4-721247c305e8.json| | 12829| 10-Apr-21| 08:03 \nsts_spclientnewuxe0de0464927d19518f48aaff08ed2ad1| daf0b71c-6de8-4ef7-b511-faae7c388708.json| | 17481| 10-Apr-21| 08:03 \nsts_spclientnewuxa08a88a1a20d60fc6fa9f6eecf78666e| embed-webpart-base.js| | 47158| 10-Apr-21| 08:03 \nsts_spclientnewux1248484f0eaf072567b2270eb74e2a1f| listview-host-assembly.js| | 725391| 10-Apr-21| 08:03 \nsts_spclientnewuxa8c9aa3afb3e1858c4883c80b87b0886| sp-application-base.js| | 89558| 10-Apr-21| 08:03 \nsts_spclientnewux26dacaeae91404692b5c89ca58e6ef98| sp-bing-map-webpart-bundle.js| | 74178| 10-Apr-21| 08:03 \nediscoveryquerystatistics.ascx| ediscoveryquerystatistics.ascx| | 1357| 13-Apr-21| 11:26 \nediscoverytemplate.ascx| ediscoverytemplate.ascx| | 3267| 13-Apr-21| 11:26 \nmicrosoft.office.mhtexport.dll| microsoft.office.mhtexport.dll| 16.0.10374.20000| 28048| 13-Apr-21| 11:26 \npdfirml.dll_0002| microsoft.office.irm.pdfprotectorlib.dll| 16.0.10374.20000| 1308560| 13-Apr-21| 11:26 \nmicrosoft.office.documentmanagement.dll| microsoft.office.documentmanagement.dll| 16.0.10374.20000| 567704| 13-Apr-21| 11:26 \nmicrosoft.office.documentmanagement.dll_isapi| microsoft.office.documentmanagement.dll| 16.0.10374.20000| 567704| 13-Apr-21| 11:26 \nmopap.dll| microsoft.office.policy.adminpages.dll| 16.0.10374.20000| 27528| 13-Apr-21| 11:26 \nbarcodeglobalsettings.ascx| barcodeglobalsettings.ascx| | 1473| 13-Apr-21| 11:26 \nbargensettings.ascx| bargensettings.ascx| | 1523| 13-Apr-21| 11:26 \ndropoffzoneroutingform.ascx| dropoffzoneroutingform.ascx| | 3528| 13-Apr-21| 11:26 \ndefault.aspx_edcons| default.aspx| | 4619| 13-Apr-21| 11:26 \nrecordsribbon.ascx| recordsribbon.ascx| | 367| 13-Apr-21| 11:26 \nmicrosoft.office.policy.dll| microsoft.office.policy.dll| 16.0.10374.20000| 2383752| 13-Apr-21| 11:26 \nmicrosoft.office.policy.dll_isapi| microsoft.office.policy.dll| 16.0.10374.20000| 2383752| 13-Apr-21| 11:26 \nmicrosoft.office.policy.pages.dll| microsoft.office.policy.pages.dll| 16.0.10374.20000| 538512| 13-Apr-21| 11:26 \nauditcustquery.ascx| auditcustomquery.ascx| | 11154| 13-Apr-21| 11:26 \nauditsettings.ascx| auditsettings.ascx| | 3594| 13-Apr-21| 11:26 \nbarcodesettings.ascx| barcodesettings.ascx| | 1399| 13-Apr-21| 11:26 \ndiscoveryglobalcontrol.ascx| discoveryglobalcontrol.ascx| | 5175| 13-Apr-21| 11:26 \ndiscoveryproperties.ascx| discoveryproperties.ascx| | 7132| 13-Apr-21| 11:26 \ndiscoveryquerystatistics.ascx| discoveryquerystatistics.ascx| | 3788| 13-Apr-21| 11:26 \ndlptemplatepicker.ascx| dlptemplatepicker.ascx| | 3594| 13-Apr-21| 11:26 \nlabelsettings.ascx| labelsettings.ascx| | 9510| 13-Apr-21| 11:26 \nretentionsettings.ascx| retentionsettings.ascx| | 11060| 13-Apr-21| 11:26 \nvideothumbnailer.exe| videothumbnailer.exe| 16.0.10374.20000| 22920| 13-Apr-21| 11:26 \ndlcworkflowactions_dll| microsoft.office.workflow.actions.dll| 16.0.10374.20000| 152456| 13-Apr-21| 11:26 \ndlcworkflowactionsvs_dll| microsoft.office.workflow.actions.dll| 16.0.10374.20000| 152456| 13-Apr-21| 11:26 \nmicrosoft.office.workflow.feature.dll| microsoft.office.workflow.feature.dll| 16.0.10374.20000| 32648| 13-Apr-21| 11:26 \nmicrosoft.office.workflow.pages.dll| microsoft.office.workflow.pages.dll| 16.0.10374.20000| 92056| 13-Apr-21| 11:26 \ndlc.workflow.routing.dll| microsoft.office.workflow.routing.dll| 16.0.10374.20000| 123280| 13-Apr-21| 11:26 \ndlc.workflow.tasks.dll| microsoft.office.workflow.tasks.dll| 16.0.10374.20000| 44432| 13-Apr-21| 11:26 \ndlc.workflow.tasks.dll2| microsoft.office.workflow.tasks.dll| 16.0.10374.20000| 44432| 13-Apr-21| 11:26 \nmicrosoft.office.workflowsoap.dll| microsoft.office.workflowsoap.dll| 16.0.10374.20000| 56208| 13-Apr-21| 11:26 \ndw20.exe_0001| dw20.exe| 16.0.10374.20000| 2138576| 13-Apr-21| 07:54 \ndwtrig20.exe| dwtrig20.exe| 16.0.10374.20000| 318928| 13-Apr-21| 07:54 \nmicrosoft.office.server.directory| microsoft.office.server.directory.dll| 16.0.10374.20000| 1374664| 13-Apr-21| 07:54 \nppt.conversion.gkpowerpoint.dll| gkpowerpoint.dll| 16.0.10374.20000| 3487648| 13-Apr-21| 07:54 \nwac.word.gkword.dll| gkword.dll| 16.0.10374.20000| 4607928| 13-Apr-21| 07:54 \nwdsrv.conversion.gkword.dll| gkword.dll| 16.0.10374.20000| 4607928| 13-Apr-21| 07:54 \nconversion.office.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nppt.conversion.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nppt.edit.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nwac.office.gfxserver.dll| gfxserver.dll| 16.0.10374.20000| 5277600| 13-Apr-21| 07:57 \nconversion.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nppt.conversion.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nppt.edit.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nwac.office.igxserver.dll| igxserver.dll| 16.0.10374.20000| 12129176| 13-Apr-21| 07:58 \nsltemp.asc| sldlibtemplates.ascx| | 12554| 13-Apr-21| 07:58 \nsldlib.js| sldlib.js| | 29295| 13-Apr-21| 07:57 \neditdlg.htm_slfeat| editdlg.htm| | 4796| 13-Apr-21| 07:54 \nfiledlg.htm_slfeat| filedlg.htm| | 3344| 13-Apr-21| 07:54 \nclientx.dll| microsoft.office.sharepoint.clientextensions.dll| 16.0.10374.20000| 381904| 13-Apr-21| 07:58 \nclientxr.dll.x64| microsoft.office.sharepoint.clientextensions.dll| 16.0.10374.20000| 381904| 13-Apr-21| 07:58 \nmicrosoft.office.server.chart.dll| microsoft.office.server.chart.dll| 16.0.10374.20000| 614344| 13-Apr-21| 07:58 \nmicrosoft.office.server.chart_gac.dll| microsoft.office.server.chart.dll| 16.0.10374.20000| 614344| 13-Apr-21| 07:58 \nas_adal_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| adal.dll| | 1456656| 12-Apr-21| 03:31 \nas_adal_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| adal.dll| | 1784544| 12-Apr-21| 03:32 \nas_azureclient_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| microsoft.analysisservices.azureclient.dll| | 316496| 12-Apr-21| 03:31 \nas_azureclient_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| microsoft.analysisservices.azureclient.dll| | 316496| 12-Apr-21| 03:32 \nas_client_db2v0801_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| db2v0801.xsl| | 30717| 12-Apr-21| 03:31 \nas_client_db2v0801_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| db2v0801.xsl| | 30717| 12-Apr-21| 03:31 \nas_client_hive_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| hive.xsl| | 81782| 12-Apr-21| 03:31 \nas_client_hive_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| hive.xsl| | 81782| 12-Apr-21| 03:31 \nas_client_msql_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msql.xsl| | 128792| 12-Apr-21| 03:32 \nas_client_msql_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msql.xsl| | 128792| 12-Apr-21| 03:32 \nas_client_orcl7_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| orcl7.xsl| | 95739| 12-Apr-21| 03:31 \nas_client_orcl7_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| orcl7.xsl| | 95739| 12-Apr-21| 03:31 \nas_client_sqlpdw_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqlpdw.xsl| | 105635| 12-Apr-21| 03:31 \nas_client_sqlpdw_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqlpdw.xsl| | 105635| 12-Apr-21| 03:31 \nas_client_trdtv2r41_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| trdtv2r41.xsl| | 105800| 12-Apr-21| 03:31 \nas_client_trdtv2r41_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| trdtv2r41.xsl| | 105800| 12-Apr-21| 03:31 \nas_client_xmsrv_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmsrv.dll| | 35081808| 12-Apr-21| 03:32 \nas_client_xmsrv_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmsrv.dll| | 25498704| 12-Apr-21| 03:32 \nas_clientas80_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as80.xsl| | 17484| 12-Apr-21| 03:31 \nas_clientas80_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as80.xsl| | 17484| 12-Apr-21| 03:31 \nas_clientas90_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as90.xsl| | 20021| 12-Apr-21| 03:32 \nas_clientas90_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| as90.xsl| | 20021| 12-Apr-21| 03:32 \nas_clientinformix_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| informix.xsl| | 32145| 12-Apr-21| 03:31 \nas_clientinformix_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| informix.xsl| | 32145| 12-Apr-21| 03:31 \nas_clientmsjet_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msjet.xsl| | 30427| 12-Apr-21| 03:31 \nas_clientmsjet_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msjet.xsl| | 30427| 12-Apr-21| 03:31 \nas_clientmsmgdsrv_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmgdsrv.dll| | 7638824| 12-Apr-21| 03:31 \nas_clientmsmgdsrv_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmgdsrv.dll| | 9328720| 12-Apr-21| 03:32 \nas_clientsql120_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql120.xsl| | 135247| 12-Apr-21| 03:32 \nas_clientsql120_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql120.xsl| | 135247| 12-Apr-21| 03:32 \nas_clientsql2000_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql2000.xsl| | 35014| 12-Apr-21| 03:32 \nas_clientsql2000_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql2000.xsl| | 35014| 12-Apr-21| 03:32 \nas_clientsql70_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql70.xsl| | 33181| 12-Apr-21| 03:31 \nas_clientsql70_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql70.xsl| | 33181| 12-Apr-21| 03:31 \nas_clientsql90_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql90.xsl| | 136426| 12-Apr-21| 03:31 \nas_clientsql90_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sql90.xsl| | 136426| 12-Apr-21| 03:31 \nas_clientsybase_xsl_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sybase.xsl| | 30964| 12-Apr-21| 03:31 \nas_clientsybase_xsl_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sybase.xsl| | 30964| 12-Apr-21| 03:31 \nas_msmdlocal_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmdlocal.dll| | 45813840| 12-Apr-21| 03:32 \nas_msmdlocal_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msmdlocal.dll| | 63495968| 12-Apr-21| 03:31 \nas_msolap_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolap.dll| | 7999272| 12-Apr-21| 03:32 \nas_msolap_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolap.dll| | 10331936| 12-Apr-21| 03:31 \nas_msolui_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolui.dll| | 292128| 12-Apr-21| 03:31 \nas_msolui_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| msolui.dll| | 312616| 12-Apr-21| 03:32 \nas_sqldumper_exe_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqldumper.exe| | 147560| 12-Apr-21| 03:32 \nas_sqldumper_exe_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| sqldumper.exe| | 172368| 12-Apr-21| 03:31 \nas_xmlrw_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrw.dll| | 289376| 12-Apr-21| 03:32 \nas_xmlrw_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrw.dll| | 333928| 12-Apr-21| 03:31 \nas_xmlrwbin_dll_32.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrwbin.dll| | 194152| 12-Apr-21| 03:32 \nas_xmlrwbin_dll_64.b77a7d1e_2d54_42cb_81a8_c5262ccc792b| xmlrwbin.dll| | 224864| 12-Apr-21| 03:31 \nconversion.office.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nppt.conversion.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nppt.edit.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nwac.office.mso99lres.dll| mso99lres.dll| 16.0.10374.20000| 14980536| 13-Apr-21| 07:55 \nconversion.office.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nmso.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nppt.conversion.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nppt.edit.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nwac.office.mso20win32server.dll| mso20win32server.dll| 16.0.10374.20000| 4399032| 13-Apr-21| 07:55 \nconversion.office.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nmso.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nppt.conversion.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nppt.edit.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nwac.office.mso30win32server.dll| mso30win32server.dll| 16.0.10374.20000| 5585312| 13-Apr-21| 07:58 \nconversion.office.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nppt.conversion.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nppt.edit.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nwac.office.mso40uiwin32server.dll| mso40uiwin32server.dll| 16.0.10374.20000| 12497336| 13-Apr-21| 07:58 \nconversion.office.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nppt.conversion.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nppt.edit.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nwac.office.mso98win32server.dll| mso98win32server.dll| 16.0.10374.20000| 3952568| 13-Apr-21| 07:55 \nconversion.office.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nppt.conversion.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nppt.edit.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nwac.office.msoserver.dll| msoserver.dll| 16.0.10374.20000| 14484392| 13-Apr-21| 07:58 \nconversion.office.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nppt.conversion.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nppt.edit.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nwac.office.msores.dll| msores.dll| 16.0.10374.20000| 73689000| 13-Apr-21| 07:56 \nmicrosoft.office.web.environment.officeserver.dll| microsoft.office.web.environment.officeserver.dll| 16.0.10374.20000| 62408| 13-Apr-21| 07:56 \nmicrosoft.office.web.common.dll| microsoft.office.web.common.dll| 16.0.10374.20000| 1973168| 13-Apr-21| 07:55 \nnl7data0011.dll_osssearch| nl7data0011.dll| 16.0.10374.20000| 7782904| 13-Apr-21| 07:58 \nnl7data0404.dll_osssearch| nl7data0404.dll| 16.0.10374.20000| 2708472| 13-Apr-21| 07:58 \nnl7data0804.dll_osssearch| nl7data0804.dll| 16.0.10374.20000| 3588088| 13-Apr-21| 07:58 \nprm0009.bin_osssearch| prm0009.bin| | 13280768| 13-Apr-21| 07:58 \nconversion.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nppt.conversion.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nppt.edit.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nwac.office.oartodfserver.dll| oartodfserver.dll| 16.0.10374.20000| 3555752| 13-Apr-21| 07:55 \nconversion.office.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nppt.conversion.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nppt.edit.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nwac.office.oartserver.dll| oartserver.dll| 16.0.10374.20000| 18202552| 13-Apr-21| 07:55 \nmicrosoft.office.connectedservices.identity.dll| microsoft.office.connectedservices.identity.dll| 16.0.10374.20000| 62888| 13-Apr-21| 07:58 \nconversion.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \noffice.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nppt.conversion.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nvisioserver.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nwac.conversion.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nwac.powerpoint.edit.bin.cultures.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nxlsrv.ecs.culture.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nxlsrv.ecs.office.odf| office.odf| | 2224584| 13-Apr-21| 07:55 \nhtmlchkr.dll.x64| htmlchkr.dll| 16.0.10374.20000| 1149384| 13-Apr-21| 07:55 \nconversionhtmlutil.dll| htmlutil.dll| 16.0.10374.20000| 2855344| 13-Apr-21| 07:55 \nbusdata.dll| microsoft.businessdata.dll| 16.0.10374.20000| 131024| 13-Apr-21| 07:55 \nbusdatar.dll.x64| microsoft.businessdata.dll| 16.0.10374.20000| 131024| 13-Apr-21| 07:55 \nmicrosoft_web_design_server.dll| microsoft.web.design.server.dll| 16.0.10374.20000| 396224| 13-Apr-21| 07:55 \nonetnative.dll| onetnative.dll| 16.0.10374.20000| 811952| 13-Apr-21| 07:55 \nonetnative_1.dll| onetnative.dll| 16.0.10374.20000| 811952| 13-Apr-21| 07:55 \nonetutil.dll| onetutil.dll| 16.0.10374.20000| 2866112| 13-Apr-21| 07:55 \nconversion.office.osfserver.dll| osfserver.dll| 16.0.10374.20000| 164256| 13-Apr-21| 07:55 \nwac.office.osfserver.dll| osfserver.dll| 16.0.10374.20000| 164256| 13-Apr-21| 07:55 \nconversion.office.osfsharedserver.dll| osfsharedserver.dll| 16.0.10374.20000| 734136| 13-Apr-21| 07:55 \nwac.office.osfsharedserver.dll| osfsharedserver.dll| 16.0.10374.20000| 734136| 13-Apr-21| 07:55 \nconversion.office.osfuiserver.dll| osfuiserver.dll| 16.0.10374.20000| 487840| 13-Apr-21| 07:55 \nwac.office.osfuiserver.dll| osfuiserver.dll| 16.0.10374.20000| 487840| 13-Apr-21| 07:55 \nosfserver_activities_dll.x64| microsoft.sharepoint.workflowservices.activities.dll| 16.0.10374.20000| 286144| 13-Apr-21| 07:55 \nosfserver_workflow_dll| microsoft.sharepoint.workflowservices.dll| 16.0.10374.20000| 498632| 13-Apr-21| 07:55 \nosfextap.dll| microsoft.sharepoint.officeextension.applicationpages.dll| 16.0.10374.20000| 16336| 13-Apr-21| 07:55 \noffice_extension_manager_js| sp.officeextensionmanager.js| | 50999| 13-Apr-21| 07:55 \nmicrosoft.office.serviceinfrastructure.runtime.dll| microsoft.office.serviceinfrastructure.runtime.dll| 16.0.10374.20000| 1053128| 13-Apr-21| 07:55 \nosrvadml.xml| officeserveradminlinks.xml| | 3483| 12-Apr-21| 03:48 \nugcdot.xml| feature.xml| | 629| 12-Apr-21| 03:45 \nmicrosoft.office.server.directory.sharepoint| microsoft.office.server.directory.sharepoint.dll| 16.0.10374.20000| 747472| 13-Apr-21| 07:55 \nmicrosoft.office.server.dll| microsoft.office.server.dll| 16.0.10374.20000| 3042728| 13-Apr-21| 07:55 \nmicrosoft.office.server.dll_isapi| microsoft.office.server.dll| 16.0.10374.20000| 3042728| 13-Apr-21| 07:55 \nmicrosoft.office.server.filtercontrols.dll| microsoft.office.server.filtercontrols.dll| 16.0.10374.20000| 158160| 13-Apr-21| 07:55 \nmicrosoft.office.server.importprofileproperties| microsoft.office.server.importprofileproperties.dll| 16.0.10374.20000| 77792| 13-Apr-21| 07:55 \nosrvintl.dll| microsoft.office.server.intl.dll| 16.0.10374.20000| 287712| 13-Apr-21| 07:55 \nmicrosoft.office.server.openxml.dll| microsoft.office.server.openxml.dll| 16.0.10374.20000| 1658280| 13-Apr-21| 07:55 \nmicrosoft.office.server.userprofiles.dll| microsoft.office.server.userprofiles.dll| 16.0.10374.20000| 5332920| 13-Apr-21| 07:55 \nmicrosoft.office.server.userprofiles.dll_isapi| microsoft.office.server.userprofiles.dll| 16.0.10374.20000| 5332920| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.taxonomy.dll| microsoft.sharepoint.taxonomy.dll| 16.0.10374.20000| 1744312| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.taxonomy.dll_gac| microsoft.sharepoint.taxonomy.dll| 16.0.10374.20000| 1744312| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.taxonomy.dll_gac1| microsoft.sharepoint.taxonomy.dll| 16.0.10374.20000| 1744312| 13-Apr-21| 07:55 \nmicrosoft.office.server.userprofiles.proxy.dll| microsoft.office.server.userprofiles.dll| 16.0.10374.20000| 1466328| 13-Apr-21| 07:58 \nscriptresources.rsx| scriptresources.resx| | 18203| 13-Apr-21| 07:55 \nscriptforwebtaggingui.js| scriptforwebtaggingui.js| | 132939| 12-Apr-21| 03:32 \nsp.ui.taxonomy.js| sp.ui.taxonomy.js| | 46516| 12-Apr-21| 03:32 \newafieldlist.png| ewafieldlist.png| | 3210| 6-Aug-19| 05:21 \newanov.png| ewanov.png| | 6857| 6-Aug-19| 05:21 \newaribbonchart.png| ewaribbonchart.png| | 13248| 6-Aug-19| 05:21 \newaribboninsert.png| ewaribboninsert.png| | 46008| 6-Aug-19| 05:21 \newaribbonview.png| ewaribbonview.png| | 1940| 6-Aug-19| 05:21 \nwac.livebooks.notetags.intl.112_16_n.png_10266| 112_16_n.16x16x32.png| | 261| 6-Aug-19| 05:21 \nwac.livebooks.notetags.intl.23_16_n.png_10266| 23_16_n.16x16x32.png| | 266| 6-Aug-19| 05:21 \newaanth.gif| ewaanth.gif| | 216| 6-Aug-19| 05:22 \newaantv.gif| ewaantv.gif| | 213| 6-Aug-19| 05:22 \newr023.gif| ewr023.gif| | 908| 6-Aug-19| 05:22 \nfavicon_excel.ico| favicon_excel.ico| | 8958| 6-Aug-19| 05:22 \nopenfromurl.web.favicon_excel.ico| favicon_excel.ico| | 8958| 6-Aug-19| 05:22 \nmediaplayer.xap| mediaplayer.xap| | 53010| 13-Apr-21| 11:39 \ndecompositiontree.xap| decompositiontree.xap| | 117420| 13-Apr-21| 11:39 \naddgal.xap| addgallery.xap| | 416791| 13-Apr-21| 11:39 \nwpgalim.xap| webpartgalleryimages.xap| | 109796| 13-Apr-21| 11:39 \naddgallery.xap_silverlight| addgallery.xap| | 383089| 13-Apr-21| 11:39 \nmicrosoft.sharepoint.client.xap| microsoft.sharepoint.client.xap| | 321027| 13-Apr-21| 11:39 \ndsigres.cab.x64| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigres.cab.x64_10266| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigres.cab.x64_1033| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigres.cab.x64_1087| dsigres.cab| | 231445| 13-Apr-21| 11:39 \ndsigctrl.cab.x64| dsigctrl.cab| | 481223| 13-Apr-21| 11:39 \ndsigres.cab.x86| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigres.cab.x86_10266| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigres.cab.x86_1033| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigres.cab.x86_1087| dsigres.cab| | 193223| 13-Apr-21| 11:41 \ndsigctrl.cab.x86| dsigctrl.cab| | 528257| 13-Apr-21| 11:41 \nmossbi.wfe.gac.scorecards.client.dll| microsoft.performancepoint.scorecards.client.dll| 16.0.10374.20000| 2233832| 13-Apr-21| 07:58 \nmossbi.wfe.gac.scorecards.servercommon.dll| microsoft.performancepoint.scorecards.servercommon.dll| 16.0.10374.20000| 333816| 13-Apr-21| 07:58 \nmossbi.wfe.gac.scorecards.webcontrols.dll| microsoft.performancepoint.scorecards.webcontrols.dll| 16.0.10374.20000| 345096| 13-Apr-21| 07:58 \nsts_spclientnewux46be2393a35a55172ff4bbbbd4d0e51c| vsdx_48x2_e3becfeb024cbd3c46477b32b6fd3cae.png| | 1601| 21-Mar-21| 05:46 \nsts_spclientnewux522b80f3d51b476a0dda839d975ca09f| vsdx_48x3_bde94d5ae43f8bf84396338bd2f23a19.png| | 2285| 21-Mar-21| 05:46 \nsts_spclientnewux4bfd71d75f5c36d9ec4093b444c5b077| vsdx_96x1_5_eef3c215df8bb98b59db649569d6a0b7.png| | 2046| 21-Mar-21| 05:46 \nsts_spclientnewux0c23522926745ff870fdb9c91e62e920| vsdx_96x1_70d2e9f604f1b5a341b5a4c0342768c0.png| | 2500| 21-Mar-21| 05:46 \nsts_spclientnewux66bfb4af2c35d5a59041a193f44b5383| vsdx_96x2_f474a1b19da5215a7eab918efadbdb3e.png| | 2547| 21-Mar-21| 05:46 \nsts_spclientnewux2448ae88f11fb5d72da1e3885be94fb4| vsdx_96x3_16c2db9ccb2da0e93e3e31f6a81a96db.png| | 3891| 21-Mar-21| 05:46 \nsts_spclientnewux4f1b185849a54e36a4fd79a41b03ee4b| vssx_16x1_23673d773d2e84e8cb02ed0391e48950.png| | 1321| 21-Mar-21| 05:46 \nsts_spclientnewuxf4783f501b24fda1bccf0a3aaa449bd1| vssx_16x1_5_ece371e69212b24bbe11123c1a56df9b.png| | 1499| 21-Mar-21| 05:46 \nsts_spclientnewux6989f8a7abd8ccd3ad0555ab5f968b88| vssx_16x2_41e188b398c92e9c3e5737366a941ae8.png| | 532| 21-Mar-21| 05:46 \nsts_spclientnewuxf048ff5cf6f1bfe6dc7d190d48bd9bfa| vssx_16x3_c235741aadd6f2194ff6b0030772d1fa.png| | 705| 21-Mar-21| 05:46 \nsts_spclientnewux905e08d7477fe697ab5c95ba6acb4825| vssx_48x1_5_133a4c533a831abfe262f6c3ae88a272.png| | 1824| 21-Mar-21| 05:46 \nsts_spclientnewux589e933f9bc5ddc69f744bed90b3970c| vssx_48x1_e46d27a4d9f7161e7264798737511387.png| | 1626| 21-Mar-21| 05:46 \nsts_spclientnewuxffc0781ccc84e5c4b7674db088dc8efc| vssx_48x2_5db92e09f6e93f5ac9a6acd0c0b0efd0.png| | 1018| 21-Mar-21| 05:46 \nsts_spclientnewux8b9ade185d38647b14012b06f976f027| vssx_48x3_20cee415a165e5b1d9f5860f5a61730f.png| | 1416| 21-Mar-21| 05:46 \nsts_spclientnewuxfe69dda904861eab895266dcc33eafeb| vssx_96x1_304d4b3db91a5fab49a49ac71d4ad491.png| | 1940| 21-Mar-21| 05:46 \nsts_spclientnewux6bba68b13fc096a832e5110a66e5a17e| vssx_96x1_5_62ef76b7015b6acdb793ff8ceaa7f96d.png| | 1270| 21-Mar-21| 05:46 \nsts_spclientnewux5ba777a9e10f9e3beb6b51b9d3077970| vssx_96x2_55ba8d81db214f9f2cfacc5a1ca947b8.png| | 1640| 21-Mar-21| 05:46 \nsts_spclientnewux294f38c8d236c306a36e04fbb00bb7a4| vssx_96x3_6138d40859b5fa945df9d862fc3a77b7.png| | 2295| 21-Mar-21| 05:46 \nsts_spclientnewux0523f888c49e50fef4713eaf8a4d1284| vstx_16x1_5_5cc00b7044c143b1ccfeedbd95806acf.png| | 1608| 21-Mar-21| 05:46 \nsts_spclientnewuxeb906a458ec4da9ddae1a0dd920f13ea| vstx_16x1_e8bbd84ad07d13458d5fe9a3e41d496f.png| | 1376| 21-Mar-21| 05:46 \nsts_spclientnewux2db81c901a09a60b94e37b2ff63f536b| vstx_16x2_564935220019958b0f4952e1342f3f09.png| | 728| 21-Mar-21| 05:46 \nsts_spclientnewuxe1c0b3cd4c0ce30a0526327857a90839| vstx_16x3_c12c7a6f375155dac42e7b02dd46f002.png| | 1024| 21-Mar-21| 05:46 \nsts_spclientnewux824c9b4b670debdfc2183094c0dd3d19| vstx_48x1_5_bd92f3ebbafa8cc68983a8822a8b99e8.png| | 2262| 21-Mar-21| 05:46 \nsts_spclientnewux4a72fcfc636555ae4d69f1d6edf3be60| vstx_48x1_a080021fb4cd85b590d146d5946662f3.png| | 1957| 21-Mar-21| 05:46 \nsts_spclientnewux97b8a2af03fd84420ee8182ae1427212| vstx_48x2_845753ded3e968bf6600a502fd8e742d.png| | 1351| 21-Mar-21| 05:46 \nsts_spclientnewuxf6009284223717865eadaae78adf2d6d| vstx_48x3_db83862135a37c85f07f7e263b7cb8b5.png| | 2224| 21-Mar-21| 05:46 \nsts_spclientnewux74ba0bdcfb04f8635681372394cc608a| vstx_96x1_5_1c0b7cb1691e3c01184b9d5a6e49945a.png| | 1950| 21-Mar-21| 05:46 \nsts_spclientnewux61340ccd70111e2786de01c4e9165959| vstx_96x1_da5bd9b6cdcc11bfecfd98356bd44391.png| | 2475| 21-Mar-21| 05:46 \nsts_spclientnewux01d482f452da07ee8a793f53e336cc16| vstx_96x2_098089d613867c4a71c5c043534aad48.png| | 2501| 21-Mar-21| 05:46 \nsts_spclientnewux3192da3bfa2a20a11983c02c5de87aae| vstx_96x3_2904adb44857649814c781376d574d96.png| | 3794| 21-Mar-21| 05:46 \nsts_spclientnewuxf944546bb71cd877a97d36c423740c5b| word_16x1_170c8b215333e956079ce7952b27642f.png| | 365| 21-Mar-21| 05:46 \nsts_spclientnewuxcb5dcc99118b73e3628bc7725c347c31| word_16x1_5_23bc1a35f790a9e6cc967a5e5b5d7e83.png| | 447| 21-Mar-21| 05:46 \nsts_spclientnewux3eac1f8106d652be5d59857b451cac1e| word_16x2_972b09e6377d716ad86898f455329cf1.png| | 543| 21-Mar-21| 05:46 \nsts_spclientnewuxdd588b9b95c540c76520bf7d39d9439d| word_16x3_ea143039d306df4162229498c2dcefa0.png| | 1403| 21-Mar-21| 05:46 \nsts_spclientnewux80d5d1f8a495aad41167b0eb5d0d6bb2| word_48x1_5_3cc4a4f6c2c8455cedc707099b0abd54.png| | 2202| 21-Mar-21| 05:46 \nsts_spclientnewuxaad81c6cb24b4e79ef3fe70e727f226e| word_48x1_ea143039d306df4162229498c2dcefa0.png| | 1403| 21-Mar-21| 05:46 \nsts_spclientnewux90bc32d5864ce720368322c6b033dd41| word_48x2_d6cdf0009b6bf95356d953bbf929464c.png| | 2982| 21-Mar-21| 05:46 \nsts_spclientnewux1710e548340626fe269359d708253cc8| word_48x3_8ac5a5d7e625e320586836b55ac39f5a.png| | 4785| 21-Mar-21| 05:46 \nsts_spclientnewuxbf56fa563b6a78f537c2398a7fd1d7e6| word_96x1_5_f1e6c2137f47b3a11531b3ea0eea155f.png| | 4763| 21-Mar-21| 05:46 \nsts_spclientnewux612f463faa2fa48d2ee8e97a30b7bd96| word_96x1_d3143f16ad95fc8ae5c7f541a6e8135f.png| | 3002| 21-Mar-21| 05:46 \nsts_spclientnewux25858e900847d8497371db5042bd7168| word_96x2_45a9c8f359f8f7339995be3a6d742d47.png| | 6103| 21-Mar-21| 05:46 \nsts_spclientnewuxfb0b972552779549b87dfeb8273c2488| word_96x3_4e101d6264263a8df2b059dad999ee40.png| | 10265| 21-Mar-21| 05:46 \nsts_spclientnewux169d7458041ed7f33f68923ebc0c71f4| xls_16x1_5_b306b2273aeb28b19848a1f22ccf67e2.png| | 1469| 21-Mar-21| 05:46 \nsts_spclientnewux38c6e3d8098edbff902a695c88e22a43| xls_16x1_c070349ae47519fd6c414493693c12c8.png| | 1460| 21-Mar-21| 05:46 \nsts_spclientnewux804e7bd414c1c01ea56c290ee3a62364| xls_16x2_4f5a0eab318a46a41e6c92ece008fae9.png| | 670| 21-Mar-21| 05:46 \nsts_spclientnewux55acf5f2d9e930e7316a5ede09537a06| xls_16x3_2f855b289ee4706700bdc358c593c2f1.png| | 684| 21-Mar-21| 05:46 \nsts_spclientnewux64d7c2af6960f21c5804d3eb8cec271a| xls_48x1_5_dc65e29921a17ab7eeecbea7b439c069.png| | 1916| 21-Mar-21| 05:46 \nsts_spclientnewux289609e57c51889e5b870bf468db3b59| xls_48x1_6cc45efa4dd7ddb236eb71b6de2ceb4e.png| | 1706| 21-Mar-21| 05:46 \nsts_spclientnewuxf29787f6a70c4efbe977daa16edf5647| xls_48x2_7e3f36ee57409ac238645c31d53379ef.png| | 957| 21-Mar-21| 05:46 \nsts_spclientnewuxb60395a0402df93ef80cf3b956207747| xls_48x3_dd4d554a909b4690fa7932c503ecc108.png| | 1153| 21-Mar-21| 05:46 \nsts_spclientnewux60671ce1e7d40b8dca9ee4dc41c68ae6| xls_96x1_5_535a6996efb5d6a5f68f0d8bb0694f9e.png| | 2109| 21-Mar-21| 05:46 \nsts_spclientnewux584c7d200faf0ed7a4cad498107cc4c4| xls_96x1_b7e40330dfd777a5b3bfdd6e77c95d31.png| | 2010| 21-Mar-21| 05:46 \nsts_spclientnewux46d7557d37043e959cc5871faaccfed7| xls_96x2_230640a0f5cb2ba035c089988f91c223.png| | 1529| 21-Mar-21| 05:46 \nsts_spclientnewux83866892f76ac62a472d86697623ce8e| xls_96x3_2d2053f508d1c384833e77890db7a318.png| | 1948| 21-Mar-21| 05:46 \nsts_spclientnewux193e68db71cf5489494fb960cd5568e9| xlsx_16x1_5_5483276dc29e83ea26a4b4938786be38.png| | 543| 21-Mar-21| 05:46 \nsts_spclientnewux509e0958f21a117a482c074c504b123f| xlsx_16x1_751fd099c54b2b7a3da99b080eeca2e4.png| | 1474| 21-Mar-21| 05:46 \nsts_spclientnewux4f43fc6540bbb5a992916cea45021e3d| xlsx_16x2_a9b08b0f631119d3d595898147b37ab9.png| | 683| 21-Mar-21| 05:46 \nsts_spclientnewuxeea1e3b67ed20304e30715478124754c| xlsx_16x3_76f898eb25ce1b7d8583bef5e62db859.png| | 894| 21-Mar-21| 05:46 \nsts_spclientnewux11fc5dbb14efae9fa6995fa7a01082c0| xlsx_48x1_5_2ac0528e37c96a4abe710da65d5dd9db.png| | 1053| 21-Mar-21| 05:46 \nsts_spclientnewux0e5366efaf7d68e85fecf98cead9e00c| xlsx_48x1_8817915a2b258a5a4cc8bd809a0a83ae.png| | 1845| 21-Mar-21| 05:46 \nsts_spclientnewux1d8e179e5fef76f66d246a1786acd76a| xlsx_48x2_fde930a87fc61b0bdc057f8544aeb383.png| | 1301| 21-Mar-21| 05:46 \nsts_spclientnewuxa8bb205cdf6250f21bedd463d7c757d2| xlsx_48x3_d0bd2d7f0da4d666c3adebfbc352783d.png| | 1799| 21-Mar-21| 05:46 \nsts_spclientnewux3603748bcb9c5a9ab55073ffe209bc88| xlsx_96x1_43589e4cdeeadb1ddbaf3d22a82fcf6c.png| | 2140| 21-Mar-21| 05:46 \nsts_spclientnewux1b063e3f3ad86ed12475728a9b040413| xlsx_96x1_5_ff9b977a88adea5fa1ad3ee0522a357f.png| | 1669| 21-Mar-21| 05:46 \nsts_spclientnewux7a491e6eccd936674ad4b4647e41130c| xlsx_96x2_4cb85e7afaf4e847965e1d1eadb3ed1b.png| | 2893| 21-Mar-21| 05:46 \nsts_spclientnewux48890bf4e73aad7146e32d3339cf39ce| xlsx_96x3_9b1c4833c646556293ac076cac403db6.png| | 3817| 21-Mar-21| 05:46 \nsts_spclientnewux8301975b16e42de4112d9e6f24d0534f| xltx_16x1_228481ced91e9a2357ac4fbd0bc0d833.png| | 1409| 21-Mar-21| 05:46 \nsts_spclientnewux80547fb9509151985fa53c880b508ec3| xltx_16x1_5_ddcb15910b685d2f6b52e1add0f4c582.png| | 523| 21-Mar-21| 05:46 \nsts_spclientnewuxd45ade28d963d8e54de839b6892ee5a9| xltx_16x2_d8ea07232894718dbdda5e700719feac.png| | 634| 21-Mar-21| 05:46 \nsts_spclientnewuxac4c4d91889fcf5595ed71262f1e44f8| xltx_16x3_a50ade65aa08d25f13b6455859927505.png| | 874| 21-Mar-21| 05:46 \nsts_spclientnewux6c804b2643b95f5cc6af95d0bf7924bc| xltx_48x1_5_0a223d8a2fdd65be22242edcebcfb56a.png| | 1013| 21-Mar-21| 05:46 \nsts_spclientnewux269e4a426ba1262dd81cce577806ca21| xltx_48x1_f92fcc9fb31bbcd4fb9d5d1b0d952721.png| | 1777| 21-Mar-21| 05:46 \nsts_spclientnewuxb941eb557afedae4ad1026624e01f438| xltx_48x2_cd27c3a3a7c988361c38e7a65e8f1bb2.png| | 1202| 21-Mar-21| 05:46 \nsts_spclientnewux8cc553cc01174afcaf8e2417e6cb08ca| xltx_48x3_c3ddf7f9ada62c5f26f78ea8a1afdd06.png| | 1662| 21-Mar-21| 05:46 \nsts_spclientnewux6cca7a871051f0b0d4ec06f7e017fc59| xltx_96x1_5_79ab0afe48c7f408467258d5eb663888.png| | 1593| 21-Mar-21| 05:46 \nsts_spclientnewux6d6a10c9630caf79a5cd3f9f8995b281| xltx_96x1_98edf15f105d5e4bf249e6dd6026bf88.png| | 2143| 21-Mar-21| 05:46 \nsts_spclientnewux9b0d68d149897e13d7464cb33612bc8f| xltx_96x2_58084d6743f9132c2309420b7120da6f.png| | 2017| 21-Mar-21| 05:46 \nsts_spclientnewuxd825db6215c3c3564db93be26fc3ae4d| xltx_96x3_fe2df9b9b42a1cb688dddeb650555ddb.png| | 2821| 21-Mar-21| 05:46 \nsts_spclientnewuxc6fbaaf249a164465499494c5d7f4414| xsn_16x1_5_c010de05f55977d65b73747561684e45.png| | 1381| 21-Mar-21| 05:46 \nsts_spclientnewuxbfe4ecd5fd1dc53c3b98128a84558aec| xsn_16x1_6c8220ddeffaa1046149d679d32b578d.png| | 1326| 21-Mar-21| 05:46 \nsts_spclientnewux81b8172cb52e6a93c61f83e1da071b1c| xsn_16x2_2643953284151fd5e8e29573998ac242.png| | 449| 21-Mar-21| 05:46 \nsts_spclientnewux9b27af62c111847e8aacdc03e43a29a4| xsn_16x3_b739f8a4f17d34d6856a96d83b524d8c.png| | 601| 21-Mar-21| 05:46 \nsts_spclientnewuxbe9f5f1ce26590b3eb9cdbc90a1be766| xsn_48x1_5_46afa00da1bf482ee121b402a223b3bc.png| | 1727| 21-Mar-21| 05:46 \nsts_spclientnewux4327591e61b336a89d224b4d36e249fc| xsn_48x1_d65422c82aa59e45db6a69a191b4cccc.png| | 1536| 21-Mar-21| 05:46 \nsts_spclientnewux542d0f0e60250b4c2fef5c9978ffdaa5| xsn_48x2_7f04d0abec191245896205f22c311657.png| | 834| 21-Mar-21| 05:46 \nsts_spclientnewuxa9c2c94463a6a7fc35bbecb2a196945c| xsn_48x3_7e815f5b7f701adfb95f774d1b99cee3.png| | 1146| 21-Mar-21| 05:46 \nsts_spclientnewuxd143339058745a3fa58c6f6f40e9aaf5| xsn_96x1_5_87ea08d27a3693cf30863f0779a1ae32.png| | 1105| 21-Mar-21| 05:46 \nsts_spclientnewuxc3eb0627ed2a299265865a96d6dba909| xsn_96x1_51e42aafb97346413d26983a72aee7d7.png| | 1847| 21-Mar-21| 05:46 \nsts_spclientnewux02ab5360b0a27a83c0d8e62779362e4a| xsn_96x2_9988070767c0460fd82a16ec1fa12418.png| | 1391| 21-Mar-21| 05:46 \nsts_spclientnewux8a24c2795d22123dce3f204dac06a11b| xsn_96x3_a6444c641777a2debfe921a4c6581e77.png| | 1905| 21-Mar-21| 05:46 \nsts_sphomenewux47c2f9686e99961bcfa3599f0e14cb26| sharepointhome.json| | 40268| 10-Apr-21| 08:04 \nsts_sphomenewuxc0250aabec4b1e71150a3c5e78e664b7| searchux-main-sphome.js| | 1600572| 21-Mar-21| 05:46 \nsts_sphomenewuxab3efcb3b4702929d33f754cfd563158| searchux-resources.js| | 25528| 21-Mar-21| 05:46 \nsts_sphomenewuxc68fcb315164c60c6aace83a71fcbbe2| sharepointhome.js| | 1556915| 10-Apr-21| 08:04 \nsts_sphomenewux5764a9aadaf922139c9748a2b692c69f| sphome-react.js| | 208322| 21-Mar-21| 05:46 \nsts_sphomenewuxe5fc5d0c85aa24eb1adbac8ec1c9b954| sphome-rx.js| | 66245| 21-Mar-21| 05:46 \nsts_sphomenewux9e081e46518267288e7b11980f7811a4| sphome-signalr.js| | 129937| 21-Mar-21| 05:46 \nsts_sphomenewux4bf88d694ee8449f7f0ea170824568fb| sphome-utilities.js| | 123605| 10-Apr-21| 08:04 \ncui.debug.js| cui.debug.js| | 657986| 13-Apr-21| 07:56 \ncui.js| cui.js| | 364464| 13-Apr-21| 07:56 \nxui.debug.js| xui.debug.js| | 45549| 13-Apr-21| 07:56 \nxui.js| xui.js| | 18952| 13-Apr-21| 07:56 \nwac.word.sword.dll| sword.dll| 16.0.10374.20000| 12661168| 13-Apr-21| 07:58 \nwdsrv.conversion.sword.dll| sword.dll| 16.0.10374.20000| 12661168| 13-Apr-21| 07:58 \nwdsrv.dll| microsoft.office.word.server.dll| 16.0.10374.20000| 376248| 13-Apr-21| 07:58 \nwdsrv.isapi.dll| microsoft.office.word.server.dll| 16.0.10374.20000| 376248| 13-Apr-21| 07:58 \nmicrosoft.office.translationservices.dll| microsoft.office.translationservices.dll| 16.0.10374.20000| 417184| 13-Apr-21| 07:58 \nmicrosoft.office.translationservices.machinetranslation.dll| microsoft.office.translationservices.machinetranslation.dll| 16.0.10374.20000| 550328| 13-Apr-21| 07:58 \ntranslationqueue.sql| translationqueue.sql| | 53164| 13-Apr-21| 07:58 \ncore.js| core.js| | 646739| 12-Apr-21| 03:45 \nifswfe.dll| microsoft.office.infopath.server.dll| 16.0.10374.20000| 3175856| 13-Apr-21| 07:58 \nifswfepriv.dll| microsoft.office.infopath.server.dll| 16.0.10374.20000| 3175856| 13-Apr-21| 07:58 \nipomload.dll| microsoft.office.infopath.clrloader.dll| 16.0.10374.20000| 17904| 13-Apr-21| 07:56 \noffxml.dll| offxml.dll| 16.0.10374.20000| 412600| 13-Apr-21| 07:56 \nppt.conversion.ppserver.dll| ppserver.dll| 16.0.10374.20000| 12353464| 13-Apr-21| 07:58 \nppt.edit.ppserver.dll| ppserver.dll| 16.0.10374.20000| 12353464| 13-Apr-21| 07:58 \nppt.conversion.webclient.config| client.config| | 2059| 12-Apr-21| 03:47 \nppt.conversion.web.config| web.config| | 3375| 12-Apr-21| 03:46 \nmicrosoft.office.server.powerpoint.dll| microsoft.office.server.powerpoint.dll| 16.0.10374.20000| 108976| 13-Apr-21| 07:55 \npowerpointpowershell.format.ps1xml| powerpointpowershell.format.ps1xml| | 14382| 12-Apr-21| 03:36 \npjintl_1_new.dll| pjintl.dll| 16.0.10374.20000| 4898736| 13-Apr-21| 07:57 \nschedengine_new.exe| schedengine.exe| 16.0.10374.20000| 16463296| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.silverlight.dll| microsoft.projectserver.client.silverlight.dll| 16.0.10374.20000| 396192| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.phone.dll| microsoft.projectserver.client.phone.dll| 16.0.10374.20000| 396208| 13-Apr-21| 07:55 \ncontentdatabasecreate.sql| contentdatabasecreate.sql| | 8488750| 13-Apr-21| 07:58 \nmicrosoft.office.project.schema.dll| microsoft.office.project.schema.dll| 16.0.10374.20000| 6844320| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.communications.dll| microsoft.office.project.server.communications.dll| 16.0.10374.20000| 371608| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.communications.internal.dll| microsoft.office.project.server.communications.internal.dll| 16.0.10374.20000| 761240| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.database.dll| microsoft.office.project.server.database.dll| 16.0.10374.20000| 10458544| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.database.extension.dll| microsoft.office.project.server.database.extension.dll| 16.0.10374.20000| 4383656| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.dll| microsoft.office.project.server.dll| 16.0.10374.20000| 9607096| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.events.remote.dll| microsoft.office.project.server.events.remote.dll| 16.0.10374.20000| 59296| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.inproc.dll| microsoft.office.project.server.inproc.dll| 16.0.10374.20000| 802232| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.library.dll| microsoft.office.project.server.library.dll| 16.0.10374.20000| 1971632| 13-Apr-21| 07:58 \nsdk.microsoft.office.project.server.library.dll| microsoft.office.project.server.library.dll| 16.0.10374.20000| 1971632| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.optimizer.dll| microsoft.office.project.server.optimizer.dll| 16.0.10374.20000| 262568| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.workflow.dll| microsoft.office.project.server.workflow.dll| 16.0.10374.20000| 196536| 13-Apr-21| 07:58 \nsdk.microsoft.office.project.server.workflow.dll| microsoft.office.project.server.workflow.dll| 16.0.10374.20000| 196536| 13-Apr-21| 07:58 \nmicrosoft.office.project.shared.dll| microsoft.office.project.shared.dll| 16.0.10374.20000| 1897392| 13-Apr-21| 07:58 \nsdk.microsoft.office.project.shared.dll| microsoft.office.project.shared.dll| 16.0.10374.20000| 1897392| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.dll| microsoft.projectserver.client.dll| 16.0.10374.20000| 396264| 13-Apr-21| 07:58 \nmicrosoft.projectserver.client.dll_001| microsoft.projectserver.client.dll| 16.0.10374.20000| 396264| 13-Apr-21| 07:58 \nmicrosoft.projectserver.dll| microsoft.projectserver.dll| 16.0.10374.20000| 888808| 13-Apr-21| 07:58 \nmicrosoft.projectserver.dll_001| microsoft.projectserver.dll| 16.0.10374.20000| 888808| 13-Apr-21| 07:58 \nmicrosoft.projectserver.serverproxy.dll| microsoft.projectserver.serverproxy.dll| 16.0.10374.20000| 1305040| 13-Apr-21| 07:58 \nps.csom.scriptclient.debug.js| ps.debug.js| | 1030292| 12-Apr-21| 03:31 \nps.csom.scriptclient.js| ps.js| | 623325| 12-Apr-21| 03:32 \nmicrosoft.office.project.server.pwa.applicationpages.dll| microsoft.office.project.server.pwa.applicationpages.dll| 16.0.10374.20000| 1051608| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.pwa.dll| microsoft.office.project.server.pwa.dll| 16.0.10374.20000| 2758616| 13-Apr-21| 07:58 \nmicrosoft.office.project.server.administration.dll| microsoft.office.project.server.administration.dll| 16.0.10374.20000| 1003432| 13-Apr-21| 07:57 \npwa.admin.addmodifyuser.aspx| addmodifyuser.aspx| | 143704| 12-Apr-21| 03:34 \npwa.admin.editcustomfield.aspx| editcustomfield.aspx| | 153222| 12-Apr-21| 03:34 \npwa.admin.editlookuptable.aspx| editlookuptable.aspx| | 71493| 12-Apr-21| 03:34 \npwa.common.respicker.aspx| respicker.aspx| | 3737| 12-Apr-21| 03:49 \npwa.library.projectdrilldownsatellite.debug.js| projectdrilldownsatellite.debug.js| | 152603| 12-Apr-21| 03:34 \npwa.library.projectdrilldownsatellite.js| projectdrilldownsatellite.js| | 83340| 12-Apr-21| 03:34 \npwa.library.projectservertreepicker.debug.js| projectservertreepicker.debug.js| | 81985| 12-Apr-21| 03:32 \npwa.library.projectservertreepicker.js| projectservertreepicker.js| | 42509| 12-Apr-21| 03:32 \npwa.library.projectserverscripts.core.debug.js| ps.core.debug.js| | 373260| 12-Apr-21| 03:32 \npwa.library.projectserverscripts.core.js| ps.core.js| | 228332| 12-Apr-21| 03:32 \npwa.library.projectserverscripts.rm.debug.js| ps.resourcemanagers.debug.js| | 255143| 12-Apr-21| 03:31 \npwa.library.projectserverscripts.rm.js| ps.resourcemanagers.js| | 155142| 12-Apr-21| 03:31 \npwa.library.shell.debug.js| shell.debug.js| | 92012| 12-Apr-21| 03:32 \npwa.library.shell.js| shell.js| | 45380| 12-Apr-21| 03:32 \npwa.portfoliooptimizer.optimizerspreadsheet.aspx| costconstraintanalysis.aspx| | 81336| 12-Apr-21| 03:33 \npwa.portfoliooptimizer.plannerspreadsheet.aspx| resourceconstraintanalysis.aspx| | 69689| 12-Apr-21| 03:34 \npwa.resx| pwa.resx| | 824177| 13-Apr-21| 07:55 \npwa.timesheet.timesheethistory.aspx| timesheethistory.aspx| | 4300| 12-Apr-21| 03:32 \nworkflowactivitiesdll| microsoft.office.project.server.workflowactivities.dll| 16.0.10374.20000| 55208| 13-Apr-21| 07:58 \nconversion.office.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nppt.conversion.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nppt.edit.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nwac.office.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nxlsrv.ecs.riched20.dll| riched20.dll| 16.0.10374.20000| 3242912| 13-Apr-21| 07:55 \nmicrosoft.eedict_companies.de.dll| microsoft.eedict_companies.de| 16.0.10374.20000| 18856| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.dll| microsoft.eedict_companies| 16.0.10374.20000| 109863840| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.en.dll| microsoft.eedict_companies.en| 16.0.10374.20000| 16800| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.es.dll| microsoft.eedict_companies.es| 16.0.10374.20000| 16808| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.fr.dll| microsoft.eedict_companies.fr| 16.0.10374.20000| 25016| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.it.dll| microsoft.eedict_companies.it| 16.0.10374.20000| 46520| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.ja.dll| microsoft.eedict_companies.ja| 16.0.10374.20000| 1533880| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.nl.dll| microsoft.eedict_companies.nl| 16.0.10374.20000| 18360| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.no.dll| microsoft.eedict_companies.no| 16.0.10374.20000| 2098080| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.pt.dll| microsoft.eedict_companies.pt| 16.0.10374.20000| 17848| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies.ru.dll| microsoft.eedict_companies.ru| 16.0.10374.20000| 33214888| 13-Apr-21| 07:58 \nmicrosoft.eedict_companies_acceptor.ar.dll| microsoft.eedict_companies_acceptor.ar| 16.0.10374.20000| 9888160| 13-Apr-21| 07:58 \nmicrosoft.stopworddictionary.dll| microsoft.stopworddictionary.dll| 16.0.10374.20000| 32696| 13-Apr-21| 07:58 \nmicrosoft.system_dictionaries_spellcheck.dll| microsoft.system_dictionaries_spellcheck.dll| 16.0.10374.20000| 24632752| 13-Apr-21| 07:58 \nodffilt.dll.x64| odffilt.dll| 16.0.10374.20000| 1840592| 13-Apr-21| 07:55 \nofffiltx.dll.x64| offfiltx.dll| 16.0.10374.20000| 2115000| 13-Apr-21| 07:55 \nmicrosoft.ceres.common.tools.sandbox.dll| microsoft.ceres.common.tools.sandbox.dll| 16.0.10374.20000| 95648| 13-Apr-21| 07:55 \nmicrosoft.ceres.common.utils.dllmsil| microsoft.ceres.common.utils.dll| 16.0.10374.20000| 322464| 13-Apr-21| 07:58 \nmicrosoft.ceres.contentengine.contentpush.dll| microsoft.ceres.contentengine.contentpush.dll| 16.0.10374.20000| 160168| 13-Apr-21| 07:58 \nmicrosoft.ceres.contentengine.nlpevaluators.dll| microsoft.ceres.contentengine.nlpevaluators.dll| 16.0.10374.20000| 251832| 13-Apr-21| 07:58 \nmicrosoft.ceres.contentengine.operators.mars.dll| microsoft.ceres.contentengine.operators.mars.dll| 16.0.10374.20000| 37280| 13-Apr-21| 07:58 \ndocumentformat.openxml.dllmsil2| documentformat.openxml.dll| 2.6.0.4| 5305360| | \nupdate_documentformat.openxml.dllmsil2| documentformat.openxml.dll| 2.6.0.4| 5305360| 12-Apr-21| 03:32 \nsystem.io.packaging.dllmsil| system.io.packaging.dll| 1.0.0.4| 121872| | \nupdate_system.io.packaging.dllmsil| system.io.packaging.dll| 1.0.0.4| 121872| 12-Apr-21| 03:31 \nmicrosoft.ceres.docparsing.formathandlers.pdf.dllmsil| microsoft.ceres.docparsing.formathandlers.pdf.dll| 16.0.10374.20000| 4218792| 13-Apr-21| 07:55 \nmicrosoft.ceres.evaluation.operators.dll| microsoft.ceres.evaluation.operators.dll| 16.0.10374.20000| 288184| 13-Apr-21| 07:58 \nmicrosoft.ceres.interactionengine.processing.builtin.dll| microsoft.ceres.interactionengine.processing.builtin.dll| 16.0.10374.20000| 402872| 13-Apr-21| 07:55 \nmicrosoft.ceres.nlpbase.dictionaries.dll| microsoft.ceres.nlpbase.dictionaries.dll| 16.0.10374.20000| 138664| 13-Apr-21| 07:55 \nmanagedblingsigned.dll| managedblingsigned.dll| | 1862344| | \nupdate_managedblingsigned.dll| managedblingsigned.dll| | 1862344| 12-Apr-21| 03:32 \nmicrosoft.ceres.nlpbase.richfields.dll| microsoft.ceres.nlpbase.richfields.dll| 16.0.10374.20000| 97696| 13-Apr-21| 07:58 \nmicrosoft.ceres.nlpbase.wordbreaker.dll| microsoft.ceres.nlpbase.wordbreaker.dll| 16.0.10374.20000| 124320| 13-Apr-21| 07:55 \nmicrosoft.contentpushhybridflow.dll| microsoft.contentpushhybridflow.dll| 16.0.10374.3000| 105896| 13-Apr-21| 07:58 \nmicrosoft.crawlerlfow.dll| microsoft.crawlerflow.dll| 16.0.10374.3000| 68032| 13-Apr-21| 07:58 \nmicrosoft.crawlerpropertymappingsubflow.dll| microsoft.crawlerpropertymappingsubflow.dll| 16.0.10374.3000| 27568| 13-Apr-21| 07:58 \nmicrosoft.sharepointsearchproviderflow.dll| microsoft.sharepointsearchproviderflow.dll| 16.0.10374.3000| 27056| 13-Apr-21| 07:58 \nsearchcore.clustering.indexclusteringmember.dll| microsoft.ceres.searchcore.clustering.indexclusteringmember.dll| 16.0.10374.20000| 62368| 13-Apr-21| 07:58 \nsearchcore.clustering.indexclustermanager.dll| microsoft.ceres.searchcore.clustering.indexclustermanager.dll| 16.0.10374.20000| 128416| 13-Apr-21| 07:58 \nmicrosoft.ceres.searchcore.indexstorage.dll| microsoft.ceres.searchcore.indexstorage.dll| 16.0.10374.20000| 30648| 13-Apr-21| 07:58 \nmicrosoft.ceres.searchcore.journalshipper.dll| microsoft.ceres.searchcore.journalshipper.dll| 16.0.10374.20000| 87480| 13-Apr-21| 07:56 \nmicrosoft.ceres.searchcore.query.marslookupcomponent.dll| microsoft.ceres.searchcore.query.marslookupcomponent.dll| 16.0.10374.20000| 583088| 13-Apr-21| 07:58 \nmicrosoft.ceres.searchcore.seeding.dll| microsoft.ceres.searchcore.seeding.dll| 16.0.10374.20000| 132512| 13-Apr-21| 07:58 \najaxtkid.js| ajaxtoolkit.debug.js| | 312267| 12-Apr-21| 03:33 \najaxtkit.js| ajaxtoolkit.js| | 132858| 12-Apr-21| 03:32 \nsrchccd.js| search.clientcontrols.debug.js| | 380631| 12-Apr-21| 03:37 \nsrchcc.js| search.clientcontrols.js| | 204222| 12-Apr-21| 03:37 \nsrchuicd.js| searchui.debug.js| | 116371| 12-Apr-21| 03:48 \nsrchuicc.js| searchui.js| | 50907| 12-Apr-21| 03:48 \nsrchquerypipeline.dll| microsoft.office.server.search.query.dll| 16.0.10374.20000| 1103816| 13-Apr-21| 07:58 \nossapp.dll| microsoft.office.server.search.applications.dll| 16.0.10374.20000| 455096| 13-Apr-21| 07:58 \nossapp.dll_0001| microsoft.office.server.search.applications.dll| 16.0.10374.20000| 455096| 13-Apr-21| 07:58 \nclkprdct.dll| microsoft.office.server.search.clickpredict.dll| 16.0.10374.20000| 202680| 13-Apr-21| 07:58 \nsearchom.dll| microsoft.office.server.search.dll| 16.0.10374.20000| 21206960| 13-Apr-21| 07:58 \nsearchom.dll_0001| microsoft.office.server.search.dll| 16.0.10374.20000| 21206960| 13-Apr-21| 07:58 \nossex.dll| microsoft.office.server.search.exchangeadapter.dll| 16.0.10374.20000| 107456| 13-Apr-21| 07:58 \nossex.dll_0001| microsoft.office.server.search.exchangeadapter.dll| 16.0.10374.20000| 107456| 13-Apr-21| 07:58 \nsrchomnt.dll| microsoft.office.server.search.native.dll| 16.0.10374.20000| 517576| 13-Apr-21| 07:58 \nsearchom.dll_0003| microsoft.sharepoint.search.dll| 16.0.10374.20000| 3882432| 13-Apr-21| 07:55 \nsearchom.dll_0005| microsoft.sharepoint.search.dll| 16.0.10374.20000| 3882432| 13-Apr-21| 07:55 \nsrchomnt.dll_1| microsoft.sharepoint.search.native.dll| 16.0.10374.20000| 485824| 13-Apr-21| 07:55 \nmsscpi.dll| msscpi.dll| 16.0.10374.20000| 359344| 13-Apr-21| 07:55 \nmssdmn.exe| mssdmn.exe| 16.0.10374.20000| 625584| 13-Apr-21| 07:55 \nmssearch.exe| mssearch.exe| 16.0.10374.20000| 292304| 13-Apr-21| 07:55 \nmsslad.dll| msslad.dll| 16.0.10374.20000| 205240| 13-Apr-21| 07:55 \nmssph.dll| mssph.dll| 16.0.10374.20000| 2204608| 13-Apr-21| 07:55 \nmssrch.dll| mssrch.dll| 16.0.10374.20000| 3266488| 13-Apr-21| 07:55 \nquery9x.dll_0001| query.dll| 16.0.10374.20000| 136112| 13-Apr-21| 07:55 \ntquery.dll| tquery.dll| 16.0.10374.20000| 760240| 13-Apr-21| 07:55 \nnoteswebservice.dll.oss.x86| noteswebservice.dll| 16.0.10374.20000| 740280| 13-Apr-21| 07:54 \ncontrol_defaultresult.html| control_searchresults.html| | 31805| 12-Apr-21| 03:43 \ncontrol_defaultresult.js| control_searchresults.js| | 33455| 12-Apr-21| 03:44 \nitem_excel.html| item_excel.html| | 2696| 12-Apr-21| 03:43 \nitem_excel.js| item_excel.js| | 4014| 12-Apr-21| 03:43 \nitem_powerpoint.html| item_powerpoint.html| | 3221| 12-Apr-21| 03:43 \nitem_powerpoint.js| item_powerpoint.js| | 4570| 12-Apr-21| 03:43 \nitem_word.html| item_word.html| | 2832| 12-Apr-21| 03:43 \nitem_word.js| item_word.js| | 4160| 12-Apr-21| 03:43 \nsearchcenterlitefiles.default.aspx| default.aspx| | 2866| 12-Apr-21| 03:43 \nsearchcenterlitefiles.results.aspx| results.aspx| | 3395| 12-Apr-21| 03:43 \naddsnm.apx| addservernamemappings.aspx| | 10829| 12-Apr-21| 03:31 \nedtrelst.apx| editrelevancesettings.aspx| | 13350| 12-Apr-21| 03:31 \nlstsnm.apx| listservernamemappings.aspx| | 10204| 12-Apr-21| 03:32 \nmchrule1.apx| matchingrule.aspx| | 22333| 12-Apr-21| 03:31 \ncateg.apx| category.aspx| | 14271| 12-Apr-21| 03:38 \ncrprop.apx| crawledproperty.aspx| | 15447| 12-Apr-21| 03:38 \nlstcat.apx| listcategories.aspx| | 11119| 12-Apr-21| 03:37 \nlstcct.apx| listcrawledproperties.aspx| | 14243| 12-Apr-21| 03:37 \nlstmnp.apx| listmanagedproperties.aspx| | 16328| 12-Apr-21| 03:37 \nmprop.apx| managedproperty.aspx| | 35108| 12-Apr-21| 03:37 \nscope1.apx| scope.aspx| | 15130| 12-Apr-21| 03:31 \nsrcadmin.apx| searchadministration.aspx| | 11329| 12-Apr-21| 03:32 \nschpause.apx| searchapppause.aspx| | 9223| 12-Apr-21| 03:32 \nschreset.apx| searchreset.aspx| | 9733| 12-Apr-21| 03:32 \nresrem.apx| searchresultremoval.aspx| | 10164| 12-Apr-21| 03:32 \nvwscope1.apx| viewscopes.aspx| | 11793| 12-Apr-21| 03:32 \nvwscpse1.apx| viewscopesettings.aspx| | 11421| 12-Apr-21| 03:31 \naddcs.apx| addcontentsource.aspx| | 9315| 12-Apr-21| 03:33 \neditcs.apx| editcontentsource.aspx| | 36714| 12-Apr-21| 03:33 \nlstcs.apx| listcontentsources.aspx| | 8045| 12-Apr-21| 03:33 \nclcss.apx| crawllogcontentsources.aspx| | 15891| 12-Apr-21| 03:38 \nclcrawls.apx| crawllogcrawls.aspx| | 17110| 12-Apr-21| 03:37 \ncldbs.apx| crawllogdatabases.aspx| | 14408| 12-Apr-21| 03:37 \nclerrors.apx| crawllogerrors.aspx| | 15830| 12-Apr-21| 03:37 \nclhosts.apx| crawlloghosts.aspx| | 16035| 12-Apr-21| 03:38 \nclurlex.apx| crawllogurlexplorer.aspx| | 28624| 12-Apr-21| 03:37 \naddtype.apx| addfiletype.aspx| | 10522| 12-Apr-21| 03:32 \neditrule.apx| editcrawlrule.aspx| | 9413| 12-Apr-21| 03:32 \nmngrules.apx| managecrawlrules.aspx| | 8033| 12-Apr-21| 03:32 \nmngtypes.apx| managefiletypes.aspx| | 10128| 12-Apr-21| 03:32 \nedtresss.apx| editresultsourcessa.aspx| | 9668| 12-Apr-21| 03:38 \nmngresss.apx| manageresultsourcesssa.aspx| | 8750| 12-Apr-21| 03:37 \nhrcpumem.apx| cpumemoryusage.aspx| | 20285| 12-Apr-21| 03:32 \nhrfrsh.apx| crawlfreshness.aspx| | 18343| 12-Apr-21| 03:32 \nhrclrate.apx| crawlhealthreports.aspx| | 20847| 12-Apr-21| 03:31 \nhrltncy.apx| crawllatency.aspx| | 23194| 12-Apr-21| 03:32 \nhrqueue.apx| crawlqueue.aspx| | 14512| 12-Apr-21| 03:32 \nqrdeffl.apx| defaultflowquerylatency.aspx| | 17032| 12-Apr-21| 03:32 \nhrsutime.apx| documentprocessingactivity.aspx| | 14728| 12-Apr-21| 03:31 \nqrfed.apx| federationquerylatency.aspx| | 14972| 12-Apr-21| 03:32 \nhrhipri.apx| highprioritytransactions.aspx| | 16906| 12-Apr-21| 03:31 \nqrindex.apx| indexenginequerylatency.aspx| | 14996| 12-Apr-21| 03:31 \nqrall.apx| overallquerylatency.aspx| | 15704| 12-Apr-21| 03:32 \nqrps.apx| peoplesearchproviderquerylatency.aspx| | 17485| 12-Apr-21| 03:32 \nqrmain.apx| queryhealthreports.aspx| | 16747| 12-Apr-21| 03:31 \nqrsps.apx| sharepointsearchproviderquerylatency.aspx| | 17502| 12-Apr-21| 03:32 \neqctssa.apx| editqueryclienttypesssa.aspx| | 8169| 12-Apr-21| 03:39 \nmqctssa.apx| managequeryclienttypesssa.aspx| | 8097| 12-Apr-21| 03:38 \nedtqrs.apx| editqueryrule.aspx| | 71815| 12-Apr-21| 03:38 \nlstqr.apx| listqueryrules.aspx| | 16035| 12-Apr-21| 03:37 \nliqrs.apx| listqueryrules.aspx| | 18660| 12-Apr-21| 03:37 \nmngrb.apx| manageresultblock.aspx| | 39447| 12-Apr-21| 03:37 \nqrorsel.apx| orderselectedrules.aspx| | 12383| 12-Apr-21| 03:37 \nqradsrcs.apx| queryruleaddsource.aspx| | 9375| 12-Apr-21| 03:37 \nqredtbbs.apx| queryruleeditbestbet.aspx| | 20715| 12-Apr-21| 03:38 \nqraddtxs.apx| queryruletaxonomy.aspx| | 9852| 12-Apr-21| 03:37 \nlistqrl.apx| listqueryrules.aspx| | 14885| 12-Apr-21| 03:34 \nqsset.apx| querysuggestionsettings.aspx| | 15207| 12-Apr-21| 03:49 \nqsimp.apx| querysuggestionsimport.aspx| | 9830| 12-Apr-21| 03:47 \nscsets.apx| searchcentersettings.aspx| | 10043| 12-Apr-21| 03:37 \npplsearchres.aspx| peoplesearchresults.aspx| | 3821| 12-Apr-21| 03:37 \nreportsanddataresults_aspx| reportsanddataresults.aspx| | 3821| 12-Apr-21| 03:37 \nsearchmain.aspx| searchmain.aspx| | 3361| 12-Apr-21| 03:37 \nsearchres.aspx| searchresults.aspx| | 3821| 12-Apr-21| 03:37 \nmicrosoft.ceres.usageanalytics.analysis.dllmsil| microsoft.ceres.usageanalytics.analysis.dll| 16.0.10374.20000| 237984| 13-Apr-21| 07:58 \nsetup.exe| setup.exe| 16.0.10374.20000| 1972648| 13-Apr-21| 07:58 \nsvrsetup.exe| setup.exe| 16.0.10374.20000| 1972648| 13-Apr-21| 07:58 \nsvrsetup.dll| svrsetup.dll| 16.0.10374.20000| 17144736| 13-Apr-21| 07:58 \nwsssetup.dll| wsssetup.dll| 16.0.10374.20000| 17143696| 13-Apr-21| 07:58 \nvisioserver.microsoft.office.graphics.shapebuilder.dll| microsoft.office.graphics.shapebuilder.dll| 16.0.10374.20000| 13148088| 13-Apr-21| 07:58 \nsptrns.dll| microsoft.sharepoint.translation.dll| 16.0.10374.20000| 1104816| 13-Apr-21| 07:55 \nmicrosoft.fileservices.v2.dll| microsoft.fileservices.v2.dll| 16.0.10374.20000| 981928| 13-Apr-21| 07:58 \nspdxap.dll| microsoft.sharepoint.appmonitoring.applicationpages.dll| 16.0.10374.20000| 65936| 13-Apr-21| 07:58 \nmicrosoft.sharepoint.flighting.dll| microsoft.sharepoint.flighting.dll| 16.0.10374.20000| 2284960| 13-Apr-21| 07:55 \nactxprjlchrd.js| activexwinprojlauncher.debug.js| | 2095| 13-Apr-21| 07:55 \nactxprjlchr.js| activexwinprojlauncher.js| | 983| 13-Apr-21| 07:55 \nbitreeview.js| bitreeview.js| | 12879| 13-Apr-21| 07:55 \ncontentfollowing.debug.js| contentfollowing.debug.js| | 123898| 13-Apr-21| 07:55 \ncontentfollowing.js| contentfollowing.js| | 54228| 13-Apr-21| 07:55 \nfollowedtags.debug.js| followedtags.debug.js| | 6347| 13-Apr-21| 07:55 \nfollowedtags.js| followedtags.js| | 2726| 13-Apr-21| 07:55 \nfollowingcommon.debug.js| followingcommon.debug.js| | 21971| 13-Apr-21| 07:55 \nfollowingcommon.js| followingcommon.js| | 9646| 13-Apr-21| 07:55 \ngroup.debug.js| group.debug.js| | 125958| 13-Apr-21| 07:55 \ngroup.js| group.js| | 75983| 13-Apr-21| 07:55 \nhashtagprofile.debug.js| hashtagprofile.debug.js| | 6184| 13-Apr-21| 07:55 \nhashtagprofile.js| hashtagprofile.js| | 3285| 13-Apr-21| 07:55 \nhierarchytreeview.js| hierarchytreeview.js| | 8799| 13-Apr-21| 07:55 \nhtmlmenu.js| htmlmenus.js| | 21157| 13-Apr-21| 07:55 \nkpilro.js| kpilro.js| | 3182| 13-Apr-21| 07:55 \nmrudocs.debug.js| mrudocs.debug.js| | 9192| 13-Apr-21| 07:55 \nmrudocs.js| mrudocs.js| | 5862| 13-Apr-21| 07:55 \nmydocs.debug.js| mydocs.debug.js| | 73509| 13-Apr-21| 07:55 \nmydocs.js| mydocs.js| | 34453| 13-Apr-21| 07:55 \nmylinks.debug.js| mylinks.debug.js| | 7003| 13-Apr-21| 07:55 \nmylinks.js| mylinks.js| | 2629| 13-Apr-21| 07:55 \nmysiterecommendationsdebug.js| mysiterecommendations.debug.js| | 74489| 13-Apr-21| 07:55 \nmysiterecommendations.js| mysiterecommendations.js| | 41310| 13-Apr-21| 07:55 \nnotificationpanel.debug.js| notificationpanel.debug.js| | 14102| 13-Apr-21| 07:55 \nnotificationpanel.js| notificationpanel.js| | 7017| 13-Apr-21| 07:55 \nportal.debug.js| portal.debug.js| | 94804| 13-Apr-21| 07:55 \nportal.js| portal.js| | 52481| 13-Apr-21| 07:55 \nprbrows.debug.js| profilebrowsercontrol.debug.js| | 52762| 13-Apr-21| 07:55 \nprbrows.js| profilebrowsercontrol.js| | 28062| 13-Apr-21| 07:55 \nprojectsummary.debug.js| projectsummary.debug.js| | 36524| 13-Apr-21| 07:55 \nprojectsummary.js| projectsummary.js| | 13118| 13-Apr-21| 07:55 \nratings.js| ratings.js| | 18205| 13-Apr-21| 07:55 \nreputation.debug.js| reputation.debug.js| | 5317| 13-Apr-21| 07:55 \nreputation.js| reputation.js| | 3428| 13-Apr-21| 07:55 \nsoccom.js| socialcomment.js| | 23526| 13-Apr-21| 07:55 \nsocdata.js| socialdata.js| | 14889| 13-Apr-21| 07:55 \nsoctag.js| socialtag.js| | 9992| 13-Apr-21| 07:55 \nsprecdocsd.js| sp.recentdocs.debug.js| | 40634| 13-Apr-21| 07:55 \nsprecdocs.js| sp.recentdocs.js| | 18260| 13-Apr-21| 07:55 \nannouncementtilesdebug.js| sp.ui.announcementtiles.debug.js| | 14781| 13-Apr-21| 07:55 \nannouncementtiles.js| sp.ui.announcementtiles.js| | 8782| 13-Apr-21| 07:55 \nspui_cold.js| sp.ui.collabmailbox.debug.js| | 11768| 13-Apr-21| 07:55 \nspui_col.js| sp.ui.collabmailbox.js| | 7592| 13-Apr-21| 07:55 \ncommunities.js| sp.ui.communities.js| | 43980| 13-Apr-21| 07:55 \ncommunitiestileview.js| sp.ui.communities.tileview.js| | 8538| 13-Apr-21| 07:55 \ncommunityfeed.js| sp.ui.communityfeed.js| | 9997| 13-Apr-21| 07:55 \ncommunitymoderation.js| sp.ui.communitymoderation.js| | 8223| 13-Apr-21| 07:55 \nsp.ui.documentssharedbyme.debug.js| sp.ui.documentssharedbyme.debug.js| | 3174| 13-Apr-21| 07:55 \nsp.ui.documentssharedbyme.js| sp.ui.documentssharedbyme.js| | 2210| 13-Apr-21| 07:55 \nsp.ui.documentssharedwithme.debug.js| sp.ui.documentssharedwithme.debug.js| | 41725| 13-Apr-21| 07:55 \nsp.ui.documentssharedwithme.js| sp.ui.documentssharedwithme.js| | 24710| 13-Apr-21| 07:55 \nspui_listsearchbox_debug.js| sp.ui.listsearchbox.debug.js| | 39586| 13-Apr-21| 07:55 \nspui_listsearchbox.js| sp.ui.listsearchbox.js| | 20180| 13-Apr-21| 07:55 \nspui_listsearchboxbootstrap_debug.js| sp.ui.listsearchboxbootstrap.debug.js| | 7401| 13-Apr-21| 07:55 \nspui_listsearchboxbootstrap.js| sp.ui.listsearchboxbootstrap.js| | 3068| 13-Apr-21| 07:55 \nmicrofeeddebug.js| sp.ui.microfeed.debug.js| | 393708| 13-Apr-21| 07:55 \nmicrofeed.js| sp.ui.microfeed.js| | 230147| 13-Apr-21| 07:55 \nmysitecommondebug.js| sp.ui.mysitecommon.debug.js| | 131548| 13-Apr-21| 07:55 \nmysitecommon.js| sp.ui.mysitecommon.js| | 75538| 13-Apr-21| 07:55 \nmysitenavigationdebug.js| sp.ui.mysitenavigation.debug.js| | 2523| 13-Apr-21| 07:55 \nmysitenavigation.js| sp.ui.mysitenavigation.js| | 2523| 13-Apr-21| 07:55 \nmysiterecommendationsuidebug.js| sp.ui.mysiterecommendations.debug.js| | 14330| 13-Apr-21| 07:55 \nmysiterecommendationsui.js| sp.ui.mysiterecommendations.js| | 7266| 13-Apr-21| 07:55 \npeopledebug.js| sp.ui.people.debug.js| | 87048| 13-Apr-21| 07:55 \npeopledebug.js1| sp.ui.people.debug.js| | 87048| 13-Apr-21| 07:55 \npeople.js| sp.ui.people.js| | 59577| 13-Apr-21| 07:55 \npeople.js1| sp.ui.people.js| | 59577| 13-Apr-21| 07:55 \nspui_persond.js| sp.ui.person.debug.js| | 18230| 13-Apr-21| 07:55 \nspui_person.js| sp.ui.person.js| | 10324| 13-Apr-21| 07:55 \nspui_psd.js| sp.ui.promotedsites.debug.js| | 24862| 13-Apr-21| 07:55 \nspui_ps.js| sp.ui.promotedsites.js| | 15123| 13-Apr-21| 07:55 \nsp.ui.ratings.debug.js| sp.ui.ratings.debug.js| | 20220| 13-Apr-21| 07:55 \nsp.ui.ratings.js| sp.ui.ratings.js| | 11909| 13-Apr-21| 07:55 \nsp.ui.reputation.debug.js| sp.ui.reputation.debug.js| | 42482| 13-Apr-21| 07:55 \nsp.ui.reputation.js| sp.ui.reputation.js| | 25974| 13-Apr-21| 07:55 \nspssoc.js| sp.ui.socialribbon.js| | 20740| 13-Apr-21| 07:55 \nhomeapi.dll_gac| microsoft.sharepoint.homeapi.dll| 16.0.10374.20000| 352192| 13-Apr-21| 07:58 \nhomeapi.dll_isapi| microsoft.sharepoint.homeapi.dll| 16.0.10374.20000| 352192| 13-Apr-21| 07:58 \nportal.dll| microsoft.sharepoint.portal.dll| 16.0.10374.20000| 6995384| 13-Apr-21| 07:55 \nportal.dll_001| microsoft.sharepoint.portal.dll| 16.0.10374.20000| 6995384| 13-Apr-21| 07:55 \nprofileext.sql| profileext.sql| | 1388377| 12-Apr-21| 03:48 \nprofilesrp.sql| profilesrp.sql| | 1553927| 12-Apr-21| 03:48 \nprofilesrp_c.sql| profilesrp_c.sql| | 150583| 12-Apr-21| 03:48 \nprofilesrp_n.sql| profilesrp_n.sql| | 1004057| 12-Apr-21| 03:48 \nantixsslibrary.dll| antixsslibrary.dll| 3.0.3259.31320| 26256| | \nupdate_antixsslibrary.dll| antixsslibrary.dll| 3.0.3259.31320| 26256| 12-Apr-21| 03:24 \nmicrosoft_office_securestoreservice.dll| microsoft.office.securestoreservice.dll| 16.0.10374.20000| 645576| 13-Apr-21| 07:58 \nstsapa.dll| microsoft.sharepoint.applicationpages.administration.dll| 16.0.10374.20000| 688568| 13-Apr-21| 07:55 \nwssadmop.dll_0001| microsoft.sharepoint.administrationoperation.dll| 16.0.10374.20000| 1173472| 13-Apr-21| 07:58 \nanglesharp.dll| anglesharp.dll| 0.9.7| 1203712| | \nupdate_anglesharp.dll| anglesharp.dll| 0.9.7| 1203712| 12-Apr-21| 03:26 \ntimezone.xml| timezone.xml| | 89327| 12-Apr-21| 03:44 \nsiteupgrade.xml| siteupgradelinks.xml| | 534| 12-Apr-21| 03:38 \nsiteupgrade.xml_14| siteupgradelinks.xml| | 534| 12-Apr-21| 03:38 \nmicrosoft.sharepoint.health.dll| microsoft.sharepoint.health.dll| 16.0.10374.20000| 136160| 13-Apr-21| 07:58 \nmicrosoft.sharepoint.identitymodel.dll| microsoft.sharepoint.identitymodel.dll| 16.0.10374.20000| 658344| 13-Apr-21| 07:58 \nmicrosoft.owin.3.0.1.dll| microsoft.owin.dll| 3.0.40213.64| 101032| | \nupdate_microsoft.owin.3.0.1.dll| microsoft.owin.dll| 3.0.40213.64| 101032| 12-Apr-21| 03:26 \nmicrosoft.owin.host.systemweb.3.0.1.dll| microsoft.owin.host.systemweb.dll| 3.0.40213.64| 133288| | \nupdate_microsoft.owin.host.systemweb.3.0.1.dll| microsoft.owin.host.systemweb.dll| 3.0.40213.64| 133288| 12-Apr-21| 03:25 \nmicrosoft.sharepoint.client.dll.x64| microsoft.sharepoint.client.dll| 16.0.10374.20000| 852384| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.dll_0001.x64| microsoft.sharepoint.client.dll| 16.0.10374.20000| 852384| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.phone.dll| microsoft.sharepoint.client.phone.dll| 16.0.10374.20000| 797104| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.portable.dll.x64| microsoft.sharepoint.client.portable.dll| 16.0.10374.20000| 813496| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.portable.dll_gac.x64| microsoft.sharepoint.client.portable.dll| 16.0.10374.20000| 813496| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.serverruntime.dll| microsoft.sharepoint.client.serverruntime.dll| 16.0.10374.20000| 740816| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.serverruntime.dll_0001| microsoft.sharepoint.client.serverruntime.dll| 16.0.10374.20000| 740816| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.client.silverlight.dll.x64| microsoft.sharepoint.client.silverlight.dll| 16.0.10374.20000| 796624| 13-Apr-21| 07:55 \ncontextinfo.dll_0001| microsoft.sharepoint.context.dll| 16.0.10374.20000| 48568| 13-Apr-21| 07:55 \nsplinq.dll| microsoft.sharepoint.linq.dll| 16.0.10374.20000| 388512| 13-Apr-21| 07:55 \nsplinqvs.dll| microsoft.sharepoint.linq.dll| 16.0.10374.20000| 388512| 13-Apr-21| 07:55 \nrenderlist.dll_0001| microsoft.sharepoint.renderlist.dll| 16.0.10374.20000| 22960| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.serverstub.dll| microsoft.sharepoint.serverstub.dll| 16.0.10374.20000| 2882016| 13-Apr-21| 07:55 \nnewtonsoft.json.6.0.8.dll| newtonsoft.json.dll| 6.0.8.18111| 513536| | \nupdate_newtonsoft.json.6.0.8.dll| newtonsoft.json.dll| 6.0.8.18111| 513536| 12-Apr-21| 03:24 \noffprsx.dll| offparser.dll| 16.0.10374.20000| 2139080| 13-Apr-21| 07:55 \nowin.1.0.dll| owin.dll| 1.0| 4608| | \nupdate_owin.1.0.dll| owin.dll| 1.0| 4608| 12-Apr-21| 03:24 \nstslib.dll_0001| microsoft.sharepoint.library.dll| 16.0.10374.20000| 230328| 13-Apr-21| 07:58 \nowssvr.dll_0001| owssvr.dll| 16.0.10374.20000| 6900168| 13-Apr-21| 07:58 \nmicrosoft.sharepoint.powershell.dll_0001| microsoft.sharepoint.powershell.dll| 16.0.10374.20000| 1065920| 13-Apr-21| 07:55 \nmicrosoft.sharepoint.powershell.intl.dll| microsoft.sharepoint.powershell.intl.dll| 16.0.10374.20000| 97224| 13-Apr-21| 07:55 \npsconfig.exe| psconfig.exe| 16.0.10374.20000| 538568| 13-Apr-21| 07:58 \npsconfigui.exe| psconfigui.exe| 16.0.10374.20000| 809952| 13-Apr-21| 07:58 \ncore_0.rsx| core.resx| | 526140| 13-Apr-21| 07:58 \nsts_addgallery_server| microsoft.sharepoint.addgallery.server.dll| 16.0.10374.20000| 118192| 13-Apr-21| 07:55 \nsp.res_0.resx| sp.res.resx| | 78081| 13-Apr-21| 07:55 \nsts.spuchostservice.exe| spuchostservice.exe| 16.0.10374.20000| 154120| 13-Apr-21| 07:58 \nspusercode.dll_0001| microsoft.sharepoint.usercode.dll| 16.0.10374.20000| 26024| 13-Apr-21| 07:58 \ncloudweb.cfg| cloudweb.config| | 79372| 12-Apr-21| 03:39 \nstsom.dll| microsoft.sharepoint.dll| 16.0.10374.20000| 38506928| 13-Apr-21| 07:55 \nstsom.dll_0001| microsoft.sharepoint.dll| 16.0.10374.20000| 38506928| 13-Apr-21| 07:55 \nstsomdr.dll| microsoft.sharepoint.intl.dll| 16.0.10374.20000| 1409968| 13-Apr-21| 07:55 \nweb.cfg| web.config| | 79372| 12-Apr-21| 03:39 \nstsap.dll| microsoft.sharepoint.applicationpages.dll| 16.0.10374.20000| 2448360| 13-Apr-21| 07:55 \nstssoap.dll| stssoap.dll| 16.0.10374.20000| 775616| 13-Apr-21| 07:55 \nsubsetproxy.dll_0001| microsoft.sharepoint.subsetproxy.dll| 16.0.10374.20000| 1140704| 13-Apr-21| 07:55 \nsubsetshim.dll_0001| microsoft.sharepoint.dll| 16.900.rup.rpr| 2449840| 13-Apr-21| 07:58 \nsystem.net.http.formatting.5.2.3.dll| system.net.http.formatting.dll| 5.2.30128.0| 185544| | \nupdate_system.net.http.formatting.5.2.3.dll| system.net.http.formatting.dll| 5.2.30128.0| 185544| 12-Apr-21| 03:25 \nsystem.web.http.5.2.3.dll| system.web.http.dll| 5.2.30128.0| 471240| | \nupdate_system.web.http.5.2.3.dll| system.web.http.dll| 5.2.30128.0| 471240| 12-Apr-21| 03:26 \nblog.xsl| blog.xsl| | 37382| 12-Apr-21| 03:45 \napplications.asx_0014| applications.aspx| | 3998| 12-Apr-21| 03:33 \napps.asx_0014| apps.aspx| | 3974| 12-Apr-21| 03:32 \nbackups.asx_0014| backups.aspx| | 3983| 12-Apr-21| 03:33 \nconfigurationwizards.asx_0014| configurationwizards.aspx| | 4022| 12-Apr-21| 03:33 \ndefault.asx_0014| default.aspx| | 5440| 12-Apr-21| 03:33 \ngenappsettings.asx_0014| generalapplicationsettings.aspx| | 4041| 12-Apr-21| 03:32 \nmonitoring.asx_0014| monitoring.aspx| | 3992| 12-Apr-21| 03:33 \no365config.asx_0015| office365configuration.aspx| | 5180| 12-Apr-21| 03:32 \nsecurity.asx_0014| security.aspx| | 3986| 12-Apr-21| 03:32 \nsysset.asx_0014| systemsettings.aspx| | 4004| 12-Apr-21| 03:33 \nupgandmig.asx_0014| upgradeandmigration.aspx| | 4019| 12-Apr-21| 03:32 \ndepl.xsd.x64| deploymentmanifest.xsd| | 91463| 12-Apr-21| 03:46 \ndip.js| dip.js| | 50374| 12-Apr-21| 03:48 \ndip.js_14| dip.js| | 50374| 12-Apr-21| 03:48 \nfldtypes.xsl| fldtypes.xsl| | 134868| 12-Apr-21| 03:47 \ninternal.xsl| internal.xsl| | 11270| 12-Apr-21| 03:46 \naccreqctl.debug.js| accessrequestscontrol.debug.js| | 20696| 13-Apr-21| 07:55 \naccreqctl.js| accessrequestscontrol.js| | 11682| 13-Apr-21| 07:55 \naccreqviewtmpl.debug.js| accessrequestsviewtemplate.debug.js| | 50013| 13-Apr-21| 07:55 \naccreqviewtmpl.js| accessrequestsviewtemplate.js| | 22931| 13-Apr-21| 07:55 \nappcatalogfieldtemplate.debug.js| appcatalogfieldtemplate.debug.js| | 9638| 13-Apr-21| 07:55 \nappcatalogfieldtemplate.js| appcatalogfieldtemplate.js| | 3693| 13-Apr-21| 07:55 \nappdeveloperdash.debug.js| appdeveloperdash.debug.js| | 23162| 13-Apr-21| 07:55 \nappdeveloperdash.js| appdeveloperdash.js| | 11550| 13-Apr-21| 07:55 \napprequestmanagefieldtemplate.debug.js| apprequestmanagefieldtemplate.debug.js| | 2771| 13-Apr-21| 07:55 \napprequestmanagefieldtemplate.js| apprequestmanagefieldtemplate.js| | 1474| 13-Apr-21| 07:55 \nautofill.debug.js| autofill.debug.js| | 20542| 13-Apr-21| 07:55 \nautofill.js| autofill.js| | 11560| 13-Apr-21| 07:55 \nautohostedlicensingtemplates.debug.js| autohostedlicensingtemplates.debug.js| | 21187| 13-Apr-21| 07:55 \nautohostedlicensingtemplates.js| autohostedlicensingtemplates.js| | 8987| 13-Apr-21| 07:55 \nbform.debug.js| bform.debug.js| | 460795| 13-Apr-21| 07:55 \nbform.js| bform.js| | 259447| 13-Apr-21| 07:55 \nblank.debug.js| blank.debug.js| | 755| 13-Apr-21| 07:55 \nblank.js| blank.js| | 454| 13-Apr-21| 07:55 \ncallout.debug.js| callout.debug.js| | 92058| 13-Apr-21| 07:55 \ncallout.js| callout.js| | 29840| 13-Apr-21| 07:55 \nchoicebuttonfieldtemplate.debug.js| choicebuttonfieldtemplate.debug.js| | 6382| 13-Apr-21| 07:55 \nchoicebuttonfieldtemplate.js| choicebuttonfieldtemplate.js| | 2741| 13-Apr-21| 07:55 \nclientforms.debug.js| clientforms.debug.js| | 156496| 13-Apr-21| 07:55 \nclientforms.js| clientforms.js| | 79485| 13-Apr-21| 07:55 \nclientpeoplepicker.debug.js| clientpeoplepicker.debug.js| | 83429| 13-Apr-21| 07:55 \nclientpeoplepicker.js| clientpeoplepicker.js| | 44308| 13-Apr-21| 07:55 \nclientrenderer.debug.js| clientrenderer.debug.js| | 30681| 13-Apr-21| 07:55 \nclientrenderer.js| clientrenderer.js| | 12958| 13-Apr-21| 07:55 \nclienttemplates.debug.js| clienttemplates.debug.js| | 398977| 13-Apr-21| 07:55 \nclienttemplates.js| clienttemplates.js| | 203892| 13-Apr-21| 07:55 \ncommonvalidation.debug.js| commonvalidation.debug.js| | 6758| 13-Apr-21| 07:55 \ncomval.js| commonvalidation.js| | 4222| 13-Apr-21| 07:55 \ncore.debug.js| core.debug.js| | 956325| 13-Apr-21| 07:55 \ncore.js_0001| core.js| | 507438| 13-Apr-21| 07:55 \ncreatesharedfolderdialog.debug.js| createsharedfolderdialog.debug.js| | 43148| 13-Apr-21| 07:55 \ncreatesharedfolderdialog.js| createsharedfolderdialog.js| | 18920| 13-Apr-21| 07:55 \ndatepicker.debug.js| datepicker.debug.js| | 160480| 13-Apr-21| 07:55 \ndatepick.js| datepicker.js| | 71515| 13-Apr-21| 07:55 \ndesigngallery.debug.js| designgallery.debug.js| | 47390| 13-Apr-21| 07:55 \ndesigngallery.js| designgallery.js| | 29173| 13-Apr-21| 07:55 \ndevdash.debug.js| devdash.debug.js| | 89841| 13-Apr-21| 07:55 \ndevdash.js| devdash.js| | 38402| 13-Apr-21| 07:55 \ndragdrop.debug.js| dragdrop.debug.js| | 237831| 13-Apr-21| 07:55 \ndragdrop.js| dragdrop.js| | 122516| 13-Apr-21| 07:55 \nentityeditor.debug.js| entityeditor.debug.js| | 73995| 13-Apr-21| 07:55 \nentityeditor.js| entityeditor.js| | 38997| 13-Apr-21| 07:55 \nfilepreview.debug.js| filepreview.debug.js| | 25986| 13-Apr-21| 07:55 \nfilepreview.js| filepreview.js| | 14044| 13-Apr-21| 07:55 \nfoldhyperlink.debug.js| foldhyperlink.debug.js| | 3924| 13-Apr-21| 07:55 \nfoldhyperlink.js| foldhyperlink.js| | 1861| 13-Apr-21| 07:55 \nform.debug.js| form.debug.js| | 241306| 13-Apr-21| 07:55 \nform.js| form.js| | 129250| 13-Apr-21| 07:55 \nganttscript.debug.js| ganttscript.debug.js| | 9384| 13-Apr-21| 07:55 \nganttscr.js| ganttscript.js| | 5098| 13-Apr-21| 07:55 \ngeolocationfieldtemplate.debug.js| geolocationfieldtemplate.debug.js| | 41051| 13-Apr-21| 07:55 \ngeolocationfieldtemplate.js| geolocationfieldtemplate.js| | 15434| 13-Apr-21| 07:55 \ngroupboard.debug.js| groupboard.debug.js| | 16339| 13-Apr-21| 07:55 \ngroupboard.js| groupboard.js| | 9548| 13-Apr-21| 07:55 \ngroupeditempicker.debug.js| groupeditempicker.debug.js| | 21014| 13-Apr-21| 07:55 \ngip.js| groupeditempicker.js| | 12055| 13-Apr-21| 07:55 \nhierarchytaskslist.debug.js| hierarchytaskslist.debug.js| | 60796| 13-Apr-21| 07:55 \nhierarchytaskslist.js| hierarchytaskslist.js| | 20086| 13-Apr-21| 07:55 \nimglib.debug.js| imglib.debug.js| | 91322| 13-Apr-21| 07:55 \nimglib.js| imglib.js| | 53905| 13-Apr-21| 07:55 \ninit.debug.js| init.debug.js| | 626836| 13-Apr-21| 07:55 \ninit.js_0001| init.js| | 303224| 13-Apr-21| 07:55 \ninplview.debug.js| inplview.debug.js| | 156138| 13-Apr-21| 07:55 \ninplview.js| inplview.js| | 79676| 13-Apr-21| 07:55 \njsgrid.debug.js| jsgrid.debug.js| | 1186695| 13-Apr-21| 07:55 \njsgrid.gantt.debug.js| jsgrid.gantt.debug.js| | 110109| 13-Apr-21| 07:55 \njsgrid.gantt.js| jsgrid.gantt.js| | 42304| 13-Apr-21| 07:55 \njsgrid.js| jsgrid.js| | 445122| 13-Apr-21| 07:55 \nlanguagepickercontrol.js| languagepickercontrol.js| | 11516| 13-Apr-21| 07:55 \nlistview.debug.js| listview.debug.js| | 933331| 13-Apr-21| 07:55 \nlistview.js| listview.js| | 401278| 13-Apr-21| 07:55 \nmapviewtemplate.debug.js| mapviewtemplate.debug.js| | 38394| 13-Apr-21| 07:55 \nmapviewtemplate.js| mapviewtemplate.js| | 15542| 13-Apr-21| 07:55 \nmenu.debug.js| menu.debug.js| | 103516| 13-Apr-21| 07:55 \nmenu.js_0001| menu.js| | 52559| 13-Apr-21| 07:55 \nsuitenav.js| suitenav.js| | 205345| 12-Apr-21| 03:31 \nsuitenavstandalone.js| suitenavstandalone.js| | 244520| 12-Apr-21| 03:31 \nmountpt.debug.js| mountpoint.debug.js| | 13632| 13-Apr-21| 07:55 \nmountpt.js| mountpoint.js| | 6211| 13-Apr-21| 07:55 \nmquery.debug.js| mquery.debug.js| | 60340| 13-Apr-21| 07:55 \nmquery.js| mquery.js| | 22614| 13-Apr-21| 07:55 \nms.rte.debug.js| ms.rte.debug.js| | 717392| 13-Apr-21| 07:55 \nms.rte.js| ms.rte.js| | 402861| 13-Apr-21| 07:55 \noffline.debug.js| offline.debug.js| | 22154| 13-Apr-21| 07:55 \noffline.js| offline.js| | 11383| 13-Apr-21| 07:55 \nows.debug.js| ows.debug.js| | 714698| 13-Apr-21| 07:55 \nows.js| ows.js| | 377272| 13-Apr-21| 07:55 \nowsbrows.debug.js| owsbrows.debug.js| | 24954| 13-Apr-21| 07:55 \nowsbrows.js| owsbrows.js| | 13300| 13-Apr-21| 07:55 \npickerhierarchycontrol.js| pickerhierarchycontrol.js| | 84676| 13-Apr-21| 07:55 \npivotcontrol.debug.js| pivotcontrol.debug.js| | 18165| 12-Apr-21| 03:36 \npivotcontrol.js| pivotcontrol.js| | 8592| 12-Apr-21| 03:36 \nquicklaunch.debug.js| quicklaunch.debug.js| | 135522| 13-Apr-21| 07:55 \nquicklaunch.js| quicklaunch.js| | 74048| 13-Apr-21| 07:55 \nradiobuttonwithchildren.js| radiobuttonwithchildren.js| | 3555| 13-Apr-21| 07:55 \nroamingapps.debug.js| roamingapps.debug.js| | 55031| 13-Apr-21| 07:55 \nroamingapps.js| roamingapps.js| | 21853| 13-Apr-21| 07:55 \nsharing.debug.js| sharing.debug.js| | 322361| 13-Apr-21| 07:55 \nsharing.js| sharing.js| | 135348| 13-Apr-21| 07:55 \nsharingmodern.debug.js| sharingmodern.debug.js| | 18196| 13-Apr-21| 07:55 \nsharingmodern.js| sharingmodern.js| | 5805| 13-Apr-21| 07:55 \nsinglesignon.debug.js| singlesignon.debug.js| | 17059| 13-Apr-21| 07:55 \nsinglesignon.js| singlesignon.js| | 6060| 13-Apr-21| 07:55 \nsiteupgrade.debug.js| siteupgrade.debug.js| | 1693| 13-Apr-21| 07:55 \nsiteupgrade.debug.js_14| siteupgrade.debug.js| | 1693| 13-Apr-21| 07:55 \nsiteupgrade.js| siteupgrade.js| | 1119| 13-Apr-21| 07:55 \nsiteupgrade.js_14| siteupgrade.js| | 1119| 13-Apr-21| 07:55 \nsp.accessibility.debug.js| sp.accessibility.debug.js| | 34811| 13-Apr-21| 07:55 \nsp.accessibility.js| sp.accessibility.js| | 21841| 13-Apr-21| 07:55 \nsp.core.debug.js| sp.core.debug.js| | 166073| 13-Apr-21| 07:55 \nsp.core.js| sp.core.js| | 87928| 13-Apr-21| 07:55 \nsp.datetimeutil.debug.js| sp.datetimeutil.debug.js| | 116020| 13-Apr-21| 07:55 \nsp.datetimeutil.js| sp.datetimeutil.js| | 66950| 13-Apr-21| 07:55 \nsp.debug.js| sp.debug.js| | 1703154| 13-Apr-21| 07:55 \nsp.exp.debug.js| sp.exp.debug.js| | 41182| 13-Apr-21| 07:55 \nsp.exp.js| sp.exp.js| | 24498| 13-Apr-21| 07:55 \nsp.init.debug.js| sp.init.debug.js| | 57831| 13-Apr-21| 07:55 \nsp.init.js| sp.init.js| | 32952| 13-Apr-21| 07:55 \nsp.js| sp.js| | 1042985| 13-Apr-21| 07:55 \nspmap.debug.js| sp.map.debug.js| | 15759| 13-Apr-21| 07:55 \nspmap.js| sp.map.js| | 8531| 13-Apr-21| 07:55 \nsppageinstr.debug.js| sp.pageinstrumentation.debug.js| | 1925| 13-Apr-21| 07:55 \nsppageinstr.js| sp.pageinstrumentation.js| | 1395| 13-Apr-21| 07:55 \nsp.requestexecutor.debug.js| sp.requestexecutor.debug.js| | 100405| 13-Apr-21| 07:55 \nsp.requestexecutor.js| sp.requestexecutor.js| | 63696| 13-Apr-21| 07:55 \nsp.ribbon.debug.js| sp.ribbon.debug.js| | 361474| 13-Apr-21| 07:55 \nsp.ribbon.js| sp.ribbon.js| | 222917| 13-Apr-21| 07:55 \nsp.runtime.debug.js| sp.runtime.debug.js| | 197022| 13-Apr-21| 07:55 \nsp.runtime.js| sp.runtime.js| | 115684| 13-Apr-21| 07:55 \nsp.simpleloggermobile.debug.js| sp.simpleloggermobile.debug.js| | 40931| 13-Apr-21| 07:55 \nsp.simpleloggermobile.js| sp.simpleloggermobile.js| | 20442| 13-Apr-21| 07:55 \nsp.storefront.debug.js| sp.storefront.debug.js| | 443986| 13-Apr-21| 07:55 \nsp.storefront.js| sp.storefront.js| | 299460| 13-Apr-21| 07:55 \nsp.ui.admin.debug.js| sp.ui.admin.debug.js| | 18904| 13-Apr-21| 07:55 \nsp.ui.admin.js| sp.ui.admin.js| | 11611| 13-Apr-21| 07:55 \nsp.ui.allapps.debug.js| sp.ui.allapps.debug.js| | 45304| 13-Apr-21| 07:55 \nsp.ui.allapps.js| sp.ui.allapps.js| | 27972| 13-Apr-21| 07:55 \nsp.ui.applicationpages.calendar.debug.js| sp.ui.applicationpages.calendar.debug.js| | 278413| 13-Apr-21| 07:55 \nsp.ui.applicationpages.calendar.js| sp.ui.applicationpages.calendar.js| | 143448| 13-Apr-21| 07:55 \nsp.ui.applicationpages.debug.js| sp.ui.applicationpages.debug.js| | 11283| 13-Apr-21| 07:55 \nsp.ui.applicationpages.js| sp.ui.applicationpages.js| | 7682| 13-Apr-21| 07:55 \nsp.ui.bdcadminpages.debug.js| sp.ui.bdcadminpages.debug.js| | 16634| 13-Apr-21| 07:55 \nsp.ui.bdcadminpages.js| sp.ui.bdcadminpages.js| | 11650| 13-Apr-21| 07:55 \nspblogd.js| sp.ui.blogs.debug.js| | 51882| 13-Apr-21| 07:55 \nspblog.js| sp.ui.blogs.js| | 31202| 13-Apr-21| 07:55 \nsp.ui.combobox.debug.js| sp.ui.combobox.debug.js| | 100153| 13-Apr-21| 07:55 \nsp.ui.combobox.js| sp.ui.combobox.js| | 52056| 13-Apr-21| 07:55 \nsp.ui.controls.debug.js| sp.ui.controls.debug.js| | 58556| 13-Apr-21| 07:55 \nsp.ui.controls.js| sp.ui.controls.js| | 39727| 13-Apr-21| 07:55 \nsp.ui.dialog.debug.js| sp.ui.dialog.debug.js| | 75579| 13-Apr-21| 07:55 \nsp.ui.dialog.js| sp.ui.dialog.js| | 44112| 13-Apr-21| 07:55 \nspdiscd.js| sp.ui.discussions.debug.js| | 136965| 13-Apr-21| 07:55 \nspdisc.js| sp.ui.discussions.js| | 81948| 13-Apr-21| 07:55 \nspimgcd.js| sp.ui.imagecrop.debug.js| | 28399| 13-Apr-21| 07:55 \nspimgc.js| sp.ui.imagecrop.js| | 28399| 13-Apr-21| 07:55 \nspui_rid.js| sp.ui.relateditems.debug.js| | 29224| 13-Apr-21| 07:55 \nspui_ri.js| sp.ui.relateditems.js| | 18376| 13-Apr-21| 07:55 \nsp.ui.rte.debug.js| sp.ui.rte.debug.js| | 356388| 13-Apr-21| 07:55 \nsp.ui.rte.js| sp.ui.rte.js| | 218138| 13-Apr-21| 07:55 \nsp.ui.tileview.debug.js| sp.ui.tileview.debug.js| | 100921| 13-Apr-21| 07:55 \nsp.ui.tileview.js| sp.ui.tileview.js| | 61800| 13-Apr-21| 07:55 \nspui_tld.js| sp.ui.timeline.debug.js| | 488762| 13-Apr-21| 07:55 \nspui_tl.js| sp.ui.timeline.js| | 265916| 13-Apr-21| 07:55 \nspgantt.debug.js| spgantt.debug.js| | 193531| 13-Apr-21| 07:55 \nspgantt.js| spgantt.js| | 70034| 13-Apr-21| 07:55 \nspgridview.debug.js| spgridview.debug.js| | 7876| 13-Apr-21| 07:55 \nspgridvw.js| spgridview.js| | 4901| 13-Apr-21| 07:55 \nstart.debug.js| start.debug.js| | 185210| 13-Apr-21| 07:55 \nstart.js| start.js| | 101322| 13-Apr-21| 07:55 \nsuitelinks.debug.js| suitelinks.debug.js| | 32319| 13-Apr-21| 07:55 \nsuitelnk.js| suitelinks.js| | 13506| 13-Apr-21| 07:55 \ntimecard.debug.js| timecard.debug.js| | 37455| 13-Apr-21| 07:55 \ntimecard.js| timecard.js| | 21190| 13-Apr-21| 07:55 \ntouchapp.js| touchapp.js| | 498041| 12-Apr-21| 03:36 \nwpadder.debug.js| wpadder.debug.js| | 52865| 13-Apr-21| 07:55 \nwpadder.js| wpadder.js| | 33268| 13-Apr-21| 07:55 \nwpcm.debug.js| wpcm.debug.js| | 7521| 13-Apr-21| 07:55 \nwpcm.js| wpcm.js| | 3847| 13-Apr-21| 07:55 \nmain.xsl| main.xsl| | 6124| 12-Apr-21| 03:47 \nsigstore.dll| sigstore.dll| | 19888| | \nupdate_sigstore.dll| sigstore.dll| | 19888| 12-Apr-21| 03:33 \nstore.sql| store.sql| | 8074807| 12-Apr-21| 03:34 \nstore.xml| store.xml| | 8917277| 13-Apr-21| 07:55 \nstoreazure.xml| store_azure.xml| | 8917277| 13-Apr-21| 07:55 \nusagedb.sql| usagedb.sql| | 88742| 12-Apr-21| 03:34 \nusgdbup.sql| usgdbup.sql| | 88551| 12-Apr-21| 03:33 \nappassoc.asx| applicationassociations.aspx| | 5504| 12-Apr-21| 03:36 \nauthen.asx| authentication.aspx| | 13965| 12-Apr-21| 03:36 \nblkftyp.asx| blockedfiletype.aspx| | 4282| 12-Apr-21| 03:36 \ndftcntdb.asx| defaultcontentdb.aspx| | 6243| 12-Apr-21| 03:36 \nhealrepo.asx| healthreport.aspx| | 6499| 12-Apr-21| 03:36 \nincemail.asx| incomingemail.aspx| | 22663| 12-Apr-21| 03:36 \nirmadmin.asx| irmadmin.aspx| | 8804| 12-Apr-21| 03:36 \nlogusage.asx| logusage.aspx| | 14555| 12-Apr-21| 03:36 \nmetrics.asx| metrics.aspx| | 15403| 12-Apr-21| 03:36 \nofadmin.asx| officialfileadmin.aspx| | 13839| 12-Apr-21| 03:36 \nprivacy.asx| privacy.aspx| | 10182| 12-Apr-21| 03:36 \nslctcfaz.asx| selectcrossfirewallaccesszone.aspx| | 5643| 12-Apr-21| 03:36 \nsvcappcn.asx| serviceapplicationconnect.aspx| | 5027| 12-Apr-21| 03:37 \nsiteex.asx| siteandlistexport.aspx| | 12538| 12-Apr-21| 03:36 \nsitebaks.asx| sitebackuporexportstatus.aspx| | 10389| 12-Apr-21| 03:36 \nsitecbac.asx| sitecollectionbackup.aspx| | 10764| 12-Apr-21| 03:37 \nsitequot.asx| sitequota.aspx| | 24455| 12-Apr-21| 03:36 \nspscrstg.asx_0002| spsecuritysettings.aspx| | 7731| 12-Apr-21| 03:36 \nunatcdb.asx| unattacheddbselect.aspx| | 6322| 12-Apr-21| 03:37 \nuser_solution.asx| usersolutions.aspx| | 9571| 12-Apr-21| 03:37 \nlightbox.asx| lightbox.aspx| | 10265| 12-Apr-21| 03:44 \ndialog.mas| dialog.master| | 13033| 12-Apr-21| 03:34 \nshare.asx| share.aspx| | 47815| 12-Apr-21| 03:44 \nupload.asx_1| upload.aspx| | 17828| 12-Apr-21| 03:44 \nversions.asx| versions.aspx| | 37378| 12-Apr-21| 03:44 \nwss.rsx| wss.resx| | 762444| 13-Apr-21| 07:55 \nofadmin.aspx_tenantadmin| ta_officialfileadmin.aspx| | 11593| 12-Apr-21| 03:48 \nvwstyles.xsl| vwstyles.xsl| | 131251| 12-Apr-21| 03:45 \nowstimer.exe_0001| owstimer.exe| 16.0.10374.20000| 80808| 13-Apr-21| 07:57 \nmicrosoft.extensions.dependencyinjection.abstractions.1.0.0.dll| microsoft.extensions.dependencyinjection.abstractions.dll| 1.0.0.20622| 35728| | \nupdate_microsoft.extensions.dependencyinjection.abstractions.1.0.0.dll| microsoft.extensions.dependencyinjection.abstractions.dll| 1.0.0.20622| 35728| 12-Apr-21| 03:32 \nmicrosoft.extensions.dependencyinjection.1.0.0.dll| microsoft.extensions.dependencyinjection.dll| 1.0.0.20622| 37280| | \nupdate_microsoft.extensions.dependencyinjection.1.0.0.dll| microsoft.extensions.dependencyinjection.dll| 1.0.0.20622| 37280| 12-Apr-21| 03:31 \nmicrosoft.odata.core.7.0.0.dll| microsoft.odata.core.dll| 7.0.0.0| 1395624| | \nupdate_microsoft.odata.core.7.0.0.dll| microsoft.odata.core.dll| 7.0.0.0| 1395624| 12-Apr-21| 03:31 \nmicrosoft.odata.edm.7.0.0.dll| microsoft.odata.edm.dll| 7.0.0.0| 780184| | \nupdate_microsoft.odata.edm.7.0.0.dll| microsoft.odata.edm.dll| 7.0.0.0| 780184| 12-Apr-21| 03:32 \nmicrosoft.spatial.7.0.0.dll| microsoft.spatial.dll| 7.0.0.0| 135600| | \nupdate_microsoft.spatial.7.0.0.dll| microsoft.spatial.dll| 7.0.0.0| 135600| 12-Apr-21| 03:31 \nmicrosoft.vroom.sharepoint.dll| microsoft.vroom.sharepoint.dll| 16.0.10374.20000| 623544| 13-Apr-21| 07:55 \nsystem.collections.immutable.1.2.0.dll| system.collections.immutable.dll| 1.0.24212.01| 174016| | \nupdate_system.collections.immutable.1.2.0.dll| system.collections.immutable.1.2.0.dll| 1.0.24212.01| 174016| 12-Apr-21| 03:32 \nsystem.web.http.owin.5.2.3.dll| system.web.http.owin.dll| 5.2.30128.0| 64400| | \nupdate_system.web.http.owin.5.2.3.dll| system.web.http.owin.dll| 5.2.30128.0| 64400| 12-Apr-21| 03:32 \nsystem.web.odata.6.0.0.dll| system.web.odata.dll| 6.0.40914.0| 779688| | \nupdate_system.web.odata.6.0.0.dll| system.web.odata.dll| 6.0.40914.0| 779688| 12-Apr-21| 03:32 \nspwriter.exe_0001| spwriter.exe| 16.0.10374.20000| 51136| 13-Apr-21| 07:55 \nstswel.dll| stswel.dll| 16.0.10374.20000| 3670472| 13-Apr-21| 07:58 \nstswfacb.dll| microsoft.sharepoint.workflowactions.dll| 16.0.10374.20000| 312776| 13-Apr-21| 07:58 \nstswfact.dll| microsoft.sharepoint.workflowactions.dll| 16.0.10374.20000| 312776| 13-Apr-21| 07:58 \nsts.workflows.dll| microsoft.sharepoint.workflows.dll| 16.0.10374.20000| 65464| 13-Apr-21| 07:58 \nie50up.debug.js| ie50up.debug.js| | 155104| 13-Apr-21| 07:57 \nie50up.js| ie50up.js| | 81713| 13-Apr-21| 07:57 \nie55up.debug.js| ie55up.debug.js| | 154298| 13-Apr-21| 07:57 \nie55up.js| ie55up.js| | 81174| 13-Apr-21| 07:57 \nnon_ie.debug.js| non_ie.debug.js| | 102961| 13-Apr-21| 07:57 \nnon_ie.js| non_ie.js| | 60386| 13-Apr-21| 07:57 \nbpstd.debug.js| bpstd.debug.js| | 8308| 13-Apr-21| 07:55 \nbpstd.js| bpstd.js| | 4687| 13-Apr-21| 07:55 \nctp.debug.js| ctp.debug.js| | 8054| 13-Apr-21| 07:55 \nctp.js| ctp.js| | 4242| 13-Apr-21| 07:55 \ncvtp.debug.js| cvtp.debug.js| | 5066| 13-Apr-21| 07:55 \ncvtp.js| cvtp.js| | 2702| 13-Apr-21| 07:55 \nitp.debug.js| itp.debug.js| | 13120| 13-Apr-21| 07:55 \nitp.js| itp.js| | 9812| 13-Apr-21| 07:55 \nxtp.debug.js| xtp.debug.js| | 3605| 13-Apr-21| 07:55 \nxtp.js| xtp.js| | 1799| 13-Apr-21| 07:55 \nconversion.office.msosvgwin32server.dll| msosvgwin32server.dll| 16.0.10374.20000| 1799608| 13-Apr-21| 07:58 \nppt.conversion.msosvgwin32server.dll| msosvgwin32server.dll| 16.0.10374.20000| 1799608| 13-Apr-21| 07:58 \nppt.edit.msosvgwin32server.dll| msosvgwin32server.dll| 16.0.10374.20000| 1799608| 13-Apr-21| 07:58 \nosrv_sandbox.dll| microsoft.office.server.sandbox.dll| 16.0.10374.20000| 761296| 13-Apr-21| 07:56 \nmicrosoft.office.web.sandbox.dll| microsoft.office.web.sandbox.dll| 16.0.10374.20000| 761288| 13-Apr-21| 07:56 \nsts_sandbox.dll| microsoft.sharepoint.sandbox.dll| 16.0.10374.20000| 761288| 13-Apr-21| 07:56 \nvisfilt.dll.x64| visfilt.dll| 16.0.10374.20000| 6143424| 13-Apr-21| 07:58 \nvsrvwfe.dll| microsoft.office.visio.server.dll| 16.0.10374.20000| 2023864| 13-Apr-21| 07:57 \nvsrvvgs.dll| microsoft.office.visio.server.graphicsserver.dll| 16.0.10374.20000| 1299376| 13-Apr-21| 07:57 \nvisioserver.vutils.dll| vutils.dll| 16.0.10374.20000| 3149200| 13-Apr-21| 07:56 \noffice365icons.eot| office365icons.eot| | 84528| | \noffice365icons_1.eot| office365icons.eot| | 84528| 21-Mar-21| 04:26 \nsts_odspnextnewux1f1ebb360d2bde34a50cf953c975391e| createsite.js| | 1072105| 21-Mar-21| 05:43 \nsts_odspnextnewux1efa61166de43c71668b949c99f0686b| listitemformdeferred.js| | 2261447| 10-Apr-21| 08:03 \nsts_odspnextnewuxcd202787c8a8cb28e2c71ee818995ab3| listitemformexecutors.js| | 618554| 10-Apr-21| 08:03 \nsts_odspnextnewuxe8f363779e230efb9d852eceace8ab24| listitemformreactcontrols.js| | 199950| 10-Apr-21| 08:03 \nsts_odspnextnewux71d8b89e6d9d95995887b0a27dbc8f99| listitemformscenario.js| | 882914| 10-Apr-21| 08:03 \nsts_odspnextnewuxbe3313501487c79fe05e26c262deaaa9| createsite.json| | 43509| 10-Apr-21| 08:03 \nsts_odspnextnewux73bf67ca708ed0b9bbee05da7d4ab95b| listitemform.json| | 178963| 10-Apr-21| 08:03 \nodbonedrive.json| odbonedrive.json| | 359933| 10-Apr-21| 08:03 \nsts_odspnextnewux0caa67c96a8a488d88a0b64e58cf6219| recyclebin.json| | 190098| 10-Apr-21| 08:03 \nsts_odspnextnewux82ec74261e20424f9653d60d8846afce| sitehub.json| | 225442| 10-Apr-21| 08:03 \nsts_odspnextnewuxc2feb86763199de55a499729d395cb83| splist.json| | 302157| 10-Apr-21| 08:03 \nsts_odspnextnewuxc4da3cf2e6b1ad11477e32ac2c90cea6| odbdeferred.js| | 2425266| 10-Apr-21| 08:03 \nsts_odspnextnewux308f9878bc3bd35d6e7c02477ff10b6f| odbdeferredcontrols.js| | 690377| 10-Apr-21| 08:03 \nsts_odspnextnewux9e5f0d05cada29614b74c28d9065e102| odbexecutors.js| | 963199| 10-Apr-21| 08:03 \nsts_odspnextnewuxc563bd732bac9201f0dcad0747118e6b| odbfiles.js| | 857033| 21-Mar-21| 05:44 \nsts_odspnextnewux5964abaa1561be691a032b47f1bdd7b4| odbfiles2.js| | 205446| 21-Mar-21| 05:44 \nsts_odspnextnewux8c0380eb9a20542616b7c1feeac0f995| odbonedrive.js| | 678317| 21-Mar-21| 05:44 \nsts_odspnextnewuxc20d13897d513d628243ef8eadce0dfe| odbonedriveapp.js| | 410305| 21-Mar-21| 05:44 \nsts_odspnextnewux6e3d88bd0f1447b264307d9749f011bc| odboneup.js| | 354486| 21-Mar-21| 05:44 \nsts_odspnextnewux4a79707daf48fcca13da03638a9e77b8| odbreactcontrols.js| | 593612| 10-Apr-21| 08:03 \nsts_odspnextnewux57f35b229017c79fd2db2964ca66fbca| odbsites.js| | 149260| 21-Mar-21| 05:44 \nsts_odspnextnewuxdf192495e18fd01667a80b7f5657d569| odbtiles.js| | 261599| 21-Mar-21| 05:44 \nsts_odspnextnewux1a2b15ed274bbfbba6d5eaa8be1efc60| odbuploadmanager.js| | 64717| 21-Mar-21| 05:44 \nsts_odspnextnewux795d12a100cd0691f928c64b88b80240| odrestore.js| | 367704| 21-Mar-21| 05:44 \nsts_odspnextnewuxb04c6bd9af89e0b8de15413f309e7ade| 112x80_blankdocument.png| | 206| 21-Mar-21| 05:44 \nsts_odspnextnewux54576faed46c6dfea9ae9eb039a20d20| 112x80_default_back.png| | 478| 21-Mar-21| 05:44 \nsts_odspnextnewux5283eb8f4cab57bb8fc15650a0d92f99| 112x80_default_front.png| | 774| 21-Mar-21| 05:44 \nsts_odspnextnewux6afbec05ecfc043a474f4964397533b7| 112x80_photo_front.png| | 580| 21-Mar-21| 05:44 \nsts_odspnextnewuxc213e014150d89455dba0fb815be612f| 112x80_photos_back.png| | 645| 21-Mar-21| 05:44 \nsts_odspnextnewuxf9ae978879649d30526534752882f692| 112x80_shadow.png| | 545| 21-Mar-21| 05:44 \nsts_odspnextnewux4c0d7498c1ef7a1534ccb3701897c981| 112x80_shadow_empty.png| | 529| 21-Mar-21| 05:44 \nsts_odspnextnewux9ffcc6e0423cb2cf4d2279bbba952eb4| 72x52_blankdocument.png| | 158| 21-Mar-21| 05:44 \nsts_odspnextnewux322aceb9f2715ebb19952afe869c2d0e| 72x52_default_back.png| | 333| 21-Mar-21| 05:44 \nsts_odspnextnewux7741d42fb8239e3ac5fd1a56cabf10a4| 72x52_default_front.png| | 534| 21-Mar-21| 05:44 \nsts_odspnextnewuxf2d1c3d60bf986902ce0af4a3071dad9| 72x52_photos_back.png| | 426| 21-Mar-21| 05:44 \nsts_odspnextnewuxcace19a340d6a2d63e36484366da4af9| 72x52_photos_front.png| | 467| 21-Mar-21| 05:44 \nsts_odspnextnewux9e87e72501f75739fab4d90fe2fbd053| 72x52_shadow.png| | 447| 21-Mar-21| 05:44 \nsts_odspnextnewux91ea61cfe45f5a4886ea97f8b3e9df0f| 72x52_shadow_empty.png| | 441| 21-Mar-21| 05:44 \nsts_odspnextnewux0c84be7e892dce2fb4ae731c6b9a14ee| folder-large_backplate.png| | 545| 21-Mar-21| 05:44 \nsts_odspnextnewuxb362e9cb71ddd733f36d1adcd6dc7f4d| folder-large_backplate.svg| | 1175| 21-Mar-21| 05:44 \nsts_odspnextnewux404603879511a4af70482fd310157cdd| folder-large_flap_default.svg| | 1195| 21-Mar-21| 05:44 \nsts_odspnextnewux0d134d5b66025651d495eab3555b15d8| folder-large_flap_media.svg| | 1212| 21-Mar-21| 05:44 \nsts_odspnextnewux5c6f7a05c3d558d10d5cc95cd386eadc| folder-large_frontplate_nopreview.png| | 1334| 21-Mar-21| 05:44 \nsts_odspnextnewux6168c5a9d68489dba620e12ff64ba180| folder-large_frontplate_nopreview.svg| | 871| 21-Mar-21| 05:44 \nsts_odspnextnewux838f5a64bacc969feceaa93510aed1b4| folder-large_frontplate_thumbnail.png| | 1597| 21-Mar-21| 05:44 \nsts_odspnextnewux298c9d1a11a533c493ed146a2c555568| folder-large_frontplate_thumbnail.svg| | 871| 21-Mar-21| 05:44 \nsts_odspnextnewux9a5e4bf68c23039c663575b25f34361c| folder-small_backplate.png| | 459| 21-Mar-21| 05:44 \nsts_odspnextnewuxb742d6ff581d9d0e32238529044b9953| folder-small_backplate.svg| | 1156| 21-Mar-21| 05:44 \nsts_odspnextnewux9ced1d81dfe4631d43ef958edc4ba5d0| folder-small_flap_default.svg| | 1177| 21-Mar-21| 05:44 \nsts_odspnextnewux6b6dc99cb33e983665320f56766c7a15| folder-small_flap_media.svg| | 1195| 21-Mar-21| 05:44 \nsts_odspnextnewux04960d6ce0ad6a1742dd535546397b7d| folder-small_frontplate_nopreview.png| | 1057| 21-Mar-21| 05:44 \nsts_odspnextnewux8b0b149721f293226894dec4f36a7ab7| folder-small_frontplate_nopreview.svg| | 773| 21-Mar-21| 05:44 \nsts_odspnextnewux86f9124932bf14a49d845a4757f76a02| folder-small_frontplate_thumbnail.png| | 891| 21-Mar-21| 05:44 \nsts_odspnextnewux559328626fe966ab52f042408dfe22f2| folder-small_frontplate_thumbnail.svg| | 770| 21-Mar-21| 05:44 \nsts_odspnextnewux928db2dc492aad740d1dd70509dd229e| lg-bg.svg| | 1176| 21-Mar-21| 05:44 \nsts_odspnextnewux20c4a9a1c94fd22a3e33ee82a7305fea| lg-fg.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewux3a20f7582f17dcc933da585ad75d025c| lg-fg-media.svg| | 1013| 21-Mar-21| 05:44 \nsts_odspnextnewuxf7b61e9dacc1e0386920e7c35976959e| s-ldefaultback.png| | 333| 21-Mar-21| 05:44 \nsts_odspnextnewux82651529693d43a777ae3f006def616d| s-ldefaultfront.png| | 534| 21-Mar-21| 05:44 \nsts_odspnextnewuxc423a1a10d519af4a14833af6ed30ce6| s-lphotoback.png| | 426| 21-Mar-21| 05:44 \nsts_odspnextnewux97119f0acfe0408d546bafccb8724965| s-lphotosfront.png| | 467| 21-Mar-21| 05:44 \nsts_odspnextnewux8771c0695903e8f54bb795fb35613332| s-lthroughlgblankdocument.png| | 158| 21-Mar-21| 05:44 \nsts_odspnextnewuxa1cb3cf25c598e5511ecaff055354c3c| sm-bg.svg| | 1129| 21-Mar-21| 05:44 \nsts_odspnextnewux95ebb686e4776792d10fa31736128156| sm-fg.svg| | 888| 21-Mar-21| 05:44 \nsts_odspnextnewux41493385163ad6f1a33a68c9d1eaaeb8| sm-fg-media.svg| | 866| 21-Mar-21| 05:44 \nsts_odspnextnewux3ef65dc44133824821784517fcf5325e| vault-lg.svg| | 1985| 21-Mar-21| 05:44 \nsts_odspnextnewuxc7a3c1c96228bf1ee9da4e90a476bea4| vault-lg-open.svg| | 2886| 21-Mar-21| 05:44 \nsts_odspnextnewux30314ad6b431d143c7812e0e6ee061fd| vault-sm.svg| | 1779| 21-Mar-21| 05:44 \nsts_odspnextnewux8c09d3d1ffa7076c696c868f28ca7261| vault-sm-open.svg| | 2901| 21-Mar-21| 05:44 \nsts_odspnextnewux63558fb05c0db532a9cbca7fc29d683a| xxxxl-xlblankdocument.png| | 206| 21-Mar-21| 05:44 \nsts_odspnextnewuxf248dcb43a7d768d9084f753cfb0d6ed| xxxxl-xldefaultback.png| | 478| 21-Mar-21| 05:44 \nsts_odspnextnewux80120c82b98dbc4ae60f63348f0ac154| xxxxl-xldefaultfront.png| | 774| 21-Mar-21| 05:44 \nsts_odspnextnewux83577380a0fa4d4f9973205858ace2dc| xxxxl-xlphotoback.png| | 645| 21-Mar-21| 05:44 \nsts_odspnextnewux26dcbd17f5b4b267c7bdc6eabef72c6a| xxxxl-xlphotofront.png| | 580| 21-Mar-21| 05:44 \nsts_odspnextnewux52a3d4a744eb827f1450e9d405752c66| folder-large_backplate.svg| | 2420| 21-Mar-21| 05:44 \nsts_odspnextnewuxad6ea3e5246b46c958c2e04a479f99cd| folder-large_flap_default.svg| | 2365| 21-Mar-21| 05:44 \nsts_odspnextnewux7dc016ac879592ba2092550f8b12a89d| folder-large_flap_media.svg| | 2361| 21-Mar-21| 05:44 \nsts_odspnextnewux4f8b457703336304e1deb55d24cad97b| folder-large_frontplate_nopreview.svg| | 2365| 21-Mar-21| 05:44 \nsts_odspnextnewuxaad5b2797a49bebdadde74a8c31d315f| folder-large_frontplate_thumbnail.svg| | 2361| 21-Mar-21| 05:44 \nsts_odspnextnewuxf4d538c2b1a98fb4eaf08b79d265b545| folder-small_backplate.svg| | 2307| 21-Mar-21| 05:44 \nsts_odspnextnewuxaa3f1f457553f8558e0f1eac32f1a024| folder-small_flap_default.svg| | 2228| 21-Mar-21| 05:44 \nsts_spclientnewuxa61f5e0f461e05cce0e0c856fdaae280| sp-blogs-webpart-bundle.js| | 138928| 10-Apr-21| 08:03 \nsts_spclientnewuxf5d396401fea052502b6aae89b8cc207| sp-canvas.js| | 304959| 10-Apr-21| 08:03 \nsts_spclientnewuxacbcfd1635aafc26d7fa34d3a4170557| sp-carousel-layout.js| | 74688| 10-Apr-21| 08:03 \nsts_spclientnewux22d4383e576bd2d0767efe61a9b0177f| sp-classic-page-assembly.js| | 1528061| 10-Apr-21| 08:03 \nsts_spclientnewux687ed0916c9953c4eb72b0f5cd6905e1| sp-compactcard-layout.js| | 26189| 10-Apr-21| 08:03 \nsts_spclientnewux3fd286c73a51e55671b2cf05ad879fe4| sp-component-layouts.js| | 193103| 10-Apr-21| 08:03 \nsts_spclientnewux6d0b88b1fc07d52bfd5ed0e7ffd2ff96| sp-component-utilities.js| | 106926| 10-Apr-21| 08:03 \nsts_spclientnewuxf9e26c8ba0232226f164fb3134158861| sp-connector-webpart.js| | 137981| 10-Apr-21| 08:03 \nsts_spclientnewuxaeab4a7dad255efb982d8cc6384a6b30| sp-contentrollup-webpart-bundle.js| | 226371| 10-Apr-21| 08:03 \nsts_spclientnewux2a2fc2a92e0cb8cd022d363ea1786ae4| sp-custommessageregion-bundle.js| | 34510| 10-Apr-21| 08:03 \nsts_spclientnewuxc80a54337999c221a2752d525a9f98ac| sp-dataproviders.js| | 95993| 10-Apr-21| 08:03 \nsts_spclientnewuxd14e8603d99cfdea0f8636f109640add| sp-datetimepicker.js| | 105535| 10-Apr-21| 08:03 \nsts_spclientnewux294ffd36afbed5a9fdb51794f4f3a730| sp-default-assembly.js| | 703251| 10-Apr-21| 08:03 \nsts_spclientnewuxe526f3106af18bfd9a893c145a68bea1| sp-divider-webpart-bundle.js| | 32150| 10-Apr-21| 08:03 \nsts_spclientnewux6c85212e5fd53659abdaac84362ead1f| sp-documentembed-webpart-bundle.js| | 97121| 10-Apr-21| 08:03 \nsts_spclientnewuxc67750e80ee512c39aae0f51156cc4c5| sp-embed-webparts-bundle.js| | 43199| 10-Apr-21| 08:03 \nsts_spclientnewux960f55d92c073ad967c1d41757c1f0a8| sp-events-webpart-bundle.js| | 71224| 10-Apr-21| 08:03 \nsts_spclientnewuxe983fe94f37bdad72135b55a29225aed| sp-forms-webpart-bundle.js| | 61656| 10-Apr-21| 08:03 \nsts_spclientnewuxf19a838e191127967cd29ae6b20ab799| sp-groupcalendar-webpart-bundle.js| | 133450| 10-Apr-21| 08:03 \nsts_spclientnewuxa591d003a7a8c3afca3c8688ad401ea0| sp-hero-webpart-bundle.js| | 128411| 10-Apr-21| 08:03 \nsts_spclientnewux772296c19fc27e1b6f18d28759f2ba5b| sp-html-embed.js| | 40476| 10-Apr-21| 08:03 \nsts_spclientnewux8f461cff81c07d944621f876e997777e| sp-image-gallery-webpart-bundle.js| | 81367| 10-Apr-21| 08:03 \nsts_spclientnewux2d92f617d4e9cc7ec385e0e500a3d7b2| sp-image-webpart-bundle.js| | 105611| 10-Apr-21| 08:03 \nsts_spclientnewux42e703f43e251f868d972f61dafd921e| sp-linkpreview-webpart-bundle.js| | 66341| 10-Apr-21| 08:03 \nsts_spclientnewux49b289bb50fa43774a9d4645eef75e88| sp-list-webpart-bundle.js| | 1031192| 10-Apr-21| 08:03 \nsts_spclientnewux6b8c7c4233559a13836ef1a691ba7023| sp-loader.js| | 147060| 10-Apr-21| 08:03 \nsts_spclientnewux383919f8fe3b958e524c8a635d1e2c2c| sp-loader-assembly.js| | 584557| 10-Apr-21| 08:03 \nsts_spclientnewuxe842d74f8bb0760b55d7f43f35d0d7a7| sp-newsfeed-webpart-bundle.js| | 136805| 10-Apr-21| 08:03 \nsts_spclientnewux11d2e484811a186abfb7f9a6c7275fd4| sp-newsreel-webpart-bundle.js| | 136797| 10-Apr-21| 08:03 \nsts_spclientnewuxe2e58fc5fb56b66cddf843e55ff5f992| sp-news-webpart-bundle.js| | 136619| 10-Apr-21| 08:03 \nsts_spclientnewuxc21a3246bdf5a3aa770903ed6fd493ee| sp-pages.js| | 493903| 10-Apr-21| 08:03 \nsts_spclientnewuxb3b4f7cd0e237860f1b8fdbe1372826e| sp-pages-assembly.js| | 2562127| 10-Apr-21| 08:03 \nsts_spclientnewuxb7c159038749343c1c4b0ec9f2deec4c| sp-pages-core.js| | 59295| 10-Apr-21| 08:03 \nsts_spclientnewuxb3342cfbf53938dec6fdf773f6adeebc| sp-people-webparts-bundle.js| | 163839| 10-Apr-21| 08:03 \nsts_spclientnewuxb501aed454e9ea1b719ba92103130738| sp-planner-webpart-bundle.js| | 3143147| 21-Mar-21| 05:44 \nsts_spclientnewuxea46ce84a74da087564f5d905acd4e56| sp-powerapps-webpart.js| | 24084| 10-Apr-21| 08:03 \nsts_spclientnewux22fad59d46fcfec7745b173cc20fd92d| sp-queryfilter.js| | 141726| 10-Apr-21| 08:03 \nsts_spclientnewuxec0d18f646f918f9cae4bd08ccdc09ab| sp-quickchart-webpart-bundle.js| | 255118| 10-Apr-21| 08:03 \nsts_spclientnewux0bbc1a9825e04eb5a37f62f2a09d2dbf| sp-quick-links-webpart.js| | 95055| 10-Apr-21| 08:03 \nsts_spclientnewux113384fd2f31fde205b8bf2f79ccdcd3| sp-siteactivity-webpart-bundle.js| | 195003| 10-Apr-21| 08:03 \nsts_spclientnewux2f7f2f92075f659c5926320cfab3f096| sp-sitepicker.js| | 44819| 10-Apr-21| 08:03 \nsts_spclientnewux6c3d8d275dd7351021418bffbebe3d8c| sp-spacer-webpart-bundle.js| | 44319| 10-Apr-21| 08:03 \nsts_spclientnewuxf5437647b691243399470c6a80d66804| sp-title-region-webpart.js| | 129204| 10-Apr-21| 08:03 \nsts_spclientnewuxb200a6283a80b8a6b4ee220419563723| sp-toolbox.js| | 31106| 10-Apr-21| 08:03 \nsts_spclientnewux3436740e82f30185ab432f7dbe7eed84| sp-twitter-webpart-bundle.js| | 44259| 10-Apr-21| 08:03 \nsts_spclientnewux084c8b925815606929921fa578f05539| sp-webpart-application-assembly.js| | 1523100| 10-Apr-21| 08:03 \nsts_spclientnewuxf9d542f5e7a1ffba716f8cf63efa490b| sp-webpart-base.js| | 106452| 10-Apr-21| 08:03 \nsts_spclientnewux1113dc0b40c4f62ba0b2c0cbbc272713| sp-webpart-shared.js| | 151404| 10-Apr-21| 08:03 \nsts_spclientnewuxf6f4d7aff6b346521ef692276ec4c4c6| sp-webpart-workbench.js| | 51898| 10-Apr-21| 08:03 \nsts_spclientnewux96fbeacb80b41e044617bbe3fade4c6c| sp-webpart-workbench-assembly.js| | 1920470| 10-Apr-21| 08:03 \nsts_spclientnewuxb936577a0b035ab65bc7e49bd5e6a9ab| sp-yammerembed-webpart-bundle.js| | 144166| 10-Apr-21| 08:03 \nsts_spclientnewux84505203ddf82c3742f2de6283fac55b| docx_16x1_5_053e1e11915d9427b3e53d8afa6a83d0.png| | 585| 21-Mar-21| 05:44 \nsts_spclientnewux162b3a6ca51af753b9bd4843fe72d73e| docx_16x1_5d551916093e87d3ee343537fb8b88a6.png| | 1398| 21-Mar-21| 05:44 \nsts_spclientnewuxf497b0d9739710ab47621ed013958700| docx_16x2_71f9b62260e4b54bc8a4e67432c68025.png| | 627| 21-Mar-21| 05:44 \nsts_spclientnewux0356c36d9372976aa44fa8b66a60aad1| docx_16x3_4147703edb3002728b81f5cfa5a91c48.png| | 800| 21-Mar-21| 05:44 \nsts_spclientnewux79d2445aca482099f6df2e36d89461a0| docx_48x1_5_91acd6ead8deb3ea9c1235e4d4e16bdf.png| | 1029| 21-Mar-21| 05:44 \nsts_spclientnewuxe3a71083330a36a0eabe838a39d0b3c1| docx_48x1_95ded5a67197f256abb3c6dc1fdfd59f.png| | 1800| 21-Mar-21| 05:44 \nsts_spclientnewux0d5db131be96001650ead186260bd110| docx_48x2_64db322bc02431d4fbdbb48c2801d000.png| | 1325| 21-Mar-21| 05:44 \nsts_spclientnewuxcd219fe8c823f0b30359401090f8d8c3| docx_48x3_ff9f50d887901f42b0bee4f7c511f018.png| | 1852| 21-Mar-21| 05:44 \nsts_spclientnewux7cd02027da5448f87eef42787c8915ea| docx_96x1_4d0ad5d46d38513bc8fd478f6a723adf.png| | 2173| 21-Mar-21| 05:44 \nsts_spclientnewuxbde31235d2341bae8e3fb3bd773a2ba3| docx_96x1_5_9366cab6bb01500d444217ccbee74d76.png| | 1697| 21-Mar-21| 05:44 \nsts_spclientnewux157716a601a23bdcc82711713c178f89| docx_96x2_3e32a452a3e65ad09e0cf29a525d8a27.png| | 2124| 21-Mar-21| 05:44 \nsts_spclientnewux62380155bba07e21931cbd4c2c8819ee| docx_96x3_7e372763d14c0826ed8aba9a0fbe3d4f.png| | 3070| 21-Mar-21| 05:44 \nsts_spclientnewux8766926ce4c6eadaf66d6c870efd71a9| dotx_16x1_2b312ced2e9cca5bfe1963b6eb49c2e5.png| | 1360| 21-Mar-21| 05:44 \nsts_spclientnewuxeac0104f583d7aafce09495a9c48b46b| dotx_16x1_5_9587d3f8637ccf6f6dd8ca5748013923.png| | 516| 21-Mar-21| 05:44 \nsts_spclientnewux3e4c1fa274d624cf42c4645e65569671| dotx_16x2_c23c391373a8f96945cdd9d32cb24dbc.png| | 612| 21-Mar-21| 05:44 \nsts_spclientnewux403751d49b9ba3d93d637a1ea4e74154| dotx_16x3_4130e8847068434fa8b94072182f0e5c.png| | 831| 21-Mar-21| 05:44 \nsts_spclientnewuxe9572cf13d1e19a8e961628bb68132fb| dotx_48x1_5_492df226937a5fb3e5acbd7d66adfac3.png| | 988| 21-Mar-21| 05:44 \nsts_spclientnewux14208fd33bfe8ed0a7d7b0fdc85b9b92| dotx_48x1_73701fd95ef5e319da36d350bf2068e2.png| | 1755| 21-Mar-21| 05:44 \nsts_spclientnewuxde231664a23f9a0c373482ef0f5be921| dotx_48x2_cd8f82b2a79f3c22a3fe2d5e9ffe252b.png| | 1274| 21-Mar-21| 05:44 \nsts_spclientnewux8e1dc10ad2d154ea949b6e42bbfb7088| dotx_48x3_14dec4e5ad960aa52adcb43f5d4ad5c6.png| | 1790| 21-Mar-21| 05:44 \nsts_spclientnewuxa4f5eebc187758a2238b72e64dffedf3| dotx_96x1_5_5d1102527d493c61185a7e7a62a788ba.png| | 1578| 21-Mar-21| 05:44 \nsts_spclientnewuxe10968b7ab0b4844174297af0272e3ce| dotx_96x1_a1017900087f3cc70d726dee36a76994.png| | 2124| 21-Mar-21| 05:44 \nsts_spclientnewux8abca0bc280247d0ed7bd9e12b8b9f71| dotx_96x2_bdc47178af937d029e28a3e7ce249ddd.png| | 2061| 21-Mar-21| 05:44 \nsts_spclientnewux268eea4f384766e3832393e1b96ac383| dotx_96x3_33a48dc068889f7bd8ea72c90b977910.png| | 2970| 21-Mar-21| 05:44 \nsts_spclientnewux80dae808de3b5078b4efc4fb29865793| e377ea37-9047-43b9-8cdb-a761be2f8e09.json| | 13427| 10-Apr-21| 08:03 \nsts_spclientnewuxab7b1df6c15b0a294a30492e9ac8fae1| eb95c819-ab8f-4689-bd03-0c2d65d47b1f.json| | 14590| 10-Apr-21| 08:03 \nsts_spclientnewuxa4a2550216affc2874c3e81dc4018f2c| excel_16x1_5_3909e6cfb9ed574b7a4038703354688b.png| | 446| 21-Mar-21| 05:44 \nsts_spclientnewuxbe05b957f12fc509273423f56e4510e1| excel_16x1_9f85f99d3a24a45edf7c45acfc1505df.png| | 349| 21-Mar-21| 05:44 \nsts_spclientnewux9e612331e3d566da56e363a3bb8869d7| excel_16x2_b42c81daea3f36a79f7d1274c8e163a0.png| | 591| 21-Mar-21| 05:44 \nsts_spclientnewuxd355e5cb62bc4a671aba8c58b62f87eb| excel_16x3_0f3f65dc466cb70bd4da4c627a14dbb7.png| | 1387| 21-Mar-21| 05:44 \nsts_spclientnewux06bac27fbe0d073ba86b1000355ab67a| excel_48x1_0f3f65dc466cb70bd4da4c627a14dbb7.png| | 1387| 21-Mar-21| 05:44 \nsts_spclientnewux62af1d1b6aa82699a64db860e9300a47| excel_48x1_5_60704c48d93d26a884fa59095704a159.png| | 2199| 21-Mar-21| 05:44 \nsts_spclientnewux4776fee8e784a7fec675e8d974476340| excel_48x2_52ad507872842023c6dfc3bfb86b7924.png| | 2948| 21-Mar-21| 05:44 \nsts_spclientnewux79c23087af66f18bfc0cde56c79b0c95| excel_48x3_d9ad58e9a2a90c784d10a1c77f614050.png| | 4729| 21-Mar-21| 05:44 \nsts_spclientnewuxf0412560dd2e7a56af9f87852c333535| excel_96x1_5_0a0bc8cf913b213485b2056e7c75b6b6.png| | 4704| 21-Mar-21| 05:44 \nsts_spclientnewuxb5df036c286cf302d5f77402206293b8| excel_96x1_826f376978b7f5c5d84f01b0c175cdf5.png| | 2964| 21-Mar-21| 05:44 \nsts_spclientnewuxf1b335926db7c5a5cbeb471c59ed7cb5| excel_96x2_4962366bac5f3f0710950f368a5c487a.png| | 5950| 21-Mar-21| 05:44 \nsts_spclientnewuxbed36bf334a09b5c725c5113fe43a669| excel_96x3_80e5831f5dbb4a95bd15401feedd5e10.png| | 10107| 21-Mar-21| 05:44 \nsts_spclientnewux8ef36081a346aba067e958bbb3d5a845| f6fdf4f8-4a24-437b-a127-32e66a5dd9b4.json| | 13416| 10-Apr-21| 08:03 \nsts_spclientnewuxcb869d957d4e64318530b63e610d75f7| f92bf067-bc19-489e-a556-7fe95f508720.json| | 18015| 10-Apr-21| 08:03 \nsts_spclientnewuxf2d1a7f35d2ba5854680149e140e38f6| fabricmdl2icons-2.23_1850f50d510fc4b7fd7bf4889ea7da21.ttf| | 187984| 21-Mar-21| 05:44 \nsts_spclientnewuxdf3482c3e74fc57578122ab0b6dec981| fabricmdl2icons-2.23_af4a0833031abba2a3d0a55ee0add2c6.woff2| | 71744| 21-Mar-21| 05:44 \nsts_spclientnewuxca45653d077dd8f8160018077e0a9432| fabricmdl2icons-2.23_e312e6548dd1dd9ba24d9b96a7f1fd09.woff| | 94656| 21-Mar-21| 05:44 \nsts_spclientnewuxdf217af2c449434cc978237da49860dc| fabricmdl2icons-2.53_3200458db3cc6a10921a7a82c6711d45.woff| | 134252| 21-Mar-21| 05:44 \nsts_spclientnewux37401c5f5c8c6e0bebcbbd737692b878| fabricmdl2icons-2.53_4fe7efcad26d25b8f508ef80a91ee73b.woff2| | 105000| 21-Mar-21| 05:44 \nsts_spclientnewuxde72b466d6fbb352015a237d127bef27| fabricmdl2icons-2.53_9632e65543d2acfd1e277e6a3d28e601.ttf| | 263324| 21-Mar-21| 05:44 \nsts_spclientnewux0567dea9d8e26f0c4e57d2d730e1498c| infopath_16x1_429365d97899093c0d0662620631e182.png| | 1426| 21-Mar-21| 05:44 \nsts_spclientnewux038964b23bcd894601107c09748b97cc| infopath_16x1_5_6c56b62ff5748eeb26efc44ee009d777.png| | 1482| 21-Mar-21| 05:44 \nsts_spclientnewux1ae82f61b693dcab6c352906f41f3f51| infopath_16x2_7af4b21d5e1a0012598ebf077f77e017.png| | 707| 21-Mar-21| 05:44 \nsts_spclientnewux0af56f37475008374274f5244ea2e15b| infopath_16x3_1d081b470135a6f3bd25666fefcacf67.png| | 941| 21-Mar-21| 05:44 \nsts_spclientnewux665c4b4ce5c1706a93698aeb39ba1d95| infopath_48x1_5_d9a2431e0e59ba88d725aa970fc75914.png| | 2098| 21-Mar-21| 05:44 \nsts_spclientnewux2212cab7b69805d9409e27a5547b34d0| infopath_48x1_ca1a6dbcc5b7551d7cfee910fd7bbf5b.png| | 1920| 21-Mar-21| 05:44 \nsts_spclientnewuxe7a0c94dfa417ef96de11d9bd61843c1| infopath_48x2_92a5156284920439a13a11ca89a7ab4d.png| | 1373| 21-Mar-21| 05:44 \nsts_spclientnewux1e552c7812e30d87e9bb64d1d7874ab6| infopath_48x3_d971a75bbd733d3a4b9a05db484f993f.png| | 2059| 21-Mar-21| 05:44 \nsts_spclientnewux982d814efce20be6ecf6f0fa03fa0edd| infopath_96x1_34d96f820a628f53a9edb0b99382be9f.png| | 2539| 21-Mar-21| 05:44 \nsts_spclientnewux1a2f5b5573f5828549078a2453523a56| infopath_96x1_5_b8b5705b43faeec64c45815e2844d36a.png| | 2819| 21-Mar-21| 05:44 \nsts_spclientnewux2b11c4cc6340eb3c3df894816536da09| infopath_96x2_c5d38e886dc3a11de2e6e9d4210547c1.png| | 2577| 21-Mar-21| 05:44 \nsts_spclientnewux9b0bc6b412f6cfd07baa9d1263011e7b| infopath_96x3_76ec1760c3b91989adaa91037c71e809.png| | 3775| 21-Mar-21| 05:44 \nsts_spclientnewux967f273dd90b110453dab8b878d2bf81| leelawadeeui-bold_6cdc55f3988d8090f2582b1ade83df2b.woff| | 43896| 21-Mar-21| 05:44 \nsts_spclientnewux6f96908d468281085d3ab22367dfb75d| leelawadeeui-bold_a047f883e11cf168d54af7c8d5a48c79.woff2| | 38304| 21-Mar-21| 05:44 \nsts_spclientnewux2fc3af47d18316f6ee8767e276529643| leelawadeeui-regular_46e5f18647acd852fbe0ad149e166b95.woff| | 47832| 21-Mar-21| 05:44 \nsts_spclientnewux5f3a6e0eb23d3b0829be6b035a29edf7| leelawadeeui-regular_69b84090e124679cc8440393db24f914.woff2| | 41808| 21-Mar-21| 05:44 \nsts_spclientnewuxa17c77c2eec3801e69af1a999290d8bc| leelawadeeui-semilight_13764acab069edc637f71683b8cd1686.woff2| | 37772| 21-Mar-21| 05:44 \nsts_spclientnewux31bff09f85d42d6fffad6c686e881c70| leelawadeeui-semilight_b1fe5c446bd5de63c376ad54fb2e6d90.woff| | 43820| 21-Mar-21| 05:44 \nsts_spclientnewux2e8f0649b2b51d464fb6d12bb368a21f| spclientmanifests.json| | 842362| 10-Apr-21| 08:04 \nsts_spclientnewux99f5dd30cc1620deb2450f752eb89610| mpp_16x1_1010b4ea50a744c4e6efc4958109ef6d.png| | 1387| 21-Mar-21| 05:45 \nsts_spclientnewux2827d59862ac8cc6b8d4241a4796434f| mpp_16x1_5_bbb449dc2ef5a9443510c7fb6fb5b3b6.png| | 500| 21-Mar-21| 05:45 \nsts_spclientnewux56c9db207bc878f403f7678316782972| mpp_16x2_dec709baaefb24a2a80842f20bdf7f19.png| | 574| 21-Mar-21| 05:45 \nsts_spclientnewux4f98f7ef7530392632f9b07bd019254f| mpp_16x3_9e6e57964ff544dbd15aeaceda5bca2d.png| | 709| 21-Mar-21| 05:45 \nsts_spclientnewuxf87a55d678afae72ca59f187035aef67| mpp_48x1_5_82574f1537bc47111b0a63c5e126196c.png| | 828| 21-Mar-21| 05:45 \nsts_spclientnewuxaa9a7cb931ea4c2634faa835e6c17631| mpp_48x1_b904e94455dd03895546f41dcb9bd306.png| | 1686| 21-Mar-21| 05:45 \nsts_spclientnewux7102fab14b868f195aff00e731e8502d| mpp_48x2_13ade8dd0d4dfc9af24f78a2896748dc.png| | 1851| 21-Mar-21| 05:45 \nsts_spclientnewux0797527f80620130016a08105dda404a| mpp_48x3_ade9155c84598f2b2493940822486f83.png| | 2260| 21-Mar-21| 05:45 \nsts_spclientnewuxf1b07831582cbbe6b36e31b30d3b6bcf| mpp_96x1_5_60d8aac23b7acc5b7344bd40ab34aad8.png| | 1431| 21-Mar-21| 05:45 \nsts_spclientnewuxd9016ef5dc6067a0740b4530aebcc328| mpp_96x1_ab6bc51bee1d4409658ab3424ea7c5b3.png| | 2004| 21-Mar-21| 05:45 \nsts_spclientnewux0884c20268f53dd1c6e6b197df5c18b1| mpp_96x2_41f1145a74ea0d674e8d31fe5e00dfbb.png| | 1698| 21-Mar-21| 05:45 \nsts_spclientnewux93dbd9ac6bc4c891067d76af20c9f63e| mpp_96x3_d2bb13af4c9f4fd5ffe323e630c452f6.png| | 2427| 21-Mar-21| 05:45 \nsts_spclientnewuxf50e8f501255a034483d9e7f2db76afe| mpt_16x1_5_570cafb5d0edad07c5ce99ac7dfdfd06.png| | 467| 21-Mar-21| 05:45 \nsts_spclientnewuxb7257e562cd166c3f2ce42ea5947fb41| mpt_16x1_a90bb595bca3e895610018bd26a8f21c.png| | 1356| 21-Mar-21| 05:45 \nsts_spclientnewux9fb47e4060a1b729d39fbe83d1844768| mpt_16x2_0ed0f313e5053f642851bced03083687.png| | 561| 21-Mar-21| 05:45 \nsts_spclientnewux8daf4980251272a02d39a01ac05b18f9| mpt_16x3_5aa607f0157cd3f7d57b1e7afe242adf.png| | 728| 21-Mar-21| 05:45 \nsts_spclientnewuxed9998e06049d03a0bd8f9d215da1f5b| mpt_48x1_211b603eb5ff1d72c81484cae589e162.png| | 1647| 21-Mar-21| 05:45 \nsts_spclientnewux8fb6b9ce81c2e3063ecd801e2bb4663d| mpt_48x1_5_1be0fc21808475404ff41967da6722ab.png| | 823| 21-Mar-21| 05:45 \nsts_spclientnewux9b631ae49ca71b9a97cef85c874e40e6| mpt_48x2_518133a35ff544b9f8d763ab04b35eb5.png| | 1033| 21-Mar-21| 05:45 \nsts_spclientnewux4f5058682ec6a687217cb426fdf4f4b5| mpt_48x3_6fa74bdefca2e538d0edb1391c18dc8f.png| | 1432| 21-Mar-21| 05:45 \nsts_spclientnewux6598587e9510c16f80b8ad0ebcc0876c| mpt_96x1_5_d7409818dcc9fc24b50904ab22faca20.png| | 1348| 21-Mar-21| 05:45 \nsts_spclientnewuxee880dc0bc0e96ffcf45f85e4c33b8f1| mpt_96x1_5f4846d6cbbe85c44aecabad05817b9f.png| | 1973| 21-Mar-21| 05:45 \nsts_spclientnewuxef8ec71822faf55f1045a4e5be112cee| mpt_96x2_008d41ef196833760b213e20254a48f9.png| | 1661| 21-Mar-21| 05:45 \nsts_spclientnewuxafd1735abf6b97f3c0fc085e251f2678| mpt_96x3_86db70c1212fa230f78630d7e71fb3ab.png| | 2364| 21-Mar-21| 05:45 \nsts_spclientnewuxfc697664cdf725397b9cd73acb9ca971| odp_16x1_0652ef644f639f1625512762417b7d07.png| | 1535| 21-Mar-21| 05:45 \nsts_spclientnewuxc17022bed963ae16743a2e99ee8c7ca5| odp_16x1_5_e6a2231502a4569309c1443476ebc22c.png| | 707| 21-Mar-21| 05:45 \nsts_spclientnewuxef105b9ab2150adaba53f17c793fb090| odp_16x2_ddac034a03a7e58641bf63dcabe97e80.png| | 1670| 21-Mar-21| 05:45 \nsts_spclientnewuxdbca1293f338f13c7bda180e70fbadf2| odp_16x3_06f3a1e1aba2ff65b3b7699517a40cd0.png| | 1094| 21-Mar-21| 05:45 \nsts_spclientnewux56fc39247722e891b42b067652af3007| odp_48x1_5_7e272558574c272eb8588c3f285b7b44.png| | 1152| 21-Mar-21| 05:45 \nsts_spclientnewux3898d55324b7bf255321dd90878bf567| odp_48x1_b62b9212a606bfd73e27a6c20e9813cd.png| | 1896| 21-Mar-21| 05:45 \nsts_spclientnewuxf94f1626c128986797da06bcb23090fd| odp_48x2_f71e3a54f9a149317b468bb872b91f1b.png| | 1395| 21-Mar-21| 05:45 \nsts_spclientnewux065672a6a0fae1ecbde65402f18190c3| odp_48x3_37dd0400edb8d44057b755b0e73dd835.png| | 2003| 21-Mar-21| 05:45 \nsts_spclientnewux697155bc435e1efeed846a7ed0b0c7c3| odp_96x1_5_3d5645dbd7c8063ca69983d226f4f70e.png| | 1922| 21-Mar-21| 05:45 \nsts_spclientnewuxc83a5a142e4e4ec21ffe0048cd51a773| odp_96x1_7ae2c11d295fd44e42034954b05cd868.png| | 2452| 21-Mar-21| 05:45 \nsts_spclientnewux1db21e34914c799e99266990944e8a3d| odp_96x2_93b70e4c3b8f50e6d9146455063e79e0.png| | 2463| 21-Mar-21| 05:45 \nsts_spclientnewuxc7f94a48cd6335579a1b96b2c18390fb| odp_96x3_7b6c678eaddaae13b2620f3d0d913410.png| | 3577| 21-Mar-21| 05:45 \nsts_spclientnewux8bbcce7341376fb01468323d69c148da| ods_16x1_5_655d4bb9e48011acb264766c86093166.png| | 1784| 21-Mar-21| 05:45 \nsts_spclientnewuxe23bab01318c04f9c295c6b39252202e| ods_16x1_bb993b307cab21bd330978c310ca510e.png| | 1603| 21-Mar-21| 05:45 \nsts_spclientnewuxd131303728eb3dd64dc36d644428df15| ods_16x2_30809d3c9ce0a92d0264cdd6e8fdc49c.png| | 1750| 21-Mar-21| 05:45 \nsts_spclientnewuxc2488c67646f04798609242cde5f2635| ods_16x3_da00453de559c4c175ec83e836989945.png| | 1251| 21-Mar-21| 05:45 \nsts_spclientnewux9d37951ebb875fb2004fed8e66e130aa| ods_48x1_5_091e2c6413d0c41305efebdfd233a49b.png| | 2438| 21-Mar-21| 05:45 \nsts_spclientnewux1b78b3513adcec7b33110695f696ce03| ods_48x1_518499ba4faf2fe042434721d1a19d57.png| | 2035| 21-Mar-21| 05:45 \nsts_spclientnewux0853e3f35f4052c59c94fc198281efaf| ods_48x2_752ec3bb85787feb85cd21f376c9efb7.png| | 1621| 21-Mar-21| 05:45 \nsts_spclientnewux75135d1d959cd571dd927a41bc192715| ods_48x3_8fc6fe8163811e3e4afe19a1dea38a17.png| | 2279| 21-Mar-21| 05:45 \nsts_spclientnewux16be39df6279b430152e6c0a03ba263c| ods_96x1_22b133866829a6b4d3e5bb877fb70636.png| | 2605| 21-Mar-21| 05:45 \nsts_spclientnewuxbaa596ef1bc571ecd9c1a45c1587a5b3| ods_96x1_5_606ee559d015baeca21754282f484bc3.png| | 2198| 21-Mar-21| 05:45 \nsts_spclientnewuxa8ea00470118105bd6de6471628360b0| ods_96x2_9eddaa4e76efd2d82caea2103ab63b87.png| | 2778| 21-Mar-21| 05:45 \nsts_spclientnewux0144b072201854403eedd7c9c5924573| ods_96x3_3acc059f00f80a5378ac93531aa3ada5.png| | 4143| 21-Mar-21| 05:45 \nsts_spclientnewux8a9ecec5097c0731077401824e0098ef| odt_16x1_5_5941fb2960d03792ec0afc5c562a4bf2.png| | 763| 21-Mar-21| 05:45 \nsts_spclientnewux97b9b594d6b98a6b9d4e50f652e4c93d| odt_16x1_e5aec88e88cd69be7d2dc453ec079555.png| | 1545| 21-Mar-21| 05:45 \nsts_spclientnewux47c3761a8a542fad0a7605fea55f83ac| odt_16x2_285d5e580470899895ccc3944a3f8f1d.png| | 1744| 21-Mar-21| 05:45 \nsts_spclientnewux2e01511fb90e9b0a926b459d24b9b56c| odt_16x3_c592db34f2de4e39792cfb9d612bfee4.png| | 1163| 21-Mar-21| 05:45 \nsts_spclientnewux6e4397b9982a9f500126d10d58879d4d| odt_48x1_5_a3219473a0734821db9138f63524ed90.png| | 1362| 21-Mar-21| 05:45 \nsts_spclientnewux3c9593d6ac254185c3400c3cce199d3e| odt_48x1_6a445e48f9b78a7113cd39b405ef432a.png| | 2062| 21-Mar-21| 05:45 \nsts_spclientnewuxccbc4692416e0db865991cbc66d9d4b8| odt_48x2_f3f4d46ecf671115a8e0e25badf123b5.png| | 1704| 21-Mar-21| 05:45 \nsts_spclientnewuxf4a92a830eb68a8abaf332ae65072945| odt_48x3_39ac359955b520e643d138738e60f8bb.png| | 2459| 21-Mar-21| 05:45 \nsts_spclientnewux45e1c848b983d857436347558a976b87| odt_96x1_5_579b328615ab8b00a2d9d8fd67714009.png| | 2230| 21-Mar-21| 05:45 \nsts_spclientnewux5047171b02ae6c10000711f1bc531c38| odt_96x1_78c30e583fd92d128b7d0d324fad3314.png| | 2676| 21-Mar-21| 05:45 \nsts_spclientnewuxbf14f6f1bbc5e4c5d4b3e736dcef7e54| odt_96x2_b5c886500d30e344851a3750c511e687.png| | 2896| 21-Mar-21| 05:45 \nsts_spclientnewux11379768c807dc802e5a6d258262f009| odt_96x3_5fbd93972f01f9e1f8b631f66ea194a2.png| | 4316| 21-Mar-21| 05:45 \nsts_spclientnewux0ea4912ad4b6e2a91376daf4efd1d82c| office_16x1_5_ec7699cc55361c66980e465fe32a8782.png| | 734| 21-Mar-21| 05:45 \nsts_spclientnewuxe1b985d81f63b5c9241e3e0fc6e0b94f| office_16x1_a13161719190df10e297a686a21db3d1.png| | 499| 21-Mar-21| 05:45 \nsts_spclientnewux196bf924aed05d6a9c20764e9253bd8f| office_16x2_681d5b444d2f5c50dfc5e55519dc0dcf.png| | 889| 21-Mar-21| 05:45 \nsts_spclientnewux88a04bff1c6a567a9898b9118bb06d49| office_16x3_7b2e74d0e008ac7beb1ff2e4a609ebe8.png| | 1655| 21-Mar-21| 05:45 \nsts_spclientnewux8145791b10da8c8ad6a4955b096578ad| office_48x1_5_09d52490a1253f071723a8284f0ade95.png| | 2790| 21-Mar-21| 05:45 \nsts_spclientnewuxebbcd84e5b2e439912b6c2c5821ad783| office_48x1_7b2e74d0e008ac7beb1ff2e4a609ebe8.png| | 1655| 21-Mar-21| 05:45 \nsts_spclientnewux61055a6fe43eab354281b29b43038514| office_48x2_e5dbaebd9a34133e9399c0329ba4adec.png| | 3926| 21-Mar-21| 05:45 \nsts_spclientnewux5aaa090a1af19ec8b1e5a08ab35e51dd| office_48x3_dcafd0dd73840a7a3a71c183f418b280.png| | 5645| 21-Mar-21| 05:45 \nsts_spclientnewux72526247372a12b7575bac8fb15a61c4| office_96x1_5_b2526be872f607490b9c3e28fcfc8dd1.png| | 5661| 21-Mar-21| 05:45 \nsts_spclientnewuxf8d108fca1408ddf45217cf1c8a48694| office_96x1_e5dbaebd9a34133e9399c0329ba4adec.png| | 3926| 21-Mar-21| 05:45 \nsts_spclientnewux0f4c2843d503dd3a0f0926c07a695e0d| office_96x2_3bfa647cb4efb82d293539717f982232.png| | 7717| 21-Mar-21| 05:45 \nsts_spclientnewux7f6919d17ce7f4625a42666a42b5628a| office_96x3_2419f9561fb44372f4f2a3bd71523638.png| | 11900| 21-Mar-21| 05:45 \nsts_spclientnewuxcdd2fade97e6bd1c609dafc0204d0272| office-ui-fabric-react-bundle.js| | 548732| 10-Apr-21| 08:04 \nsts_spclientnewux8b2ac4bde84da6d035aa8358f61f1dc9| one_16x1_06078ed2327fe826fab79a4ffae33291.png| | 1339| 21-Mar-21| 05:45 \nsts_spclientnewuxb568411ffd089a51ae0c26c31c76bd9a| one_16x1_5_f0d8bec3550e70b86da3b21a3abacf5b.png| | 1426| 21-Mar-21| 05:45 \nsts_spclientnewux698070f1ba57e75ea06ac9be5df12a9f| one_16x2_4c392808ab8cd648309f4c2e95ea0f8c.png| | 476| 21-Mar-21| 05:45 \nsts_spclientnewux16dbf9e92d14dc5e03b94e5b5980ef2d| one_16x3_e8099922d5036fd221885b6f5b05c08f.png| | 639| 21-Mar-21| 05:45 \nsts_spclientnewuxef6ec3e2c2859661d5a40d4cff85c34d| one_48x1_5_a550da06a954af02aaaf84d86a5c3e6e.png| | 1759| 21-Mar-21| 05:45 \nsts_spclientnewux9a4bb0c5b8aa555b7bf9679e0b4cac34| one_48x1_ed0a2d84d5340e67519dc2d69e6dcdd6.png| | 1544| 21-Mar-21| 05:45 \nsts_spclientnewux36c02e6edcf71f57e936683fd7904c5b| one_48x2_2aeba6417765fc0a4406cd734a5b754b.png| | 939| 21-Mar-21| 05:45 \nsts_spclientnewux350fc595907321a38b46e3d58831d165| one_48x3_550ee91b80f33b2238d5245e6eaee8a2.png| | 1222| 21-Mar-21| 05:45 \nsts_spclientnewuxda279aad71c957c44dcf2cc674ddbb31| one_96x1_5_3603283a8f03a6d056b83a195b86cf72.png| | 1249| 21-Mar-21| 05:45 \nsts_spclientnewuxf6cf50fd76a8d6fb1d6dffcac150eb6a| one_96x1_9f6c6f81bf94aa2f33f2954406076981.png| | 1865| 21-Mar-21| 05:45 \nsts_spclientnewux99e374ef4dc8fa72758b6d35beb26f3d| one_96x2_c5f187f69b443e242a74607998f7976a.png| | 2370| 21-Mar-21| 05:45 \nsts_spclientnewux0cbc76d08dc33b6badbbc57049b98bf2| one_96x3_af1f530050d6c5ca00203c3786c2210c.png| | 2949| 21-Mar-21| 05:45 \nsts_spclientnewux49ee3b4403ae588a29b197ab4d054733| onedrive_16x1_5_580964d90840893ec99d7b4588041702.png| | 532| 21-Mar-21| 05:45 \nsts_spclientnewuxde80ec02dfdfa0e1c70d9e990a6431c5| onedrive_16x1_ad200983f29c2ab23c8acceb99a0d609.png| | 391| 21-Mar-21| 05:45 \nsts_spclientnewuxbd4bc9e955beee02e6b79dc899c54599| onedrive_16x2_7eb74d7742b2b04a6cf623993588bd34.png| | 697| 21-Mar-21| 05:45 \nsts_spclientnewux9b37b5e1c9b1676609c346b4fa65f574| onedrive_16x3_937e4efd018fbda0ab8ef6982d9d481c.png| | 2048| 21-Mar-21| 05:45 \nsts_spclientnewuxdb7c4cc78bc4dd4c619d3d59ab9c0b7b| onedrive_48x1_5_9dc787eef493df319215c145a3802e2b.png| | 3280| 21-Mar-21| 05:45 \nsts_spclientnewux171feb5ea1ec9da44952b0bf89f8327a| onedrive_48x1_937e4efd018fbda0ab8ef6982d9d481c.png| | 2048| 21-Mar-21| 05:45 \nsts_spclientnewux8658412fb29198fd07cf23cdd9eac3f5| onedrive_48x2_07d48c7cd2cd28f787c34c4ee69771d6.png| | 4614| 21-Mar-21| 05:45 \nsts_spclientnewux5b814285bf6435da99c84b305ee0d79f| onedrive_48x3_0b0ba8a3e2574cf78aae89a0c975d56b.png| | 7431| 21-Mar-21| 05:45 \nsts_spclientnewuxeee6dd48b6e7e61953bc47e1c37924c3| onedrive_96x1_5_12a4543a7ca269f78b378ca7eb946d2e.png| | 7465| 21-Mar-21| 05:45 \nsts_spclientnewux4b5db9fdf914d1003c0375e9dfc14be7| onedrive_96x1_68050d871c56f6af2de0f63c8db1a096.png| | 4567| 21-Mar-21| 05:45 \nsts_spclientnewux41c549919e77d2b6b0684f0383756cc7| onedrive_96x2_ffa6200db67bbddc7c1edac1ee47dacd.png| | 9335| 21-Mar-21| 05:45 \nsts_spclientnewux723be2ea5c08ebd5ab734773c849d16d| onedrive_96x3_daaffab07ea290aecad69b385f6106d8.png| | 16378| 21-Mar-21| 05:45 \nsts_spclientnewuxaf813f3795c75f76b5be594c15a5445e| onenote_16x1_5_71c029f74226db57a96fa0001910ac7b.png| | 380| 21-Mar-21| 05:45 \nsts_spclientnewuxcee263786432008d4b22488e54062ce7| onenote_16x1_7835f8e3ca8b3a1be9846ce957b71798.png| | 345| 21-Mar-21| 05:45 \nsts_spclientnewux35d6671bb2192c5c1ee942a882ed3568| onenote_16x2_970f30eff687bc1799ded44d6bb17837.png| | 440| 21-Mar-21| 05:45 \nsts_spclientnewuxe97ec67fe131f41593c824c264680383| onenote_16x3_bfa94d3e46a64200286bac0851aff7db.png| | 1348| 21-Mar-21| 05:45 \nsts_spclientnewux53d823030334c3703d200d3f69cd7922| onenote_48x1_5_4b71ceaec9fca977e561e58296fc3886.png| | 2076| 21-Mar-21| 05:45 \nsts_spclientnewuxbe92306b5cee921863d5c602d4a7c0ca| onenote_48x1_bfa94d3e46a64200286bac0851aff7db.png| | 1348| 21-Mar-21| 05:45 \nsts_spclientnewux79e429b1a06f32900c4a036518691680| onenote_48x2_fd4f28fb2ae0bb5d11f8dc0346b62325.png| | 2751| 21-Mar-21| 05:45 \nsts_spclientnewux67b5a4682f6bafa46b100b2b971a9c44| onenote_48x3_478c741b2f7f860be8326e628d59775d.png| | 4462| 21-Mar-21| 05:45 \nsts_spclientnewuxf3d25893c829536715c291859990b221| onenote_96x1_5_f4ec645620b08f74c6922e8d871e6c3e.png| | 4476| 21-Mar-21| 05:45 \nsts_spclientnewuxd1ea998f3e129c37a725a1f393da4186| onenote_96x1_d5a12d216466db180c9ae56ee0176ce0.png| | 2717| 21-Mar-21| 05:45 \nsts_spclientnewux12b6bc9a6d6c3de037b82d23d95cbec6| onenote_96x2_6ae4dd77675879a0fa09a200cbb33585.png| | 5724| 21-Mar-21| 05:45 \nsts_spclientnewux2bc6fad6151043ecaad21cb9ca81dbb0| onenote_96x3_3ffc4eef38c31af32008c861efb51b4e.png| | 9483| 21-Mar-21| 05:45 \nsts_spclientnewux6b799a81dd24a6006c1f1201b8dd7582| onepkg_16x1_227cd84e77c0884fd9049e5407b0318d.png| | 1382| 21-Mar-21| 05:45 \nsts_spclientnewux9717b186430fbb9e61ea827567ccfc91| onepkg_16x1_5_b8b9a6a5b8bb0b9b7ceffbb84b59d888.png| | 1461| 21-Mar-21| 05:45 \nsts_spclientnewux61df94c73bcdc6248fe29c1c9b556964| onepkg_16x2_d03a13ebfe3c0e917e75f0679d7bf8a0.png| | 539| 21-Mar-21| 05:45 \nsts_spclientnewuxf21c9e2a42d732f8456e58106f3b0689| onepkg_16x3_48d3e0456a14956bdbb3e3639f13b782.png| | 706| 21-Mar-21| 05:45 \nsts_spclientnewuxa81dd96aa77e372335d2e20c3677f28f| onepkg_48x1_5_5787217c78361b69ef991c884c6fde19.png| | 1829| 21-Mar-21| 05:45 \nsts_spclientnewux726843af796e7bb026589615f5d19dc4| onepkg_48x1_775930370aef1321481b7716cdd02380.png| | 1687| 21-Mar-21| 05:45 \nsts_spclientnewuxf3bb448758471023a39493f987b418d6| onepkg_48x2_5f2f64ce776dacd38f76b501d2be0c90.png| | 1023| 21-Mar-21| 05:45 \nsts_spclientnewux2e2e9b54d12cee7e51f0e0f83ad4adee| onepkg_48x3_1860fdfee652c527eea6608efccdd9c8.png| | 1353| 21-Mar-21| 05:45 \nsts_spclientnewuxd4458e61cc85d4394bcaaaff01441e82| onepkg_96x1_06c835415cec8efeab8113d25cfe0410.png| | 1918| 21-Mar-21| 05:45 \nsts_spclientnewuxd96a6ca4d1f29051ab6be89e01b5b849| onepkg_96x1_5_b1acc0818e091ecf622a9908f5e83e17.png| | 1298| 21-Mar-21| 05:45 \nsts_spclientnewux9a12420dd23bd44ef8b15ea09bf35ec2| onepkg_96x2_d9abf3041053f70cffb45cb1fda4e065.png| | 2445| 21-Mar-21| 05:45 \nsts_spclientnewux42956cadcdc329f1b544a135f2786346| onepkg_96x3_240101f1f8c7d233756ec0684ffe7863.png| | 3032| 21-Mar-21| 05:45 \nsts_spclientnewux35749a6818e0f8665d1055a986a61fb7| onetoc_16x1_474c7634ec192e461a72eb8057bf61bd.png| | 1332| 21-Mar-21| 05:45 \nsts_spclientnewux52f8715c2e21243f7d40449279af75ec| onetoc_16x1_5_b1e30fd607223113877d6af2a26a5fad.png| | 1453| 21-Mar-21| 05:45 \nsts_spclientnewuxd44da58b81c339f1df864795a3ac4efa| onetoc_16x2_05f84c0c8c37bd9509d595043bd65680.png| | 484| 21-Mar-21| 05:45 \nsts_spclientnewuxda9ed235b0529e6b9762fd604e944aaa| onetoc_16x3_e22660c4299dde4cc6a3e0afcf2f6320.png| | 658| 21-Mar-21| 05:45 \nsts_spclientnewuxa9f3215f938e91ae74b4845bb5aa2aa4| onetoc_48x1_5_e7767a4acf424e21e3dd4159d5870cd3.png| | 1830| 21-Mar-21| 05:45 \nsts_spclientnewux84595b31a7623a6e15c86dafafb5d94c| onetoc_48x1_78769282167fa5faf3b56211745795a8.png| | 1584| 21-Mar-21| 05:45 \nsts_spclientnewux0a7937080ffd98ce1d67186cb6bc009f| onetoc_48x2_bcd769644320cf1d33e731e56f794a34.png| | 1149| 21-Mar-21| 05:45 \nsts_spclientnewux140b5b180905402f69db1e19ddcc061b| onetoc_48x3_24d09779a832388888d75f40e9d42f65.png| | 1580| 21-Mar-21| 05:45 \nsts_spclientnewuxfa93fc4422ba48314d91a42d18ce6338| onetoc_96x1_5_863f122960f17c2758421fa9809d2740.png| | 1490| 21-Mar-21| 05:45 \nsts_spclientnewux701baccef454763d277311c9da280df1| onetoc_96x1_87b9b903487d64024a6b572d5c196eb0.png| | 1986| 21-Mar-21| 05:45 \nsts_spclientnewux228a8630fb26a3c1de1df8b9ff2faa39| onetoc_96x2_71f3f24213e9e190e4138c6f6203e555.png| | 1972| 21-Mar-21| 05:45 \nsts_spclientnewux66b85f880d6f28dd87c8c9801c4978a4| onetoc_96x3_a05100039b8bf7eac1615d39793aa2d6.png| | 2776| 21-Mar-21| 05:45 \nsts_spclientnewux783e5e7fc06578bb5d69670760b88dfd| outlook_16x1_5_5c87e27ba6a10ecbad26a7aabbe2f455.png| | 669| 21-Mar-21| 05:45 \nsts_spclientnewuxe4a93b93d654259675099057a8e9b3e7| outlook_16x1_b331f27256d6ef2f7556aeebe686b5cd.png| | 476| 21-Mar-21| 05:45 \nsts_spclientnewux17282bf8087502c6b2d5eeaf342cd4aa| outlook_16x2_a68a44a677a1a658f6ccd091b5201f43.png| | 923| 21-Mar-21| 05:45 \nsts_spclientnewux86f33977836e385af05c3262afeb98b1| outlook_16x3_938a57f2f8547d7bde6598d7f68a3a73.png| | 2479| 21-Mar-21| 05:45 \nsts_spclientnewux17fa8ba606f8011f2eec4b534523efd8| outlook_48x1_5_8261b2df7fba563cfedad9e3e5dc846e.png| | 4216| 21-Mar-21| 05:45 \nsts_spclientnewux8bcd607ec2edb848f0229727e1cada6c| outlook_48x1_938a57f2f8547d7bde6598d7f68a3a73.png| | 2479| 21-Mar-21| 05:45 \nsts_spclientnewuxa47707101d17b55f2fcb827b0746b95d| outlook_48x2_298abf80ae13e76e052563ef6b8f868e.png| | 6351| 21-Mar-21| 05:45 \nsts_spclientnewuxae369aebe4acdebb23b06b2db094efd5| outlook_48x3_90f49dc188fc0363d2b248c291996c26.png| | 10621| 21-Mar-21| 05:45 \nsts_spclientnewux401469fa3c58e9f3daf01d33c53eb4d6| outlook_96x1_5_56673a9892d1e984c9c81316e80f1419.png| | 10610| 21-Mar-21| 05:45 \nsts_spclientnewuxa4c99abed2aa704bdea2f53ade16f446| outlook_96x1_d55d0c23ea3d70136d36196f45443f3a.png| | 6335| 21-Mar-21| 05:45 \nsts_spclientnewux23034083507a352ebf324d978e4f62f3| outlook_96x2_1ea11db60f1b7de9b611b8b8e59236e6.png| | 15167| 21-Mar-21| 05:45 \nsts_spclientnewux14b8fab7144b1a6f5c0b0d10f5f87f60| outlook_96x3_e9da421dff71797d53baa3fc6ffad83c.png| | 26043| 21-Mar-21| 05:45 \nsts_spclientnewuxa3c3c2ece22cfd2e4b2d5325eed20b9e| potx_16x1_5_d9b2f3417001f2d85dbd0d232e97a12b.png| | 531| 21-Mar-21| 05:45 \nsts_spclientnewuxe5e70f63deb5478b170fa498dace9864| potx_16x1_ec38333385f5f918d9103af1283dff84.png| | 1373| 21-Mar-21| 05:45 \nsts_spclientnewux2464e0e858353b4330b00d9e5b7eb58b| potx_16x2_d0ac8cd8955a409b77e587af6f0ac3be.png| | 647| 21-Mar-21| 05:45 \nsts_spclientnewuxf5c1d8378686871b09056b0544f23036| potx_16x3_6c625c175ded14041cf451e94506401d.png| | 865| 21-Mar-21| 05:45 \nsts_spclientnewuxa686961b21b0004e0b70ebc20db83c82| potx_48x1_5_e6c7b36c680c5941ce0fdd32131c21e0.png| | 935| 21-Mar-21| 05:45 \nsts_spclientnewux7d981234a205bc409931c302fd363b0e| potx_48x1_c8acf1ef4bfec6897ad8243cf99bc995.png| | 1702| 21-Mar-21| 05:45 \nsts_spclientnewux1265e0ebd08c23bd3107d4bb6a93aee1| potx_48x2_69aeac5fb36d704967349bfe5edb4a71.png| | 1175| 21-Mar-21| 05:45 \nsts_spclientnewux13f4479455af274eb635c2cf3ef816da| potx_48x3_ef8965d983b113bc768e59ec5bda6bd0.png| | 1682| 21-Mar-21| 05:45 \nsts_spclientnewux9296a560b95d31e96717ce7a4548b74b| potx_96x1_5_9de4b23189346de7a617fd5f5bbb858f.png| | 1720| 21-Mar-21| 05:45 \nsts_spclientnewux7f9a41c9fef528aab10abb377b00986a| potx_96x1_86101bbc9854b5658ed2aa69af5065e3.png| | 2212| 21-Mar-21| 05:45 \nsts_spclientnewuxe8bd369dc9e6b1b99eebf43e274d45a1| potx_96x2_7a7b4f2bc984b48528381a37015e47fe.png| | 2186| 21-Mar-21| 05:45 \nsts_spclientnewux9c08f8aa7cfcdad56a1f9961ee1a80b7| potx_96x3_f5c913794b14a8c55b4ecd63a7d3f7e0.png| | 3143| 21-Mar-21| 05:45 \nsts_spclientnewux7c07c5abd3b9ca204bfa3f7f1e27c7d0| powerpoint_16x1_5_95899a21ab9c310d698591c16e221cc0.png| | 520| 21-Mar-21| 05:45 \nsts_spclientnewux556924fa6d5090c7d8cd90cfc17b2d46| powerpoint_16x1_521f738a5689875072f5ecd701ad3535.png| | 411| 21-Mar-21| 05:45 \nsts_spclientnewuxd67520fd57466e7cfff268bec82f4060| powerpoint_16x2_52d97bf259c360def5f418c5dfcd49a8.png| | 673| 21-Mar-21| 05:45 \nsts_spclientnewux0ea9fae991ef48d4007fb3d2956e2826| powerpoint_16x3_205e941a085680ce9a6b4775425a4f69.png| | 2006| 21-Mar-21| 05:45 \nsts_spclientnewux77a41409952364ecde16df4c38d4cf34| powerpoint_48x1_205e941a085680ce9a6b4775425a4f69.png| | 2006| 21-Mar-21| 05:45 \nsts_spclientnewux28b54114a61ba24609a26e9975017a7a| powerpoint_48x1_5_941df5daa20d9e23eb3273671df6ee9b.png| | 3290| 21-Mar-21| 05:45 \nsts_spclientnewuxda8102846f212d7507de825c1210db4b| powerpoint_48x2_f0d4e64b4ea1d0b133bfb04696c1baf3.png| | 4400| 21-Mar-21| 05:45 \nsts_spclientnewux02c37b81fb86983b189cb63ee2bb2c49| powerpoint_48x3_771503087da2b44dab70b9a8bd17a08c.png| | 6536| 21-Mar-21| 05:45 \nsts_spclientnewuxf13b100e4c908753060ef1717b6d4e89| powerpoint_96x1_2c1e97b157ea50d3bc3a7220233cf203.png| | 4451| 21-Mar-21| 05:45 \nsts_spclientnewuxb7ad25e087adc5dc35d680b9ddd2782b| powerpoint_96x1_5_767692ce7f9910b9e9360cd7f580fa7a.png| | 6543| 21-Mar-21| 05:45 \nsts_spclientnewux6811c249ded39e00f3ce640aeb8e612a| powerpoint_96x2_36b5fe9d29fff26172b06ef78395035a.png| | 8644| 21-Mar-21| 05:45 \nsts_spclientnewux515474d19ee5cb55a172f89a8bf85697| powerpoint_96x3_a23c2c272c6892447b321fd658417a26.png| | 14389| 21-Mar-21| 05:45 \nsts_spclientnewux410096cb746961bf0fa79953b3441436| ppsx_16x1_5_790982a1280a144ba74aacc975180a93.png| | 442| 21-Mar-21| 05:45 \nsts_spclientnewux5b5443b4c7d423e670592dc511cfa0e5| ppsx_16x1_dbb56ba5b3feb65adc5139a785a3c840.png| | 1335| 21-Mar-21| 05:45 \nsts_spclientnewux3d96a3e35e637d464a56a6b5df0a7d7b| ppsx_16x2_3b6e07c1e80133bfa4a4eea9a52bebc9.png| | 1248| 21-Mar-21| 05:45 \nsts_spclientnewuxad0d131ac6202c368992f8b20fc6f432| ppsx_16x3_090fba79557ac8250abcd41c11fbba5f.png| | 526| 21-Mar-21| 05:45 \nsts_spclientnewux9b528b324594fe86c418b27113ffaded| ppsx_48x1_5_e32bcea5d9b968e5279530c2227e7cb1.png| | 1093| 21-Mar-21| 05:45 \nsts_spclientnewux5c9201d1e4ca87bc4f2a9165451c0fc8| ppsx_48x1_e2a84878a933d987cf44de929a540953.png| | 1817| 21-Mar-21| 05:45 \nsts_spclientnewux7923a72c8523969e2215fb505b44fff5| ppsx_48x2_feaeccb8e4e602ba11111f05ef40b5a8.png| | 1260| 21-Mar-21| 05:45 \nsts_spclientnewuxd0bd24e571b321169b2e36f59181ca38| ppsx_48x3_9e8af2676943ce9edd4ca9c3db4edbf3.png| | 1777| 21-Mar-21| 05:45 \nsts_spclientnewux7f0ee76f446b08a9fb0c7778a2260488| ppsx_96x1_5_f2ae7fe46cd84dbba844a070a1bc420b.png| | 1772| 21-Mar-21| 05:45 \nsts_spclientnewuxeaf3c389ae4a9ea15c42c4aa1dddf844| ppsx_96x1_8ecb28ba951229d595b065eee33d19ac.png| | 2286| 21-Mar-21| 05:45 \nsts_spclientnewuxd3b37127beb0e8ed6e1b289a7f78af2d| ppsx_96x2_115a03817dda01884862bfa2b76874ba.png| | 2189| 21-Mar-21| 05:45 \nsts_spclientnewux2675959c90f4bcb6d6977febc1ece604| ppsx_96x3_4ac3d26c5baf19cf5da791d9aa64c273.png| | 3160| 21-Mar-21| 05:45 \nsts_spclientnewuxeb7932da59d337a06f90985ae7ffad6c| pptx_16x1_5_ece5b018d48b2f28ff296337e859b116.png| | 540| 21-Mar-21| 05:45 \nsts_spclientnewux79cfbd7859371f3308a6bcb34bb504a8| pptx_16x1_b9d460ef31b53b0f11add2d612e6f562.png| | 1413| 21-Mar-21| 05:45 \nsts_spclientnewuxded2adf1d5cbbe51c55b4ded67b93318| pptx_16x2_3d9ad3c908be2eee976c8490414c42db.png| | 664| 21-Mar-21| 05:45 \nsts_spclientnewux353b09747866726e40ea2475dc158224| pptx_16x3_88b44d104f3e4425e36aa14d3d772fd7.png| | 829| 21-Mar-21| 05:45 \nsts_spclientnewux7075757f5a7b664c3fafb313162bd664| pptx_48x1_5_b3e80007a9639f5cbd6e0b93078d2852.png| | 1074| 21-Mar-21| 05:45 \nsts_spclientnewuxf9632325c6e8b0ac162a32439d7ff982| pptx_48x1_62bc7e26981e7f314e8767b4aac9b25b.png| | 1857| 21-Mar-21| 05:45 \nsts_spclientnewux4287d17f81e4e813ee912d87f810a771| pptx_48x2_8928056765d09f9381169968ac76e17c.png| | 1342| 21-Mar-21| 05:45 \nsts_spclientnewuxd6e194558fd28ffd68d23f5c42b51760| pptx_48x3_6f37937f2bbb8053ef615c4b8a730710.png| | 1895| 21-Mar-21| 05:45 \nsts_spclientnewux75a229e04c87f1e879167a6e4f9fe576| pptx_96x1_5_728a7eb2b8717833b5afce00214e9b2d.png| | 1829| 21-Mar-21| 05:45 \nsts_spclientnewux7c25f7e833388b2d0b8ed4a9bba9aea7| pptx_96x1_7057a44aa3dfe1a810f2afeeb12dcbca.png| | 2284| 21-Mar-21| 05:45 \nsts_spclientnewuxeb9a3e051ceeada2b12c8e999e2abd3a| pptx_96x2_a61408511135e2a2518b4c6e00564d85.png| | 2279| 21-Mar-21| 05:45 \nsts_spclientnewux55ec2f9324b96009c0d2b118a0f88926| pptx_96x3_a80d73f9ebb1f993bede1414d9f38ce8.png| | 3334| 21-Mar-21| 05:45 \nsts_spclientnewux88c7bef3c41cb96cb80f75b619cf3a3e| project_16x1_5_ae8a41016b428e83cfa15c7f54ef6a2e.png| | 1618| 21-Mar-21| 05:45 \nsts_spclientnewux779d35fb6b0e753858a79a80a80d44b1| project_16x1_7a45d6b6f61b3c60285a755a4ede3cb3.png| | 332| 21-Mar-21| 05:45 \nsts_spclientnewux993aa0bd8122b20cfaf12a18701b0bcf| project_16x2_6bdc785623090b36e0fcd9b6b50a7b80.png| | 644| 21-Mar-21| 05:45 \nsts_spclientnewux1ffe6fd77bb03c3e11be7ee95567321d| project_16x3_6c4998e2688565a69074ccbde25f272c.png| | 924| 21-Mar-21| 05:45 \nsts_spclientnewux042dc99b22a974d6dc670e6de3ab23c7| project_48x1_5_c4e2dc8e6e76fe4d7d6abe17e2de99fc.png| | 2295| 21-Mar-21| 05:45 \nsts_spclientnewux382c4836b19d03deb3d9d2ead113db1c| project_48x1_805f358f0b9e09afdabf5d6cdc6cbffc.png| | 1138| 21-Mar-21| 05:45 \nsts_spclientnewux4d2b0ffecac6b8ec15487fc34435dffd| project_48x2_c9765a2e16acfdcbcfa82a7c9b5db559.png| | 1438| 21-Mar-21| 05:45 \nsts_spclientnewuxc76816e1d04da6268d90cc9fdc5411ac| project_48x3_a8a782124e0e07a19dba004e251f9e07.png| | 2114| 21-Mar-21| 05:45 \nsts_spclientnewux7ccb688e54cd365a176703b20bf5f8d8| project_96x1_5_9132ac99aea4a726306e2be603b2bd18.png| | 2025| 21-Mar-21| 05:45 \nsts_spclientnewuxf10189c48dc53407b4885615754bbe0c| project_96x1_b8230c25b4f52a99eac544ec61dedaa1.png| | 2294| 21-Mar-21| 05:45 \nsts_spclientnewux174d8aea6e7922491890fb68131336aa| project_96x2_d41618c588c2f5fa243b6e53ffd0db7b.png| | 2685| 21-Mar-21| 05:45 \nsts_spclientnewux0dc6bd095b77b305aafffc571aa8dba7| project_96x3_355e3cc8e18d97cdfe9ccb364c01bc8a.png| | 3899| 21-Mar-21| 05:45 \nsts_spclientnewux5384cea7d9b52030c4aea6b2928b6c31| pub_16x1_5_2332e7318eaf797ddef18058c125b992.png| | 521| 21-Mar-21| 05:45 \nsts_spclientnewux3b98c2b60e1bf01e8bfc5acbd510a75a| pub_16x1_ebfdbe022c094edf0a8737db76480f98.png| | 1395| 21-Mar-21| 05:45 \nsts_spclientnewux2614cf1ac68c98b1ffc1fd62be40155d| pub_16x2_f72f9a551fcac38420ef310635332a91.png| | 602| 21-Mar-21| 05:45 \nsts_spclientnewux90a71ab094e48b68ac0169c13c948f43| pub_16x3_cff1b6773f457c579d4b17a1e07b3c89.png| | 752| 21-Mar-21| 05:45 \nsts_spclientnewux4171cf8bb662a9ff223d6790307e0920| pub_48x1_5_76d5f60aa226e56178b44924d024d46c.png| | 830| 21-Mar-21| 05:45 \nsts_spclientnewuxe5d14b0af75122ab4f237ee7ee3f3875| pub_48x1_8c5cc5e03db039797231ac2987a39677.png| | 1670| 21-Mar-21| 05:45 \nsts_spclientnewuxa6be26b1046a5241f79a892338786b46| pub_48x2_b2cbf1007f3f2e83b504fd45b67acdfe.png| | 1918| 21-Mar-21| 05:45 \nsts_spclientnewux109e6aec60eb33b950f3f7071f756e13| pub_48x3_d892aa688f7823f3d1456344b8b595f6.png| | 2249| 21-Mar-21| 05:45 \nsts_spclientnewux98d3a57aac90e2ac555168da2d6e39ca| pub_96x1_5_587a0d668690ca0e984badc77a53b8a7.png| | 1397| 21-Mar-21| 05:45 \nsts_spclientnewuxcb939d9c58ef0dc752ad056b91d52801| pub_96x1_cae35678c79c0f4705fc93866b1d0b51.png| | 1971| 21-Mar-21| 05:45 \nsts_spclientnewux62c5d524238a798f830891f589c64e21| pub_96x2_64432be186ffaa13e66be1119cf03a13.png| | 1716| 21-Mar-21| 05:45 \nsts_spclientnewuxea1973a0a951d0497e9a2db970ea56cc| pub_96x3_732a5dcfd692f3c956a626572d01597d.png| | 2409| 21-Mar-21| 05:45 \nsts_spclientnewux98fdc013a89de66164023b1a90d2b52a| segoeui-bold_00a8a2e0a7feded81b77e36622338dbe.woff2| | 43868| 21-Mar-21| 05:45 \nsts_spclientnewux6bd17fa6a958814af77f24d7e3d3b77b| segoeui-bold_1729e0cca0b4e15a571c8943277f428e.woff| | 55496| 21-Mar-21| 05:45 \nsts_spclientnewux69fde7923cb7dd9b3f9153cea6b01521| segoeui-bold_18738737200cf8e46a65db625abba8cc.woff2| | 35408| 21-Mar-21| 05:45 \nsts_spclientnewux8748e6e90bdeafbb7841b68c362567cc| segoeui-bold_2c47175b890a2788244dbbb04fd15810.woff2| | 32964| 21-Mar-21| 05:45 \nsts_spclientnewux62d02d87d391eea9d4b481f178d5fd5f| segoeui-bold_2ece9866fc7c325f4593a8e8e151d7c1.woff2| | 42788| 21-Mar-21| 05:45 \nsts_spclientnewux53b5d503481dca80876d6a3b975caa1d| segoeui-bold_6870e52f16d72f5085e9cf8dcbb6ab14.woff| | 41644| 21-Mar-21| 05:45 \nsts_spclientnewuxb895ee44a9aaaeaa33aec54f839f54bd| segoeui-bold_7670fcad720d662aeae5246acb160915.woff| | 38360| 21-Mar-21| 05:45 \nsts_spclientnewuxd7f19e398290de2ddbd387f12232fc66| segoeui-bold_9d3adc4c7719ae2a3bb54b4281996bfe.woff2| | 63344| 21-Mar-21| 05:45 \nsts_spclientnewuxa9691f2e24a93a05b2f0aea66ecd2b39| sp-page-context.js| | 24215| 21-Mar-21| 05:46 \nsts_spclientnewuxd6110cac400251f3be610cf051fe0306| segoeui-bold_a6e7024959542da97b48764015cb2912.woff| | 76124| 21-Mar-21| 05:45 \nsts_spclientnewux0abfc468174a7731d197c779850a4d96| segoeui-bold_b9c579295a2e1db8635d0a9a244954c4.woff| | 50536| 21-Mar-21| 05:45 \nsts_spclientnewux1d13369d81ef1b62eeda680cfe5260e4| segoeui-bold_cf12db8a2720d67c975b0b99951f3fe2.woff| | 79792| 21-Mar-21| 05:45 \nsts_spclientnewux542a8333d6eb454003994dcb90adc921| segoeui-bold_db5a0e1149b0aa25176764ca925df569.woff2| | 42980| 21-Mar-21| 05:45 \nsts_spclientnewuxd2d5d9a94c848bbc7d0005c0181100a4| segoeui-bold_e7c62f35d3a8a60765846452cdea20f7.woff| | 51496| 21-Mar-21| 05:45 \nsts_spclientnewux3993b58044c950e07f3a7bc7f0d32a71| segoeui-bold_f964699843376a4cd45d10a41c41cc23.woff2| | 71732| 21-Mar-21| 05:45 \nsts_spclientnewux43c0c60685bc2f23783e37b5a0102061| segoeui-light_0fde8f2a95d1517dad89c4c06b31deac.woff2| | 62788| 21-Mar-21| 05:45 \nsts_spclientnewuxa9fa6e0d242efc33abbbda989b01eb44| segoeui-light_1f57bc2cb31f22bc9094d22c5134d589.woff2| | 39776| 21-Mar-21| 05:45 \nsts_spclientnewuxe2093a46ead921462c515abb5a3abf01| segoeui-light_2fd9614c0deb54d27b7f8257e237ccc1.woff2| | 30836| 21-Mar-21| 05:45 \nsts_spclientnewux90560c9f5867981d0594c177ebe1c56b| segoeui-light_330e17beeeecee428dea32f39b679d3b.woff2| | 28740| 21-Mar-21| 05:45 \nsts_spclientnewux0c51ec3bf94d7b42b14c8354f59cadee| segoeui-light_3cead85155e0de2d7e9b721eb34fee76.woff| | 46632| 21-Mar-21| 05:45 \nsts_spclientnewuxeca141a7e6c5fcfc83b31e5a56be0539| segoeui-light_89dc18e4fa3fac2779928262e8e2f4e6.woff| | 73624| 21-Mar-21| 05:45 \nsts_spclientnewux2d7b33d4a9796de999fe52ef820053c6| segoeui-light_9e15a0188be993b49f37286f9d759ff0.woff| | 45000| 21-Mar-21| 05:45 \nsts_spclientnewuxea7b612f0ad0746591d118e3be5e376d| segoeui-light_a7a0d35a2e5d0c1e3bc30b45a11dc36c.woff| | 46744| 21-Mar-21| 05:45 \nsts_spclientnewux99a368ffbc9e315e65b1dbd4d25d98e8| segoeui-light_b734f1fd85091592e77747be6ea5a910.woff| | 36844| 21-Mar-21| 05:45 \nsts_spclientnewux2f9e4c0839f9f5460ff2fb2c0059269b| segoeui-light_b9f0073120dc85d152929803a1080c4b.woff2| | 38336| 21-Mar-21| 05:45 \nsts_spclientnewuxa3c3d5b27cb7e088b6c70ab8819dc368| segoeui-light_dd854137779d360dc33d99866c62aec5.woff2| | 67992| 21-Mar-21| 05:45 \nsts_spclientnewuxee37f05f925a33d8f972ce7a90d3b52c| segoeui-light_e48ea1ac1846a2e80cb60f9a23494a50.woff| | 33752| 21-Mar-21| 05:45 \nsts_spclientnewux545df6c3cea8abf4e281022a817f1d1b| segoeui-light_f1d4b0e953fa0758da4db09e88531b93.woff| | 75568| 21-Mar-21| 05:45 \nsts_spclientnewux4366170e7dbdb045a4ebad49b8581faa| segoeui-light_fe64866d56c34385e3833dde54a08b9c.woff2| | 37892| 21-Mar-21| 05:45 \nsts_spclientnewux11fee05cd1897fe9512edf62e33a5474| segoeui-regular_28959e485d3ae31c66dbef059dce1265.woff| | 55604| 21-Mar-21| 05:45 \nsts_spclientnewuxba227bdf3fa698cf6c49711b887d5dd0| segoeui-regular_53b650cb4ad3b562dd9e152400eaf2c2.woff2| | 47288| 21-Mar-21| 05:45 \nsts_spclientnewuxcde9de09101026016f177ef0e53015d0| segoeui-regular_5fa620c9eefcd9c86b00199b3733d6e8.woff| | 75464| 21-Mar-21| 05:45 \nsts_spclientnewux90a46abf7b8ff5c083d11554258b281b| segoeui-regular_697230d0942e89a4e8582ea9f463bc30.woff2| | 39176| 21-Mar-21| 05:45 \nsts_spclientnewux3666c8b7d79269023ca66dcf996ca281| segoeui-regular_78aea412d491b3c930b06f2007feff44.woff| | 45616| 21-Mar-21| 05:45 \nsts_spclientnewux8c8b85fe70573ba86b67c8b1aac0a24b| segoeui-regular_7b6cba99d25f22ff1ccdee97c12482d1.woff| | 60540| 21-Mar-21| 05:45 \nsts_spclientnewux8664aa54fef9844d3ddfb3905d6082d5| segoeui-regular_7db9efbd4f0051eec003a69d52208a40.woff| | 66632| 21-Mar-21| 05:45 \nsts_spclientnewuxa84b2cf53c1d31eb9c2e939143b12e4a| segoeui-regular_7e0879cc50cdc9845eef81efe62d76d2.woff2| | 59140| 21-Mar-21| 05:45 \nsts_spclientnewux395310c463d2122fda0dc96c2b4ed122| segoeui-regular_865f1db6545fc94a2f4444dd60e7bbc6.woff2| | 36344| 21-Mar-21| 05:45 \nsts_spclientnewux37a4e2868b2413a6651c2a02f7f22aaa| segoeui-regular_8e5beaebb27bbf92146977bd1062eb11.woff| | 42236| 21-Mar-21| 05:45 \nsts_spclientnewuxa5417e269e594aab4089c7cef6849ae3| segoeui-regular_a174c5c5aca9fc207f0774e74b6a5017.woff| | 56896| 21-Mar-21| 05:45 \nsts_spclientnewuxcc2f9dc9071267ec95c94c923a14d179| segoeui-regular_a66ac4b246c87c08e18b5ba6d7e83798.woff2| | 47716| 21-Mar-21| 05:45 \nsts_spclientnewux626592d53cbcdf9efb4fa570480949ec| segoeui-regular_de7cd3a972e93e3f2c920b53c13b58ae.woff2| | 63928| 21-Mar-21| 05:45 \nsts_spclientnewux1c639428f948d14fce3267118b782fa4| segoeui-regular_f51d4cde8cd85b1caa064a18c0fa8b92.woff2| | 48012| 21-Mar-21| 05:45 \nsts_spclientnewuxf3e9d7b2eecb84d597ce582d94a137be| segoeui-semibold_03f00b8d19f7f27318f4653f9d5bab24.woff2| | 69908| 21-Mar-21| 05:45 \nsts_spclientnewux9c9d4d531b690b69d774b59793279494| segoeui-semibold_204b492169988b818ea24253774d6ee1.woff| | 40692| 21-Mar-21| 05:45 \nsts_spclientnewuxdb1bfd34224db15a24c475a2efe46ac7| segoeui-semibold_2aab0c00d3723964e503969f2d554c13.woff2| | 65772| 21-Mar-21| 05:45 \nsts_spclientnewux8791a953c99bfbb0a9af1ba0161d1620| segoeui-semibold_40f607089688633d2659e6042ac33620.woff| | 78492| 21-Mar-21| 05:45 \nsts_spclientnewux7658de07d18b46fbcf668e6a7cf0c3b0| segoeui-semibold_66d11e55b7a413ddf6a84e858697e7b6.woff2| | 31824| 21-Mar-21| 05:45 \nsts_spclientnewux1f827be026738099fcf4acaff86813bf| segoeui-semibold_67a64f575e084b02e863817a1242b92a.woff| | 76908| 21-Mar-21| 05:45 \nsts_spclientnewuxcf1e222f0ee3fc0b96cbb456fceeda44| segoeui-semibold_690fc91487e8393ee7496881ba915389.woff| | 50184| 21-Mar-21| 05:45 \nsts_spclientnewux1456b68af58274e2d2e5b9ba39aeb114| segoeui-semibold_6b8d94ee3b0185feaafe1f19e9587f1f.woff| | 37236| 21-Mar-21| 05:45 \nsts_spclientnewux29bec47b357612107fa8a25d9f0a9561| segoeui-semibold_8551e8694644280ece249254e10bf910.woff| | 49212| 21-Mar-21| 05:45 \nsts_spclientnewuxcab33662f63ea8dcd23c0758f866b1ea| segoeui-semibold_87bd68a4637619c40a489d9d13e42747.woff2| | 41724| 21-Mar-21| 05:45 \nsts_spclientnewux9be6c00153f9d18d9d8d0d9b1c69ab02| segoeui-semibold_917c51fdfabab1435e52275e3f460017.woff| | 54224| 21-Mar-21| 05:45 \nsts_spclientnewux85fba1389bf729b7ea5c7a5e3bba027a| segoeui-semibold_9b3d5bf54cd48c3eefd8ac1217253a56.woff2| | 42800| 21-Mar-21| 05:45 \nsts_spclientnewuxf01340f50fe9a547d6d2a65d55801aa0| segoeui-semibold_c9307fd69140b02de407557064719c73.woff2| | 34572| 21-Mar-21| 05:45 \nsts_spclientnewuxcde125ec6309d831574dd26d5791738c| segoeui-semibold_ebd6cfb03ec224b96c3fe02c13befa55.woff2| | 41532| 21-Mar-21| 05:45 \nsts_spclientnewux5ead2154e3dee002a02735809a6910e5| segoeui-semilight_0e95088a90a65a1c397f347e9517826f.woff2| | 40128| 21-Mar-21| 05:45 \nsts_spclientnewuxdae0ed6737476841a9630b20f17d9928| segoeui-semilight_3ff95bf86e54359409f750eeb604bf95.woff| | 76836| 21-Mar-21| 05:45 \nsts_spclientnewux04fb6d5d66cc49470a26f0658311f11a| segoeui-semilight_4d650c89d860efeb3a1c77d9c0742c4a.woff| | 28504| 21-Mar-21| 05:45 \nsts_spclientnewux590ec3664f65c2eecf03fe3bea6cda63| segoeui-semilight_5000bfb344caca36abc9930579e87909.woff2| | 65788| 21-Mar-21| 05:45 \nsts_spclientnewuxa5fd063fc3fbb406ff26b45a8d64f869| segoeui-semilight_6984a87b441bd33e9ef4106f43dda279.woff2| | 40236| 21-Mar-21| 05:45 \nsts_spclientnewux9b288e31dd56b4ae70b6371f77f4357e| segoeui-semilight_7263170323b9c598485bf2632f0d39fc.woff| | 47700| 21-Mar-21| 05:45 \nsts_spclientnewuxc30d59866e0f48cf2365d76e9b04235c| segoeui-semilight_77a9efbe7a4f246e7e83ca2248e26a36.woff2| | 29936| 21-Mar-21| 05:45 \nsts_spclientnewux18fcc9fcf00cc845ceb2662a5fdbfe31| segoeui-semilight_7bf8c217f3e999717e5a2b5c78d151b6.woff2| | 39920| 21-Mar-21| 05:45 \nsts_spclientnewuxb62e8b720352b727ff4fd4c58f8c453f| segoeui-semilight_897f07bb31e3216cbf844b2c09e2cde5.woff| | 35300| 21-Mar-21| 05:45 \nsts_spclientnewuxbad569b0a4283dac2ccc0c8b4f81331e| segoeui-semilight_91a966e76f349cf84dcfcb30d24c3bd3.woff| | 52180| 21-Mar-21| 05:45 \nsts_spclientnewuxdb8899172a90cc6a287cea7d056a1e35| segoeui-semilight_9a12b3dbf8920a3174853867d0f0cbbf.woff| | 48316| 21-Mar-21| 05:45 \nsts_spclientnewux8f0c6d69a147418ffe80caafa921b889| segoeui-semilight_ac85d4edbcabf09efd9fb6cccc403e23.woff2| | 32128| 21-Mar-21| 05:45 \nsts_spclientnewux44090e977086ec2a4143c2654ebd2a90| segoeui-semilight_e748f71274adb7dcc350e322f5802540.woff| | 38288| 21-Mar-21| 05:45 \nsts_spclientnewux3f1bfeb2bc729e696390c433c2d9ec64| segoeui-semilight_f5d83201b9de2f4d51a2cfb6cc8e3445.woff2| | 24432| 21-Mar-21| 05:45 \nsts_spclientnewuxd948aa5673f2ae756920bb5382248233| selawik-bold_2c03fc898ff48ca28968079f3c9f5839.woff| | 19336| 21-Mar-21| 05:45 \nsts_spclientnewux904f600a3f3bb704808fa8b9d2fa0f75| selawik-bold_685fb6280fec3582a82006a0a09e2b6f.woff2| | 14424| 21-Mar-21| 05:45 \nsts_spclientnewuxc6387ceea9cbeb78ae56c6ee7b4f5e25| selawik-light_18b8c53b827002bac4d1eb60f9d8d207.woff| | 19524| 21-Mar-21| 05:45 \nsts_spclientnewux3dcccc03b51a669e4059049127785bfe| selawik-light_2080ecbe44abf1d585763d718c144d0f.woff2| | 14544| 21-Mar-21| 05:45 \nsts_spclientnewuxff93e55bf121b388f14b105c36973428| selawik-regular_c1aa8c51674cf0eb4a615b2e55e158c1.woff2| | 14632| 21-Mar-21| 05:45 \nsts_spclientnewuxd09475a2bdf5f6be4aeb641708337a13| selawik-regular_ceebb048d952cbfe385109812d1e02da.woff| | 19596| 21-Mar-21| 05:45 \nsts_spclientnewux23b3237dc6fabbe334dfd5d72b609f8b| selawik-semibold_17eab24cc0c2e0e43b886bf5e9b966e7.woff2| | 14896| 21-Mar-21| 05:45 \nsts_spclientnewux72011d6116ef1ea31cd909aa0736792e| selawik-semibold_a8a0ec9a04c3e8089a2e4c1a95472bec.woff| | 19824| 21-Mar-21| 05:45 \nsts_spclientnewuxfbeae9f1dac898fc67ca0251087da6c7| sp-safehtml.js| | 17535| 21-Mar-21| 05:46 \nsts_spclientnewux5394ce16dd0d7da4524a1dd1af87de1f| selawik-semilight_744e92b0cad631df4366f497d6bd644d.woff2| | 14864| 21-Mar-21| 05:45 \nsts_spclientnewuxc33f3c4ba1d90763c4d099e669b33801| selawik-semilight_ff7350adb693801aa55f19afaafe0fa5.woff| | 19944| 21-Mar-21| 05:45 \nsts_spclientnewuxba1eaa313c38bf5fdca388af985407e6| sharepoint_16x1_5_54d4684c6511492a93a17c51e5cb453a.png| | 667| 21-Mar-21| 05:45 \nsts_spclientnewux4e09209825d0f30fee1a94fbe6ec31d8| sharepoint_16x1_60fed59eb24bba330eaa7134c2b35354.png| | 456| 21-Mar-21| 05:45 \nsts_spclientnewux29911c62fc38df7a422dca1288ec3962| sharepoint_16x2_3d7f07c1ce3f3c67c81f8be76cefa954.png| | 927| 21-Mar-21| 05:45 \nsts_spclientnewuxdfbd21744c8ce511cfea23e31cfc5db8| sharepoint_16x3_994d525eb6f806a620b11f62d889ad0a.png| | 2748| 21-Mar-21| 05:45 \nsts_spclientnewux2cb223574ad67644afe54eaffb65e1ef| sharepoint_48x1_5_d49b03aa3acc2bd1a2c3e742faf95056.png| | 4523| 21-Mar-21| 05:45 \nsts_spclientnewuxb68874e76f816a8d9c00572a089f1102| sharepoint_48x1_994d525eb6f806a620b11f62d889ad0a.png| | 2748| 21-Mar-21| 05:45 \nsts_spclientnewux278d718673d0f0314b2f18a446a18cf3| sharepoint_48x2_92191738c1d805cd51156256ee1cdb17.png| | 6178| 21-Mar-21| 05:45 \nsts_spclientnewux4052d784ce1dcf1cd2d44282e23e5ba2| sharepoint_48x3_213cc2361d61cd7ddf2d840dc73f06dd.png| | 9576| 21-Mar-21| 05:45 \nsts_spclientnewux61b323d30f83b76046f18eb8275f3186| sharepoint_96x1_5_031a1917fbc191f080148374355340f0.png| | 9487| 21-Mar-21| 05:45 \nsts_spclientnewuxc0fcfec6842082a066c675f66dd7d2b7| sharepoint_96x1_c434aa9f4e4901a86fa4ca274076a3ff.png| | 6140| 21-Mar-21| 05:45 \nsts_spclientnewux28b847b13b9d12716f97f8a5bbb1a384| sharepoint_96x2_858dfdb2a683ba6eba930bc4431b084c.png| | 13877| 21-Mar-21| 05:45 \nsts_spclientnewux6791844307e768b1cda0305d87d4710e| sharepoint_96x3_0ce9ea9c5a551308866960076d0de984.png| | 21919| 21-Mar-21| 05:45 \nsts_spclientnewux7ffed58434bba18019f8dc25a6921a4f| sp-a11y.js| | 18449| 21-Mar-21| 05:45 \nsts_spclientnewux80477eda0db88481a24ec28e3ec1a3d4| sp-component-base.js| | 15558| 21-Mar-21| 05:46 \nsts_spclientnewuxd06b22027fae659d53ac198990a2bb9a| sp-dragzone.js| | 8397| 10-Apr-21| 08:04 \nsts_spclientnewuxdce4aa0e772fc2b45853242803a8efdf| sp-flex-layout.js| | 6517| 10-Apr-21| 08:04 \nsts_spclientnewux121e8abb46c9ff351343b680014b113b| sp-hero-layout.js| | 20682| 10-Apr-21| 08:04 \nsts_spclientnewuxf915d58a5d7a11c9f0074f6a6b62e431| sp-masonry-layout.js| | 73604| 10-Apr-21| 08:04 \nsts_spclientnewux45c199cda8c597c6b22274f4ccd6346b| tab-test-field-customizer.js| | 5718| 10-Apr-21| 08:04 \nsts_spclientnewuxf27942de8bf5be30c8d15ef048860ddd| visio_16x1_4c1d923ec0faa9fb8eae2db30aef89e2.png| | 439| 21-Mar-21| 05:46 \nsts_spclientnewuxe7396a59b5eedff5e7435233a62e9c21| visio_16x1_5_78cbfd0a1390cf35af2676cf1f2fbc21.png| | 534| 21-Mar-21| 05:46 \nsts_spclientnewuxcd0b532d68b3df4f515bb9da2eb098e1| visio_16x2_9518363f6a0609c0e8fe02fb6bb55877.png| | 710| 21-Mar-21| 05:46 \nsts_spclientnewuxbc72d857c4c257cd97e0de75533a0374| visio_16x3_5412174a280e6e2855820adadf707a6d.png| | 1720| 21-Mar-21| 05:46 \nsts_spclientnewuxc07033e73ab0b8d148b3384afc0ab2e7| visio_48x1_5_618764ef718bf23076904b4bfc0611c5.png| | 2791| 21-Mar-21| 05:46 \nsts_spclientnewuxb6c0813b5c6459267eecd1ff9d6ef3b9| visio_48x1_5412174a280e6e2855820adadf707a6d.png| | 1720| 21-Mar-21| 05:46 \nsts_spclientnewuxd9562d2b4303d2ecde3fa655005772eb| visio_48x2_dfcfb564a48b7fc49203c5050985a152.png| | 3732| 21-Mar-21| 05:46 \nsts_spclientnewuxd0685442b622a3cfc540f6bdced1ad29| visio_48x3_eac6e2fd59138e9c2c0ab15f234bcd9e.png| | 6054| 21-Mar-21| 05:46 \nsts_spclientnewuxe785979898e1367803b5edf061dbad7e| visio_96x1_45b9266fda6ff4bcb6b64cac55320532.png| | 3724| 21-Mar-21| 05:46 \nsts_spclientnewuxae33df669824e4720a4dbd076f834f08| visio_96x1_5_4428a305a7bc1b1ddc1e9cfce64ae6cb.png| | 6065| 21-Mar-21| 05:46 \nsts_spclientnewux5f740b9132f808ba34b509429852deaf| visio_96x2_aa9d76ef7ce27682fae963a87dc848e3.png| | 8030| 21-Mar-21| 05:46 \nsts_spclientnewuxb84db68e21caf2d2530b88ea74251490| visio_96x3_7bd21e75b273310b9206d68ec4399361.png| | 13387| 21-Mar-21| 05:46 \nsts_spclientnewux593f7140154a8b70feae78d41e7271dc| vsdx_16x1_4430ba06293826a3c92891bd1e70a022.png| | 1407| 21-Mar-21| 05:46 \nsts_spclientnewuxf3dc099a7e95a90107d54f133810a453| vsdx_16x1_5_7d61906b3614fb55f1963754bbdaa3a5.png| | 1643| 21-Mar-21| 05:46 \nsts_spclientnewux914b8d40b763f49f13b3d6c1037cb6e8| vsdx_16x2_e454713a3cc9d266e9a58d90ed4a5c8e.png| | 746| 21-Mar-21| 05:46 \nsts_spclientnewux2c46cd33ead68fe394aa1a4c1d104b78| vsdx_16x3_5ddaa063d2f373cf8b2bc252f7dd36ac.png| | 984| 21-Mar-21| 05:46 \nsts_spclientnewux9fa1614717387e76385e88cae3961d6e| vsdx_48x1_5_bc7d1cf87bbc4dd921aecdb2deaf6705.png| | 2267| 21-Mar-21| 05:46 \nsts_spclientnewuxb6c185672d32527b6b23674fd618c072| vsdx_48x1_67341fd0ff33731357594e3b092a2c8e.png| | 1989| 21-Mar-21| 05:46 \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Server 2019: May 11, 2021 (KB5001916)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-05-11T07:00:00", "id": "KB5001916", "href": "https://support.microsoft.com/en-us/help/5001916", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-05-19T10:46:39", "description": "None\n## Summary\n\nThis security update resolves a Microsoft SharePoint Server remote code execution vulnerability, information disclosure vulnerability, and spoofing vulnerability, and Microsoft SharePoint remote code execution vulnerability and information disclosure vulnerability. To learn more about these vulnerabilities, see:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-26418](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26418>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28478](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28478>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31171](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31171>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31172](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31172>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31173](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31173>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31181](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31181>)\n\n**Note: **To apply this security update, you must have the release version of [Service Pack 1 for Microsoft SharePoint Foundation 2013 ](<http://support.microsoft.com/kb/2880551>)installed on the computer.\n\n## Improvements and fixes\n\nThis security update contains fixes for the following nonsecurity issues:\n\n * Fixes the incompatible issue that's caused by the deprecation of the showModalDialog API in modern browsers.\n * Fixes an issue in which SharePoint Designer doesn't work well for the site that disables the wiki home page feature.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001935>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001935 for the 64-bit version of SharePoint Foundation 2013](<http://www.microsoft.com/download/details.aspx?familyid=6830da9c-09be-44a0-a565-03638b030d89>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021 (KB5001871).\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4493238](<https://support.microsoft.com/kb/4493238>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nsts2013-kb5001935-fullfile-x64-glb.exe| | C75DE561D55437E6951B7AFD08B1C29411721D6A3E3176D9E3044F9EB478ADC2 \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nFor all supported x64-based versions of SharePoint Foundation 2013\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nmicrosoft.cobaltcore.dll| microsoft.cobaltcore.dll| 15.0.4991.1000| 1211112| 15-Apr-21| 08:18 \ncsisrv.dll| csisrv.dll| 15.0.5233.1000| 1410656| 15-Apr-21| 08:19 \ncsisrvexe.exe| csisrvexe.exe| 15.0.5233.1000| 203664| 15-Apr-21| 08:19 \nonfda.dll| onfda.dll| 15.0.5233.1000| 2151312| 15-Apr-21| 08:19 \njsapiextensibilitymanager.debug.js| jsapiextensibilitymanager.debug.js| | 20163| 15-Apr-21| 08:19 \nganttsharepointapishim.generated.debug.js| ganttapishim.generated.debug.js| | 6812| 15-Apr-21| 08:19 \nganttsharedapi.generated.debug.js| ganttsharedapi.generated.debug.js| | 4617| 15-Apr-21| 08:19 \ntimelinesharepointapishim.generated.debug.js| timelineapishim.generated.debug.js| | 1842| 15-Apr-21| 08:19 \ntimelinesharedapi.generated.debug.js| timelinesharedapi.generated.debug.js| | 3420| 15-Apr-21| 08:19 \nmsoidclil.dll| msoidclil.dll| 7.250.4556.0| 1446248| 15-Apr-21| 08:18 \nmsoidclil.dll.x64| msoidclil.dll| 7.250.4556.0| 1446248| 15-Apr-21| 08:18 \nmsoidres.dll| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \nmsoidres.dll.x64| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \nmsoidclil.dll| msoidclil.dll| 7.250.4556.0| 1220456| 15-Apr-21| 08:18 \nmsoidclil.dll.x86| msoidclil.dll| 7.250.4556.0| 1220456| 15-Apr-21| 08:18 \nmsoidres.dll| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \nmsoidres.dll.x86| msoidres.dll| 7.250.4556.0| 830864| 15-Apr-21| 08:18 \ncompat.bro| compat.browser| | 14781| 15-Apr-21| 08:19 \nmicrosoft.naturallanguage.keywordextraction.resources.en.dll| microsoft.naturallanguage.keywordextraction.resources.dll| 15.0.5259.1000| 2745752| 15-Apr-21| 08:18 \ndevdash15.png| devdash15.png| | 699| 16-Apr-21| 10:13 \ndevsitegettingstarted.png| devsitegettingstarted.png| | 4798| 16-Apr-21| 10:13 \ngettingstarted.png| gettingstarted.png| | 4260| 16-Apr-21| 10:13 \ngettingstartedwithappcatalogsite.png| gettingstartedwithappcatalogsite.png| | 1518| 16-Apr-21| 10:13 \nspcommon.png| spcommon.png| | 19434| 16-Apr-21| 10:13 \nspimn.png| spimn.png| | 4248| 16-Apr-21| 10:13 \nspnav.png| spnav.png| | 651| 16-Apr-21| 10:13 \nsproaming.png| sproaming.png| | 8717| 16-Apr-21| 10:13 \nspstorefront.png| spstorefront.png| | 4785| 16-Apr-21| 10:13 \nspstorefrontbkg.png| spstorefrontbkg.png| | 239| 16-Apr-21| 10:13 \nacatrb16.png| stsappcatalogribbon16x16.png| | 475| 16-Apr-21| 10:13 \nacatrb32.png| stsappcatalogribbon32x32.png| | 790| 16-Apr-21| 10:13 \nattach16.png| attach16.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1025| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1026| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1027| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1028| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1029| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1030| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1031| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1032| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1033| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1035| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1036| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1037| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1038| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1040| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1041| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1042| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1043| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1044| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1045| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1046| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1048| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1049| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1050| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1051| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1053| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1054| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1055| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1057| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1058| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1060| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1061| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1062| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1063| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1066| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1069| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1071| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1081| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1086| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1087| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1106| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_1110| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2052| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2070| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2074| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_2108| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_3082| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.112_16_n.png_3098| 112_16_n.16x16x32.png| | 261| 16-Apr-21| 10:13 \nmb_taskhome.png| mb_taskhome.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1025| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1026| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1027| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1028| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1029| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1030| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1031| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1032| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1033| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1035| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1036| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1037| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1038| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1040| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1041| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1042| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1043| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1044| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1045| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1046| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1048| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1049| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1050| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1051| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1053| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1054| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1055| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1057| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1058| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1060| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1061| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1062| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1063| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1066| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1069| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1071| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1081| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1086| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1087| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1106| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_1110| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2052| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2070| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2074| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_2108| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_3082| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nwac.livebooks.notetags.intl.23_16_n.png_3098| 23_16_n.16x16x32.png| | 266| 16-Apr-21| 10:13 \nsz256_icaccdb.png| 256_icaccdb.png| | 3163| 16-Apr-21| 10:13 \nsz256_icdocm.png| 256_icdocm.png| | 4691| 16-Apr-21| 10:13 \nsz256_icdocx.png| 256_icdocx.png| | 3496| 16-Apr-21| 10:13 \nsz256_icdotm.png| 256_icdotm.png| | 4571| 16-Apr-21| 10:13 \nsz256_icdotx.png| 256_icdotx.png| | 3286| 16-Apr-21| 10:13 \nsz256_icmpd.png| 256_icmpd.png| | 2843| 16-Apr-21| 10:13 \nsz256_icmpp.png| 256_icmpp.png| | 2920| 16-Apr-21| 10:13 \nsz256_icmpt.png| 256_icmpt.png| | 2840| 16-Apr-21| 10:13 \nsz256_icnotebk.png| 256_icnotebk.png| | 2801| 16-Apr-21| 10:13 \nsz256_icodp.png| 256_icodp.png| | 4326| 16-Apr-21| 10:13 \nsz256_icods.png| 256_icods.png| | 4778| 16-Apr-21| 10:13 \nsz256_icodt.png| 256_icodt.png| | 4894| 16-Apr-21| 10:13 \nsz256_icone.png| 256_icone.png| | 2553| 16-Apr-21| 10:13 \nsz256_iconp.png| 256_iconp.png| | 2601| 16-Apr-21| 10:13 \nsz256_icont.png| 256_icont.png| | 2801| 16-Apr-21| 10:13 \nsz256_icpotm.png| 256_icpotm.png| | 4812| 16-Apr-21| 10:13 \nsz256_icpotx.png| 256_icpotx.png| | 3571| 16-Apr-21| 10:13 \nsz256_icpps.png| 256_icpps.png| | 4436| 16-Apr-21| 10:13 \nsz256_icppsm.png| 256_icppsm.png| | 5074| 16-Apr-21| 10:13 \nsz256_icppsx.png| 256_icppsx.png| | 3888| 16-Apr-21| 10:13 \nsz256_icpptm.png| 256_icpptm.png| | 4916| 16-Apr-21| 10:13 \nsz256_icpptx.png| 256_icpptx.png| | 3721| 16-Apr-21| 10:13 \nsz256_icpub.png| 256_icpub.png| | 2844| 16-Apr-21| 10:13 \nsz256_icvdx.png| 256_icvdx.png| | 4317| 16-Apr-21| 10:13 \nsz256_icvsx.png| 256_icvsx.png| | 2932| 16-Apr-21| 10:13 \nsz256_icvtx.png| 256_icvtx.png| | 4256| 16-Apr-21| 10:13 \nsz256_icxlsb.png| 256_icxlsb.png| | 3236| 16-Apr-21| 10:13 \nsz256_icxlsm.png| 256_icxlsm.png| | 4694| 16-Apr-21| 10:13 \nsz256_icxltm.png| 256_icxltm.png| | 4561| 16-Apr-21| 10:13 \nsz256_icxltx.png| 256_icxltx.png| | 3227| 16-Apr-21| 10:13 \nsz256_icxsn.png| 256_icxsn.png| | 2466| 16-Apr-21| 10:13 \naddhero.20x20x32.png| addhero.20x20x32.png| | 437| 16-Apr-21| 10:13 \naddimagecamera.11x11x32.png| addimagecamera.11x11x32.png| | 236| 16-Apr-21| 10:13 \naddimagecamera.16x16x32.png| addimagecamera.16x16x32.png| | 289| 16-Apr-21| 10:13 \naddlink.11x11x32.png| addlink.11x11x32.png| | 210| 16-Apr-21| 10:13 \naddlink.16x16x32.png| addlink.16x16x32.png| | 267| 16-Apr-21| 10:13 \naddr_getmap.16x16x32.png| addr_getmap.16x16x32.png| | 603| 16-Apr-21| 10:13 \naddrbook.png| addressbook.png| | 235| 16-Apr-21| 10:13 \naddtasktotimeline.png| addtasktotimeline.png| | 236| 16-Apr-21| 10:13 \npwa.images.addtasktotimeline.png| addtasktotimeline.png| | 236| 16-Apr-21| 10:13 \nannouncements.11x11x32.png| announcements.11x11x32.png| | 320| 16-Apr-21| 10:13 \naskmeaboutupdated.11x11x32.png| askmeaboutupdated.11x11x32.png| | 199| 16-Apr-21| 10:13 \nattractmodefollowstar.128x128x32.png| attractmodefollowstar.128x128x32.png| | 1398| 16-Apr-21| 10:13 \naudiopreview.png| audiopreview.png| | 13196| 16-Apr-21| 10:13 \nbirthday.11x11x32.png| birthday.11x11x32.png| | 156| 16-Apr-21| 10:13 \nblogabout96.png| blogabout96.png| | 1390| 16-Apr-21| 10:13 \ncancelglyph.16x16x32.png| cancelglyph.16x16x32.png| | 183| 16-Apr-21| 10:13 \ncentraladmin_apps.48x48x32.png| centraladmin_apps.48x48x32.png| | 585| 16-Apr-21| 10:13 \ncentraladmin_apps_appmanagement.32x32x32.png| centraladmin_apps_appmanagement.32x32x32.png| | 721| 16-Apr-21| 10:13 \ncentraladmin_apps_marketplace.32x32x32.png| centraladmin_apps_marketplace.32x32x32.png| | 515| 16-Apr-21| 10:13 \ncentraladmin_office365.32x32x24.png| centraladmin_office365.32x32x24.png| | 395| 16-Apr-21| 10:13 \ncentraladmin_office365.48x48x24.png| centraladmin_office365.48x48x24.png| | 546| 16-Apr-21| 10:13 \nchecknames.png| checknames.png| | 379| 16-Apr-21| 10:13 \ncoauth_placeholderneedrefresh.16x16x32.png| coauth_placeholderneedrefresh.16x16x32.png| | 283| 16-Apr-21| 10:13 \ncoauth_placeholderneedrefresh.24x24x32.png| coauth_placeholderneedrefresh.24x24x32.png| | 378| 16-Apr-21| 10:13 \ncommentcollapse12.png| commentcollapse12.png| | 164| 16-Apr-21| 10:13 \ncommentcollapse12rtl.png| commentcollapse12rtl.png| | 166| 16-Apr-21| 10:13 \ncommentexpand12.png| commentexpand12.png| | 238| 16-Apr-21| 10:13 \ncommentexpand12rtl.png| commentexpand12rtl.png| | 222| 16-Apr-21| 10:13 \ndeletefilterglyph.png| deletefilterglyph.png| | 352| 16-Apr-21| 10:13 \ndisableddeletefilterglyph.png| disableddeletefilterglyph.png| | 352| 16-Apr-21| 10:13 \ndwnarsml.png| downarrowsmall.11x7x32.png| | 272| 16-Apr-21| 10:13 \necbtn.png| ecbbutton.png| | 132| 16-Apr-21| 10:13 \necbtnr.png| ecbbuttonrtl.png| | 118| 16-Apr-21| 10:13 \nellipsis.11x11x32.png| ellipsis.11x11x32.png| | 140| 16-Apr-21| 10:13 \nellipsis.16x16x32.png| ellipsis.16x16x32.png| | 161| 16-Apr-21| 10:13 \nerrorbck.png| errorbck.png| | 318| 16-Apr-21| 10:13 \nexit.png| exit.png| | 249| 16-Apr-21| 10:13 \nexit.png_14| exit.png| | 249| 16-Apr-21| 10:13 \nfirstrundocmove48.png| firstrundocmove48.png| | 834| 16-Apr-21| 10:13 \nfirstrunfoldersync48.png| firstrunfoldersync48.png| | 816| 16-Apr-21| 10:13 \nfirstrunfollow48.png| firstrunfollow48.png| | 1262| 16-Apr-21| 10:13 \nfirstrunmobile48.png| firstrunmobile48.png| | 530| 16-Apr-21| 10:13 \nfirstrunprivacyemail48.png| firstrunprivacyemail48.png| | 1070| 16-Apr-21| 10:13 \nfirstrunprivacysettings48.png| firstrunprivacysettings48.png| | 1117| 16-Apr-21| 10:13 \nfirstrunupdateprofile48.png| firstrunupdateprofile48.png| | 617| 16-Apr-21| 10:13 \nmb_folder.png| mb_folder.png| | 323| 16-Apr-21| 10:13 \nfolder.gif_0001| folder.gif| | 73| 16-Apr-21| 10:13 \nhelpbullet.5x15x32.png| helpbullet.5x15x32.png| | 99| 16-Apr-21| 10:13 \nhelpscrolldown.15x15x32.png| helpscrolldown.15x15x32.png| | 109| 16-Apr-21| 10:13 \nhelpscrollleft.15x15x32.png| helpscrollleft.15x15x32.png| | 107| 16-Apr-21| 10:13 \nhelpscrollright.15x15x32.png| helpscrollright.15x15x32.png| | 108| 16-Apr-21| 10:13 \nhelpscrollup.15x15x32.png| helpscrollup.15x15x32.png| | 108| 16-Apr-21| 10:13 \nicaccdb.png| icaccdb.png| | 1376| 16-Apr-21| 10:13 \nicaccde.png| icaccde.png| | 1376| 16-Apr-21| 10:13 \nicdoc.png| icdoc.png| | 1375| 16-Apr-21| 10:13 \nicdocm.png| icdocm.png| | 1474| 16-Apr-21| 10:13 \nicdocx.png| icdocx.png| | 1398| 16-Apr-21| 10:13 \nicdot.png| icdot.png| | 1329| 16-Apr-21| 10:13 \nicdotm.png| icdotm.png| | 1414| 16-Apr-21| 10:13 \nicdotx.png| icdotx.png| | 1360| 16-Apr-21| 10:13 \nicgen.gif| icgen.gif| | 90| 16-Apr-21| 10:13 \nicmpd.png| icmpd.png| | 1394| 16-Apr-21| 10:13 \nicmpp.png| icmpp.png| | 1387| 16-Apr-21| 10:13 \nicmpt.png| icmpt.png| | 1356| 16-Apr-21| 10:13 \nicnotebk.png| icnotebk.png| | 1332| 16-Apr-21| 10:13 \nicodp.png| icodp.png| | 1535| 16-Apr-21| 10:13 \nicods.png| icods.png| | 1603| 16-Apr-21| 10:13 \nicodt.png| icodt.png| | 1545| 16-Apr-21| 10:13 \nicone.png| icone.png| | 1339| 16-Apr-21| 10:13 \niconp.png| iconp.png| | 1382| 16-Apr-21| 10:13 \nicont.png| icont.png| | 1332| 16-Apr-21| 10:13 \nicpdf.png| icpdf.png| | 236| 16-Apr-21| 10:13 \nicpot.png| icpot.png| | 1343| 16-Apr-21| 10:13 \nicpotm.png| icpotm.png| | 1441| 16-Apr-21| 10:13 \nicpotx.png| icpotx.png| | 1373| 16-Apr-21| 10:13 \nicppa.png| icppa.png| | 1278| 16-Apr-21| 10:13 \nicppam.png| icppam.png| | 1309| 16-Apr-21| 10:13 \nicpps.png| icpps.png| | 1394| 16-Apr-21| 10:13 \nicppsm.png| icppsm.png| | 1425| 16-Apr-21| 10:13 \nicppsx.png| icppsx.png| | 1335| 16-Apr-21| 10:13 \nicppt.png| icppt.png| | 1395| 16-Apr-21| 10:13 \nicpptm.png| icpptm.png| | 1464| 16-Apr-21| 10:13 \nicpptx.png| icpptx.png| | 1413| 16-Apr-21| 10:13 \nicpub.png| icpub.png| | 1395| 16-Apr-21| 10:13 \nicspdgeneric.png| icspdgeneric.png| | 1430| 16-Apr-21| 10:13 \nicvdx.png| icvdx.png| | 1407| 16-Apr-21| 10:13 \nicvisiogeneric.png| icvisiogeneric.png| | 1407| 16-Apr-21| 10:13 \nicvsx.png| icvsx.png| | 1321| 16-Apr-21| 10:13 \nicvtx.png| icvtx.png| | 1376| 16-Apr-21| 10:13 \nicxla.png| icxla.png| | 1362| 16-Apr-21| 10:13 \nicxlam.png| icxlam.png| | 1373| 16-Apr-21| 10:13 \nicxls.png| icxls.png| | 1460| 16-Apr-21| 10:13 \nicxlsb.png| icxlsb.png| | 1430| 16-Apr-21| 10:13 \nicxlsm.png| icxlsm.png| | 1535| 16-Apr-21| 10:13 \nicxlsx.png| icxlsx.png| | 1474| 16-Apr-21| 10:13 \nicxlt.png| icxlt.png| | 1428| 16-Apr-21| 10:13 \nicxltm.png| icxltm.png| | 1470| 16-Apr-21| 10:13 \nicxltx.png| icxltx.png| | 1409| 16-Apr-21| 10:13 \nicxsn.png| icxsn.png| | 1326| 16-Apr-21| 10:13 \nmb_picture.png| mb_picture.png| | 469| 16-Apr-21| 10:13 \nitagnda.png| itagnda.png| | 220| 16-Apr-21| 10:13 \nitann.png| itann.png| | 392| 16-Apr-21| 10:13 \nitappcat.png| itappcatalog.png| | 265| 16-Apr-21| 10:13 \nitappreq.png| itapprequests.png| | 294| 16-Apr-21| 10:13 \nitcat.gif| itcat.gif| | 115| 16-Apr-21| 10:13 \nitcommcat.png| itcommcat.png| | 271| 16-Apr-21| 10:13 \nitcommem.png| itcommem.png| | 280| 16-Apr-21| 10:13 \nitcommnt.gif| itcommnt.gif| | 189| 16-Apr-21| 10:13 \nitcontct.gif| itcontct.gif| | 208| 16-Apr-21| 10:13 \nitcontct.png| itcontct.png| | 280| 16-Apr-21| 10:13 \nitdatash.png| itdatash.png| | 165| 16-Apr-21| 10:13 \nitdecis.png| itdecis.png| | 300| 16-Apr-21| 10:13 \nitdisc.png| itdisc.png| | 298| 16-Apr-21| 10:13 \nitdl.png| itdl.png| | 277| 16-Apr-21| 10:13 \nitebl.png| itebl.png| | 224| 16-Apr-21| 10:13 \nitevent.png| itevent.png| | 223| 16-Apr-21| 10:13 \nitfl.png| itfl.png| | 177| 16-Apr-21| 10:13 \nitgbcall.gif| itgbcall.gif| | 308| 16-Apr-21| 10:13 \nitgbfaci.gif| itgbfaci.gif| | 127| 16-Apr-21| 10:13 \nitgbwher.gif| itgbwher.gif| | 222| 16-Apr-21| 10:13 \nitgen.png| itgen.png| | 165| 16-Apr-21| 10:13 \nitil.png| itil.png| | 292| 16-Apr-21| 10:13 \nitime.png| itime.png| | 177| 16-Apr-21| 10:13 \nitiss.png| itiss.png| | 345| 16-Apr-21| 10:13 \nitissue.png| itissue.png| | 343| 16-Apr-21| 10:13 \nitlink.png| itlink.png| | 482| 16-Apr-21| 10:13 \nitobject.png| itobject.png| | 307| 16-Apr-21| 10:13 \nitposts.gif| itposts.gif| | 81| 16-Apr-21| 10:13 \nittask.png| ittask.png| | 343| 16-Apr-21| 10:13 \nitthgbrg.png| itthgbrg.png| | 323| 16-Apr-21| 10:13 \nitwp.png| itwp.png| | 590| 16-Apr-21| 10:13 \nmb_gear.png| mb_gear.png| | 455| 16-Apr-21| 10:13 \nmb_audio.png| mb_audio.png| | 671| 16-Apr-21| 10:13 \nlg_icdoc.png| lg_icdoc.png| | 1542| 16-Apr-21| 10:13 \nlg_icdocm.png| lg_icdocm.png| | 1874| 16-Apr-21| 10:13 \nlg_icdocx.png| lg_icdocx.png| | 1656| 16-Apr-21| 10:13 \nlg_icdot.png| lg_icdot.png| | 1492| 16-Apr-21| 10:13 \nlg_icdotm.png| lg_icdotm.png| | 1779| 16-Apr-21| 10:13 \nlg_icdotx.png| lg_icdotx.png| | 1573| 16-Apr-21| 10:13 \nlg_gen.gif| lg_icgen.gif| | 171| 16-Apr-21| 10:13 \nlg_mpd.png| lg_icmpd.png| | 1587| 16-Apr-21| 10:13 \nlg_mpp.png| lg_icmpp.png| | 1583| 16-Apr-21| 10:13 \nlg_mpt.png| lg_icmpt.png| | 1552| 16-Apr-21| 10:13 \nlg_icodp.png| lg_icodp.png| | 1786| 16-Apr-21| 10:13 \nlg_icods.png| lg_icods.png| | 1845| 16-Apr-21| 10:13 \nlg_icodt.png| lg_icodt.png| | 1861| 16-Apr-21| 10:13 \nlg_icone.png| lg_icone.png| | 1484| 16-Apr-21| 10:13 \nlg_iconp.png| lg_iconp.png| | 1558| 16-Apr-21| 10:13 \nlg_icont.png| lg_icont.png| | 1544| 16-Apr-21| 10:13 \nlg_icpdf.png| lg_icpdf.png| | 451| 16-Apr-21| 10:13 \nlg_icpot.png| lg_icpot.png| | 1495| 16-Apr-21| 10:13 \nlg_icpotm.png| lg_icpotm.png| | 1785| 16-Apr-21| 10:13 \nlg_icpotx.png| lg_icpotx.png| | 1593| 16-Apr-21| 10:13 \nlg_icppa.png| lg_icppa.png| | 1397| 16-Apr-21| 10:13 \nlg_icppam.png| lg_icppam.png| | 1506| 16-Apr-21| 10:13 \nlg_icpps.png| lg_icpps.png| | 1696| 16-Apr-21| 10:13 \nlg_icppsm.png| lg_icppsm.png| | 1823| 16-Apr-21| 10:13 \nlg_icppsx.png| lg_icppsx.png| | 1603| 16-Apr-21| 10:13 \nlg_icppt.png| lg_icppt.png| | 1607| 16-Apr-21| 10:13 \nlg_icpptm.png| lg_icpptm.png| | 1894| 16-Apr-21| 10:13 \nlg_icpptx.png| lg_icpptx.png| | 1709| 16-Apr-21| 10:13 \nlg_pub.png| lg_icpub.png| | 1587| 16-Apr-21| 10:13 \nlgvdw.gif| lg_icvdw.gif| | 464| 16-Apr-21| 10:13 \nlg_vdx.png| lg_icvdx.png| | 1839| 16-Apr-21| 10:13 \nlg_vsdm.gif| lg_icvsdm.gif| | 577| 16-Apr-21| 10:13 \nlg_vsdx.gif| lg_icvsdx.gif| | 540| 16-Apr-21| 10:13 \nlg_vssm.gif| lg_icvssm.gif| | 468| 16-Apr-21| 10:13 \nlg_vssx.gif| lg_icvssx.gif| | 468| 16-Apr-21| 10:13 \nlg_vstm.gif| lg_icvstm.gif| | 502| 16-Apr-21| 10:13 \nlg_vsx.png| lg_icvsx.png| | 1549| 16-Apr-21| 10:13 \nlg_vtx.png| lg_icvtx.png| | 1686| 16-Apr-21| 10:13 \nlg_icxla.png| lg_icxla.png| | 1553| 16-Apr-21| 10:13 \nlg_icxlam.png| lg_icxlam.png| | 1579| 16-Apr-21| 10:13 \nlg_icxls.png| lg_icxls.png| | 1558| 16-Apr-21| 10:13 \nlg_icxlsb.png| lg_icxlsb.png| | 1598| 16-Apr-21| 10:13 \nlg_icxlsm.png| lg_icxlsm.png| | 1856| 16-Apr-21| 10:13 \nlg_icxlsx.png| lg_icxlsx.png| | 1635| 16-Apr-21| 10:13 \nlg_icxlt.png| lg_icxlt.png| | 1498| 16-Apr-21| 10:13 \nlg_icxltm.png| lg_icxltm.png| | 1783| 16-Apr-21| 10:13 \nlg_xltx.gif| lg_icxltx.gif| | 377| 16-Apr-21| 10:13 \nlg_icxltx.png| lg_icxltx.png| | 1570| 16-Apr-21| 10:13 \nlg_xsn.png| lg_icxsn.png| | 1418| 16-Apr-21| 10:13 \nlink.gif| link.gif| | 359| 16-Apr-21| 10:13 \nltagnda.png| ltagnda.png| | 594| 16-Apr-21| 10:13 \nltann.png| ltann.png| | 905| 16-Apr-21| 10:13 \nltappcat.png| ltappcatalog.png| | 1167| 16-Apr-21| 10:13 \nltappreq.png| ltapprequests.png| | 1504| 16-Apr-21| 10:13 \nltcat.gif| ltcat.gif| | 402| 16-Apr-21| 10:13 \nltcommcat.png| ltcommcat.png| | 492| 16-Apr-21| 10:13 \nltcommem.png| ltcommem.png| | 589| 16-Apr-21| 10:13 \nltcommnt.gif| ltcommnt.gif| | 375| 16-Apr-21| 10:13 \nltcontct.gif| ltcontct.gif| | 409| 16-Apr-21| 10:13 \nltcontct.png| ltcontct.png| | 579| 16-Apr-21| 10:13 \nltdatash.png| ltdatash.png| | 195| 16-Apr-21| 10:13 \nltdecis.png| ltdecis.png| | 785| 16-Apr-21| 10:13 \nltdisc.png| ltdisc.png| | 472| 16-Apr-21| 10:13 \nltdl.png| ltdl.png| | 417| 16-Apr-21| 10:13 \nltebl.png| ltebl.png| | 459| 16-Apr-21| 10:13 \nltevent.png| ltevent.png| | 209| 16-Apr-21| 10:13 \nltfl.png| ltfl.png| | 409| 16-Apr-21| 10:13 \nltgbcall.gif| ltgbcall.gif| | 396| 16-Apr-21| 10:13 \nltgbfaci.gif| ltgbfaci.gif| | 390| 16-Apr-21| 10:13 \nltgbwher.gif| ltgbwher.gif| | 422| 16-Apr-21| 10:13 \nltgen.png| ltgen.png| | 195| 16-Apr-21| 10:13 \nltil.png| ltil.png| | 543| 16-Apr-21| 10:13 \nltime.png| ltime.png| | 346| 16-Apr-21| 10:13 \nltiss.png| ltiss.png| | 1426| 16-Apr-21| 10:13 \nltissue.png| ltissue.png| | 681| 16-Apr-21| 10:13 \nltlink.png| ltlink.png| | 2074| 16-Apr-21| 10:13 \nltobject.png| ltobject.png| | 821| 16-Apr-21| 10:13 \nltposts.gif| ltposts.gif| | 385| 16-Apr-21| 10:13 \nltsurvey.png| ltsurvey.png| | 225| 16-Apr-21| 10:13 \nlttask.png| lttask.png| | 1176| 16-Apr-21| 10:13 \nltthgbrg.png| ltthgbrg.png| | 754| 16-Apr-21| 10:13 \nltwp.png| ltwp.png| | 706| 16-Apr-21| 10:13 \nmb_video.png| mb_video.png| | 209| 16-Apr-21| 10:13 \nmappushpin.25x39x32.png| mappushpin.25x39x32.png| | 1070| 16-Apr-21| 10:13 \nmappushpindisabled.25x39x32.png| mappushpindisabled.25x39x32.png| | 1026| 16-Apr-21| 10:13 \nmappushpinhover.25x39x32.png| mappushpinhover.25x39x32.png| | 1037| 16-Apr-21| 10:13 \nmapview.31x22x32.png| mapview.31x22x32.png| | 672| 16-Apr-21| 10:13 \nmb_button_bg.png| mb_button_bg.png| | 194| 16-Apr-21| 10:13 \nmention.11x11x32.png| mention.11x11x32.png| | 274| 16-Apr-21| 10:13 \nmtagnda.png| mtagnda.png| | 413| 16-Apr-21| 10:13 \nmtann.png| mtann.png| | 520| 16-Apr-21| 10:13 \nmtappcat.png| mtappcatalog.png| | 414| 16-Apr-21| 10:13 \nmtappreq.png| mtapprequests.png| | 548| 16-Apr-21| 10:13 \nmtcat.gif| mtcat.gif| | 197| 16-Apr-21| 10:13 \nmtcommcat.png| mtcommcat.png| | 330| 16-Apr-21| 10:13 \nmtcommem.png| mtcommem.png| | 388| 16-Apr-21| 10:13 \nmtcommnt.gif| mtcommnt.gif| | 193| 16-Apr-21| 10:13 \nmtcontct.gif| mtcontct.gif| | 137| 16-Apr-21| 10:13 \nmtcontct.png| mtcontct.png| | 293| 16-Apr-21| 10:13 \nmtdatash.png| mtdatash.png| | 129| 16-Apr-21| 10:13 \nmtdecis.png| mtdecis.png| | 516| 16-Apr-21| 10:13 \nmtdisc.png| mtdisc.png| | 307| 16-Apr-21| 10:13 \nmtdl.png| mtdl.png| | 252| 16-Apr-21| 10:13 \nmtebl.png| mtebl.png| | 245| 16-Apr-21| 10:13 \nmtevent.png| mtevent.png| | 135| 16-Apr-21| 10:13 \nmtfl.png| mtfl.png| | 227| 16-Apr-21| 10:13 \nmtgbcall.gif| mtgbcall.gif| | 396| 16-Apr-21| 10:13 \nmtgbfaci.gif| mtgbfaci.gif| | 377| 16-Apr-21| 10:13 \nmtgbwher.gif| mtgbwher.gif| | 390| 16-Apr-21| 10:13 \nmtgen.png| mtgen.png| | 129| 16-Apr-21| 10:13 \nmtil.png| mtil.png| | 280| 16-Apr-21| 10:13 \nmtime.png| mtime.png| | 188| 16-Apr-21| 10:13 \nmtiss.png| mtiss.png| | 534| 16-Apr-21| 10:13 \nmtissue.png| mtissue.png| | 447| 16-Apr-21| 10:13 \nmtlink.png| mtlink.png| | 565| 16-Apr-21| 10:13 \nmtobject.png| mtobject.png| | 460| 16-Apr-21| 10:13 \nmtposts.gif| mtposts.gif| | 197| 16-Apr-21| 10:13 \nmtsurvey.png| mtsurvey.png| | 141| 16-Apr-21| 10:13 \nmttask.png| mttask.png| | 405| 16-Apr-21| 10:13 \nmtthgbrg.png| mtthgbrg.png| | 526| 16-Apr-21| 10:13 \nmtwp.png| mtwp.png| | 391| 16-Apr-21| 10:13 \nmb_file.png| mb_file.png| | 215| 16-Apr-21| 10:13 \nnowfollowing.11x11x32.png| nowfollowing.11x11x32.png| | 257| 16-Apr-21| 10:13 \no365brandsuite.png| o365brandsuite.png| | 2122| 16-Apr-21| 10:13 \npersonplaceholder200.png| personplaceholder.200x150x32.png| | 2438| 16-Apr-21| 10:13 \npersonplaceholder32.png| personplaceholder.32x32x32.png| | 737| 16-Apr-21| 10:13 \npersonplaceholder42.png| personplaceholder.42x42x32.png| | 728| 16-Apr-21| 10:13 \npersonplaceholder96.png| personplaceholder.96x96x32.png| | 1500| 16-Apr-21| 10:13 \nprojectmanagedeliverables.16x16x32.png| projectmanagedeliverables.16x16x32.png| | 219| 16-Apr-21| 10:13 \npromotedsitetile.150x150x32.png| promotedsitetile.150x150x32.png| | 2530| 16-Apr-21| 10:13 \nrepliedto.11x11x32.png| repliedto.11x11x32.png| | 257| 16-Apr-21| 10:13 \nmb_excel.png| mb_excel.png| | 572| 16-Apr-21| 10:13 \nmb_onenote.png| mb_onenote.png| | 456| 16-Apr-21| 10:13 \nmb_text.png| mb_text.png| | 268| 16-Apr-21| 10:13 \nmb_ppt.png| mb_ppt.png| | 577| 16-Apr-21| 10:13 \nmb_word.png| mb_word.png| | 535| 16-Apr-21| 10:13 \nmb_site.png| mb_siteworkspace.png| | 822| 16-Apr-21| 10:13 \nselectioncheckmarkcolumn.10x10x32.png| selectioncheckmarkcolumn.10x10x32.png| | 229| 16-Apr-21| 10:13 \nsharepointfoundation16.png| sharepointfoundation16.png| | 560| 16-Apr-21| 10:13 \nfavicon.ico| favicon.ico| | 7886| 16-Apr-21| 10:13 \nsharepointdesigner32.png| sharepointdesigner32.png| | 1613| 16-Apr-21| 10:13 \nsharepointmetroapptile.png| sharepointmetroapptile.png| | 3992| 16-Apr-21| 10:13 \nsiteicon.png| siteicon.png| | 2345| 16-Apr-21| 10:13 \naccsrv.images.progcircle16.gif| hig_progcircle_loading16.gif| | 420| 16-Apr-21| 10:13 \nloadingcirclests16.gif| loadingcirclests16.gif| | 420| 16-Apr-21| 10:13 \naccsrv.images.progcircle24.gif| hig_progcircle_loading24.gif| | 878| 16-Apr-21| 10:13 \ngears_anv4.gif_0001| gears_anv4.gif| | 878| 16-Apr-21| 10:13 \nloadin24.gif| hig_progcircle_loading24.gif| | 878| 16-Apr-21| 10:13 \nloadin24.png| hig_progcircle_loading24.gif| | 878| 16-Apr-21| 10:13 \nprogress_circle_24.gif| progress-circle-24.gif| | 878| 16-Apr-21| 10:13 \nmb_navigation.png| mb_navigation.png| | 255| 16-Apr-21| 10:13 \nspstorefrontappdefault.16x16x32.png| spstorefrontappdefault.16x16x32.png| | 296| 16-Apr-21| 10:13 \nspstorefrontappdefault.96x96x32.png| spstorefrontappdefault.96x96x32.png| | 1036| 16-Apr-21| 10:13 \ntag.11x11x32.png| tag.11x11x32.png| | 228| 16-Apr-21| 10:13 \nupdatelink.16x16x32.png| updatelink.16x16x32.png| | 320| 16-Apr-21| 10:13 \nusquig.png| usersquiggle.png| | 150| 16-Apr-21| 10:13 \nvideopreview.png| videopreview.png| | 7110| 16-Apr-21| 10:13 \nmb_page.png| mb_page.png| | 710| 16-Apr-21| 10:13 \nmb_xml.png| mb_xml.png| | 464| 16-Apr-21| 10:13 \nbusdata.dll| microsoft.businessdata.dll| 15.0.5345.1000| 128920| 15-Apr-21| 08:18 \nbusdatar.dll| microsoft.businessdata.dll| 15.0.5345.1000| 128920| 15-Apr-21| 08:18 \nmicrosoft_web_design_server.dll| microsoft.web.design.server.dll| 15.0.5345.1000| 395160| 15-Apr-21| 08:19 \nmicrosoft_web_design_server_intl.dll| microsoft.web.design.server.intl.dll| 15.0.4420.1017| 21640| 15-Apr-21| 08:19 \nbdcmdsch.xsd| bdcmetadata.xsd| | 26300| | \nbdcmeta.xsd| bdcmetadata.xsd| | 26300| 15-Apr-21| 08:18 \nbdcmdsc2.xsd| bdcmetadataresource.xsd| | 13089| | \nbdcmetar.xsd| bdcmetadataresource.xsd| | 13089| 15-Apr-21| 08:18 \nonetnative.dll| onetnative.dll| 15.0.5223.1000| 517008| 15-Apr-21| 08:18 \nxlsrv.onetnative.dll| onetnative.dll| 15.0.5223.1000| 517008| 15-Apr-21| 08:18 \nonetutil.dll| onetutil.dll| 15.0.5345.1000| 2617752| 15-Apr-21| 08:19 \noffice_extension_manager_js| sp.officeextensionmanager.js| | 35154| 15-Apr-21| 08:19 \nosfserver_client_dll| microsoft.sharepoint.client.workflowservices.dll| 15.0.4599.1000| 39128| 15-Apr-21| 08:19 \nosfserver_silverlight_dll| microsoft.sharepoint.client.workflowservices.silverlight.dll| 15.0.4599.1000| 39152| 15-Apr-21| 08:19 \nosfserver_serverproxy_dll| microsoft.sharepoint.workflowservices.serverproxy.dll| 15.0.4599.1000| 110280| 15-Apr-21| 08:19 \nosfserver_shared_dll| microsoft.sharepoint.workflowservicesbase.dll| 15.0.4877.1000| 88360| 15-Apr-21| 08:19 \nosfserver_shared_dll_intl| microsoft.sharepoint.workflowservicesbase.intl.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \nproxylibrary.osfserver.xml| proxylibrary.osfserver.xml| | 164| 15-Apr-21| 08:19 \nosfserver_clientdbg_js| sp.workflowservices.debug.js| | 58451| 15-Apr-21| 08:19 \nosfserver_clientdbg_js.x64| sp.workflowservices.debug.js| | 58451| 15-Apr-21| 08:19 \nosfserver_client_js| sp.workflowservices.js| | 34083| 15-Apr-21| 08:19 \nosfserver_client_js.x64| sp.workflowservices.js| | 34083| 15-Apr-21| 08:19 \naddwrkfl.aspx| addwrkfl.aspx| | 61362| 15-Apr-21| 08:19 \nassocwrkfl.aspx| assocwrkfl.aspx| | 4655| 15-Apr-21| 08:19 \navailableworkflow.aspx| availableworkflow.aspx| | 7966| 15-Apr-21| 08:19 \nmytasks.aspx| mytasks.aspx| | 6818| 15-Apr-21| 08:19 \noextnmgr.aspx| officeextensionmanager.aspx| | 2196| 15-Apr-21| 08:19 \nremwrkfl.aspx| remwrkfl.aspx| | 16619| 15-Apr-21| 08:19 \nosfserver.resx| osfserver.resx| | 45025| 15-Apr-21| 08:19 \nrunningworkflows.aspx| runningworkflows.aspx| | 8570| 15-Apr-21| 08:19 \nvalidapp.osfsrv.xml| validappendpoints.osfserver.xml| | 1245| 15-Apr-21| 08:19 \nwfstart.asx| wfstart.aspx| | 202| 15-Apr-21| 08:19 \nworkflow.asx| workflow.aspx| | 25914| 15-Apr-21| 08:19 \nworkflowtaskpane.aspx| workflowtaskpane.aspx| | 1180| 15-Apr-21| 08:19 \nwrksetng.aspx| wrksetng.aspx| | 15843| 15-Apr-21| 08:19 \nwrkstat.aspx| wrkstat.aspx| | 27940| 15-Apr-21| 08:19 \nosfextap.dll| microsoft.sharepoint.officeextension.applicationpages.dll| 15.0.5207.1000| 16480| 15-Apr-21| 08:19 \nwfform.js| wfformtemplates.js| | 5024| 15-Apr-21| 08:19 \nosfap.dll| microsoft.sharepoint.workflowservices.applicationpages.dll| 15.0.4755.1000| 96880| 15-Apr-21| 08:19 \nwebconfig.osfserver.xml| webconfig.osfserver.xml| | 504| 15-Apr-21| 08:19 \naddgallery.xap_silverlight| addgallery.xap| | 368387| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.xap| microsoft.sharepoint.client.xap| | 223749| 15-Apr-21| 08:19 \nosscadmn.dll| microsoft.search.server.comadmin.dll| | 36232| 15-Apr-21| 08:19 \nwsstlb.net| microsoft.sharepoint.search.administration.mssitlb.dll| | 90792| 15-Apr-21| 08:19 \nsearchom.dll_0003| microsoft.sharepoint.search.dll| 15.0.5129.1000| 3601488| 15-Apr-21| 08:19 \nsearchom.dll_0005| microsoft.sharepoint.search.dll| 15.0.5129.1000| 3601488| 15-Apr-21| 08:19 \nsrchomnt.dll_1| microsoft.sharepoint.search.native.dll| 15.0.5337.1000| 472472| 15-Apr-21| 08:19 \nwsrchps.dll| microsoft.sharepoint.search.powershell.dll| 15.0.4937.1000| 31520| 15-Apr-21| 08:19 \ncontrol_defaultresult.js| control_searchresults.js| | 32312| 15-Apr-21| 08:19 \nfilter_refinement.js| filter_default.js| | 21014| 15-Apr-21| 08:19 \nfilter_multirefinement.js| filter_multivalue.js| | 6263| 15-Apr-21| 08:19 \ngroup_content.js| group_content.js| | 2159| 15-Apr-21| 08:19 \ngroup_defaultgroup.js| group_default.js| | 6616| 15-Apr-21| 08:19 \nhoverpanel_commonactions.js| item_commonhoverpanel_actions.js| | 12766| 15-Apr-21| 08:19 \nhoverpanel_commonbody.js| item_commonhoverpanel_body.js| | 7771| 15-Apr-21| 08:19 \nhoverpanel_community.js| item_community_hoverpanel.js| | 11080| 15-Apr-21| 08:19 \nhoverpanel_default.js| item_default_hoverpanel.js| | 4222| 15-Apr-21| 08:19 \nhoverpanel_microblog.js| item_microblog_hoverpanel.js| | 17457| 15-Apr-21| 08:19 \nhoverpanel_site.js| item_site_hoverpanel.js| | 7582| 15-Apr-21| 08:19 \nhoverpanel_webpage.js| item_webpage_hoverpanel.js| | 6608| 15-Apr-21| 08:19 \nitem_commonbody.js| item_commonitem_body.js| | 8742| 15-Apr-21| 08:19 \nitem_communityportal.js| item_communityportal.js| | 9225| 15-Apr-21| 08:19 \nitem_microblog.js| item_microblog.js| | 17108| 15-Apr-21| 08:19 \nitem_pdf.js| item_pdf.js| | 4102| 15-Apr-21| 08:19 \nitem_people.js| item_person.js| | 24413| 15-Apr-21| 08:19 \nitem_peopleintent.js| item_person_compacthorizontal.js| | 27705| 15-Apr-21| 08:19 \nitem_site.js| item_site.js| | 4544| 15-Apr-21| 08:19 \nitem_webpage.js| item_webpage.js| | 3827| 15-Apr-21| 08:19 \nitem_word.js| item_word.js| | 4157| 15-Apr-21| 08:19 \nsearch.web.parts.feature.xml| feature.xml| | 5405| 15-Apr-21| 08:19 \nsearch.web.parts.dwpfiles.xml| webpartdwpfiles.xml| | 68278| 15-Apr-21| 08:19 \nwss.searchpowershell.types.ps1xml| wsssearchpowershell.types.ps1xml| | 10901| 15-Apr-21| 08:19 \nwss.intl.dll| microsoft.sharepoint.search.intl.dll| 15.0.5197.1000| 563296| 15-Apr-21| 08:19 \nsetup.exe| setup.exe| 15.0.5337.1000| 1080216| 15-Apr-21| 08:18 \nsvrsetup.exe| setup.exe| 15.0.5337.1000| 1080216| 15-Apr-21| 08:18 \nwsssetup.dll| wsssetup.dll| 15.0.5345.1000| 10405256| 15-Apr-21| 08:19 \ndevftr.xml| feature.xml| | 1225| 15-Apr-21| 08:19 \nappdev.dll| microsoft.sharepoint.appdevelopment.dll| 15.0.5027.1000| 71384| 15-Apr-21| 08:19 \nstsapa.dll| microsoft.sharepoint.applicationpages.administration.dll| 15.0.5163.1000| 662120| 15-Apr-21| 08:19 \nwssadmop.dll_0001| microsoft.sharepoint.administrationoperation.dll| 15.0.5297.1000| 1039768| 15-Apr-21| 08:19 \nwssadmin.exe_0001| wssadmin.exe| 15.0.4420.1017| 17088| 15-Apr-21| 08:19 \nappmng.svc| appmng.svc| | 375| 15-Apr-21| 08:19 \nappmngclient.config| client.config| | 2159| 15-Apr-21| 08:19 \nappmngweb.config| web.config| | 2641| 15-Apr-21| 08:19 \nbgximg.png| bgximg.png| | 1770| 15-Apr-21| 08:19 \nbgyimg.png| bgyimg.png| | 68| 15-Apr-21| 08:19 \nclient.svc| client.svc| | 402| 15-Apr-21| 08:19 \nadmwcfg.xml| adminwebconfig.sts.xml| | 3530| 15-Apr-21| 08:19 \napppermissionprovider.bdcconnection.xml| apppermissionprovider.bdcconnection.xml| | 232| 15-Apr-21| 08:19 \napppermissionprovider.content.xml| apppermissionprovider.content.xml| | 706| 15-Apr-21| 08:19 \ncapabilitycheckers.sts.xml| capabilitycheckers.sts.xml| | 2789| 15-Apr-21| 08:19 \ndocexflt.xml| docextflt.xml| | 4439| 15-Apr-21| 08:19 \ndocparse.xml| docparse.xml| | 2293| 15-Apr-21| 08:19 \ngbwupgrade.xml| gbwupgrade.xml| | 4055| 15-Apr-21| 08:19 \ngbwupgradeb2b.xml| gbwupgradeb2b.xml| | 311| 15-Apr-21| 08:19 \nmdocview.xml| mdocview.xml| | 6975| 15-Apr-21| 08:19 \nmpsupgrade.xml| mpsupgrade.xml| | 15459| 15-Apr-21| 08:19 \nmpsupgradeb2b.xml| mpsupgradeb2b.xml| | 102| 15-Apr-21| 08:19 \nmredirection.xml| mredirection.xml| | 4660| 15-Apr-21| 08:19 \nproxylibrary.stsom.xml| proxylibrary.stsom.xml| | 217| 15-Apr-21| 08:19 \nrgnldflt.xml| rgnldflt.xml| | 81253| 15-Apr-21| 08:19 \ntaupgrade.xml| tenantadminupgrade.xml| | 437| 15-Apr-21| 08:19 \ntimezone.xml| timezone.xml| | 99866| 15-Apr-21| 08:19 \nwebconfig_identitymodel_add| webconfig.identitymodel.add.xml| | 7529| 15-Apr-21| 08:19 \nwebconfig_identitymodel_remove| webconfig.identitymodel.remove.xml| | 3122| 15-Apr-21| 08:19 \nwssupgrade.xml| wssupgrade.xml| | 9043| 15-Apr-21| 08:19 \nwssupgradeb2b.xml| wssupgradeb2b.xml| | 4719| 15-Apr-21| 08:19 \noleprsx.dll| oleparser.dll| 15.0.4454.1000| 31880| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.dotnetinterceptor.dll| microsoft.sharepoint.dotnetinterceptor.dll| 15.0.5271.1000| 15768| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.dotnetinterceptor.dll_001| microsoft.sharepoint.dotnetinterceptor.dll| 15.0.5271.1000| 15768| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp.dll| microsoft.sharepoint.dsp.dll| 15.0.4420.1017| 48248| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_oledb.dll| microsoft.sharepoint.dsp.oledb.dll| 15.0.4420.1017| 112768| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_soappt.dll| microsoft.sharepoint.dsp.soappt.dll| 15.0.4420.1017| 75912| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_sts.dll| microsoft.sharepoint.dsp.sts.dll| 15.0.4420.1017| 93312| 15-Apr-21| 08:19 \nmicrosoft_sharepoint_dsp_xmlurl.dll| microsoft.sharepoint.dsp.xmlurl.dll| 15.0.4420.1017| 75912| 15-Apr-21| 08:19 \nschema.xml_accreq| schema.xml| | 21500| 15-Apr-21| 08:19 \naccreq.xml| accessrequests.xml| | 681| 15-Apr-21| 08:19 \nfeature.xml_accreq| feature.xml| | 497| 15-Apr-21| 08:19 \napplications.xml| applications.xml| | 8249| 15-Apr-21| 08:19 \napps.xml| apps.xml| | 3078| 15-Apr-21| 08:19 \nbackups.xml| backups.xml| | 4398| 15-Apr-21| 08:19 \nconfigurationwizards.xml| configurationwizards.xml| | 912| 15-Apr-21| 08:19 \ndefault.xml| default.xml| | 12609| 15-Apr-21| 08:19 \nfeature.xml_sts| feature.xml| | 1712| 15-Apr-21| 08:19 \ngenappsettings.xml| generalapplicationsettings.xml| | 1989| 15-Apr-21| 08:19 \nmonitoring.xml| monitoring.xml| | 3736| 15-Apr-21| 08:19 \no365configuration.xml| office365configuration.xml| | 405| 15-Apr-21| 08:19 \nquicklaunch.xml| quicklaunch.xml| | 555| 15-Apr-21| 08:19 \nsecurity.xml| security.xml| | 5954| 15-Apr-21| 08:19 \nsystemsettings.xml| systemsettings.xml| | 5280| 15-Apr-21| 08:19 \nupgradeandmigration.xml| upgradeandmigration.xml| | 1630| 15-Apr-21| 08:19 \nschema.xml_announce| schema.xml| | 26227| 15-Apr-21| 08:19 \nannounce.xml| announcements.xml| | 456| 15-Apr-21| 08:19 \nfeature.xml_announce| feature.xml| | 500| 15-Apr-21| 08:19 \napplockdown.xml| applockdown.xml| | 2321| 15-Apr-21| 08:19 \nfeature.xml_apploc| feature.xml| | 400| 15-Apr-21| 08:19 \nappreglinks.xml| appregistrationlinks.xml| | 793| 15-Apr-21| 08:19 \nfeature.xml_appreg| feature.xml| | 554| 15-Apr-21| 08:19 \nschema.xml_apprequestslist| schema.xml| | 10229| 15-Apr-21| 08:19 \napprequestscontenttypes.xml_apprequestslist| apprequestscontenttypes.xml| | 1748| 15-Apr-21| 08:19 \napprequestsfields.xml_apprequestslist| apprequestsfields.xml| | 5336| 15-Apr-21| 08:19 \napprequestslistinstance.xml_apprequestslist| apprequestslistinstance.xml| | 403| 15-Apr-21| 08:19 \napprequestslisttemplate.xml_apprequestslist| apprequestslisttemplate.xml| | 627| 15-Apr-21| 08:19 \nfeature.xml_apprequestslist| feature.xml| | 1516| 15-Apr-21| 08:19 \nautohostedlicensing_fields.xml_autohostedapplicensing| autohostedapplicensingfields.xml| | 771| 15-Apr-21| 08:19 \nfeature.xml_autohostedapplicensing| feature.xml| | 744| 15-Apr-21| 08:19 \nautohostedlicensing_controls.xml_autohostedapplicensing| resourcebar.xml| | 412| 15-Apr-21| 08:19 \nfeature.xml_autohostedapplicensingstapling| feature.xml| | 487| 15-Apr-21| 08:19 \nelements.xml_autohostedapplicensingstapling| staplingelements.xml| | 223| 15-Apr-21| 08:19 \nblog.dwp_admintools| blogadmin.dwp| | 468| 15-Apr-21| 08:19 \nblog.dwp_archives| blogarchives.dwp| | 462| 15-Apr-21| 08:19 \nblog.webpart_notifications| blognotifications.webpart| | 883| 15-Apr-21| 08:19 \nelements.xml_basicwebparts| elements.xml| | 1652| 15-Apr-21| 08:19 \nelements14.xml_basicwebparts| elements14.xml| | 629| 15-Apr-21| 08:19 \nelements15.xml_basicwebparts| elements15.xml| | 1407| 15-Apr-21| 08:19 \nfeature.xml_basicwebparts| feature.xml| | 3149| 15-Apr-21| 08:19 \ngettingstarted.webpart_basicwebparts| gettingstarted.webpart| | 834| 15-Apr-21| 08:19 \nmscontenteditor.dwp_basicwebparts| mscontenteditor.dwp| | 506| 15-Apr-21| 08:19 \nmsimage.dwp_basicwebparts| msimage.dwp| | 483| 15-Apr-21| 08:19 \nmsmembers.dwp_basicwebparts| msmembers.dwp| | 487| 15-Apr-21| 08:19 \nmspageviewer.dwp_basicwebparts| mspageviewer.dwp| | 498| 15-Apr-21| 08:19 \nmspiclibslideshow.webpart_basicwebparts| mspicturelibraryslideshow.webpart| | 733| 15-Apr-21| 08:19 \nmsscripteditor.webpart_basicwebparts| msscripteditor.webpart| | 739| 15-Apr-21| 08:19 \nmssimpleform.dwp_basicwebparts| mssimpleform.dwp| | 799| 15-Apr-21| 08:19 \nmsuserdocs.dwp_basicwebparts| msuserdocs.dwp| | 492| 15-Apr-21| 08:19 \nmsusertasks.dwp_basicwebparts| msusertasks.dwp| | 495| 15-Apr-21| 08:19 \nmsxml.dwp_basicwebparts| msxml.dwp| | 475| 15-Apr-21| 08:19 \nsilverlight.webpart_basicwebparts| silverlight.webpart| | 669| 15-Apr-21| 08:19 \ntimeline.webpart_basicwebparts| timeline.webpart| | 831| 15-Apr-21| 08:19 \nextsubsh_feature.xml| feature.xml| | 570| 15-Apr-21| 08:19 \nallcategories.asp_blog_categories| allcategories.aspx| | 2718| 15-Apr-21| 08:19 \neditcategory.asp_blog_categories| editcategory.aspx| | 4167| 15-Apr-21| 08:19 \nmycategories.asp_blog_categories| mycategories.aspx| | 2718| 15-Apr-21| 08:19 \nnewcategory.asp_blog_categories| newcategory.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_blog_categories| schema.xml| | 18153| 15-Apr-21| 08:19 \nviewcategory.asp_blog_categories| viewcategory.aspx| | 4190| 15-Apr-21| 08:19 \nallcomments.asp_blog_comments| allcomments.aspx| | 2718| 15-Apr-21| 08:19 \nbyauthor.asp_blog_comments| byauthor.aspx| | 2718| 15-Apr-21| 08:19 \neditcomment.asp_blog_comments| editcomment.aspx| | 4167| 15-Apr-21| 08:19 \nmycomments.asp_blog_comments| mycomments.aspx| | 2718| 15-Apr-21| 08:19 \nnewcomment.asp_blog_comments| newcomment.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_blog_comments| schema.xml| | 35968| 15-Apr-21| 08:19 \nviewcomment.asp_blog_comments| viewcomment.aspx| | 4190| 15-Apr-21| 08:19 \nallposts.asp_blog_posts| allposts.aspx| | 2718| 15-Apr-21| 08:19 \narchive.asp_blog_posts| archive.aspx| | 2718| 15-Apr-21| 08:19 \nbyauthor.asp_blog_posts| byauthor.aspx| | 2718| 15-Apr-21| 08:19 \nbycategory.asp_blog_posts| bycategory.aspx| | 2718| 15-Apr-21| 08:19 \ncalendar.asp_blog_posts| calendar.aspx| | 2718| 15-Apr-21| 08:19 \neditpost.asp_blog_posts| editpost.aspx| | 4167| 15-Apr-21| 08:19 \nmyposts.asp_blog_posts| myposts.aspx| | 2718| 15-Apr-21| 08:19 \nnewpost.asp_blog_posts| newpost.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_blog_posts| schema.xml| | 81082| 15-Apr-21| 08:19 \nviewpost.asp_blog_posts| viewpost.aspx| | 4190| 15-Apr-21| 08:19 \nelements.xml_blog| elements.xml| | 1207| 15-Apr-21| 08:19 \nfeature.xml_blog| feature.xml| | 1326| 15-Apr-21| 08:19 \ncategory.asp_blogcon| category.aspx| | 2649| 15-Apr-21| 08:19 \ndate.asp_blog_blogcon| date.aspx| | 2643| 15-Apr-21| 08:19 \nelements.xml_blogcon| elements.xml| | 29090| 15-Apr-21| 08:19 \nfeature.xml_blogcon| feature.xml| | 517| 15-Apr-21| 08:19 \nmonthlyarchive.asp_blogcon| monthlyarchive.aspx| | 2737| 15-Apr-21| 08:19 \npost.asp_blogcon| post.aspx| | 3153| 15-Apr-21| 08:19 \nsummary.asp_blog_blogcon| summary.aspx| | 3200| 15-Apr-21| 08:19 \ndefault.asp_blog_bloghp| default.aspx| | 2682| 15-Apr-21| 08:19 \nelements.xml_bloghp| elements.xml| | 8483| 15-Apr-21| 08:19 \nfeature.xml_bloghp| feature.xml| | 501| 15-Apr-21| 08:19 \nschema.xml_calltrack| schema.xml| | 314515| 15-Apr-21| 08:19 \ncalltrack.xml| calltracklist.xml| | 5563| 15-Apr-21| 08:19 \nfeature.xml_calltrack| feature.xml| | 1178| 15-Apr-21| 08:19 \nschema.xml_circulation| schema.xml| | 313711| 15-Apr-21| 08:19 \ncirculation.xml| circulationlist.xml| | 6489| 15-Apr-21| 08:19 \nfeature.xml_circulation| feature.xml| | 1196| 15-Apr-21| 08:19 \nschema.xml_contacts| schema.xml| | 8715| 15-Apr-21| 08:19 \ncontacts.xml| contacts.xml| | 451| 15-Apr-21| 08:19 \nfeature.xml_contacts| feature.xml| | 480| 15-Apr-21| 08:19 \nsrcharea.xml| searcharea.xml| | 1279| 15-Apr-21| 08:19 \nfeature.xml_0004| feature.xml| | 527| 15-Apr-21| 08:19 \ncontenttypesettings.xml| contenttypesettings.xml| | 4678| 15-Apr-21| 08:19 \nfeature.xml_0010| feature.xml| | 537| 15-Apr-21| 08:19 \nschema.xml_corpcatalog| schema.xml| | 32074| 15-Apr-21| 08:19 \ncorporatecatalogcustomactions.xml_corpcatalog| corporatecatalogcustomactions.xml| | 8553| 15-Apr-21| 08:19 \ncorporatecatalogfields.xml_corpcatalog| corporatecatalogfields.xml| | 11303| 15-Apr-21| 08:19 \ncorporatecataloginstance.xml_corpcatalog| corporatecataloginstance.xml| | 422| 15-Apr-21| 08:19 \ncorporatecatalogtemplate.xml_corpcatalog| corporatecatalogtemplate.xml| | 665| 15-Apr-21| 08:19 \nfeature.xml_corpcatalog| feature.xml| | 2174| 15-Apr-21| 08:19 \nwebeventreceiver.xml_corpcatalog| webeventreceiver.xml| | 578| 15-Apr-21| 08:19 \nfeature.xml_corpgallerysettings| feature.xml| | 408| 15-Apr-21| 08:19 \nctypswss.xml| ctypeswss.xml| | 48192| 15-Apr-21| 08:19 \nctpswss2.xml| ctypeswss2.xml| | 26052| 15-Apr-21| 08:19 \nctpswss3.xml| ctypeswss3.xml| | 2093| 15-Apr-21| 08:19 \nfeature_0004.xml| feature.xml| | 3974| 15-Apr-21| 08:19 \nschema.xml_custom| schema.xml| | 3427| 15-Apr-21| 08:19 \ncustlist.xml| customlist.xml| | 442| 15-Apr-21| 08:19 \nfeature.xml_custom| feature.xml| | 479| 15-Apr-21| 08:19 \nschema.xml_dsl| schema.xml| | 4343| 15-Apr-21| 08:19 \ndsl.xml| datasourcelibrary.xml| | 512| 15-Apr-21| 08:19 \nfeature.xml_dsl| feature.xml| | 477| 15-Apr-21| 08:19 \nribbon.xml| ribbon.xml| | 4984| 15-Apr-21| 08:19 \nschema.xml_discuss| schema.xml| | 266868| 15-Apr-21| 08:19 \ndiscuss.xml| discussions.xml| | 1715| 15-Apr-21| 08:19 \nfeature.xml_discuss| feature.xml| | 1750| 15-Apr-21| 08:19 \neditdlg.htm_doclib| editdlg.htm| | 4892| 15-Apr-21| 08:19 \neditdlg.htm_ldoclib| editdlg.htm| | 4892| 15-Apr-21| 08:19 \neditdlg.htm_pubfeap| editdlg.htm| | 4892| 15-Apr-21| 08:19 \neditdlg.htm_pubresfeat| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nreportcenterdoclibeditdlg_htm| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nrleditdlg.htm| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nfiledlg.htm_doclib| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nfiledlg.htm_ldoclib| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nfiledlg.htm_pubfeap| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nfiledlg.htm_pubresfeat| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nreportcenterdoclibfiledlg_htm| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nrlfiledlg.htm_ldoclib| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nrepair.aspx_doclib| repair.aspx| | 3259| 15-Apr-21| 08:19 \nrepair.aspx_ldoclib| repair.aspx| | 3259| 15-Apr-21| 08:19 \nrepair.aspx_pubfeap| repair.aspx| | 3259| 15-Apr-21| 08:19 \nrepair.aspx_pubresfeat| repair.aspx| | 3259| 15-Apr-21| 08:19 \nreportcenterdoclibrepair_aspx| repair.aspx| | 3259| 15-Apr-21| 08:19 \nreportcenterdoclibschema_xml| schema.xml| | 31199| 15-Apr-21| 08:19 \nschema.xml_doclib| schema.xml| | 31199| 15-Apr-21| 08:19 \nschema.xml_pubfeap| schema.xml| | 31199| 15-Apr-21| 08:19 \nreportcenterdoclibupload_aspx| upload.aspx| | 5911| 15-Apr-21| 08:19 \nrlupload.aspx| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_doclib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_ldoclib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_pubfeap| upload.aspx| | 5911| 15-Apr-21| 08:19 \nupload.aspx_pubresfeat| upload.aspx| | 5911| 15-Apr-21| 08:19 \ndoclib.xml| documentlibrary.xml| | 476| 15-Apr-21| 08:19 \nfeature.xml_doclib| feature.xml| | 499| 15-Apr-21| 08:19 \nelements.xml_downloadfromofficedotcom| elements.xml| | 114| 15-Apr-21| 08:19 \nfeature.xml_downloadfromofficedotcom| feature.xml| | 521| 15-Apr-21| 08:19 \nemltemplates.xml| emailtemplates.xml| | 2233| 15-Apr-21| 08:19 \nemltemplates.xml_14| emailtemplates.xml| | 2233| 15-Apr-21| 08:19 \nevalnoupg.xml| evalsitecreatewithnoupgrade.xml| | 1443| 15-Apr-21| 08:19 \nevalnoupg.xml_14| evalsitecreatewithnoupgrade.xml| | 1443| 15-Apr-21| 08:19 \nevalupg.xml| evalsitecreationwithupgrade.xml| | 1184| 15-Apr-21| 08:19 \nevalupg.xml_14| evalsitecreationwithupgrade.xml| | 1184| 15-Apr-21| 08:19 \nevaldelete.xml| evalsitedeleted.xml| | 440| 15-Apr-21| 08:19 \nevaldelete.xml_14| evalsitedeleted.xml| | 440| 15-Apr-21| 08:19 \nevalexp.xml| evalsitenearingexpiry.xml| | 1030| 15-Apr-21| 08:19 \nevalexp.xml_14| evalsitenearingexpiry.xml| | 1030| 15-Apr-21| 08:19 \nevalrequest.xml| evalsiterequested.xml| | 363| 15-Apr-21| 08:19 \nevalrequest.xml_14| evalsiterequested.xml| | 363| 15-Apr-21| 08:19 \nemltemplatefeat.xml| feature.xml| | 518| 15-Apr-21| 08:19 \nemltemplatefeat.xml_14| feature.xml| | 518| 15-Apr-21| 08:19 \nsiteupg.xml| siteupgraded.xml| | 922| 15-Apr-21| 08:19 \nsiteupg.xml_14| siteupgraded.xml| | 922| 15-Apr-21| 08:19 \nsiteupgfailed.xml| siteupgradefailed.xml| | 807| 15-Apr-21| 08:19 \nsiteupgfailed.xml_14| siteupgradefailed.xml| | 807| 15-Apr-21| 08:19 \nupgavail.xml| upgradeavailable.xml| | 1129| 15-Apr-21| 08:19 \nupgavail.xml_14| upgradeavailable.xml| | 1129| 15-Apr-21| 08:19 \nschema.xml_events| schema.xml| | 27131| 15-Apr-21| 08:19 \nevents.xml| events.xml| | 481| 15-Apr-21| 08:19 \nfeature.xml_events| feature.xml| | 975| 15-Apr-21| 08:19 \nschema.xml_external| schema.xml| | 3389| 15-Apr-21| 08:19 \nextlist.xml| externallist.xml| | 437| 15-Apr-21| 08:19 \nfeature.xml_external| feature.xml| | 485| 15-Apr-21| 08:19 \nextsubs_schema.xml| schema.xml| | 2775| 15-Apr-21| 08:19 \nextsubs.xml| extsubs.xml| | 470| 15-Apr-21| 08:19 \nextsubs_feature.xml| feature.xml| | 1216| 15-Apr-21| 08:19 \nextsubs_listinstance.xml| listinstance.xml| | 446| 15-Apr-21| 08:19 \nschema.xml_facility| schema.xml| | 5279| 15-Apr-21| 08:19 \nfacility.xml| facilitylist.xml| | 552| 15-Apr-21| 08:19 \nfeature.xml_facility| feature.xml| | 1064| 15-Apr-21| 08:19 \nschema.xml_fcgroups| schema.xml| | 5266| 15-Apr-21| 08:19 \nfcgroups.xml| fcgroupslist.xml| | 518| 15-Apr-21| 08:19 \nfeature.xml_fcgroups| feature.xml| | 546| 15-Apr-21| 08:19 \nfeature_0003.xml| feature.xml| | 1346| 15-Apr-21| 08:19 \nfldswss.xml| fieldswss.xml| | 222599| 15-Apr-21| 08:19 \nfldswss2.xml| fieldswss2.xml| | 469| 15-Apr-21| 08:19 \nfldswss3.xml| fieldswss3.xml| | 50780| 15-Apr-21| 08:19 \nfldswss4.xml| fieldswss4.xml| | 11512| 15-Apr-21| 08:19 \nschema.xml_gantt| schema.xml| | 15783| 15-Apr-21| 08:19 \ngantttl.xml| gantttaskslist.xml| | 496| 15-Apr-21| 08:19 \nfeature.xml_gantt| feature.xml| | 475| 15-Apr-21| 08:19 \nfeature_gbwprovision.xml| feature.xml| | 710| 15-Apr-21| 08:19 \nlistinstance_gbwprovision.xml| listinstance.xml| | 816| 15-Apr-21| 08:19 \nelements.xml_gbwwebparts| elements.xml| | 596| 15-Apr-21| 08:19 \nfeature.xml_gbwwebparts| feature.xml| | 346| 15-Apr-21| 08:19 \ntimecard.dwp_gbwwebparts| timecard.dwp| | 442| 15-Apr-21| 08:19 \nwhatsnew.dwp_gbwwebparts| whatsnew.dwp| | 448| 15-Apr-21| 08:19 \nwhereabouts.dwp_gbwwebparts| whereabouts.dwp| | 445| 15-Apr-21| 08:19 \nelements.xml| elements.xml| | 1584| 15-Apr-21| 08:19 \nfeature_gettingstarted.xml| feature.xml| | 957| 15-Apr-21| 08:19 \ngettingstarted.asx| gettingstarted.aspx| | 2904| 15-Apr-21| 08:19 \nelements.xml_gsappcatsite| elements.xml| | 483| 15-Apr-21| 08:19 \nfeature.xml_gsappcatsite| feature.xml| | 769| 15-Apr-21| 08:19 \ngettingstartedwithappcatalogsite.webpart_gsappcatsite| gettingstartedwithappcatalogsite.webpart| | 915| 15-Apr-21| 08:19 \nschema.xml_gridlist| schema.xml| | 2824| 15-Apr-21| 08:19 \ngridlist.xml| gridlist.xml| | 454| 15-Apr-21| 08:19 \nfeature.xml_gridlist| feature.xml| | 477| 15-Apr-21| 08:19 \nfeature_groupwork.xml| feature.xml| | 728| 15-Apr-21| 08:19 \nlistinstance_groupwork.xml| listinstance.xml| | 962| 15-Apr-21| 08:19 \nschema.xml_helplibrary| schema.xml| | 18584| 15-Apr-21| 08:19 \nhelplibrary.xml| helplibrary.xml| | 587| 15-Apr-21| 08:19 \nfeature.xml_helplibrary| feature.xml| | 566| 15-Apr-21| 08:19 \nhelpcontenttypes| helpcontenttypes.xml| | 3976| 15-Apr-21| 08:19 \nhelpsitecolumns| helpsitecolumns.xml| | 7052| 15-Apr-21| 08:19 \nschema.xml_hierarchy| schema.xml| | 20345| 15-Apr-21| 08:19 \nhierarchyl.xml| hierarchytaskslist.xml| | 1459| 15-Apr-21| 08:19 \nfeature.xml_hierarchy| feature.xml| | 3460| 15-Apr-21| 08:19 \nschema.xml_holiday| schema.xml| | 7813| 15-Apr-21| 08:19 \nholiday.xml| holidayslist.xml| | 541| 15-Apr-21| 08:19 \nfeature.xml_holiday| feature.xml| | 1048| 15-Apr-21| 08:19 \nfeature.xml_ifedependentapps| feature.xml| | 412| 15-Apr-21| 08:19 \nschema.xml_imedic| schema.xml| | 5726| 15-Apr-21| 08:19 \nimedic.xml| imediclist.xml| | 1655| 15-Apr-21| 08:19 \nfeature.xml_imedic| feature.xml| | 894| 15-Apr-21| 08:19 \nschema.xml_issues| schema.xml| | 9760| 15-Apr-21| 08:19 \nissues.xml| issues.xml| | 446| 15-Apr-21| 08:19 \nfeature.xml_issues| feature.xml| | 466| 15-Apr-21| 08:19 \nschema.xml_links| schema.xml| | 41072| 15-Apr-21| 08:19 \nlinks.xml| links.xml| | 441| 15-Apr-21| 08:19 \nfeature.xml_links| feature.xml| | 476| 15-Apr-21| 08:19 \nschema.xml_mainlo| schema.xml| | 2006| 15-Apr-21| 08:19 \nschema.xml_mainlo_v14| schema.xml| | 2006| 15-Apr-21| 08:19 \nfeature.xml_mainlo| feature.xml| | 706| 15-Apr-21| 08:19 \nfeature.xml_mainlo_v14| feature.xml| | 706| 15-Apr-21| 08:19 \nmaintenancelogsinstance.xml_mainlo| maintenancelogsinstance.xml| | 412| 15-Apr-21| 08:19 \nmaintenancelogsinstance.xml_mainlo_v14| maintenancelogsinstance.xml| | 412| 15-Apr-21| 08:19 \nmaintenancelogstemplate.xml_mainlo| maintenancelogstemplate.xml| | 728| 15-Apr-21| 08:19 \nmaintenancelogstemplate.xml_mainlo_v14| maintenancelogstemplate.xml| | 728| 15-Apr-21| 08:19 \nfeature.xml_mbrowserredirect| feature.xml| | 418| 15-Apr-21| 08:19 \nfeature.xml_mbrowserredirectstapling| feature.xml| | 437| 15-Apr-21| 08:19 \nfeature.xml_mbrowserredirectfeaturestp| featurestapling.xml| | 637| 15-Apr-21| 08:19 \nfeature.xml_mds| feature.xml| | 520| 15-Apr-21| 08:19 \nmriddflt.xml| default.aspx| | 1270| 15-Apr-21| 08:19 \nmridelms.xml| elements.xml| | 210| 15-Apr-21| 08:19 \nmridfeat.xml| feature.xml| | 461| 15-Apr-21| 08:19 \nelements.xml_mpswebparts| elements.xml| | 583| 15-Apr-21| 08:19 \nfeature.xml_mpswebparts| feature.xml| | 469| 15-Apr-21| 08:19 \nncwfl.xml| nocodeworkflowlibrary.xml| | 1118| 15-Apr-21| 08:19 \nschema.xml_nocodepublicwf| schema.xml| | 4515| 15-Apr-21| 08:19 \nschema.xml_nocodewf| schema.xml| | 4455| 15-Apr-21| 08:19 \nfeature.xml_nocodewf| feature.xml| | 493| 15-Apr-21| 08:19 \nschema.xml_oecatalog| schema.xml| | 24259| 15-Apr-21| 08:19 \nfeature.xml_oecatalog| feature.xml| | 1840| 15-Apr-21| 08:19 \noecatalogfields.xml_oecatalog| oecatalogfields.xml| | 7204| 15-Apr-21| 08:19 \noecataloginstance.xml_oecatalog| oecataloginstance.xml| | 436| 15-Apr-21| 08:19 \noecatalogtemplate.xml_oecatalog| oecatalogtemplate.xml| | 718| 15-Apr-21| 08:19 \nfeature.xml_openinclient| feature.xml| | 435| 15-Apr-21| 08:19 \npnsubr.xml| pnsubscriberreceivers.xml| | 516| 15-Apr-21| 08:19 \npnsubs.xml| pnsubscribers.xml| | 425| 15-Apr-21| 08:19 \nschema.xml_pnsubs| schema.xml| | 1204| 15-Apr-21| 08:19 \nfeature.xml_pnsubs| feature.xml| | 883| 15-Apr-21| 08:19 \nlistinstance.xml_pnsubs| listinstance.xml| | 446| 15-Apr-21| 08:19 \npiclib.xml| picturelibrary.xml| | 473| 15-Apr-21| 08:19 \nallitems.aspx_piclib| allitems.aspx| | 3916| 15-Apr-21| 08:19 \ndispform.aspx_piclib| dispform.aspx| | 4735| 15-Apr-21| 08:19 \neditform.aspx_piclib| editform.aspx| | 4393| 15-Apr-21| 08:19 \nschema.xml| schema.xml| | 43005| 15-Apr-21| 08:19 \nselected.aspx_piclib| selected.aspx| | 3916| 15-Apr-21| 08:19 \nslidshow.aspx_piclib| slidshow.aspx| | 4133| 15-Apr-21| 08:19 \nupload.aspx_piclib| upload.aspx| | 6294| 15-Apr-21| 08:19 \nwebfldr.aspx_piclib| webfldr.aspx| | 2521| 15-Apr-21| 08:19 \nfeature.xml_piclib| feature.xml| | 864| 15-Apr-21| 08:19 \npromotedlinks.xml| promotedlinks.xml| | 495| 15-Apr-21| 08:19 \nschema.xml_promotedlinks| schema.xml| | 8219| 15-Apr-21| 08:19 \nfeature.xml_promotedlinks| feature.xml| | 497| 15-Apr-21| 08:19 \nschedule.xml| schedulelist.xml| | 526| 15-Apr-21| 08:19 \nfeature.xml_schedule| feature.xml| | 546| 15-Apr-21| 08:19 \nschema.xml_schedule| schema.xml| | 23502| 15-Apr-21| 08:19 \nfeature.xml_sharewitheveryone| feature.xml| | 622| 15-Apr-21| 08:19 \nfeature.xml_sharewitheveryonestapling| feature.xml| | 449| 15-Apr-21| 08:19 \nfeature.xml_sharewitheveryonefeaturestp| featurestapling.xml| | 215| 15-Apr-21| 08:19 \nfeature.xml_siteassets| feature.xml| | 526| 15-Apr-21| 08:19 \nfeature.xml_sitehelp| feature.xml| | 804| 15-Apr-21| 08:19 \nfeature.xml_sitenotebook| feature.xml| | 703| 15-Apr-21| 08:19 \nfeature.xml_0002| feature.xml| | 516| 15-Apr-21| 08:19 \nsitesettings.xml| sitesettings.xml| | 21358| 15-Apr-21| 08:19 \nelements.xml_sitestat| elements.xml| | 334| 15-Apr-21| 08:19 \nelements14.xml_sitestat| elements.xml| | 334| 15-Apr-21| 08:19 \nfeature.xml_sitestat| feature.xml| | 397| 15-Apr-21| 08:19 \nfeature14.xml_sitestat| feature.xml| | 397| 15-Apr-21| 08:19 \nupgfeature.xml| feature.xml| | 528| 15-Apr-21| 08:19 \nupgfeature.xml_14| feature.xml| | 528| 15-Apr-21| 08:19 \nsiteupgrade.xml| siteupgradelinks.xml| | 970| 15-Apr-21| 08:19 \nsiteupgrade.xml_14| siteupgradelinks.xml| | 970| 15-Apr-21| 08:19 \nelements.xml_suitenav| elements.xml| | 478| 15-Apr-21| 08:19 \nfeature.xml_suitenav| feature.xml| | 366| 15-Apr-21| 08:19 \nsurveys.xml| surveys.xml| | 477| 15-Apr-21| 08:19 \nfeature.xml_surveys| feature.xml| | 478| 15-Apr-21| 08:19 \nschema.xml_surveys| schema.xml| | 40244| 15-Apr-21| 08:19 \ntasks.xml| tasks.xml| | 468| 15-Apr-21| 08:19 \nfeature.xml_tasks| feature.xml| | 476| 15-Apr-21| 08:19 \nschema.xml_tasks| schema.xml| | 17465| 15-Apr-21| 08:19 \nfeature_teamcollab.xml| feature.xml| | 3223| 15-Apr-21| 08:19 \ndefault.xml_tenantadminbdc| default.xml| | 347| 15-Apr-21| 08:19 \nfeature.xml_tenantadminbdc| feature.xml| | 514| 15-Apr-21| 08:19 \nfeature.xml_tenantadminbdcstapling| feature.xml| | 443| 15-Apr-21| 08:19 \nfeature.xml_tenantadminbdcfeaturestp| featurestapling.xml| | 222| 15-Apr-21| 08:19 \ndefault.xml_tenantadminlinks| default.xml| | 3573| 15-Apr-21| 08:19 \nfeature.xml_tenantadminlinks| feature.xml| | 517| 15-Apr-21| 08:19 \ntimecard.xml| timecardlist.xml| | 8045| 15-Apr-21| 08:19 \nfeature.xml_timecard| feature.xml| | 916| 15-Apr-21| 08:19 \nschema.xml_timecard| schema.xml| | 8517| 15-Apr-21| 08:19 \nfeature.xml_excelserveredit| feature.xml| | 749| 15-Apr-21| 08:19 \nfeature.xml_excelserveredit_14| feature.xml| | 749| 15-Apr-21| 08:19 \nfeature.xml_officewebapps| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_officewebapps_14| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_onenoteserverviewing| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_onenoteserverviewing_14| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_wordserverviewing| feature.xml| | 752| 15-Apr-21| 08:19 \nfeature.xml_wordserverviewing_14| feature.xml| | 752| 15-Apr-21| 08:19 \nwbpglib.xml| webpagelibrary.xml| | 496| 15-Apr-21| 08:19 \nfeature.xml_webpagelib| feature.xml| | 478| 15-Apr-21| 08:19 \nschema.xml_webpagelib| schema.xml| | 16443| 15-Apr-21| 08:19 \nupload.aspx_webpagelib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nwhatsnew.xml| whatsnewlist.xml| | 518| 15-Apr-21| 08:19 \nfeature.xml_whatsnew| feature.xml| | 521| 15-Apr-21| 08:19 \nschema.xml_whatsnew| schema.xml| | 21487| 15-Apr-21| 08:19 \nwhereabouts.xml| whereaboutslist.xml| | 1704| 15-Apr-21| 08:19 \nfeature.xml_whereabouts| feature.xml| | 1067| 15-Apr-21| 08:19 \nschema.xml_whereabouts| schema.xml| | 149506| 15-Apr-21| 08:19 \nfeature.xml_wikipagehomepage| feature.xml| | 902| 15-Apr-21| 08:19 \nfeature.xml_wikiwelcome| feature.xml| | 594| 15-Apr-21| 08:19 \nworkflowhistory.xml| workflowhistory.xml| | 489| 15-Apr-21| 08:19 \nfeature.xml_wrkflhis| feature.xml| | 482| 15-Apr-21| 08:19 \nschema.xml_wrkflhis| schema.xml| | 8019| 15-Apr-21| 08:19 \nworkflowprocess.xml| workflowprocess.xml| | 496| 15-Apr-21| 08:19 \nfeature.xml_wrkflproc| feature.xml| | 531| 15-Apr-21| 08:19 \nschema.xml_wrkflprc| schema.xml| | 629| 15-Apr-21| 08:19 \nformlib.xml| xmlformlibrary.xml| | 477| 15-Apr-21| 08:19 \nfeature.xml_xmlform| feature.xml| | 472| 15-Apr-21| 08:19 \neditdlg.htm_xmlform| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nfiledlg.htm_xmlform| filedlg.htm| | 4754| 15-Apr-21| 08:19 \nrepair.aspx_xmlform| repair.aspx| | 3272| 15-Apr-21| 08:19 \nschema.xml_xmlform| schema.xml| | 20593| 15-Apr-21| 08:19 \nupload.aspx_xmlform| upload.aspx| | 5911| 15-Apr-21| 08:19 \nfgimg.png| fgimg.png| | 11776| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.health.dll| microsoft.sharepoint.health.dll| 15.0.4989.1000| 109896| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.identitymodel.dll| microsoft.sharepoint.identitymodel.dll| 15.0.5249.1000| 263048| 15-Apr-21| 08:19 \nadmin.dll_0001| admin.dll| 15.0.4454.1000| 18528| 15-Apr-21| 08:19 \nauthor.dll_0001| author.dll| 15.0.4454.1000| 18528| 15-Apr-21| 08:19 \nshtml.dll_0001| shtml.dll| 15.0.4454.1000| 18544| 15-Apr-21| 08:19 \njsgridcluster.png| jsgridcluster.png| | 2003| 15-Apr-21| 08:19 \nmicrosoft.online.sharepoint.dedicated.tenantadmin.dll| microsoft.online.sharepoint.dedicated.tenantadmin.dll| 15.0.4605.1000| 48832| 15-Apr-21| 08:19 \nmicrosoft.online.sharepoint.dedicated.tenantadmin.serverstub.dll| microsoft.online.sharepoint.dedicated.tenantadmin.serverstub.dll| 15.0.4535.1000| 79608| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.dll| microsoft.sharepoint.client.dll| 15.0.5337.1000| 499096| 15-Apr-21| 07:28 \nmicrosoft.sharepoint.client.dll_0001| microsoft.sharepoint.client.dll| 15.0.5337.1000| 499096| 15-Apr-21| 07:28 \ntaps_client.dll| microsoft.sharepoint.client.dll| 15.0.5337.1000| 499096| | \nmicrosoft.sharepoint.client.phone.dll| microsoft.sharepoint.client.phone.dll| 15.0.5337.1000| 434072| 15-Apr-21| 08:18 \nmicrosoft.sharepoint.client.phone.runtime.dll| microsoft.sharepoint.client.phone.runtime.dll| 15.0.4859.1000| 206616| 15-Apr-21| 08:18 \nmicrosoft.sharepoint.client.runtime.dll| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| 15-Apr-21| 07:28 \nmicrosoft.sharepoint.client.runtime.dll_0001| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| 15-Apr-21| 07:28 \ntaps_client.runtime.dll| microsoft.sharepoint.client.runtime.dll| 15.0.4859.1000| 298240| | \nmicrosoft.sharepoint.client.serverruntime.dll| microsoft.sharepoint.client.serverruntime.dll| 15.0.4905.1000| 630608| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.serverruntime.dll_0001| microsoft.sharepoint.client.serverruntime.dll| 15.0.4905.1000| 630608| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.silverlight.dll| microsoft.sharepoint.client.silverlight.dll| 15.0.5337.1000| 433544| 15-Apr-21| 07:28 \nmicrosoft.sharepoint.client.silverlight.runtime.dll| microsoft.sharepoint.client.silverlight.runtime.dll| 15.0.4859.1000| 197424| 15-Apr-21| 07:28 \nspmintl.dll| microsoft.sharepoint.linq.codegeneration.intl.dll| 15.0.4420.1017| 17032| 15-Apr-21| 08:19 \nspldtsvc.dll| microsoft.sharepoint.linq.dataservice.dll| 15.0.4633.1000| 42720| 15-Apr-21| 08:19 \nsplinq.dll| microsoft.sharepoint.linq.dll| 15.0.4843.1000| 376032| 15-Apr-21| 08:19 \nsplinqvs.dll| microsoft.sharepoint.linq.dll| 15.0.4843.1000| 376032| 15-Apr-21| 08:19 \nsplintl.dll| microsoft.sharepoint.linq.intl.dll| 15.0.4420.1017| 26784| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.serverstub.dll| microsoft.sharepoint.serverstub.dll| 15.0.5337.1000| 1420696| 15-Apr-21| 08:19 \nspnativerequestmoduledll_0001| spnativerequestmodule.dll| | 42064| 15-Apr-21| 08:19 \noffprsx.dll| offparser.dll| 15.0.5337.1000| 1489304| 15-Apr-21| 08:19 \noisimg.dll| oisimg.dll| 15.0.5085.1000| 96848| 15-Apr-21| 08:19 \nstslib.dll_0001| microsoft.sharepoint.library.dll| 15.0.4971.1000| 184576| 15-Apr-21| 08:19 \nowssvr.dll_0001| owssvr.dll| 15.0.5345.1000| 6378888| 15-Apr-21| 08:19 \nsts11plc.config| policy.11.0.microsoft.sharepoint.config| | 590| 15-Apr-21| 08:19 \nsts11plc.dll| policy.11.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nspsec11.config| policy.11.0.microsoft.sharepoint.security.config| | 599| 15-Apr-21| 08:19 \nspsec11.dll| policy.11.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \nsts12plc.config| policy.12.0.microsoft.sharepoint.config| | 590| 15-Apr-21| 08:19 \nsts12plc.dll| policy.12.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nspsec12.config| policy.12.0.microsoft.sharepoint.security.config| | 599| 15-Apr-21| 08:19 \nspsec12.dll| policy.12.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nwfa12plc.config| policy.12.0.microsoft.sharepoint.workflowactions.config| | 606| 15-Apr-21| 08:19 \nwfa12plc.dll| policy.12.0.microsoft.sharepoint.workflowactions.dll| 15.0.4420.1017| 12488| 15-Apr-21| 08:19 \nwfs12plc.config| policy.12.0.microsoft.sharepoint.workflows.config| | 600| 15-Apr-21| 08:19 \nwfs12plc.dll| policy.12.0.microsoft.sharepoint.workflows.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \nbusinessdata14.config| policy.14.0.microsoft.businessdata.config| | 592| 15-Apr-21| 08:19 \nbusinessdata14.dll| policy.14.0.microsoft.businessdata.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \nclt14plc.config| policy.14.0.microsoft.sharepoint.client.config| | 597| 15-Apr-21| 08:19 \nclt14plc.dll| policy.14.0.microsoft.sharepoint.client.dll| 15.0.4420.1017| 12472| 15-Apr-21| 08:19 \ncltrtm14.config| policy.14.0.microsoft.sharepoint.client.runtime.config| | 605| 15-Apr-21| 08:19 \ncltrtm14.dll| policy.14.0.microsoft.sharepoint.client.runtime.dll| 15.0.4420.1017| 12488| 15-Apr-21| 08:19 \ncltsvr14.config| policy.14.0.microsoft.sharepoint.client.serverruntime.config| | 611| 15-Apr-21| 08:19 \ncltsvr14.dll| policy.14.0.microsoft.sharepoint.client.serverruntime.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \nsts14plc.config| policy.14.0.microsoft.sharepoint.config| | 590| 15-Apr-21| 08:19 \nsts14plc.dll| policy.14.0.microsoft.sharepoint.dll| 15.0.4420.1017| 12472| 15-Apr-21| 08:19 \nlinq14.config| policy.14.0.microsoft.sharepoint.linq.config| | 595| 15-Apr-21| 08:19 \nlinq14.dll| policy.14.0.microsoft.sharepoint.linq.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \npowshl14.config| policy.14.0.microsoft.sharepoint.powershell.config| | 601| 15-Apr-21| 08:19 \npowshl14.dll| policy.14.0.microsoft.sharepoint.powershell.dll| 15.0.4420.1017| 12480| 15-Apr-21| 08:19 \nspsec14.config| policy.14.0.microsoft.sharepoint.security.config| | 599| 15-Apr-21| 08:19 \nspsec14.dll| policy.14.0.microsoft.sharepoint.security.dll| 15.0.4420.1017| 12456| 15-Apr-21| 08:19 \nwfa14plc.config| policy.14.0.microsoft.sharepoint.workflowactions.config| | 606| 15-Apr-21| 08:19 \nwfa14plc.dll| policy.14.0.microsoft.sharepoint.workflowactions.dll| 15.0.4420.1017| 12488| 15-Apr-21| 08:19 \nwfs14plc.config| policy.14.0.microsoft.sharepoint.workflows.config| | 600| 15-Apr-21| 08:19 \nwfs14plc.dll| policy.14.0.microsoft.sharepoint.workflows.dll| 15.0.4420.1017| 12496| 15-Apr-21| 08:19 \ncmdui14.config| policy.14.0.microsoft.web.commandui.config| | 593| 15-Apr-21| 08:19 \ncmdui14.dll| policy.14.0.microsoft.web.commandui.dll| 15.0.4420.1017| 12464| 15-Apr-21| 08:19 \nformat.ps1xml| sharepointpowershell.format.ps1xml| | 61362| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.powershell.dll_0001| microsoft.sharepoint.powershell.dll| 15.0.4949.1000| 993024| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.powershell.intl.dll| microsoft.sharepoint.powershell.intl.dll| 15.0.4863.1000| 95488| 15-Apr-21| 08:19 \npsconsole.psc1| psconsole.psc1| | 181| 15-Apr-21| 08:19 \nsharepoint.ps1| sharepoint.ps1| | 9838| 15-Apr-21| 08:19 \nspcmdletschema.xsd| spcmdletschema.xsd| | 1114| 15-Apr-21| 08:19 \nwsscmdlet.xml| wsscmdlet.xml| | 113235| 15-Apr-21| 08:19 \ntypes.ps1xml| sharepointpowershell.types.ps1xml| | 18000| 15-Apr-21| 08:19 \npscintl.dll| microsoft.sharepoint.setupconfiguration.intl.dll| 15.0.5197.1000| 2087008| 15-Apr-21| 08:19 \npsconfig.exe| psconfig.exe| 15.0.4939.1000| 564544| 15-Apr-21| 08:19 \npsconfig.exe.config| psconfig.exe.config| | 273| 15-Apr-21| 08:19 \npsconfigui.exe| psconfigui.exe| 15.0.4939.1000| 825664| 15-Apr-21| 08:19 \npsconfigui.exe.config| psconfigui.exe.config| | 273| 15-Apr-21| 08:19 \ncore_0.rsx| core.resx| | 490005| 15-Apr-21| 08:19 \nadmincfg.xml| adminconfig.xml| | 1288| 15-Apr-21| 08:19 \nbdcservice.xml| bdcservice.xml| | 632| 15-Apr-21| 08:19 \njoinfarm.xml| joinfarm.xml| | 648| 15-Apr-21| 08:19 \nsilverlight.js_script| silverlight.js| | 7950| 15-Apr-21| 08:19 \nsts_addgallery_ooprovider| addgallery.officeonlineprovider.dll| 15.0.4420.1017| 43144| 15-Apr-21| 08:19 \naddgallery.aspx_silverlight| addgallery.aspx| | 11755| 15-Apr-21| 08:19 \ndldsln16.png| dldsln16.png| | 912| 15-Apr-21| 08:19 \ndldsln32.png| dldsln32.png| | 2612| 15-Apr-21| 08:19 \nsts_addgallery_server| microsoft.sharepoint.addgallery.server.dll| 15.0.5345.1000| 118168| 15-Apr-21| 08:19 \nsp.datetimeutil.res_0.resx| sp.datetimeutil.res.resx| | 5825| 15-Apr-21| 08:19 \nsp.datetimeutil.res_0.resx_0.scriptx| sp.datetimeutil.res.resx.scriptx| | 255| 15-Apr-21| 08:19 \nsp.jsgrid.res_0.resx| sp.jsgrid.res.resx| | 16415| 15-Apr-21| 08:19 \nsp.jsgrid.res_0.resx_0.scriptx| sp.jsgrid.res.resx.scriptx| | 249| 15-Apr-21| 08:19 \nsp.res_0.resx| sp.res.resx| | 74046| 15-Apr-21| 08:19 \nspmetal.exe| spmetal.exe| 15.0.4420.1017| 140488| 15-Apr-21| 08:19 \nsts.spuchostservice.exe| spuchostservice.exe| 15.0.4525.1000| 118040| 15-Apr-21| 08:19 \nsts.spuchostservice.exe.config| spuchostservice.exe.config| | 644| 15-Apr-21| 08:19 \nsts.spucworkerprocess.exe| spucworkerprocess.exe| 15.0.4510.1000| 46856| 15-Apr-21| 08:19 \nsts.spucworkerprocess.exe.config| spucworkerprocess.exe.config| | 654| 15-Apr-21| 08:19 \nsts.spucworkerprocessproxy.exe| spucworkerprocessproxy.exe| 15.0.4420.1017| 115440| 15-Apr-21| 08:19 \nsts.spucworkerprocessproxy.exe.config| spucworkerprocessproxy.exe.config| | 644| 15-Apr-21| 08:19 \nspusercode.dll_0001| microsoft.sharepoint.usercode.dll| 15.0.4525.1000| 26816| 15-Apr-21| 08:19 \nadmsoap.dll| admsoap.dll| 15.0.4420.1017| 15496| 15-Apr-21| 08:19 \nadmin.amx| admin.asmx| | 86| 15-Apr-21| 08:19 \nadmdisco.asx| admindisco.aspx| | 1283| 15-Apr-21| 08:19 \nadmwsdl.asx| adminwsdl.aspx| | 9474| 15-Apr-21| 08:19 \nweb.cfg_0001| web.config| | 445| 15-Apr-21| 08:19 \nstsadm.exe| stsadm.exe| 15.0.4420.1017| 350392| 15-Apr-21| 08:19 \nstsadm.exe.config| stsadm.exe.config| | 272| 15-Apr-21| 08:19 \nstscfg.exe| stscfg.exe| 15.0.4420.1017| 14944| 15-Apr-21| 08:19 \nbecwebserviceclientconfig| client.config| | 1437| 15-Apr-21| 08:19 \nsecuritytokenappsvc| appsts.svc| | 452| 15-Apr-21| 08:19 \nappwrweb.cfg| appwpresweb.config| | 1210| 15-Apr-21| 08:19 \ncloudweb.cfg| cloudweb.config| | 67174| 15-Apr-21| 08:19 \nstsomdia.dll| microsoft.sharepoint.diagnostics.dll| 15.0.4420.1017| 18080| 15-Apr-21| 08:19 \nstsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nstsom.dll_0001| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nxlsrv.ecs.stsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nxlsrv.ecswatchdog.stsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nxlsrv.stsom.dll| microsoft.sharepoint.dll| 15.0.5345.1000| 26888584| 16-Apr-21| 10:13 \nstsomdr.dll| microsoft.sharepoint.intl.dll| 15.0.5297.1000| 1260440| 15-Apr-21| 08:19 \nbdcservice.svc| bdcservice.svc| | 383| 15-Apr-21| 08:19 \nbdcwebclient.config| client.config| | 2125| 15-Apr-21| 08:19 \nbdcserviceweb.config| web.config| | 3156| 15-Apr-21| 08:19 \nsecuritytokenclientconfig| client.config| | 3448| 15-Apr-21| 08:19 \nsecuritytokenconfig| web.config| | 6235| 15-Apr-21| 08:19 \nsecuritytokensvc| securitytoken.svc| | 443| 15-Apr-21| 08:19 \nwintokcachesvc| windowstokencache.svc| | 395| 15-Apr-21| 08:19 \nsubscriptionsettingsclientconfig| client.config| | 2369| 15-Apr-21| 08:19 \nsubscriptionsettingsservicesvc| subscriptionsettings.svc| | 367| 15-Apr-21| 08:19 \nsubscriptionsettingsserviceconfig| web.config| | 2647| 15-Apr-21| 08:19 \ntopologyclientconfig| client.config| | 982| 15-Apr-21| 08:19 \ntopologyservicesvc| topology.svc| | 347| 15-Apr-21| 08:19 \ntopologyserviceconfig| web.config| | 1604| 15-Apr-21| 08:19 \nusercodeweb.cfg| web.config| | 1002| 15-Apr-21| 08:19 \nweb.cfg| web.config| | 67174| 15-Apr-21| 08:19 \nweb.cfg_0003| web.config| | 258| 15-Apr-21| 08:19 \nstsap.dll| microsoft.sharepoint.applicationpages.dll| 15.0.5345.1000| 1483688| 15-Apr-21| 08:19 \nstsomsec.dll| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-21| 07:28 \nstsomsec.dll_0001| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-21| 07:28 \nxlsrv.spsec.dll| microsoft.sharepoint.security.dll| 15.0.4420.1017| 16512| 15-Apr-21| 07:28 \nsppimps.xml| sharepointpermission.impersonate.xml| | 207| 15-Apr-21| 08:19 \nsppom.xml| sharepointpermission.objectmodel.xml| | 207| 15-Apr-21| 08:19 \nsppusog.xml| sharepointpermission.unsafesaveonget.xml| | 211| 15-Apr-21| 08:19 \nwssmedtr.cfg| wss_mediumtrust.config| | 13782| 15-Apr-21| 08:19 \nwssmintr.cfg| wss_minimaltrust.config| | 9149| 15-Apr-21| 08:19 \nusercode.cfg| wss_usercode.config| | 5855| 15-Apr-21| 08:19 \nsub.amx| alerts.asmx| | 88| 15-Apr-21| 08:19 \nsubdisco.asx| alertsdisco.aspx| | 1313| 15-Apr-21| 08:19 \nsubwsdl.asx| alertswsdl.aspx| | 8824| 15-Apr-21| 08:19 \nauth.amx| authentication.asmx| | 96| 15-Apr-21| 08:19 \nautdisco.asx| authenticationdisco.aspx| | 1301| 15-Apr-21| 08:19 \nautwsdl.asx| authenticationwsdl.aspx| | 5968| 15-Apr-21| 08:19 \nbdcadminservice.svc| bdcadminservice.svc| | 332| 15-Apr-21| 08:19 \nbdcexecutionservice.svc| bdcremoteexecutionservice.svc| | 197| 15-Apr-21| 08:19 \nbdcresolverpickerservice.svc| bdcresolverpickerservice.svc| | 402| 15-Apr-21| 08:19 \ncellstorage.https.svc| cellstorage.https.svc| | 205| 15-Apr-21| 08:19 \ncellstorage.svc| cellstorage.svc| | 200| 15-Apr-21| 08:19 \ncopy.amx| copy.asmx| | 86| 15-Apr-21| 08:19 \ncopdisco.asx| copydisco.aspx| | 1281| 15-Apr-21| 08:19 \ncopwsdl.asx| copywsdl.aspx| | 11267| 15-Apr-21| 08:19 \ndiagnostics.amx| diagnostics.asmx| | 103| 15-Apr-21| 08:19 \ndiagdata.svc| diagnosticsdata.svc| | 391| 15-Apr-21| 08:19 \ndiagnosticsdisco.asx| diagnosticsdisco.aspx| | 1329| 15-Apr-21| 08:19 \ndiagnosticswsdl.asx| diagnosticswsdl.aspx| | 4677| 15-Apr-21| 08:19 \ndocumentsharing.svc| documentsharing.svc| | 331| 15-Apr-21| 08:19 \ndspsts.amx| dspsts.asmx| | 179| 15-Apr-21| 08:19 \ndspstsdi.asx_0001| dspstsdisco.aspx| | 1289| 15-Apr-21| 08:19 \ndspstsws.asx_0001| dspstswsdl.aspx| | 10966| 15-Apr-21| 08:19 \ndws.amx| dws.asmx| | 85| 15-Apr-21| 08:19 \ndwsdisco.asx| dwsdisco.aspx| | 1287| 15-Apr-21| 08:19 \ndwswsdl.asx| dwswsdl.aspx| | 20223| 15-Apr-21| 08:19 \nexcelrest.asx| excelrest.aspx| | 202| 15-Apr-21| 08:19 \nexportwp.asx| exportwp.aspx| | 498| 15-Apr-21| 08:19 \nexpurlwp.asx| expurlwp.aspx| | 243| 15-Apr-21| 08:19 \nforms.amx| forms.asmx| | 87| 15-Apr-21| 08:19 \nfordisco.asx| formsdisco.aspx| | 1283| 15-Apr-21| 08:19 \nforwsdl.asx| formswsdl.aspx| | 5644| 15-Apr-21| 08:19 \nimaging.amx| imaging.asmx| | 89| 15-Apr-21| 08:19 \nimadisco.asx| imagingdisco.aspx| | 1295| 15-Apr-21| 08:19 \nimawsdl.asx| imagingwsdl.aspx| | 24227| 15-Apr-21| 08:19 \nlistdata.svc| listdata.svc| | 392| 15-Apr-21| 08:19 \nlists.amx| lists.asmx| | 87| 15-Apr-21| 08:19 \nlisdisco.asx| listsdisco.aspx| | 1283| 15-Apr-21| 08:19 \nliswsdl.asx| listswsdl.aspx| | 73094| 15-Apr-21| 08:19 \nmeetings.amx| meetings.asmx| | 90| 15-Apr-21| 08:19 \nmeedisco.asx| meetingsdisco.aspx| | 1307| 15-Apr-21| 08:19 \nmeewsdl.asx| meetingswsdl.aspx| | 26921| 15-Apr-21| 08:19 \nonenote.ashx| onenote.ashx| | 89| 15-Apr-21| 08:19 \npeople.amx| people.asmx| | 88| 15-Apr-21| 08:19 \nppldisco.asx| peopledisco.aspx| | 1285| 15-Apr-21| 08:19 \npplwsdl.asx| peoplewsdl.aspx| | 9093| 15-Apr-21| 08:19 \nperms.amx| permissions.asmx| | 94| 15-Apr-21| 08:19 \nperdisco.asx| permissionsdisco.aspx| | 1315| 15-Apr-21| 08:19 \nperwsdl.asx| permissionswsdl.aspx| | 13698| 15-Apr-21| 08:19 \nsharedaccess.amx| sharedaccess.asmx| | 94| 15-Apr-21| 08:19 \nsharedaccessdisco.asx| sharedaccessdisco.aspx| | 1297| 15-Apr-21| 08:19 \nsharedaccesswsdl.asx| sharedaccesswsdl.aspx| | 4036| 15-Apr-21| 08:19 \nsharepointemailws.amx| sharepointemailws.asmx| | 98| 15-Apr-21| 08:19 \nsharepointemailwsdisco.asx| sharepointemailwsdisco.aspx| | 1349| 15-Apr-21| 08:19 \nsharepointemailwswsdl.asx| sharepointemailwswsdl.aspx| | 25799| 15-Apr-21| 08:19 \nsitedata.amx| sitedata.asmx| | 90| 15-Apr-21| 08:19 \nsdadisco.asx| sitedatadisco.aspx| | 1289| 15-Apr-21| 08:19 \nsdawsdl.asx| sitedatawsdl.aspx| | 36711| 15-Apr-21| 08:19 \nsites.amx| sites.asmx| | 87| 15-Apr-21| 08:19 \nsitdisco.asx| sitesdisco.aspx| | 1283| 15-Apr-21| 08:19 \nsitwsdl.asx| siteswsdl.aspx| | 22976| 15-Apr-21| 08:19 \nspclaimproviderwebservice.https.svc| spclaimproviderwebservice.https.svc| | 115| 15-Apr-21| 08:19 \nspclaimproviderwebservice.svc| spclaimproviderwebservice.svc| | 110| 15-Apr-21| 08:19 \nspdisco.asx| spdisco.aspx| | 11428| 15-Apr-21| 08:19 \nspsearchdisco.asx| spsearchdisco.aspx| | 1319| 15-Apr-21| 08:19 \nspsearchwsdl.asx| spsearchwsdl.aspx| | 8629| 15-Apr-21| 08:19 \nspsecuritytokenservice.svc| spsecuritytokenservice.svc| | 476| 15-Apr-21| 08:19 \nweb.config_sts| web.config| | 4845| 15-Apr-21| 08:19 \nusergrp.amx| usergroup.asmx| | 92| 15-Apr-21| 08:19 \nusedisco.asx| usergroupdisco.aspx| | 1311| 15-Apr-21| 08:19 \nusewsdl.asx| usergroupwsdl.aspx| | 82880| 15-Apr-21| 08:19 \nversions.amx| versions.asmx| | 90| 15-Apr-21| 08:19 \nverdisco.asx| versionsdisco.aspx| | 1289| 15-Apr-21| 08:19 \nverwsdl.asx| versionswsdl.aspx| | 9474| 15-Apr-21| 08:19 \nviews.amx| views.asmx| | 87| 15-Apr-21| 08:19 \nviedisco.asx| viewsdisco.aspx| | 1283| 15-Apr-21| 08:19 \nviewsdl.asx| viewswsdl.aspx| | 25520| 15-Apr-21| 08:19 \nweb.cfg_0010| web.config| | 13944| 15-Apr-21| 08:19 \nwppages.amx| webpartpages.asmx| | 186| 15-Apr-21| 08:19 \nwppdisco.asx| webpartpagesdisco.aspx| | 1315| 15-Apr-21| 08:19 \nwppwsdl.asx| webpartpageswsdl.aspx| | 56408| 15-Apr-21| 08:19 \nwebs.amx| webs.asmx| | 86| 15-Apr-21| 08:19 \nwebdisco.asx| websdisco.aspx| | 1281| 15-Apr-21| 08:19 \nwebwsdl.asx| webswsdl.aspx| | 41302| 15-Apr-21| 08:19 \nwopi.ashx| wopi.ashx| | 86| 15-Apr-21| 08:19 \nwsdisco.asx| wsdisco.aspx| | 1806| 15-Apr-21| 08:19 \nwswsdl.asx| wswsdl.aspx| | 1904| 15-Apr-21| 08:19 \nstssoap.dll| stssoap.dll| 15.0.5172.1000| 554088| 15-Apr-21| 08:19 \nsubsetproxy.dll_0001| microsoft.sharepoint.subsetproxy.dll| 15.0.5313.1000| 841624| 15-Apr-21| 08:19 \nsubsetshim.dll_0001| microsoft.sharepoint.dll| 15.900.5345.1000| 2134432| 15-Apr-21| 08:19 \nalerttmp.xml| alerttemplates.xml| | 458234| 15-Apr-21| 08:19 \nalerttms.xml| alerttemplates_sms.xml| | 51863| 15-Apr-21| 08:19 \ndefault.aspx_app| default.aspx| | 1168| 15-Apr-21| 08:19 \nonet.xml_app| onet.xml| | 4911| 15-Apr-21| 08:19 \ndefault.aspx_appcatalog| default.aspx| | 4026| 15-Apr-21| 08:19 \nonet.xml_appcatalog| onet.xml| | 6262| 15-Apr-21| 08:19 \napphostwebfeatures.xsd| apphostwebfeatures.xsd| | 17579| 15-Apr-21| 08:19 \nappmanifest.xsd| appmanifest.xsd| | 20392| 15-Apr-21| 08:19 \napppartconfig.xsd| apppartconfig.xsd| | 2826| 15-Apr-21| 08:19 \nappsolution.xsd| appsolution.xsd| | 101258| 15-Apr-21| 08:19 \nblog.xsl| blog.xsl| | 37383| 15-Apr-21| 08:19 \nonet.xml_blog| onet.xml| | 6549| 15-Apr-21| 08:19 \ncamlqry.xsd| camlquery.xsd| | 10890| 15-Apr-21| 08:19 \ncamlview.xsd| camlview.xsd| | 19014| 15-Apr-21| 08:19 \ncpchkers.xsd| capabilitycheckers.xsd| | 1924| 15-Apr-21| 08:19 \nschema.xml_0010| schema.xml| | 16975| 15-Apr-21| 08:19 \ndmslstallitems_aspx| allitems.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstcreatedls_aspx| createdls.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstdeletedls_aspx| deletedls.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstdispform_aspx| dispform.aspx| | 4190| 15-Apr-21| 08:19 \ndmslsteditform_aspx| editform.aspx| | 4167| 15-Apr-21| 08:19 \ndmslstmodifydls_aspx| modifydls.aspx| | 2731| 15-Apr-21| 08:19 \ndmslstnewform_aspx| newform.aspx| | 4197| 15-Apr-21| 08:19 \ndmslstschema_xml| schema.xml| | 22840| 15-Apr-21| 08:19 \ntopology.dwp| topologyview.dwp| | 495| 15-Apr-21| 08:19 \nschema.xml_1221| schema.xml| | 9478| 15-Apr-21| 08:19 \nschema.xml_1220| schema.xml| | 7583| 15-Apr-21| 08:19 \napplications.asx_0014| applications.aspx| | 3724| 15-Apr-21| 08:19 \napps.asx_0014| apps.aspx| | 3708| 15-Apr-21| 08:19 \nbackups.asx_0014| backups.aspx| | 3714| 15-Apr-21| 08:19 \nconfigurationwizards.asx_0014| configurationwizards.aspx| | 3740| 15-Apr-21| 08:19 \ndefault.asx_0014| default.aspx| | 5454| 15-Apr-21| 08:19 \ngenappsettings.asx_0014| generalapplicationsettings.aspx| | 3753| 15-Apr-21| 08:19 \nmonitoring.asx_0014| monitoring.aspx| | 3720| 15-Apr-21| 08:19 \no365config.asx_0015| office365configuration.aspx| | 3838| 15-Apr-21| 08:19 \nsecurity.asx_0014| security.aspx| | 3716| 15-Apr-21| 08:19 \nsysset.asx_0014| systemsettings.aspx| | 3728| 15-Apr-21| 08:19 \nupgandmig.asx_0014| upgradeandmigration.aspx| | 3738| 15-Apr-21| 08:19 \nonet.xml_0006| onet.xml| | 10552| 15-Apr-21| 08:19 \ncoredefs.xsd| coredefinitions.xsd| | 3308| 15-Apr-21| 08:19 \ndeplset.xsd| deploymentexportsettings.xsd| | 4494| 15-Apr-21| 08:19 \ndepllook.xsd| deploymentlookuplistmap.xsd| | 1632| 15-Apr-21| 08:19 \ndepl.xsd| deploymentmanifest.xsd| | 79362| 15-Apr-21| 08:19 \ndeplreq.xsd| deploymentrequirements.xsd| | 1262| 15-Apr-21| 08:19 \ndeplroot.xsd| deploymentrootobjectmap.xsd| | 1642| 15-Apr-21| 08:19 \ndeplsys.xsd| deploymentsystemdata.xsd| | 3065| 15-Apr-21| 08:19 \ndepluser.xsd| deploymentusergroupmap.xsd| | 3386| 15-Apr-21| 08:19 \ndeplform.xsd| deploymentviewformslist.xsd| | 877| 15-Apr-21| 08:19 \ndip.css| dip.css| | 1781| 15-Apr-21| 08:19 \ndip.css_14| dip.css| | 1781| 15-Apr-21| 08:19 \ndip.html| dip.html| | 4328| 15-Apr-21| 08:19 \ndip.html_14| dip.html| | 4328| 15-Apr-21| 08:19 \ndip.js| dip.js| | 63039| 15-Apr-21| 08:19 \ndip.js_14| dip.js| | 63039| 15-Apr-21| 08:19 \nmessagebanner.js| messagebanner.js| | 4968| 15-Apr-21| 08:19 \nmessagebanner.js_14| messagebanner.js| | 4968| 15-Apr-21| 08:19 \ndocicon.xml| docicon.xml| | 16363| 15-Apr-21| 08:19 \nwkpstd.asx_wiki| wkpstd.aspx| | 3356| 15-Apr-21| 08:19 \nfldtypes.xml| fldtypes.xml| | 256018| 15-Apr-21| 08:19 \nfldtypes.xsl| fldtypes.xsl| | 133256| 15-Apr-21| 08:19 \nftacpl.xml| fldtypes_accessrequestspermissionlevel.xml| | 753| 15-Apr-21| 08:19 \nfluidapp.xsd| fluidapplicationsettings.xsd| | 2721| 15-Apr-21| 08:19 \nformxml.xsl| formxml.xsl| | 20914| 15-Apr-21| 08:19 \ngbwdef.asc| gbwdefaulttemplates.ascx| | 57071| 15-Apr-21| 08:19 \ngbwmdef.asc| gbwmobiledefaulttemplates.ascx| | 13722| 15-Apr-21| 08:19 \ndispsr.asx_mobile| dispsr.aspx| | 2702| 15-Apr-21| 08:19 \neditsr.asx_mobile| editsr.aspx| | 2574| 15-Apr-21| 08:19 \nnewsr.asx_mobile| newsr.aspx| | 2570| 15-Apr-21| 08:19 \nviewdaily.asx_mobile| viewdaily.aspx| | 4994| 15-Apr-21| 08:19 \nwaview.asx_mobile| waview.aspx| | 2986| 15-Apr-21| 08:19 \ndefault.aspx_gbw| default.aspx| | 3458| 15-Apr-21| 08:19 \nonet.xml_gbw| onet.xml| | 10911| 15-Apr-21| 08:19 \nschema.xml_appdatalib| schema.xml| | 314| 15-Apr-21| 08:19 \ndefault.spc| default.spcolor| | 5243| 15-Apr-21| 08:19 \npalette001.spcolor| palette001.spcolor| | 5243| 15-Apr-21| 08:19 \npalette002.spcolor| palette002.spcolor| | 5251| 15-Apr-21| 08:19 \npalette003.spcolor| palette003.spcolor| | 5247| 15-Apr-21| 08:19 \npalette004.spcolor| palette004.spcolor| | 5246| 15-Apr-21| 08:19 \npalette005.spcolor| palette005.spcolor| | 5247| 15-Apr-21| 08:19 \npalette006.spcolor| palette006.spcolor| | 5249| 15-Apr-21| 08:19 \npalette007.spcolor| palette007.spcolor| | 5251| 15-Apr-21| 08:19 \npalette008.spcolor| palette008.spcolor| | 5251| 15-Apr-21| 08:19 \npalette009.spcolor| palette009.spcolor| | 5248| 15-Apr-21| 08:19 \npalette010.spcolor| palette010.spcolor| | 5250| 15-Apr-21| 08:19 \npalette011.spcolor| palette011.spcolor| | 5248| 15-Apr-21| 08:19 \npalette012.spcolor| palette012.spcolor| | 5243| 15-Apr-21| 08:19 \npalette013.spcolor| palette013.spcolor| | 5243| 15-Apr-21| 08:19 \npalette014.spcolor| palette014.spcolor| | 5243| 15-Apr-21| 08:19 \npalette015.spcolor| palette015.spcolor| | 5243| 15-Apr-21| 08:19 \npalette016.spcolor| palette016.spcolor| | 5243| 15-Apr-21| 08:19 \npalette017.spcolor| palette017.spcolor| | 5243| 15-Apr-21| 08:19 \npalette018.spcolor| palette018.spcolor| | 5243| 15-Apr-21| 08:19 \npalette019.spcolor| palette019.spcolor| | 5243| 15-Apr-21| 08:19 \npalette020.spcolor| palette020.spcolor| | 5243| 15-Apr-21| 08:19 \npalette021.spcolor| palette021.spcolor| | 5243| 15-Apr-21| 08:19 \npalette022.spcolor| palette022.spcolor| | 5246| 15-Apr-21| 08:19 \npalette023.spcolor| palette023.spcolor| | 5246| 15-Apr-21| 08:19 \npalette024.spcolor| palette024.spcolor| | 5246| 15-Apr-21| 08:19 \npalette025.spcolor| palette025.spcolor| | 5246| 15-Apr-21| 08:19 \npalette026.spcolor| palette026.spcolor| | 5246| 15-Apr-21| 08:19 \npalette027.spcolor| palette027.spcolor| | 5246| 15-Apr-21| 08:19 \npalette028.spcolor| palette028.spcolor| | 5246| 15-Apr-21| 08:19 \npalette029.spcolor| palette029.spcolor| | 5246| 15-Apr-21| 08:19 \npalette030.spcolor| palette030.spcolor| | 5246| 15-Apr-21| 08:19 \npalette031.spcolor| palette031.spcolor| | 5246| 15-Apr-21| 08:19 \npalette032.spcolor| palette032.spcolor| | 5245| 15-Apr-21| 08:19 \npalette1.spcolor| palette1.spcolor| | 3110| 15-Apr-21| 08:19 \npalette2.spcolor| palette2.spcolor| | 3121| 15-Apr-21| 08:19 \npalette3.spcolor| palette3.spcolor| | 3122| 15-Apr-21| 08:19 \npalette4.spcolor| palette4.spcolor| | 3121| 15-Apr-21| 08:19 \npalette5.spcolor| palette5.spcolor| | 3116| 15-Apr-21| 08:19 \npalette6.spcolor| palette6.spcolor| | 3118| 15-Apr-21| 08:19 \nschema.xml_designlib| schema.xml| | 4033| 15-Apr-21| 08:19 \nfnt001.spfont| fontscheme001.spfont| | 15354| 15-Apr-21| 08:19 \nfnt002.spfont| fontscheme002.spfont| | 13545| 15-Apr-21| 08:19 \nfnt003.spfont| fontscheme003.spfont| | 15461| 15-Apr-21| 08:19 \nfnt004.spfont| fontscheme004.spfont| | 15884| 15-Apr-21| 08:19 \nfnt005.spfont| fontscheme005.spfont| | 16065| 15-Apr-21| 08:19 \nfnt006.spfont| fontscheme006.spfont| | 14209| 15-Apr-21| 08:19 \nfnt007.spfont| fontscheme007.spfont| | 15880| 15-Apr-21| 08:19 \ndefault.spf| default.spfont| | 13976| 15-Apr-21| 08:19 \nsharepoint.spfont| sharepointpersonality.spfont| | 13976| 15-Apr-21| 08:19 \nschema.xml_listtemp| schema.xml| | 80036| 15-Apr-21| 08:19 \nupload.asx_listtemp| upload.aspx| | 6141| 15-Apr-21| 08:19 \napp.mas_mplib| app.master| | 19062| 15-Apr-21| 08:19 \ndefault.mas| default.master| | 26292| 15-Apr-21| 08:19 \ndefault.mas_mplib| default.master| | 26292| 15-Apr-21| 08:19 \nlv3.mas| layoutsv3.master| | 13587| 15-Apr-21| 08:19 \nminimal.mas| minimal.master| | 8825| 15-Apr-21| 08:19 \nminimal.mas_mplib| minimal.master| | 8825| 15-Apr-21| 08:19 \nmwsdef.mas_mplib| mwsdefault.master| | 26950| 15-Apr-21| 08:19 \nmwsv15.mas_mplib| mwsdefaultv15.master| | 30580| 15-Apr-21| 08:19 \nmwsv4.mas_mplib| mwsdefaultv4.master| | 27509| 15-Apr-21| 08:19 \noslo.mas_mplib| oslo.master| | 29416| 15-Apr-21| 08:19 \noslo.prev| oslo.preview| | 10159| 15-Apr-21| 08:19 \nschema.xml_mplib| schema.xml| | 84417| 15-Apr-21| 08:19 \nseattle.mas| seattle.master| | 29925| 15-Apr-21| 08:19 \nseattle.mas_mplib| seattle.master| | 29925| 15-Apr-21| 08:19 \nseattle.prev| seattle.preview| | 10725| 15-Apr-21| 08:19 \nupload.asp_mplib| upload.aspx| | 5911| 15-Apr-21| 08:19 \nv4.mas| v4.master| | 26916| 15-Apr-21| 08:19 \nv4.mas_mplib| v4.master| | 26916| 15-Apr-21| 08:19 \nactivate.asx_solutionslib| activate.aspx| | 3861| 15-Apr-21| 08:19 \nschema.xml_solutionslib| schema.xml| | 83463| 15-Apr-21| 08:19 \nupload.asx_solutionslib| upload.aspx| | 5914| 15-Apr-21| 08:19 \nviewpage.asx_solutionslib| viewpage.aspx| | 2718| 15-Apr-21| 08:19 \nschema.xml_themeslib| schema.xml| | 1849| 15-Apr-21| 08:19 \nschema.xml_users| schema.xml| | 392079| 15-Apr-21| 08:19 \neditdlg.htm_webtemp| editdlg.htm| | 4892| 15-Apr-21| 08:19 \nschema.xml_webtemp| schema.xml| | 166908| 15-Apr-21| 08:19 \nupload.asx_webtemp| upload.aspx| | 6141| 15-Apr-21| 08:19 \nschema.xml_wplib| schema.xml| | 92345| 15-Apr-21| 08:19 \nupload.asx_wplib| upload.aspx| | 5914| 15-Apr-21| 08:19 \ncmdui.xml_global| cmdui.xml| | 631119| 15-Apr-21| 08:19 \nonet.xml_global| onet.xml| | 313439| 15-Apr-21| 08:19 \nstdview.xml_global| stdview.xml| | 54852| 15-Apr-21| 08:19 \nvwstyles.xml_global| vwstyles.xml| | 422824| 15-Apr-21| 08:19 \ngroupbd.xsl| groupboard.xsl| | 14233| 15-Apr-21| 08:19 \nhtrinfo.xml_0001| htmltransinfo.xml| | 5136| 15-Apr-21| 08:19 \ndefault.asx_forms| default.aspx| | 2788| 15-Apr-21| 08:19 \nweb.cfg_forms| web.config| | 216| 15-Apr-21| 08:19 \ndefault.asx_multilogin| default.aspx| | 2284| 15-Apr-21| 08:19 \nweb.cfg_multilogin| web.config| | 216| 15-Apr-21| 08:19 \ndefault.asx_trust| default.aspx| | 530| 15-Apr-21| 08:19 \nweb.cfg_trust| web.config| | 2190| 15-Apr-21| 08:19 \ndefault.asx_windows| default.aspx| | 522| 15-Apr-21| 08:19 \nweb.cfg_windows| web.config| | 214| 15-Apr-21| 08:19 \ninternal.xsl| internal.xsl| | 11158| 15-Apr-21| 08:19 \naccreqctl.debug.js| accessrequestscontrol.debug.js| | 18870| 15-Apr-21| 08:19 \naccreqctl.js| accessrequestscontrol.js| | 10674| 15-Apr-21| 08:19 \naccreqctl.xml| accessrequestscontrol.xml| | 103| 15-Apr-21| 08:19 \naccreqviewtmpl.debug.js| accessrequestsviewtemplate.debug.js| | 28650| 15-Apr-21| 08:19 \naccreqviewtmpl.js| accessrequestsviewtemplate.js| | 11376| 15-Apr-21| 08:19 \naccreqviewtmpl.xml| accessrequestsviewtemplate.xml| | 108| 15-Apr-21| 08:19 \nappcatalogfieldtemplate.debug.js| appcatalogfieldtemplate.debug.js| | 9040| 15-Apr-21| 08:19 \nappcatalogfieldtemplate.js| appcatalogfieldtemplate.js| | 3342| 15-Apr-21| 08:19 \nappdeveloperdash.debug.js| appdeveloperdash.debug.js| | 22542| 15-Apr-21| 08:19 \nappdeveloperdash.js| appdeveloperdash.js| | 11197| 15-Apr-21| 08:19 \naddb.xml| appdeveloperdash.xml| | 158| 15-Apr-21| 08:19 \nautofill.debug.js| autofill.debug.js| | 18404| 15-Apr-21| 08:19 \nautofill.js| autofill.js| | 10322| 15-Apr-21| 08:19 \nautohostedlicensingtemplates.debug.js| autohostedlicensingtemplates.debug.js| | 20576| 15-Apr-21| 08:19 \nautohostedlicensingtemplates.js| autohostedlicensingtemplates.js| | 8623| 15-Apr-21| 08:19 \nautohostedlicensingtemplates.xml| autohostedlicensingtemplates.xml| | 110| 15-Apr-21| 08:19 \nbform.debug.js| bform.debug.js| | 459758| 15-Apr-21| 08:19 \nbform.js| bform.js| | 258656| 15-Apr-21| 08:19 \nbform.xml| bform.xml| | 87| 15-Apr-21| 08:19 \nblank.debug.js| blank.debug.js| | 164| 15-Apr-21| 08:19 \nblank.js| blank.js| | 119| 15-Apr-21| 08:19 \ncallout.debug.js| callout.debug.js| | 84762| 15-Apr-21| 08:19 \ncallout.js| callout.js| | 26526| 15-Apr-21| 08:19 \ncallout.xml| callout.xml| | 155| 15-Apr-21| 08:19 \nchoicebuttonfieldtemplate.debug.js| choicebuttonfieldtemplate.debug.js| | 5782| 15-Apr-21| 08:19 \nchoicebuttonfieldtemplate.js| choicebuttonfieldtemplate.js| | 2388| 15-Apr-21| 08:19 \ncbft.xml| choicebuttonfieldtemplate.xml| | 97| 15-Apr-21| 08:19 \nclientforms.debug.js| clientforms.debug.js| | 153736| 15-Apr-21| 08:19 \nclientforms.js| clientforms.js| | 77613| 15-Apr-21| 08:19 \nclientforms.xml| clientforms.xml| | 145| 15-Apr-21| 08:19 \nclientpeoplepicker.debug.js| clientpeoplepicker.debug.js| | 77565| 15-Apr-21| 08:19 \nclientpeoplepicker.js| clientpeoplepicker.js| | 41210| 15-Apr-21| 08:19 \nclientrenderer.debug.js| clientrenderer.debug.js| | 23510| 15-Apr-21| 08:19 \nclientrenderer.js| clientrenderer.js| | 9805| 15-Apr-21| 08:19 \nclienttemplates.debug.js| clienttemplates.debug.js| | 294399| 15-Apr-21| 08:19 \nclienttemplates.js| clienttemplates.js| | 150440| 15-Apr-21| 08:19 \nclienttemplates.xml| clienttemplates.xml| | 101| 15-Apr-21| 08:19 \ncommonvalidation.debug.js| commonvalidation.debug.js| | 5376| 15-Apr-21| 08:19 \ncomval.js| commonvalidation.js| | 3369| 15-Apr-21| 08:19 \ncommonvalidation.xml| commonvalidation.xml| | 98| 15-Apr-21| 08:19 \ncore.debug.js| core.debug.js| | 636512| 15-Apr-21| 08:19 \ncore.js_0001| core.js| | 331719| 15-Apr-21| 08:19 \ncore.xml| core.xml| | 86| 15-Apr-21| 08:19 \ndatepicker.debug.js| datepicker.debug.js| | 48715| 15-Apr-21| 08:19 \ndatepick.js| datepicker.js| | 27099| 15-Apr-21| 08:19 \ndatepicker.xml| datepicker.xml| | 92| 15-Apr-21| 08:19 \ndesigngallery.debug.js| designgallery.debug.js| | 46223| 15-Apr-21| 08:19 \ndesigngallery.js| designgallery.js| | 28550| 15-Apr-21| 08:19 \ndesigngallery.xml| designgallery.xml| | 95| 15-Apr-21| 08:19 \ndevdash.debug.js| devdash.debug.js| | 86004| 15-Apr-21| 08:19 \ndevdash.js| devdash.js| | 36366| 15-Apr-21| 08:19 \ndragdrop.debug.js| dragdrop.debug.js| | 160299| 15-Apr-21| 08:19 \ndragdrop.js| dragdrop.js| | 85346| 15-Apr-21| 08:19 \ndragdrop.xml| dragdrop.xml| | 90| 15-Apr-21| 08:19 \nentityeditor.debug.js| entityeditor.debug.js| | 73212| 15-Apr-21| 08:19 \nentityeditor.js| entityeditor.js| | 38537| 15-Apr-21| 08:19 \nfilepreview.debug.js| filepreview.debug.js| | 18731| 15-Apr-21| 08:19 \nfilepreview.js| filepreview.js| | 10123| 15-Apr-21| 08:19 \nfilepreview.xml| filepreview.xml| | 91| 15-Apr-21| 08:19 \nfoldhyperlink.debug.js| foldhyperlink.debug.js| | 3360| 15-Apr-21| 08:19 \nfoldhyperlink.js| foldhyperlink.js| | 1544| 15-Apr-21| 08:19 \nform.debug.js| form.debug.js| | 240967| 15-Apr-21| 08:19 \nform.js| form.js| | 128992| 15-Apr-21| 08:19 \nform.xml| form.xml| | 86| 15-Apr-21| 08:19 \nganttscript.debug.js| ganttscript.debug.js| | 8826| 15-Apr-21| 08:19 \nganttscr.js| ganttscript.js| | 4787| 15-Apr-21| 08:19 \ngeolocationfieldtemplate.debug.js| geolocationfieldtemplate.debug.js| | 40200| 15-Apr-21| 08:19 \ngeolocationfieldtemplate.js| geolocationfieldtemplate.js| | 14901| 15-Apr-21| 08:19 \nglft.xml| geolocationfieldtemplate.xml| | 88| 15-Apr-21| 08:19 \ngroupboard.debug.js| groupboard.debug.js| | 15630| 15-Apr-21| 08:19 \ngroupboard.js| groupboard.js| | 9088| 15-Apr-21| 08:19 \ngroupboard.xml| groupboard.xml| | 92| 15-Apr-21| 08:19 \ngroupeditempicker.debug.js| groupeditempicker.debug.js| | 20302| 15-Apr-21| 08:19 \ngip.js| groupeditempicker.js| | 11630| 15-Apr-21| 08:19 \nhierarchytaskslist.debug.js| hierarchytaskslist.debug.js| | 59315| 15-Apr-21| 08:19 \nhierarchytaskslist.js| hierarchytaskslist.js| | 19494| 15-Apr-21| 08:19 \nhierarchytaskslist.xml| hierarchytaskslist.xml| | 57| 15-Apr-21| 08:19 \nimglib.debug.js| imglib.debug.js| | 85024| 15-Apr-21| 08:19 \nimglib.js| imglib.js| | 50445| 15-Apr-21| 08:19 \nimglib.xml| imglib.xml| | 88| 15-Apr-21| 08:19 \ninit.debug.js| init.debug.js| | 304096| 15-Apr-21| 08:19 \ninit.js_0001| init.js| | 161957| 15-Apr-21| 08:19 \ninplview.debug.js| inplview.debug.js| | 136957| 15-Apr-21| 08:19 \ninplview.js| inplview.js| | 69236| 15-Apr-21| 08:19 \ninplview.xml| inplview.xml| | 158| 15-Apr-21| 08:19 \njsgrid.debug.js| jsgrid.debug.js| | 1164592| 15-Apr-21| 08:19 \njsgrid.gantt.debug.js| jsgrid.gantt.debug.js| | 109470| 15-Apr-21| 08:19 \njsgrid.gantt.js| jsgrid.gantt.js| | 41962| 15-Apr-21| 08:19 \njsgrid.gantt.xml| jsgrid.gantt.xml| | 84| 15-Apr-21| 08:19 \njsgrid.js| jsgrid.js| | 436852| 15-Apr-21| 08:19 \njsgrid.xml| jsgrid.xml| | 60| 15-Apr-21| 08:19 \nlanguagepickercontrol.js| languagepickercontrol.js| | 11175| 15-Apr-21| 08:19 \nmapviewtemplate.debug.js| mapviewtemplate.debug.js| | 37816| 15-Apr-21| 08:19 \nmapviewtemplate.js| mapviewtemplate.js| | 15210| 15-Apr-21| 08:19 \nmapvt.xml| mapviewtemplate.xml| | 106| 15-Apr-21| 08:19 \nmenu.debug.js| menu.debug.js| | 101574| 15-Apr-21| 08:19 \nmenu.htc| menu.htc| | 21872| 15-Apr-21| 08:19 \nmenu.js_0001| menu.js| | 51332| 15-Apr-21| 08:19 \nmenubar.htc| menubar.htc| | 13961| 15-Apr-21| 08:19 \nmquery.debug.js| mquery.debug.js| | 59856| 15-Apr-21| 08:19 \nmquery.js| mquery.js| | 22239| 15-Apr-21| 08:19 \nmquery.xml| mquery.xml| | 89| 15-Apr-21| 08:19 \noffline.debug.js| offline.debug.js| | 7585| 15-Apr-21| 08:19 \noffline.js| offline.js| | 3595| 15-Apr-21| 08:19 \nows.debug.js| ows.debug.js| | 511037| 15-Apr-21| 08:19 \nows.js| ows.js| | 265328| 15-Apr-21| 08:19 \nows.xml| ows.xml| | 85| 15-Apr-21| 08:19 \nowsbrows.debug.js| owsbrows.debug.js| | 9579| 15-Apr-21| 08:19 \nowsbrows.js| owsbrows.js| | 6113| 15-Apr-21| 08:19 \npickerhierarchycontrol.js| pickerhierarchycontrol.js| | 85910| 15-Apr-21| 08:19 \npivotcontrol.debug.js| pivotcontrol.debug.js| | 16089| 15-Apr-21| 08:19 \npivotcontrol.js| pivotcontrol.js| | 8700| 15-Apr-21| 08:19 \nquicklaunch.debug.js| quicklaunch.debug.js| | 130124| 15-Apr-21| 08:19 \nquicklaunch.js| quicklaunch.js| | 69543| 15-Apr-21| 08:19 \nquicklaunch.js.xml| quicklaunch.xml| | 120| 15-Apr-21| 08:19 \nradiobuttonwithchildren.js| radiobuttonwithchildren.js| | 3208| 15-Apr-21| 08:19 \nroamingapps.debug.js| roamingapps.debug.js| | 46291| 15-Apr-21| 08:19 \nroamingapps.js| roamingapps.js| | 19190| 15-Apr-21| 08:19 \nroamingapp.xml| roamingapps.xml| | 93| 15-Apr-21| 08:19 \nsharing.debug.js| sharing.debug.js| | 71639| 15-Apr-21| 08:19 \nsharing.js| sharing.js| | 27124| 15-Apr-21| 08:19 \nsharing.xml| sharing.xml| | 171| 15-Apr-21| 08:19 \nsiteupgrade.debug.js| siteupgrade.debug.js| | 1135| 15-Apr-21| 08:19 \nsiteupgrade.debug.js_14| siteupgrade.debug.js| | 1135| 15-Apr-21| 08:19 \nsiteupgrade.js| siteupgrade.js| | 808| 15-Apr-21| 08:19 \nsiteupgrade.js_14| siteupgrade.js| | 808| 15-Apr-21| 08:19 \nsp.core.debug.js| sp.core.debug.js| | 73924| 15-Apr-21| 08:19 \nsp.core.js| sp.core.js| | 40446| 15-Apr-21| 08:19 \nsp.core.xml| sp.core.xml| | 150| 15-Apr-21| 08:19 \nsp.datetimeutil.debug.js| sp.datetimeutil.debug.js| | 115909| 15-Apr-21| 08:19 \nsp.datetimeutil.debug.js.x64| sp.datetimeutil.debug.js| | 115909| 15-Apr-21| 08:19 \nsp.datetimeutil.js| sp.datetimeutil.js| | 69042| 15-Apr-21| 08:19 \nsp.datetimeutil.js.x64| sp.datetimeutil.js| | 69042| 15-Apr-21| 08:19 \nsp.datetimeutil.xml| sp.datetimeutil.xml| | 69| 15-Apr-21| 08:19 \nsp.debug.js| sp.debug.js| | 1003685| 15-Apr-21| 08:19 \nsp.debug.js.x64| sp.debug.js| | 1003685| 15-Apr-21| 08:19 \nsp.exp.debug.js| sp.exp.debug.js| | 40770| 15-Apr-21| 08:19 \nsp.exp.js| sp.exp.js| | 24528| 15-Apr-21| 08:19 \nsp.exp.xml| sp.exp.xml| | 48| 15-Apr-21| 08:19 \nsp.init.debug.js| sp.init.debug.js| | 55563| 15-Apr-21| 08:19 \nsp.init.js| sp.init.js| | 32205| 15-Apr-21| 08:19 \nsp.js| sp.js| | 625954| 15-Apr-21| 08:19 \nsp.js.x64| sp.js| | 625954| 15-Apr-21| 08:19 \nspmap.debug.js| sp.map.debug.js| | 15227| 15-Apr-21| 08:19 \nspmap.js| sp.map.js| | 8235| 15-Apr-21| 08:19 \nspmap.xml| sp.map.xml| | 65| 15-Apr-21| 08:19 \nsp.requestexecutor.debug.js| sp.requestexecutor.debug.js| | 81201| 15-Apr-21| 08:19 \nsp.requestexecutor.debug.js.x64| sp.requestexecutor.debug.js| | 81201| 15-Apr-21| 08:19 \nsp.requestexecutor.js| sp.requestexecutor.js| | 51540| 15-Apr-21| 08:19 \nsp.requestexecutor.js.x64| sp.requestexecutor.js| | 51540| 15-Apr-21| 08:19 \nsp.requestexecutor.xml| sp.requestexecutor.xml| | 46| 15-Apr-21| 08:19 \nsp.ribbon.debug.js| sp.ribbon.debug.js| | 363159| 15-Apr-21| 08:19 \nsp.ribbon.js| sp.ribbon.js| | 224039| 15-Apr-21| 08:19 \nsp.ribbon.xml| sp.ribbon.xml| | 321| 15-Apr-21| 08:19 \nsp.runtime.debug.js| sp.runtime.debug.js| | 185617| 15-Apr-21| 08:19 \nsp.runtime.debug.js.x64| sp.runtime.debug.js| | 185617| 15-Apr-21| 08:19 \nsp.runtime.js| sp.runtime.js| | 111493| 15-Apr-21| 08:19 \nsp.runtime.js.x64| sp.runtime.js| | 111493| 15-Apr-21| 08:19 \nsp.runtime.xml| sp.runtime.xml| | 46| 15-Apr-21| 08:19 \nsp.storefront.debug.js| sp.storefront.debug.js| | 425498| 15-Apr-21| 08:19 \nsp.storefront.js| sp.storefront.js| | 296609| 15-Apr-21| 08:19 \nsp.storefront.xml| sp.storefront.xml| | 346| 15-Apr-21| 08:19 \nsp.ui.admin.debug.js| sp.ui.admin.debug.js| | 18342| 15-Apr-21| 08:19 \nsp.ui.admin.js| sp.ui.admin.js| | 11378| 15-Apr-21| 08:19 \nsp.ui.allapps.debug.js| sp.ui.allapps.debug.js| | 42395| 15-Apr-21| 08:19 \nsp.ui.allapps.js| sp.ui.allapps.js| | 26257| 15-Apr-21| 08:19 \nsp.ui.applicationpages.calendar.debug.js| sp.ui.applicationpages.calendar.debug.js| | 277454| 15-Apr-21| 08:19 \nsp.ui.applicationpages.calendar.js| sp.ui.applicationpages.calendar.js| | 144914| 15-Apr-21| 08:19 \nsp.ui.applicationpages.calendar.xml| sp.ui.applicationpages.calendar.xml| | 225| 15-Apr-21| 08:19 \nsp.ui.applicationpages.debug.js| sp.ui.applicationpages.debug.js| | 10163| 15-Apr-21| 08:19 \nsp.ui.applicationpages.js| sp.ui.applicationpages.js| | 6953| 15-Apr-21| 08:19 \nsp.ui.applicationpages.xml| sp.ui.applicationpages.xml| | 213| 15-Apr-21| 08:19 \nsp.ui.bdcadminpages.debug.js| sp.ui.bdcadminpages.debug.js| | 16063| 15-Apr-21| 08:19 \nsp.ui.bdcadminpages.js| sp.ui.bdcadminpages.js| | 11315| 15-Apr-21| 08:19 \nspblogd.js| sp.ui.blogs.debug.js| | 50644| 15-Apr-21| 08:19 \nspblog.js| sp.ui.blogs.js| | 31017| 15-Apr-21| 08:19 \nsp.ui.blogs.xml| sp.ui.blogs.xml| | 94| 15-Apr-21| 08:19 \nsp.ui.combobox.debug.js| sp.ui.combobox.debug.js| | 99428| 15-Apr-21| 08:19 \nsp.ui.combobox.js| sp.ui.combobox.js| | 52107| 15-Apr-21| 08:19 \nsp.ui.combobox.xml| sp.ui.combobox.xml| | 54| 15-Apr-21| 08:19 \nsp.ui.controls.debug.js| sp.ui.controls.debug.js| | 55987| 15-Apr-21| 08:19 \nsp.ui.controls.js| sp.ui.controls.js| | 38359| 15-Apr-21| 08:19 \nsp.ui.dialog.debug.js| sp.ui.dialog.debug.js| | 69292| 15-Apr-21| 08:19 \nsp.ui.dialog.js| sp.ui.dialog.js| | 40375| 15-Apr-21| 08:19 \nsp.ui.dialog.xml| sp.ui.dialog.xml| | 90| 15-Apr-21| 08:19 \nspdiscd.js| sp.ui.discussions.debug.js| | 136506| 15-Apr-21| 08:19 \nspdisc.js| sp.ui.discussions.js| | 82216| 15-Apr-21| 08:19 \nsp.ui.discussions.xml| sp.ui.discussions.xml| | 94| 15-Apr-21| 08:19 \nspimgcd.js| sp.ui.imagecrop.debug.js| | 27973| 15-Apr-21| 08:19 \nspimgc.js| sp.ui.imagecrop.js| | 27973| 15-Apr-21| 08:19 \nspui_rid.js| sp.ui.relateditems.debug.js| | 28006| 15-Apr-21| 08:19 \nspui_ri.js| sp.ui.relateditems.js| | 17626| 15-Apr-21| 08:19 \nsp.ui.ri.xml| sp.ui.relateditems.xml| | 114| 15-Apr-21| 08:19 \nsp.ui.rte.debug.js| sp.ui.rte.debug.js| | 1012976| 15-Apr-21| 08:19 \nsp.ui.rte.js| sp.ui.rte.js| | 584834| 15-Apr-21| 08:19 \nsp.ui.rte.xml| sp.ui.rte.xml| | 74| 15-Apr-21| 08:19 \nsp.ui.tileview.debug.js| sp.ui.tileview.debug.js| | 65203| 15-Apr-21| 08:19 \nsp.ui.tileview.js| sp.ui.tileview.js| | 40240| 15-Apr-21| 08:19 \nsp.ui.tileview.xml| sp.ui.tileview.xml| | 129| 15-Apr-21| 08:19 \nspui_tld.js| sp.ui.timeline.debug.js| | 434522| 15-Apr-21| 08:19 \nspui_tl.js| sp.ui.timeline.js| | 240067| 15-Apr-21| 08:19 \nspstl.xml| sp.ui.timeline.xml| | 111| 15-Apr-21| 08:19 \nsp.xml| sp.xml| | 106| 15-Apr-21| 08:19 \nspgantt.debug.js| spgantt.debug.js| | 183484| 15-Apr-21| 08:19 \nspgantt.js| spgantt.js| | 66168| 15-Apr-21| 08:19 \nspgantt.xml| spgantt.xml| | 159| 15-Apr-21| 08:19 \nspgridview.debug.js| spgridview.debug.js| | 7321| 15-Apr-21| 08:19 \nspgridvw.js| spgridview.js| | 4593| 15-Apr-21| 08:19 \nspgridview.xml| spgridview.xml| | 92| 15-Apr-21| 08:19 \nstart.debug.js| start.debug.js| | 174744| 15-Apr-21| 08:19 \nstart.js| start.js| | 95780| 15-Apr-21| 08:19 \nstrings.xml| strings.xml| | 140| 15-Apr-21| 08:19 \nsuitelinks.debug.js| suitelinks.debug.js| | 32558| 15-Apr-21| 08:19 \nsuitelnk.js| suitelinks.js| | 13795| 15-Apr-21| 08:19 \nsuitelinks.xml| suitelinks.xml| | 134| 15-Apr-21| 08:19 \nsuitenav.js| suitenav.js| | 34319| 15-Apr-21| 08:19 \ntimecard.debug.js| timecard.debug.js| | 36906| 15-Apr-21| 08:19 \ntimecard.js| timecard.js| | 20888| 15-Apr-21| 08:19 \nwpadder.debug.js| wpadder.debug.js| | 49561| 15-Apr-21| 08:19 \nwpadder.js| wpadder.js| | 31016| 15-Apr-21| 08:19 \nwpcm.debug.js| wpcm.debug.js| | 6894| 15-Apr-21| 08:19 \nwpcm.js| wpcm.js| | 3509| 15-Apr-21| 08:19 \nmain.xsl| main.xsl| | 5791| 15-Apr-21| 08:19 \nallitems.asx_0086| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0071| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0071| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmyitems.asx_0008| myitems.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0055| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0012| schema.xml| | 253482| 15-Apr-21| 08:19 \nallitems.asx_0089| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0083| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0083| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmyitems.asx_0009| myitems.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0062| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0027| schema.xml| | 245825| 15-Apr-21| 08:19 \nmtgredir.asx_0001| mtgredir.aspx| | 1436| 15-Apr-21| 08:19 \nnewmws.asx| newmws.aspx| | 18858| 15-Apr-21| 08:19 \nmovetodt.asx| movetodt.aspx| | 3075| 15-Apr-21| 08:19 \nschema.xml_0079| schema.xml| | 79705| 15-Apr-21| 08:19 \nallitems.asx_0088| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0082| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0082| editform.aspx| | 4167| 15-Apr-21| 08:19 \nnewform.asx_0061| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0026| schema.xml| | 127795| 15-Apr-21| 08:19 \nallitems.asx_0087| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0072| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0072| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmanagea.asx| managea.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0056| newform.aspx| | 5954| 15-Apr-21| 08:19 \nschema.xml_0021| schema.xml| | 255145| 15-Apr-21| 08:19 \ndefault.aspx_mps| default.aspx| | 4102| 15-Apr-21| 08:19 \nspstd1.asx_0004| spstd1.aspx| | 4134| 15-Apr-21| 08:19 \nallitems.asx_0032| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0038| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0040| editform.aspx| | 4167| 15-Apr-21| 08:19 \nnewform.asx_0021| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0039| schema.xml| | 42852| 15-Apr-21| 08:19 \nallitems.asx_0090| allitems.aspx| | 2463| 15-Apr-21| 08:19 \ndispform.asx_0084| dispform.aspx| | 4190| 15-Apr-21| 08:19 \neditform.asx_0084| editform.aspx| | 4167| 15-Apr-21| 08:19 \nmyitems.asx_0001| myitems.aspx| | 2718| 15-Apr-21| 08:19 \nnewform.asx_0063| newform.aspx| | 4197| 15-Apr-21| 08:19 \nschema.xml_0028| schema.xml| | 245557| 15-Apr-21| 08:19 \nschema.xml_0033| schema.xml| | 51432| 15-Apr-21| 08:19 \nonet.xml_mps| onet.xml| | 20985| 15-Apr-21| 08:19 \nnotif.clbk.typ.xml| notificationcallbacktypes.xml| | 1267| 15-Apr-21| 08:19 \nform.asp_pages_form| form.aspx| | 4065| 15-Apr-21| 08:19 \nview.asp_pages_viewpage| viewpage.aspx| | 2718| 15-Apr-21| 08:19 \nview.asp_pages_webfldr| webfldr.aspx| | 2521| 15-Apr-21| 08:19 \nresxscriptx.xsd| resxscriptx.xsd| | 1229| 15-Apr-21| 08:19 \nsvrfiles.xml| serverfiles.xml| | 213| 15-Apr-21| 08:19 \nshrulee.xsd| sitehealthruleregistrationerror.xsd| | 1909| 15-Apr-21| 08:19 \nshrulew.xsd| sitehealthruleregistrationwarning.xsd| | 1911| 15-Apr-21| 08:19 \nsitehcwss.xml| sitehealthwssrules.xml| | 1010| 15-Apr-21| 08:19 \nsitehcwss.xml_14| sitehealthwssrules.xml| | 1010| 15-Apr-21| 08:19 \nspkvp.xsd| spkeyvaluepairs.xsd| | 1727| 15-Apr-21| 08:19 \nspmtlprm.xsd| spmetalparameters.xsd| | 3857| 15-Apr-21| 08:19 \nappmng.sql| appmng.sql| | 289219| 15-Apr-21| 08:19 \nappmngup.sql| appmngup.sql| | 282966| 15-Apr-21| 08:19 \nbdc.sql| bdc.sql| | 558446| 15-Apr-21| 08:19 \nconfigdb.sql| configdb.sql| | 189484| 15-Apr-21| 08:19 \nconfigup.sql| configup.sql| | 48486| 15-Apr-21| 08:19 \ncfgupddl.sql| configupddl.sql| | 131| 15-Apr-21| 08:19 \nusgdiag.sql| diagnostics.sql| | 19977| 15-Apr-21| 08:19 \nsigcfg.cer| sigconfigdb.cer| | 689| 15-Apr-21| 08:19 \nsigcfg.dll| sigconfigdb.dll| | 8832| 15-Apr-21| 08:19 \nsigstore.cer| sigstore.cer| | 689| 15-Apr-21| 08:19 \nsigstore.dll| sigstore.dll| | 8816| 15-Apr-21| 08:19 \nstore.sql| store.sql| | 6504340| 15-Apr-21| 08:19 \nstoreup.sql| storeup.sql| | 512275| 15-Apr-21| 08:19 \nstoupddl.sql| storeupddl.sql| | 131| 15-Apr-21| 08:19 \nsubscr.sql| subscriptionsettings.sql| | 33788| 15-Apr-21| 08:19 \nusagedb.sql| usagedb.sql| | 81583| 15-Apr-21| 08:19 \nusgdbup.sql| usgdbup.sql| | 81392| 15-Apr-21| 08:19 \naddbact.asx| addbdcaction.aspx| | 13019| 15-Apr-21| 08:19 \naddbapp.asx| addbdcapplication.aspx| | 9266| 15-Apr-21| 08:19 \naddiurl.asx| addincomingurl.aspx| | 4473| 15-Apr-21| 08:19 \nadmin.smp| admin.sitemap| | 15577| 15-Apr-21| 08:19 \nadmcfgc.asx| adminconfigceip.aspx| | 7764| 15-Apr-21| 08:19 \nadmcfgi.asx| adminconfigintro.aspx| | 8689| 15-Apr-21| 08:19 \nadmcfgr.asx| adminconfigresults.aspx| | 5038| 15-Apr-21| 08:19 \nadmcfgs.asx| adminconfigservices.aspx| | 9937| 15-Apr-21| 08:19 \nadmcfgsr.asx| adminconfigservicesresults.aspx| | 4998| 15-Apr-21| 08:19 \nadminweb.cfg| adminweb.config| | 899| 15-Apr-21| 08:19 \nallappprincipals.asx| allappprincipals.aspx| | 6808| 15-Apr-21| 08:19 \nalturls.asx| alternateurlcollections.aspx| | 7122| 15-Apr-21| 08:19 \nappassoc.asx| applicationassociations.aspx| | 5259| 15-Apr-21| 08:19 \nappasdlg.asx| applicationassociationsdialog.aspx| | 3519| 15-Apr-21| 08:19 \nappcreat.asx| applicationcreated.aspx| | 4106| 15-Apr-21| 08:19 \nauthen.asx| authentication.aspx| | 13828| 15-Apr-21| 08:19 \nauthprov.asx| authenticationproviders.aspx| | 4939| 15-Apr-21| 08:19 \navadmin.asx| avadmin.aspx| | 9653| 15-Apr-21| 08:19 \nbackup.asx| backup.aspx| | 15389| 15-Apr-21| 08:19 \nbackhis.asx| backuphistory.aspx| | 20577| 15-Apr-21| 08:19 \nbackset.asx| backupsettings.aspx| | 8689| 15-Apr-21| 08:19 \nbackupst.asx| backupstatus.aspx| | 10643| 15-Apr-21| 08:19 \nbdcapps.asx| bdcapplications.aspx| | 14415| 15-Apr-21| 08:19 \nbdclobs.asx| bdclobsettings.aspx| | 7037| 15-Apr-21| 08:19 \nblkftyp.asx| blockedfiletype.aspx| | 4045| 15-Apr-21| 08:19 \ncaaapplm.asx| ca_allapplicensesmanagement.aspx| | 8267| 15-Apr-21| 08:19 \ncasapplm.asx| ca_specificapplicensemanagement.aspx| | 29344| 15-Apr-21| 08:19 \ncntdbadm.asx| cntdbadm.aspx| | 6042| 15-Apr-21| 08:19 \nconfgssc.asx| configssc.aspx| | 22074| 15-Apr-21| 08:19 \nconfgapp.asx| configureappsettings.aspx| | 7246| 15-Apr-21| 08:19 \ncreatecorpcatalog.asx| createcorporatecatalog.aspx| | 18174| 15-Apr-21| 08:19 \ncreatexu.asx| createexternalurl.aspx| | 4182| 15-Apr-21| 08:19 \ncreatsit.asx| createsite.aspx| | 17064| 15-Apr-21| 08:19 \ndbstats.asx| databasestatus.aspx| | 5023| 15-Apr-21| 08:19 \ndeacfadm.asx| deactivatefeature.aspx| | 3184| 15-Apr-21| 08:19 \ndftcntdb.asx| defaultcontentdb.aspx| | 6455| 15-Apr-21| 08:19 \ndelstcfg.asx| deletesiteconfig.aspx| | 12279| 15-Apr-21| 08:19 \ndelapp.asx| deletewebapplication.aspx| | 6619| 15-Apr-21| 08:19 \ndelsite.asx| delsite.aspx| | 7267| 15-Apr-21| 08:19 \ndplysoln.asx| deploysolution.aspx| | 10122| 15-Apr-21| 08:19 \ndmscmd.aspx| dmscmd.aspx| | 5593| 15-Apr-21| 08:19 \ndtcusta.asx| doctrancustomizeadmin.aspx| | 7789| 15-Apr-21| 08:19 \ndoctrana.asx| doctransadmin.aspx| | 7797| 15-Apr-21| 08:19 \ndspset.asx| dspsettings.aspx| | 14863| 15-Apr-21| 08:19 \neditacct.asx| editaccount.aspx| | 18305| 15-Apr-21| 08:19 \neditbact.asx| editbdcaction.aspx| | 12661| 15-Apr-21| 08:19 \neditiurl.asx| editincomingurl.aspx| | 4683| 15-Apr-21| 08:19 \neditourl.asx| editoutboundurls.aspx| | 7201| 15-Apr-21| 08:19 \nexpbapp.asx| exportbdcapplication.aspx| | 8043| 15-Apr-21| 08:19 \nextendvs.asx| extendvs.aspx| | 7113| 15-Apr-21| 08:19 \nextvsopt.asx| extendvsoption.aspx| | 5077| 15-Apr-21| 08:19 \nextwebfm.asx| extendwebfarm.aspx| | 5418| 15-Apr-21| 08:19 \nfarmjoin.asx| farmconfigjoinintro.aspx| | 8354| 15-Apr-21| 08:19 \nfarmcred.asx| farmcredentialmanagement.aspx| | 7541| 15-Apr-21| 08:19 \nfarmsvrs.asx| farmservers.aspx| | 4910| 15-Apr-21| 08:19 \ngemlcnfg.asx| globalemailconfig.aspx| | 8560| 15-Apr-21| 08:19 \ngmobcnfg.asx| globalxmsconfig.aspx| | 8407| 15-Apr-21| 08:19 \nhealrepo.asx| healthreport.aspx| | 6265| 15-Apr-21| 08:19 \nhtadmin.asx| htmltransadmin.aspx| | 10141| 15-Apr-21| 08:19 \nincemail.asx| incomingemail.aspx| | 22300| 15-Apr-21| 08:19 \nirmadmin.asx| irmadmin.aspx| | 8837| 15-Apr-21| 08:19 \njobedit.asx| jobedit.aspx| | 8303| 15-Apr-21| 08:19 \nlogusage.asx| logusage.aspx| | 14424| 15-Apr-21| 08:19 \nlropsta.asx| lroperationstatus.aspx| | 4915| 15-Apr-21| 08:19 \nmgbdcper.asx| managebdcpermissions.aspx| | 5485| 15-Apr-21| 08:19 \nmgbdcapp.asx| managebdcserviceapp.aspx| | 6684| 15-Apr-21| 08:19 \nmgappinf.asx| managebdcserviceappstateinfo.aspx| | 4613| 15-Apr-21| 08:19 \nmngcorpcatalog.asx| managecorporatecatalog.aspx| | 9289| 15-Apr-21| 08:19 \nmngaccts.asx| managedaccounts.aspx| | 5952| 15-Apr-21| 08:19 \nmngffeat.asx| managefarmfeatures.aspx| | 3273| 15-Apr-21| 08:19 \nmktplset.asx| managemarketplacesettings.aspx| | 7972| 15-Apr-21| 08:19 \nmngqtmpl.asx| managequotatemplate.aspx| | 18002| 15-Apr-21| 08:19 \nmngsftru.asx| manageservicefarmtrust.aspx| | 4743| 15-Apr-21| 08:19 \nmngtrust.asx| managetrust.aspx| | 6911| 15-Apr-21| 08:19 \nmngwfeat.asx| managewebappfeatures.aspx| | 4334| 15-Apr-21| 08:19 \nmetrics.asx| metrics.aspx| | 15273| 15-Apr-21| 08:19 \nadmin.mas| admin.master| | 29828| 15-Apr-21| 08:19 \nappascvw.asc| applicationassociationsview.ascx| | 4379| 15-Apr-21| 08:19 \napppool.asc| applicationpoolsection.ascx| | 8668| 15-Apr-21| 08:19 \nbsqmopt.asc| browserceipsection.ascx| | 2776| 15-Apr-21| 08:19 \ncerstsec.asc| certificatesettingsection.ascx| | 10758| 15-Apr-21| 08:19 \ncntdbsec.asc| contentdatabasesection.ascx| | 7964| 15-Apr-21| 08:19 \nidprosec.asc| identityprovidersettingsection.ascx| | 16007| 15-Apr-21| 08:19 \niiswsapp.asc| iiswebserviceapplicationpoolsection.ascx| | 8772| 15-Apr-21| 08:19 \niiswbste.asc| iiswebsitesection.ascx| | 14964| 15-Apr-21| 08:19 \npopup.mas| popup.master| | 3088| 15-Apr-21| 08:19 \nproxysel.asx| proxyselectionsection.ascx| | 5393| 15-Apr-21| 08:19 \nregacctl.asc| registeraccountcontrol.ascx| | 10073| 15-Apr-21| 08:19 \nrunjobs.asc| runningtimerjobs.ascx| | 4696| 15-Apr-21| 08:19 \nschedjob.asc| scheduledtimerjobs.ascx| | 3583| 15-Apr-21| 08:19 \ntjobhist.asc| timerjobhistory.ascx| | 5114| 15-Apr-21| 08:19 \ntopology.asc| topologyview.ascx| | 4091| 15-Apr-21| 08:19 \ntstgesec.asc| trustgeneralsettingsection.ascx| | 3656| 15-Apr-21| 08:19 \nnewappmngsvcapp.asx| newappmngserviceapp.aspx| | 6664| 15-Apr-21| 08:19 \nnewcntdb.asx| newcntdb.aspx| | 7208| 15-Apr-21| 08:19 \nofadmin.asx| officialfileadmin.aspx| | 13569| 15-Apr-21| 08:19 \noldcntdb.asx| oldcntdb.aspx| | 13658| 15-Apr-21| 08:19 \nowners.asx| owners.aspx| | 5602| 15-Apr-21| 08:19 \npwdset.asx| passwordsettings.aspx| | 8443| 15-Apr-21| 08:19 \npatchstt.asx| patchstatus.aspx| | 7284| 15-Apr-21| 08:19 \npolc.asx| policy.aspx| | 14387| 15-Apr-21| 08:19 \npolcanon.asx| policyanon.aspx| | 7109| 15-Apr-21| 08:19 \npolcrl.asx| policyrole.aspx| | 116092| 15-Apr-21| 08:19 \npolcrle.asx| policyroleedit.aspx| | 116100| 15-Apr-21| 08:19 \npolcrls.asx| policyroles.aspx| | 10688| 15-Apr-21| 08:19 \npolcusr.asx| policyuser.aspx| | 10142| 15-Apr-21| 08:19 \npolcusre.asx| policyuseredit.aspx| | 12411| 15-Apr-21| 08:19 \nprivacy.asx| privacy.aspx| | 8269| 15-Apr-21| 08:19 \nregacct.asx| registeraccount.aspx| | 4058| 15-Apr-21| 08:19 \nremacct.asx| removeaccount.aspx| | 8676| 15-Apr-21| 08:19 \nreqfeata.asx| reqfeatures.aspx| | 2625| 15-Apr-21| 08:19 \nrestore.asx| restore.aspx| | 16105| 15-Apr-21| 08:19 \nrestore3.asx| restorestep3.aspx| | 22878| 15-Apr-21| 08:19 \nrtctsoln.asx| retractsolution.aspx| | 7381| 15-Apr-21| 08:19 \nschedjob.asx| scheduledtimerjobs.aspx| | 7063| 15-Apr-21| 08:19 \nscprefix.asx_0001| scprefix.aspx| | 11391| 15-Apr-21| 08:19 \nslctauc.asx| selectalternateurlcollection.aspx| | 5141| 15-Apr-21| 08:19 \nslctapp.asx| selectapplication.aspx| | 6801| 15-Apr-21| 08:19 \nslctcfaz.asx| selectcrossfirewallaccesszone.aspx| | 5398| 15-Apr-21| 08:19 \nslctjob.asx| selectjobdefinition.aspx| | 5358| 15-Apr-21| 08:19 \nslctlist.asx| selectlist.aspx| | 8606| 15-Apr-21| 08:19 \nslctserv.asx| selectserver.aspx| | 4908| 15-Apr-21| 08:19 \nslctsvc.asx| selectservice.aspx| | 4982| 15-Apr-21| 08:19 \nslctsite.asx| selectsite.aspx| | 9385| 15-Apr-21| 08:19 \nslctweb.asx| selectweb.aspx| | 8459| 15-Apr-21| 08:19 \nslctwapp.asx| selectwebapplication.aspx| | 5356| 15-Apr-21| 08:19 \nserver.asx| server.aspx| | 9131| 15-Apr-21| 08:19 \nsvcappcn.asx| serviceapplicationconnect.aspx| | 4890| 15-Apr-21| 08:19 \nsvcappcd.asx| serviceapplicationconnectiondetails.aspx| | 4334| 15-Apr-21| 08:19 \nsvcappcp.asx| serviceapplicationconnectpopup.aspx| | 2991| 15-Apr-21| 08:19 \nsvcappdl.asx| serviceapplicationdelete.aspx| | 4443| 15-Apr-21| 08:19 \nsvcapppe.asx| serviceapplicationpermissions.aspx| | 4034| 15-Apr-21| 08:19 \nsvcapppb.asx| serviceapplicationpublish.aspx| | 10169| 15-Apr-21| 08:19 \nsvcapp.asx| serviceapplications.aspx| | 4101| 15-Apr-21| 08:19 \nsvcjdefs.asx| servicejobdefinitions.aspx| | 8692| 15-Apr-21| 08:19 \nsvcrjobs.asx| servicerunningjobs.aspx| | 7059| 15-Apr-21| 08:19 \nspdadmin.asx| sharepointdesigneradmin.aspx| | 6974| 15-Apr-21| 08:19 \nsiteex.asx| siteandlistexport.aspx| | 12299| 15-Apr-21| 08:19 \nsitebaks.asx| sitebackuporexportstatus.aspx| | 10242| 15-Apr-21| 08:19 \nsitecbac.asx| sitecollectionbackup.aspx| | 10522| 15-Apr-21| 08:19 \nsitecoll.asx| sitecollections.aspx| | 9189| 15-Apr-21| 08:19 \nsitcrted.asx| sitecreated.aspx| | 3632| 15-Apr-21| 08:19 \nsitequot.asx| sitequota.aspx| | 24323| 15-Apr-21| 08:19 \nsolns.asx| solutions.aspx| | 4786| 15-Apr-21| 08:19 \nsolnsts.asx| solutionstatus.aspx| | 10835| 15-Apr-21| 08:19 \nsolvmgr.asx| solutionvalidatormanager.aspx| | 10912| 15-Apr-21| 08:19 \nspadmin.rsx| spadmin.resx| | 359899| 15-Apr-21| 08:19 \nspscrstg.asx_0002| spsecuritysettings.aspx| | 7491| 15-Apr-21| 08:19 \nstbackup.asx| startbackup.aspx| | 14510| 15-Apr-21| 08:19 \nsuccessp.asx| successpopup.aspx| | 3735| 15-Apr-21| 08:19 \ntimer.asx| timer.aspx| | 8984| 15-Apr-21| 08:19 \ntjobhist.asx| timerjobhistory.aspx| | 8860| 15-Apr-21| 08:19 \nunatcdbb.asx| unattacheddbbrowse.aspx| | 6276| 15-Apr-21| 08:19 \nunatcdb.asx| unattacheddbselect.aspx| | 6082| 15-Apr-21| 08:19 \nunxtndvs.asx| unextendvs.aspx| | 5541| 15-Apr-21| 08:19 \nupgrstat.asx| upgradestatus.aspx| | 11239| 15-Apr-21| 08:19 \nuser_solution.asx| usersolutions.aspx| | 9435| 15-Apr-21| 08:19 \nviewbapp.asx| viewbdcapplication.aspx| | 17212| 15-Apr-21| 08:19 \nviewbent.asx| viewbdcentity.aspx| | 17275| 15-Apr-21| 08:19 \nvwblobi.asx| viewbdclobsysteminstances.aspx| | 10960| 15-Apr-21| 08:19 \nvwblobs.asx| viewbdclobsystems.aspx| | 14303| 15-Apr-21| 08:19 \nvsemail.asx| vsemail.aspx| | 8991| 15-Apr-21| 08:19 \nvsgenset.asx| vsgeneralsettings.aspx| | 52139| 15-Apr-21| 08:19 \nvsmask.asx| vsmask.aspx| | 65273| 15-Apr-21| 08:19 \nvsxms.asx| vsxms.aspx| | 8803| 15-Apr-21| 08:19 \nweblist.asx| webapplicationlist.aspx| | 5468| 15-Apr-21| 08:19 \nwebapps.asx| webapplications.aspx| | 5350| 15-Apr-21| 08:19 \nwfadmin.asx| workflowadmin.aspx| | 6741| 15-Apr-21| 08:19 \nwftimer.asx| workflowtimer.aspx| | 5101| 15-Apr-21| 08:19 \nacrqdlg.asc| accessrequestsdialog.ascx| | 3059| 15-Apr-21| 08:19 \narplfc.asc| accessrequestspermissionlevelfieldcontrol.ascx| | 1145| 15-Apr-21| 08:19 \nacctpick.asc| accountpickerandlink.ascx| | 2347| 15-Apr-21| 08:19 \nacledito.asc| acleditor.ascx| | 9596| 15-Apr-21| 08:19 \nactnbar.asc_0002| actionbar.ascx| | 2464| 15-Apr-21| 08:19 \nbdcfindc.asc| bdcfinderconfigurator.ascx| | 3309| 15-Apr-21| 08:19 \nbdflded.asc| businessdatafieldeditor.ascx| | 4216| 15-Apr-21| 08:19 \ndefformt.asc| defaulttemplates.ascx| | 178739| 15-Apr-21| 08:19 \ndemocon.asc| designmodeconsole.ascx| | 2329| 15-Apr-21| 08:19 \ndispprev.asc| displaypreview.ascx| | 5491| 15-Apr-21| 08:19 \neditprev.asc| editpreview.ascx| | 6219| 15-Apr-21| 08:19 \nfeatact.asc| featureactivator.ascx| | 2403| 15-Apr-21| 08:19 \nfeatacti.asc| featureactivatoritem.ascx| | 2209| 15-Apr-21| 08:19 \nfeatdep.asc| featuredependees.ascx| | 2172| 15-Apr-21| 08:19 \nflhylk.asc| foldhyperlink.ascx| | 1034| 15-Apr-21| 08:19 \nhptnb.asc| helppagetopnavbar.ascx| | 12286| 15-Apr-21| 08:19 \nlanguagepicker.ascx| languagepicker.ascx| | 5536| 15-Apr-21| 08:19 \nleftnav.asc| leftnavigation.ascx| | 895| 15-Apr-21| 08:19 \nlinksect.asc_0002| linksection.ascx| | 2737| 15-Apr-21| 08:19 \nlkseclv1.asc_0002| linksectionlevel1.ascx| | 1429| 15-Apr-21| 08:19 \nlkseclv2.asc_0002| linksectionlevel2.ascx| | 1317| 15-Apr-21| 08:19 \nlinktabl.asc_0002| linkstable.ascx| | 1282| 15-Apr-21| 08:19 \nmodeftst.asc| mobiledefaultstylesheets.ascx| | 1315| 15-Apr-21| 08:19 \nmodeftmp.asc| mobiledefaulttemplates.ascx| | 67472| 15-Apr-21| 08:19 \nmorecolorspicker.ascx| morecolorspicker.ascx| | 2163| 15-Apr-21| 08:19 \nmuiselec.asc| muiselector.ascx| | 1050| 15-Apr-21| 08:19 \nmuisetng.asc| muisettings.ascx| | 4724| 15-Apr-21| 08:19 \nnavitem.asc| navitem.ascx| | 99| 15-Apr-21| 08:19 \nnewprev.asc| newpreview.ascx| | 5243| 15-Apr-21| 08:19 \nschdpckr.asc| schedulepicker.ascx| | 28102| 15-Apr-21| 08:19 \ntoolbar.asc_0002| toolbar.ascx| | 1588| 15-Apr-21| 08:19 \ntbbutton.asc_0002| toolbarbutton.ascx| | 1301| 15-Apr-21| 08:19 \nviewhdr.asc_0002| viewheader.ascx| | 1527| 15-Apr-21| 08:19 \nwelcome.asc_0002| welcome.ascx| | 3508| 15-Apr-21| 08:19 \naccdny.asx| accessdenied.aspx| | 2154| 15-Apr-21| 08:19 \naccreq.asx| accessrequests.aspx| | 1078| 15-Apr-21| 08:19 \naclinv.asx| aclinv.aspx| | 26945| 15-Apr-21| 08:19 \nactredir.asx| actionredirect.aspx| | 896| 15-Apr-21| 08:19 \naddanapp.asx| addanapp.aspx| | 3652| 15-Apr-21| 08:19 \naddcttl.asx| addcontenttypetolist.aspx| | 7512| 15-Apr-21| 08:19 \naddfft.asx| addfieldfromtemplate.aspx| | 9800| 15-Apr-21| 08:19 \naddrole.asx| addrole.aspx| | 68566| 15-Apr-21| 08:19 \narecycle.asx| adminrecyclebin.aspx| | 21099| 15-Apr-21| 08:19 \nadvsetng.asx_0001| advsetng.aspx| | 31465| 15-Apr-21| 08:19 \naggcustze.asx| aggregationcustomize.aspx| | 13046| 15-Apr-21| 08:19 \naggsetngs.asx| aggregationsettings.aspx| | 8162| 15-Apr-21| 08:19 \nappliaap.asx| allapplicensesmanagement.aspx| | 8143| 15-Apr-21| 08:19 \nalphaimage.htc| alphaimage.htc| | 253| 15-Apr-21| 08:19 \nappcatalogimage.asx| appcatalogimage.ashx| | 213| 15-Apr-21| 08:19 \nappicon.asx| appicons.ashx| | 205| 15-Apr-21| 08:19 \nappinv.asx| appinv.aspx| | 11660| 15-Apr-21| 08:19 \nappprincipals.asx| appprincipals.aspx| | 5678| 15-Apr-21| 08:19 \nappredirect.asx| appredirect.aspx| | 5250| 15-Apr-21| 08:19 \nappregnew.asx| appregnew.aspx| | 11198| 15-Apr-21| 08:19 \napprequest.aspx| apprequest.aspx| | 6876| 15-Apr-21| 08:19 \napprove.asx| approve.aspx| | 8991| 15-Apr-21| 08:19 \nappsrcrd.asx| appsourceredirect.aspx| | 3061| 15-Apr-21| 08:19 \nappwebproxy.asx| appwebproxy.aspx| | 2059| 15-Apr-21| 08:19 \naspxform.asx| aspxform.aspx| | 5396| 15-Apr-21| 08:19 \nassogrps.asx| associatedgroups.aspx| | 4795| 15-Apr-21| 08:19 \natchfile.asx| attachfile.aspx| | 6541| 15-Apr-21| 08:19 \nauthentc.asx| authenticate.aspx| | 1068| 15-Apr-21| 08:19 \navreport.asx| avreport.aspx| | 11898| 15-Apr-21| 08:19 \nblank.htm| blank.htm| | 229| 15-Apr-21| 08:18 \nbpcf.asx| bpcf.aspx| | 14883| 15-Apr-21| 08:19 \nbdsync.asx| businessdatasynchronizer.aspx| | 3836| 15-Apr-21| 08:19 \ncalsvc.asx| calendarservice.ashx| | 205| 15-Apr-21| 08:19 \nctmark.asx| calltrackmark.aspx| | 211| 15-Apr-21| 08:19 \nchgctos.asx| changecontenttypeoptionalsettings.aspx| | 8550| 15-Apr-21| 08:19 \nchgcto.asx| changecontenttypeorder.aspx| | 7816| 15-Apr-21| 08:19 \nchgford.asx| changefieldorder.aspx| | 7536| 15-Apr-21| 08:19 \ncheckin.asx| checkin.aspx| | 16116| 15-Apr-21| 08:19 \nchkperm.asx| chkperm.aspx| | 10498| 15-Apr-21| 08:19 \nclcnfm.asx| circulationconfirm.aspx| | 216| 15-Apr-21| 08:19 \nclose.asx| closeconnection.aspx| | 1866| 15-Apr-21| 08:19 \ncmdui.asx| commandui.ashx| | 203| 15-Apr-21| 08:19 \nconfirm.asx| confirmation.aspx| | 1211| 15-Apr-21| 08:19 \ncfmupg.asx| confirmsiteupgrade.aspx| | 3715| 15-Apr-21| 08:19 \ncfmupg.asx_14| confirmsiteupgrade.aspx| | 3712| 15-Apr-21| 08:19 \nconngps.asx| conngps.aspx| | 8490| 15-Apr-21| 08:19 \ncontpick.asx| containerpicker.aspx| | 443| 15-Apr-21| 08:19 \ncopy.asx| copy.aspx| | 15509| 15-Apr-21| 08:19 \ncopyres.asx| copyresults.aspx| | 10337| 15-Apr-21| 08:19 \ncopyrole.asx| copyrole.aspx| | 68509| 15-Apr-21| 08:19 \ncopyutil.asx| copyutil.aspx| | 2333| 15-Apr-21| 08:19 \ncreate.asx| create.aspx| | 33731| 15-Apr-21| 08:19 \ncrtadact.asx| createadaccount.aspx| | 7233| 15-Apr-21| 08:19 \ncrlstpkr.asx| createlistpickerpage.aspx| | 4809| 15-Apr-21| 08:19 \ncreatenewdoc.asx| createnewdocument.aspx| | 5021| 15-Apr-21| 08:19 \ncreatenewdoc.asx_14| createnewdocument.aspx| | 5021| 15-Apr-21| 08:19 \ncreatews.asx| createws.aspx| | 5078| 15-Apr-21| 08:19 \nctypedit.asx| ctypedit.aspx| | 10808| 15-Apr-21| 08:19 \nctypenew.asx| ctypenew.aspx| | 11913| 15-Apr-21| 08:19 \ndeacfeat.asx| deactivatefeature.aspx| | 4424| 15-Apr-21| 08:19 \ndefcss.asx| defaultcss.ashx| | 193| 15-Apr-21| 08:19 \ndefloc.asx| definelocation.aspx| | 4002| 15-Apr-21| 08:19 \ndeletemu.asx| deletemu.aspx| | 188| 15-Apr-21| 08:19 \ndelweb.asx| deleteweb.aspx| | 8062| 15-Apr-21| 08:19 \ndeptsapp.asx| deploytsapp.aspx| | 15800| 15-Apr-21| 08:19 \ndesnbld.asx| designbuilder.aspx| | 6683| 15-Apr-21| 08:19 \ndesndat.asx| designdata.ashx| | 208| 15-Apr-21| 08:19 \ndesngal.asx| designgallery.aspx| | 3475| 15-Apr-21| 08:19 \ndesnprv.asx| designpreview.aspx| | 5615| 15-Apr-21| 08:19 \ndevdash.asx| devdash.aspx| | 2357| 15-Apr-21| 08:19 \ndiscbar.asx| discbar.aspx| | 2448| 15-Apr-21| 08:19 \ndladvopt.asx| dladvopt.aspx| | 19446| 15-Apr-21| 08:19 \ndoctran.asx| doctrans.aspx| | 11465| 15-Apr-21| 08:19 \ndownload.asx| download.aspx| | 155| 15-Apr-21| 08:19 \ndextdata.asx| downloadexternaldata.aspx| | 870| 15-Apr-21| 08:19 \ndws.asx| dws.aspx| | 4368| 15-Apr-21| 08:19 \neditcopy.asx| editcopyinformation.aspx| | 12731| 15-Apr-21| 08:19 \neditgrp.asx| editgrp.aspx| | 19005| 15-Apr-21| 08:19 \neditidx.asx| editindex.aspx| | 7133| 15-Apr-21| 08:19 \neditnav.asx| editnav.aspx| | 6298| 15-Apr-21| 08:19 \neditprms.asx| editprms.aspx| | 5371| 15-Apr-21| 08:19 \neditrole.asx| editrole.aspx| | 69296| 15-Apr-21| 08:19 \nemaildet.asx| emaildetails.aspx| | 5368| 15-Apr-21| 08:19 \nemailset.asx| emailsettings.aspx| | 25980| 15-Apr-21| 08:19 \nerror.asx| error.aspx| | 5011| 15-Apr-21| 08:19 \nevalupg.asx| evaluatesiteupgrade.aspx| | 5395| 15-Apr-21| 08:19 \nevalupg.asx_14| evaluatesiteupgrade.aspx| | 5386| 15-Apr-21| 08:19 \nexporttr.asx| exporttranslations.aspx| | 7907| 15-Apr-21| 08:19 \nfilesred.xml| filestoredirect.sts.xml| | 3378| 15-Apr-21| 08:19 \nfilter.asx| filter.aspx| | 1679| 15-Apr-21| 08:19 \nfldedit.asx| fldedit.aspx| | 208271| 15-Apr-21| 08:19 \nfldedtex.asx| fldeditex.aspx| | 24858| 15-Apr-21| 08:19 \nfldnew.asx| fldnew.aspx| | 203182| 15-Apr-21| 08:19 \nfldnewex.asx| fldnewex.aspx| | 25047| 15-Apr-21| 08:19 \nfldpick.asx| fldpick.aspx| | 9869| 15-Apr-21| 08:19 \nformedt.asx| formedt.aspx| | 21543| 15-Apr-21| 08:19 \ngear.asx| gear.aspx| | 3255| 15-Apr-21| 08:19 \ngbredir.asx| groupboardredirect.aspx| | 216| 15-Apr-21| 08:19 \ngroups.asx| groups.aspx| | 9600| 15-Apr-21| 08:19 \nguestaccess.asx| guestaccess.aspx| | 158| 15-Apr-21| 08:19 \nhelp.asx| help.aspx| | 6803| 15-Apr-21| 08:19 \nhelpcont.asx| helpcontent.aspx| | 690| 15-Apr-21| 08:19 \nhelpsrch.asx| helpsearch.aspx| | 1473| 15-Apr-21| 08:19 \nhelpstg.asx| helpsettings.aspx| | 6298| 15-Apr-21| 08:19 \ntsksvc.asx| hierarchytasksservice.ashx| | 211| 15-Apr-21| 08:19 \nhtmledit.asx| htmledit.aspx| | 13128| 15-Apr-21| 08:19 \nhtmlfieldsecurity.asx| htmlfieldsecurity.aspx| | 12545| 15-Apr-21| 08:19 \nhtmltran.asx| htmltranslate.aspx| | 862| 15-Apr-21| 08:19 \nhtredir.asx| htmltrredir.aspx| | 6388| 15-Apr-21| 08:19 \nhtverify.asx| htmltrverify.aspx| | 6674| 15-Apr-21| 08:19 \niframe.asx| iframe.aspx| | 2029| 15-Apr-21| 08:19 \nimporttr.asx| importtranslations.aspx| | 5800| 15-Apr-21| 08:19 \nindxcol2.asx| indexedcolumns.aspx| | 5424| 15-Apr-21| 08:19 \nindxcol.asx| indxcol.aspx| | 10385| 15-Apr-21| 08:19 \ninfopage.asx| infopage.aspx| | 3782| 15-Apr-21| 08:19 \ninplview.asx| inplview.aspx| | 2378| 15-Apr-21| 08:19 \ninstpapp.asx| installprojapp.aspx| | 5946| 15-Apr-21| 08:19 \nirm.asx| irm.aspx| | 23151| 15-Apr-21| 08:19 \nirmrept.asx| irmrept.aspx| | 8437| 15-Apr-21| 08:19 \nitemrwfassoc.aspx| itemrwfassoc.aspx| | 52428| 15-Apr-21| 08:19 \njsonmetadata.asx| jsonmetadata.ashx| | 203| 15-Apr-21| 08:19 \nlayouts.smp| layouts.sitemap| | 24335| 15-Apr-21| 08:19 \nlropst.asx| layoutslroperationstatus.aspx| | 5004| 15-Apr-21| 08:19 \nlayotweb.cfg| layoutsweb.config| | 2064| 15-Apr-21| 08:19 \nlistedit.asx| listedit.aspx| | 47609| 15-Apr-21| 08:19 \nlistfeed.asx| listfeed.aspx| | 155| 15-Apr-21| 08:19 \nlistform.asx| listform.aspx| | 871| 15-Apr-21| 08:19 \nlstgenst.asx| listgeneralsettings.aspx| | 11979| 15-Apr-21| 08:19 \nlistsynd.asx| listsyndication.aspx| | 25282| 15-Apr-21| 08:19 \nlogin.asx| login.aspx| | 2598| 15-Apr-21| 08:19 \nlstsetng.asx| lstsetng.aspx| | 62369| 15-Apr-21| 08:19 \nmngcof.asx| managecheckedoutfiles.aspx| | 11768| 15-Apr-21| 08:19 \nmngct.asx| managecontenttype.aspx| | 9523| 15-Apr-21| 08:19 \nmngf.asx| managecontenttypefield.aspx| | 9277| 15-Apr-21| 08:19 \nmngcops.asx| managecopies.aspx| | 13582| 15-Apr-21| 08:19 \nmngfeat.asx| managefeatures.aspx| | 4571| 15-Apr-21| 08:19 \nmcontent.asx| mcontent.aspx| | 4742| 15-Apr-21| 08:19 \nmetablog.asx| metaweblog.aspx| | 172| 15-Apr-21| 08:19 \nmngctype.asx| mngctype.aspx| | 5738| 15-Apr-21| 08:19 \nmngfield.asx| mngfield.aspx| | 5836| 15-Apr-21| 08:19 \nmngstadm.asx| mngsiteadmin.aspx| | 5456| 15-Apr-21| 08:19 \nmngsubwb.asx| mngsubwebs.aspx| | 11725| 15-Apr-21| 08:19 \nbloghome.asx_mobile| bloghome.aspx| | 3210| 15-Apr-21| 08:19 \ndefault.asx_mobile| default.aspx| | 1513| 15-Apr-21| 08:19 \ndelete.asx_mobile| delete.aspx| | 2298| 15-Apr-21| 08:19 \ndispform.asx_mobile| dispform.aspx| | 2428| 15-Apr-21| 08:19 \ndisppost.asx_mobile| disppost.aspx| | 3234| 15-Apr-21| 08:19 \neditform.asx_mobile| editform.aspx| | 4798| 15-Apr-21| 08:19 \ndenied.asx_mobile| mbldenied.aspx| | 1619| 15-Apr-21| 08:19 \nerror.asx_mobile| mblerror.aspx| | 2172| 15-Apr-21| 08:19 \nmbllists.asx_mobile| mbllists.aspx| | 2645| 15-Apr-21| 08:19 \nmbllogin.asx_mobile| mbllogin.aspx| | 5361| 15-Apr-21| 08:19 \nmblogout.asx_mobile| mbllogout.aspx| | 5003| 15-Apr-21| 08:19 \nmltlogin.asx_mobile| mblmultilogin.aspx| | 4957| 15-Apr-21| 08:19 \nmblwiki.asx_mobile| mblwiki.aspx| | 3598| 15-Apr-21| 08:19 \nmblwp.asx_mobile| mblwp.aspx| | 3603| 15-Apr-21| 08:19 \nmblwpdtl.asx_mobile| mblwpdetail.aspx| | 2567| 15-Apr-21| 08:19 \nnewcmt.asx_mobile| newcomment.aspx| | 2762| 15-Apr-21| 08:19 \nnewform.asx_mobile| newform.aspx| | 4796| 15-Apr-21| 08:19 \nnewpost.asx_mobile| newpost.aspx| | 2777| 15-Apr-21| 08:19 \nupload.asx_mobile| upload.aspx| | 3491| 15-Apr-21| 08:19 \nview.asx_mobile| view.aspx| | 2424| 15-Apr-21| 08:19 \nviewcmt.asx_mobile| viewcomment.aspx| | 3223| 15-Apr-21| 08:19 \nviewfilter.asx_mobile| viewfilter.aspx| | 3747| 15-Apr-21| 08:19 \nweb.cfg_mobile| web.config| | 10909| 15-Apr-21| 08:19 \nmorecols.asx| morecolors.aspx| | 4163| 15-Apr-21| 08:19 \napp.mas| application.master| | 13756| 15-Apr-21| 08:19 \nappv4.mas| applicationv4.master| | 20553| 15-Apr-21| 08:19 \nbutsec.asc_0001| buttonsection.ascx| | 3836| 15-Apr-21| 08:19 \ndialog.mas| dialog.master| | 12646| 15-Apr-21| 08:19 \nerrv15.mas| errorv15.master| | 3482| 15-Apr-21| 08:19 \nifcont.asc_0001| inputformcontrol.ascx| | 2568| 15-Apr-21| 08:19 \nifsect.asc_0001| inputformsection.ascx| | 5204| 15-Apr-21| 08:19 \nlayouts.mas| layouts.master| | 13244| 15-Apr-21| 08:19 \nlkfldedt.asc_0001| lookupfieldeditor.ascx| | 10383| 15-Apr-21| 08:19 \nlkreledt.asc_0001| lookuprelationshipseditor.ascx| | 7752| 15-Apr-21| 08:19 \npickerdialog.mas| pickerdialog.master| | 8912| 15-Apr-21| 08:19 \nrtedlg.mas| rtedialog.master| | 3199| 15-Apr-21| 08:19 \nsimple.mas| simple.master| | 10243| 15-Apr-21| 08:19 \nsimpv4.mas| simplev4.master| | 6530| 15-Apr-21| 08:19 \ntmpctl.asc_0001| templatepickercontrol.ascx| | 3264| 15-Apr-21| 08:19 \ntopnavbr.asc_0001| topnavbar.ascx| | 6462| 15-Apr-21| 08:19 \nurfldedt.asc_0001| userfieldeditor.ascx| | 6555| 15-Apr-21| 08:19 \nmuisetng.asx| muisetng.aspx| | 3521| 15-Apr-21| 08:19 \nmwpstg.asx| mwpsettings.aspx| | 14042| 15-Apr-21| 08:19 \nmyprmns.asx| mypermissions.aspx| | 5239| 15-Apr-21| 08:19 \nmysubs.asx| mysubs.aspx| | 13142| 15-Apr-21| 08:19 \nnavopt.asx| navoptions.aspx| | 7337| 15-Apr-21| 08:19 \nnew.asx| new.aspx| | 61372| 15-Apr-21| 08:19 \nnewdwp.asx| newdwp.aspx| | 6557| 15-Apr-21| 08:19 \nnewgrp.asx| newgrp.aspx| | 19741| 15-Apr-21| 08:19 \nnewlink.asx| newlink.aspx| | 9284| 15-Apr-21| 08:19 \nnewnav.asx| newnav.aspx| | 6130| 15-Apr-21| 08:19 \nnewsbweb.asx| newsbweb.aspx| | 18686| 15-Apr-21| 08:19 \nnewslwp.asx| newslwp.aspx| | 10513| 15-Apr-21| 08:19 \noauthauthorize.asx| oauthauthorize.aspx| | 11676| 15-Apr-21| 08:19 \npassword.asx| password.aspx| | 8483| 15-Apr-21| 08:19 \npeople.asx| people.aspx| | 22688| 15-Apr-21| 08:19 \npermstup.asx| permsetup.aspx| | 18411| 15-Apr-21| 08:19 \npicker.asx| picker.aspx| | 7885| 15-Apr-21| 08:19 \nportal.asx| portal.aspx| | 9896| 15-Apr-21| 08:19 \nportalvw.asx_0001| portalview.aspx| | 2248| 15-Apr-21| 08:19 \nprjsetng.asx| prjsetng.aspx| | 16270| 15-Apr-21| 08:19 \nprfredir.asx| profileredirect.aspx| | 1605| 15-Apr-21| 08:19 \npubback.asx| publishback.aspx| | 4934| 15-Apr-21| 08:19 \nqlreord.asx| qlreord.aspx| | 10886| 15-Apr-21| 08:19 \nqstedit.asx| qstedit.aspx| | 217711| 15-Apr-21| 08:19 \nqstnew.asx| qstnew.aspx| | 199982| 15-Apr-21| 08:19 \nquiklnch.asx| quiklnch.aspx| | 8030| 15-Apr-21| 08:19 \nrcxform.asx| rcxform.aspx| | 6023| 15-Apr-21| 08:19 \nrecycle.asx| recyclebin.aspx| | 16593| 15-Apr-21| 08:19 \nredirect.asx_0001| redirect.aspx| | 1394| 15-Apr-21| 08:19 \nreghost.asx| reghost.aspx| | 7879| 15-Apr-21| 08:19 \nrgnlstng.asx| regionalsetng.aspx| | 21661| 15-Apr-21| 08:19 \nrndlstd.asx| reindexlistdialog.aspx| | 1762| 15-Apr-21| 08:19 \nrixsite.asx| reindexsitedialog.aspx| | 1771| 15-Apr-21| 08:19 \nrenamepg.asx| renamepagedialog.aspx| | 3946| 15-Apr-21| 08:19 \nreorder.asx| reorder.aspx| | 11743| 15-Apr-21| 08:19 \nreqacc.asx| reqacc.aspx| | 4357| 15-Apr-21| 08:19 \nreqfeat.asx| reqfeatures.aspx| | 3860| 15-Apr-21| 08:19 \nreqgroup.asx| reqgroup.aspx| | 6562| 15-Apr-21| 08:19 \nreqgrpcf.asx| reqgroupconfirm.aspx| | 6425| 15-Apr-21| 08:19 \nrqstapp.asx| requestanapp.aspx| | 7673| 15-Apr-21| 08:19 \nrfcxform.asx| rfcxform.aspx| | 6160| 15-Apr-21| 08:19 \nrfpxform.asx| rfpxform.aspx| | 6497| 15-Apr-21| 08:19 \nroamapp.asx| roamingapps.aspx| | 4614| 15-Apr-21| 08:19 \nrole.asx| role.aspx| | 11001| 15-Apr-21| 08:19 \nrssxslt.asx| rssxslt.aspx| | 3480| 15-Apr-21| 08:19 \nrtedlg.asx| rtedialog.aspx| | 10212| 15-Apr-21| 08:19 \nrteuplod.asx| rteuploaddialog.aspx| | 8044| 15-Apr-21| 08:19 \nsaveconflict.asx| saveconflict.aspx| | 5198| 15-Apr-21| 08:19 \nsavetmpl.asx| savetmpl.aspx| | 17496| 15-Apr-21| 08:19 \nscriptresx.asx| scriptresx.ashx| | 200| 15-Apr-21| 08:19 \nscsignup.asx| scsignup.aspx| | 11428| 15-Apr-21| 08:19 \nsrchrslt.asx| searchresults.aspx| | 5674| 15-Apr-21| 08:19 \nselfservicecreate.asx| selfservicecreate.aspx| | 12745| 15-Apr-21| 08:19 \nsetanon.asx| setanon.aspx| | 12399| 15-Apr-21| 08:19 \nsetrqacc.asx| setrqacc.aspx| | 7631| 15-Apr-21| 08:19 \nsettings.asx| settings.aspx| | 3673| 15-Apr-21| 08:19 \nsetwa.asx| setwhereabouts.aspx| | 212| 15-Apr-21| 08:19 \nsharedwf.asx| sharedwfform.aspx| | 5297| 15-Apr-21| 08:19 \nspdstngs.asx| sharepointdesignersettings.aspx| | 6769| 15-Apr-21| 08:19 \nsignout.asx| signout.aspx| | 1509| 15-Apr-21| 08:19 \nsitehc.asx| sitehealthcheck.aspx| | 3918| 15-Apr-21| 08:19 \nsitehcr.asx| sitehealthcheckresults.aspx| | 4054| 15-Apr-21| 08:19 \nsitehcr.asx_14| sitehealthcheckresults.aspx| | 4054| 15-Apr-21| 08:19 \nsitehc.asx_14| sitehealthcheck.aspx| | 3915| 15-Apr-21| 08:19 \nsiterss.asx| siterss.aspx| | 10595| 15-Apr-21| 08:19 \nsitesubs.asx| sitesubs.aspx| | 13639| 15-Apr-21| 08:19 \nstupgrad.asx| siteupgrade.aspx| | 5373| 15-Apr-21| 08:19 \nstupgsts.asx| siteupgradestatus.aspx| | 8418| 15-Apr-21| 08:19 \nstupgsts.asx_14| siteupgradestatus.aspx| | 8418| 15-Apr-21| 08:19 \nstupgrad.asx_14| siteupgrade.aspx| | 5416| 15-Apr-21| 08:19 \nspcf.asx| spcf.aspx| | 19428| 15-Apr-21| 08:19 \nspcontnt.asx| spcontnt.aspx| | 12854| 15-Apr-21| 08:19 \napplisap.asx| specificapplicensemanagement.aspx| | 29238| 15-Apr-21| 08:19 \nsrchvis.asx| srchvis.aspx| | 10067| 15-Apr-21| 08:19 \nstart.asx| start.aspx| | 1048| 15-Apr-21| 08:19 \nstorefront.asx| storefront.aspx| | 4349| 15-Apr-21| 08:19 \nstorman.asx| storman.aspx| | 10595| 15-Apr-21| 08:19 \ncorefxup.css| corefixup.css| | 469| 15-Apr-21| 08:19 \ndlgframe.css| dlgframe.css| | 2528| 15-Apr-21| 08:19 \njsgrid.css| jsgrid.css| | 27207| 15-Apr-21| 08:19 \njsgrid.csst| jsgrid.css| | 27207| 15-Apr-21| 08:19 \nsubchoos.asx| subchoos.aspx| | 10435| 15-Apr-21| 08:19 \nsubedit.asx| subedit.aspx| | 14784| 15-Apr-21| 08:19 \nsrepair.asx| submitrepair.aspx| | 156| 15-Apr-21| 08:19 \nsubnew.asx| subnew.aspx| | 15223| 15-Apr-21| 08:19 \nsuccess.asx| success.aspx| | 3172| 15-Apr-21| 08:19 \nsurvedit.asx| survedit.aspx| | 37673| 15-Apr-21| 08:19 \ntmptpick.asx| templatepick.aspx| | 5272| 15-Apr-21| 08:19 \ntenappin.asx| tenantappinfo.ashx| | 207| 15-Apr-21| 08:19 \nthemeweb.asx| themeweb.aspx| | 1339| 15-Apr-21| 08:19 \ntcsetng.asx| timecardsettings.aspx| | 15814| 15-Apr-21| 08:19 \ntnreord.asx| tnreord.aspx| | 8361| 15-Apr-21| 08:19 \ntoolpane.asx| toolpane.aspx| | 2370| 15-Apr-21| 08:19 \ntopnav.asx| topnav.aspx| | 7717| 15-Apr-21| 08:19 \nuniqperm.asx| uniqperm.aspx| | 9818| 15-Apr-21| 08:19 \nupdcops.asx| updatecopies.aspx| | 12032| 15-Apr-21| 08:19 \nupload.asx| upload.aspx| | 13234| 15-Apr-21| 08:19 \nusage.asx| usage.aspx| | 7871| 15-Apr-21| 08:19 \nusagedtl.asx| usagedetails.aspx| | 6089| 15-Apr-21| 08:19 \nuseconf.asx| useconfirmation.aspx| | 3520| 15-Apr-21| 08:19 \nuser.asx| user.aspx| | 27691| 15-Apr-21| 08:19 \nuserdisp.asx| userdisp.aspx| | 4299| 15-Apr-21| 08:19 \nuseredit.asx| useredit.aspx| | 4175| 15-Apr-21| 08:19 \nuserserr.asx| usersettingserror.aspx| | 1848| 15-Apr-21| 08:19 \nversions.asx| versions.aspx| | 35361| 15-Apr-21| 08:19 \nviewedit.asx| viewedit.aspx| | 220325| 15-Apr-21| 08:19 \nvwgrpprm.asx| viewgrouppermissions.aspx| | 5199| 15-Apr-21| 08:19 \nviewlsts.asx| viewlsts.aspx| | 33824| 15-Apr-21| 08:19 \nviewnew.asx| viewnew.aspx| | 218013| 15-Apr-21| 08:19 \nviewtype.asx| viewtype.aspx| | 26314| 15-Apr-21| 08:19 \nvldsetng.asx| vldsetng.aspx| | 8912| 15-Apr-21| 08:19 \nvsmenu.asx| vsmenu.aspx| | 2059| 15-Apr-21| 08:19 \nvsubwebs.asx| vsubwebs.aspx| | 6028| 15-Apr-21| 08:19 \nwebdeltd.asx| webdeleted.aspx| | 1500| 15-Apr-21| 08:19 \nwppicker.asx| webpartgallerypickerpage.aspx| | 7202| 15-Apr-21| 08:19 \nwopiframe.asx| wopiframe.aspx| | 1968| 15-Apr-21| 08:19 \nwopiframe.asx_14| wopiframe.aspx| | 1968| 15-Apr-21| 08:19 \nwopiframe2.asx| wopiframe2.aspx| | 1957| 15-Apr-21| 08:19 \nwopiframe2.asx_14| wopiframe2.aspx| | 1957| 15-Apr-21| 08:19 \nworkspce.asx| workspce.aspx| | 8290| 15-Apr-21| 08:19 \nwpeula.asx| wpeula.aspx| | 5740| 15-Apr-21| 08:19 \nwpprevw.asx| wpprevw.aspx| | 4943| 15-Apr-21| 08:19 \nwpribbon.asx| wpribbon.aspx| | 761| 15-Apr-21| 08:19 \nwsauplod.asx| wsaupload.ashx| | 198| 15-Apr-21| 08:19 \nwss.rsx| wss.resx| | 723698| 15-Apr-21| 08:19 \nproxy.asx| wssproxy.aspx| | 1448| 15-Apr-21| 08:19 \nzoombldr.asx| zoombldr.aspx| | 12990| 15-Apr-21| 08:19 \nbdrdflt.aspx| default.aspx| | 4026| 15-Apr-21| 08:18 \ndefault.aspx_sts| default.aspx| | 4026| 15-Apr-21| 08:18 \ndefault.aspx_dws| defaultdws.aspx| | 4376| 15-Apr-21| 08:19 \nonet.xml_wss| onet.xml| | 12257| 15-Apr-21| 08:19 \nthemedforegroundimages.css| themedforegroundimages.css| | 28675| 15-Apr-21| 08:19 \ntaddconn.aspx_tenantadmin| ta_addappconnection.aspx| | 11735| 15-Apr-21| 08:19 \ntbdcadac.aspx_tenantadmin| ta_addbdcaction.aspx| | 12621| 15-Apr-21| 08:19 \ntbdcadap.aspx_tenantadmin| ta_addbdcapplication.aspx| | 8942| 15-Apr-21| 08:19 \nappliaap.aspx_tenantadmin| ta_allapplicensesmanagement.aspx| | 8178| 15-Apr-21| 08:19 \nappprincipals.aspx_tenantadmin| ta_allappprincipals.aspx| | 6769| 15-Apr-21| 08:19 \ntbcshome.aspx_tenantadmin| ta_bcshome.aspx| | 4633| 15-Apr-21| 08:19 \ntbdcapps.aspx_tenantadmin| ta_bdcapplications.aspx| | 13499| 15-Apr-21| 08:19 \ntbdclobsettings.aspx_tenantadmin| ta_bdclobsettings.aspx| | 6798| 15-Apr-21| 08:19 \ncreatecc.aspx_tenantadmin| ta_createcorporatecatalog.aspx| | 12183| 15-Apr-21| 08:19 \nnewsitec.aspx_tenantadmin| ta_createsitecollection.aspx| | 11081| 15-Apr-21| 08:19 \nnewconfi.aspx_tenantadmin| ta_createsitecollectionconfirmation.aspx| | 3028| 15-Apr-21| 08:19 \ndelsitec.aspx_tenantadmin| ta_deletesitecollectiondialog.aspx| | 3562| 15-Apr-21| 08:19 \ntbdcedac.aspx_tenantadmin| ta_editbdcaction.aspx| | 12268| 15-Apr-21| 08:19 \ntbdcexap.aspx_tenantadmin| ta_exportbdcapplication.aspx| | 7749| 15-Apr-21| 08:19 \ntlropsta.aspx_tenantadmin| ta_lroperationstatus.aspx| | 3645| 15-Apr-21| 08:19 \ntconmeta.aspx_tenantadmin| ta_manageappconnectionmetadata.aspx| | 8491| 15-Apr-21| 08:19 \ntconnsec.aspx_tenantadmin| ta_manageappconnectionsecurity.aspx| | 4495| 15-Apr-21| 08:19 \ntbdcperm.aspx_tenantadmin| ta_managebdcpermissions.aspx| | 4069| 15-Apr-21| 08:19 \ncorpcat.aspx_tenantadmin| ta_managecorporatecatalog.aspx| | 6403| 15-Apr-21| 08:19 \nmktplset.aspx_tenantadmin| ta_managemarketplacesettings.aspx| | 6296| 15-Apr-21| 08:19 \nofadmin.aspx_tenantadmin| ta_officialfileadmin.aspx| | 11323| 15-Apr-21| 08:19 \nsitecdq.aspx_tenantadmin| ta_sitecollectiondiskquotadialog.aspx| | 10735| 15-Apr-21| 08:19 \nsitecown.aspx_tenantadmin| ta_sitecollectionownersdialog.aspx| | 5705| 15-Apr-21| 08:19 \nsitecper.aspx_tenantadmin| ta_sitecollectionpermissionsdialog.aspx| | 2637| 15-Apr-21| 08:19 \nsitecrep.aspx_tenantadmin| ta_sitecollectionreportsdialog.aspx| | 2637| 15-Apr-21| 08:19 \nsitecoll.aspx_tenantadmin| ta_sitecollections.aspx| | 9478| 15-Apr-21| 08:19 \napplisap.aspx_tenantadmin| ta_specificapplicensemanagement.aspx| | 27508| 15-Apr-21| 08:19 \ntviewcon.aspx_tenantadmin| ta_viewappconnections.aspx| | 8814| 15-Apr-21| 08:19 \ntbdcvwap.aspx_tenantadmin| ta_viewbdcapplication.aspx| | 16234| 15-Apr-21| 08:19 \ntbdcvwen.aspx_tenantadmin| ta_viewbdcentity.aspx| | 16454| 15-Apr-21| 08:19 \ntbdcvwli.aspx_tenantadmin| ta_viewbdclobsysteminstances.aspx| | 10289| 15-Apr-21| 08:19 \ntbdcvwlb.aspx_tenantadmin| ta_viewbdclobsystems.aspx| | 13386| 15-Apr-21| 08:19 \nvsitecp.aspx_tenantadmin| ta_viewsitecollectionpropertiesdialog.aspx| | 6189| 15-Apr-21| 08:19 \ndefault.aspx_tenantadmin| default.aspx| | 3882| 15-Apr-21| 08:19 \nonet.xml_tenantadmin| onet.xml| | 5726| 15-Apr-21| 08:19 \nthread.xsl| thread.xsl| | 34542| 15-Apr-21| 08:19 \nusercode.xsd| usercode.xsd| | 4293| 15-Apr-21| 08:19 \nvalidapp.xml| validappendpoints.xml| | 15837| 15-Apr-21| 08:19 \nvwstyles.xsl| vwstyles.xsl| | 130790| 15-Apr-21| 08:19 \nwefman.xsd| wefextensionmanifestschema.xsd| | 51975| 15-Apr-21| 08:19 \nwefma1_1.xsd| wefextensionmanifestschema1_1.xsd| | 57288| 15-Apr-21| 08:19 \nbacklink.aspx_webpagelib| backlinks.aspx| | 4069| 15-Apr-21| 08:19 \ncrtv4pgs.asx| createv4pageslib.aspx| | 3584| 15-Apr-21| 08:19 \ncreatweb.asx| createwebpage.aspx| | 10792| 15-Apr-21| 08:19 \nrecentwp.asx| recentwikipages.aspx| | 3790| 15-Apr-21| 08:19 \nversdiff.aspx_webpagelib| versiondiff.aspx| | 5692| 15-Apr-21| 08:19 \nwikiredr.aspx| wikiredirect.aspx| | 1123| 15-Apr-21| 08:19 \nonet.xml_wiki| onet.xml| | 8372| 15-Apr-21| 08:19 \nwfaction.xsd| workflowactions.xsd| | 14033| 15-Apr-21| 08:19 \nwss.xsd| wss.xsd| | 112463| 15-Apr-21| 08:19 \nbase.xml| base.xml| | 21747| 15-Apr-21| 08:19 \nsts.xml| sts.xml| | 14413| 15-Apr-21| 08:19 \nwssadmin.xml| wssadmin.xml| | 9317| 15-Apr-21| 08:19 \nresqmax.xml_0001| resourcequotamaximum.xml| | 565| 15-Apr-21| 08:19 \nresqwarn.xml_0001| resourcequotawarning.xml| | 563| 15-Apr-21| 08:19 \nowstimer.exe_0001| owstimer.exe| 15.0.4971.1000| 80608| 15-Apr-21| 08:19 \nowstimer.exe.config| owstimer.exe.config| | 481| 15-Apr-21| 08:19 \ntraceman.exe| wsstracing.exe| 15.0.4569.1501| 115904| 15-Apr-21| 08:18 \nspwriter.exe_0001| spwriter.exe| 15.0.4971.1000| 50944| 15-Apr-21| 08:19 \nstswel.dll| stswel.dll| 15.0.5345.1000| 3912584| 15-Apr-21| 08:19 \nstswfacb.dll| microsoft.sharepoint.workflowactions.dll| 15.0.4857.1000| 318728| 15-Apr-21| 08:19 \nstswfact.dll| microsoft.sharepoint.workflowactions.dll| 15.0.4857.1000| 318728| 15-Apr-21| 08:19 \nstswfaci.dll| microsoft.sharepoint.workflowactions.intl.dll| 15.0.4420.1017| 23200| 15-Apr-21| 08:19 \nisswfresources.resx| resources.resx| | 2072| 15-Apr-21| 08:19 \nisswffeature.xml| feature.xml| | 465| 15-Apr-21| 08:19 \nissuetracking.xml| issuetracking.xml| | 749| 15-Apr-21| 08:19 \nsts.workflows.dll| microsoft.sharepoint.workflows.dll| 15.0.4507.1000| 63168| 15-Apr-21| 08:19 \nworkflows_intl.dll| microsoft.sharepoint.workflows.intl.dll| 15.0.5267.1000| 15752| 15-Apr-21| 08:19 \nie50up.debug.js| ie50up.debug.js| | 152685| 15-Apr-21| 08:19 \nie50up.js| ie50up.js| | 80787| 15-Apr-21| 08:19 \nie50up.xml| ie50up.xml| | 65| 15-Apr-21| 08:19 \nie55up.debug.js| ie55up.debug.js| | 151879| 15-Apr-21| 08:19 \nie55up.js| ie55up.js| | 80248| 15-Apr-21| 08:19 \nie55up.xml| ie55up.xml| | 65| 15-Apr-21| 08:19 \nnon_ie.debug.js| non_ie.debug.js| | 101963| 15-Apr-21| 08:19 \nnon_ie.js| non_ie.js| | 59859| 15-Apr-21| 08:19 \nnon_ie.xml| non_ie.xml| | 65| 15-Apr-21| 08:19 \nbpstd.debug.js| bpstd.debug.js| | 7637| 15-Apr-21| 08:19 \nbpstd.js| bpstd.js| | 4356| 15-Apr-21| 08:19 \nbpstd.xml| bpstd.xml| | 65| 15-Apr-21| 08:19 \nctp.debug.js| ctp.debug.js| | 7406| 15-Apr-21| 08:19 \nctp.js| ctp.js| | 3934| 15-Apr-21| 08:19 \nctp.xml| ctp.xml| | 65| 15-Apr-21| 08:19 \ncvtp.debug.js| cvtp.debug.js| | 4529| 15-Apr-21| 08:19 \ncvtp.js| cvtp.js| | 2412| 15-Apr-21| 08:19 \ncvtp.xml| cvtp.xml| | 65| 15-Apr-21| 08:19 \nitp.debug.js| itp.debug.js| | 12586| 15-Apr-21| 08:19 \nitp.js| itp.js| | 9525| 15-Apr-21| 08:19 \nitp.xml| itp.xml| | 65| 15-Apr-21| 08:19 \nxtp.debug.js| xtp.debug.js| | 3071| 15-Apr-21| 08:19 \nxtp.js| xtp.js| | 1512| 15-Apr-21| 08:19 \nsts_sandbox.dll| microsoft.sharepoint.sandbox.dll| 15.0.5345.1000| 180120| 15-Apr-21| 08:19 \naddrbook.gif| addressbook.gif| | 908| 13-Apr-21| 04:57 \ncalview.gif| calview.gif| | 1615| 13-Apr-21| 04:57 \nchecknames.gif| checknames.gif| | 908| 13-Apr-21| 04:57 \nganttvw.gif| ganttview.gif| | 1625| 13-Apr-21| 04:57 \ngrid.gif| grid.gif| | 1610| 13-Apr-21| 04:57 \nicaccdb.gif| icaccdb.gif| | 231| 13-Apr-21| 04:56 \nicaccde.gif| icaccde.gif| | 222| 13-Apr-21| 04:57 \nicbmp.gif| icbmp.gif| | 355| 13-Apr-21| 04:56 \nicdoc.gif| icdoc.gif| | 231| 13-Apr-21| 04:56 \nicdocm.gif| icdocm.gif| | 236| 13-Apr-21| 04:57 \nicdocset.gif| icdocset.gif| | 221| 13-Apr-21| 04:56 \nicdocx.gif| icdocx.gif| | 224| 13-Apr-21| 04:57 \nicdot.gif| icdot.gif| | 223| 13-Apr-21| 04:56 \nicdotm.gif| icdotm.gif| | 235| 13-Apr-21| 04:57 \nicdotx.gif| icdotx.gif| | 221| 13-Apr-21| 04:57 \nicgif.gif| icgif.gif| | 220| 13-Apr-21| 04:56 \nichtmdoc.gif| ichtmdoc.gif| | 229| 13-Apr-21| 04:56 \nichtmppt.gif| ichtmppt.gif| | 227| 13-Apr-21| 04:56 \nichtmpub.gif| ichtmpub.gif| | 227| 13-Apr-21| 04:56 \nichtmxls.gif| ichtmxls.gif| | 239| 13-Apr-21| 04:56 \nicinfopathgeneric.gif| icinfopathgeneric.gif| | 216| 13-Apr-21| 04:57 \nicjfif.gif| icjfif.gif| | 214| 13-Apr-21| 04:56 \nicjpe.gif| icjpe.gif| | 214| 13-Apr-21| 04:56 \nicjpeg.gif| icjpeg.gif| | 214| 13-Apr-21| 04:56 \nicjpg.gif| icjpg.gif| | 214| 13-Apr-21| 04:56 \nicmhtpub.gif| icmhtpub.gif| | 225| 13-Apr-21| 04:57 \nicmpd.gif| icmpd.gif| | 218| 13-Apr-21| 04:56 \nicmpp.gif| icmpp.gif| | 222| 13-Apr-21| 04:56 \nicmpt.gif| icmpt.gif| | 221| 13-Apr-21| 04:56 \nicodp.gif| icodp.gif| | 354| 13-Apr-21| 04:57 \nicods.gif| icods.gif| | 369| 13-Apr-21| 04:57 \nicodt.gif| icodt.gif| | 358| 13-Apr-21| 04:57 \nicone.gif| icone.gif| | 215| 13-Apr-21| 04:56 \niconp.gif| iconp.gif| | 223| 13-Apr-21| 04:57 \nicont.gif| icont.gif| | 216| 13-Apr-21| 04:57 \nicpng.gif| icpng.gif| | 349| 13-Apr-21| 04:56 \nicpot.gif| icpot.gif| | 164| 13-Apr-21| 04:56 \nicpotm.gif| icpotm.gif| | 233| 13-Apr-21| 04:57 \nicpotx.gif| icpotx.gif| | 220| 13-Apr-21| 04:57 \nicppt.gif| icppt.gif| | 168| 13-Apr-21| 04:56 \nicpptm.gif| icpptm.gif| | 236| 13-Apr-21| 04:57 \nicpptx.gif| icpptx.gif| | 222| 13-Apr-21| 04:57 \nicpub.gif| icpub.gif| | 221| 13-Apr-21| 04:56 \nictif.gif| ictif.gif| | 355| 13-Apr-21| 04:56 \nictiff.gif| ictiff.gif| | 355| 13-Apr-21| 04:56 \nicvdw.gif| icvdw.gif| | 219| 13-Apr-21| 04:56 \nicvdx.gif| icvdx.gif| | 231| 13-Apr-21| 04:56 \nicvidset.gif| icvidset.gif| | 92| 13-Apr-21| 04:56 \nicvisiogeneric.gif| icvisiogeneric.gif| | 231| 13-Apr-21| 04:57 \nicvsd.gif| icvsd.gif| | 231| 13-Apr-21| 04:56 \nicvsdm.gif| icvsdm.gif| | 231| 13-Apr-21| 04:56 \nicvsdx.gif| icvsdx.gif| | 231| 13-Apr-21| 04:56 \nicvsl.gif| icvsl.gif| | 211| 13-Apr-21| 04:56 \nicvss.gif| icvss.gif| | 163| 13-Apr-21| 04:56 \nicvssm.gif| icvssm.gif| | 163| 13-Apr-21| 04:56 \nicvssx.gif| icvssx.gif| | 163| 13-Apr-21| 04:56 \nicvst.gif| icvst.gif| | 228| 13-Apr-21| 04:56 \nicvstm.gif| icvstm.gif| | 228| 13-Apr-21| 04:56 \nicvstx.gif| icvstx.gif| | 228| 13-Apr-21| 04:56 \nicvsx.gif| icvsx.gif| | 163| 13-Apr-21| 04:56 \nicvtx.gif| icvtx.gif| | 228| 13-Apr-21| 04:56 \nicxddoc.gif| icxddoc.gif| | 220| 13-Apr-21| 04:56 \nicxls.gif| icxls.gif| | 236| 13-Apr-21| 04:56 \nicxlsb.gif| icxlsb.gif| | 237| 13-Apr-21| 04:57 \nicxlsm.gif| icxlsm.gif| | 352| 13-Apr-21| 04:57 \nicxlsx.gif| icxlsx.gif| | 236| 13-Apr-21| 04:57 \nicxlt.gif| icxlt.gif| | 229| 13-Apr-21| 04:56 \nicxltm.gif| icxltm.gif| | 352| 13-Apr-21| 04:57 \nicxltx.gif| icxltx.gif| | 231| 13-Apr-21| 04:57 \nicxsn.gif| icxsn.gif| | 214| 13-Apr-21| 04:57 \nlg_accdb.gif| lg_icaccdb.gif| | 471| 13-Apr-21| 04:57 \nlg_accdb.png| lg_icaccdb.png| | 1634| 13-Apr-21| 04:57 \nlg_accde.gif| lg_icaccde.gif| | 479| 13-Apr-21| 04:57 \nlg_bmp.gif| lg_icbmp.gif| | 604| 13-Apr-21| 04:57 \nlg_gif.gif| lg_icgif.gif| | 501| 13-Apr-21| 04:57 \nlg_htdoc.gif| lg_ichtmdoc.gif| | 510| 13-Apr-21| 04:57 \nlg_htppt.gif| lg_ichtmppt.gif| | 484| 13-Apr-21| 04:57 \nlg_htpub.gif| lg_ichtmpub.gif| | 482| 13-Apr-21| 04:57 \nlg_htxls.gif| lg_ichtmxls.gif| | 504| 13-Apr-21| 04:57 \nlg_jfif.gif| lg_icjfif.gif| | 433| 13-Apr-21| 04:57 \nlg_jpe.gif| lg_icjpe.gif| | 433| 13-Apr-21| 04:57 \nlg_jpeg.gif| lg_icjpeg.gif| | 433| 13-Apr-21| 04:57 \nlg_jpg.gif| lg_icjpg.gif| | 433| 13-Apr-21| 04:57 \nlg_mpd.gif| lg_icmpd.gif| | 355| 13-Apr-21| 04:57 \nlg_mpp.gif| lg_icmpp.gif| | 363| 13-Apr-21| 04:57 \nlg_mpt.gif| lg_icmpt.gif| | 356| 13-Apr-21| 04:57 \nlg_png.gif| lg_icpng.gif| | 600| 13-Apr-21| 04:57 \nlg_pub.gif| lg_icpub.gif| | 462| 13-Apr-21| 04:57 \nlg_rtf.gif| lg_icrtf.gif| | 481| 13-Apr-21| 04:57 \nlg_tif.gif| lg_ictif.gif| | 604| 13-Apr-21| 04:57 \nlg_tiff.gif| lg_ictiff.gif| | 604| 13-Apr-21| 04:57 \nlg_vdx.gif| lg_icvdx.gif| | 540| 13-Apr-21| 04:57 \nlg_vsd.gif| lg_icvsd.gif| | 540| 13-Apr-21| 04:57 \nlg_vsl.gif| lg_icvsl.gif| | 482| 13-Apr-21| 04:57 \nlg_vss.gif| lg_icvss.gif| | 468| 13-Apr-21| 04:57 \nlg_vst.gif| lg_icvst.gif| | 502| 13-Apr-21| 04:57 \nlg_vstx.gif| lg_icvstx.gif| | 502| 13-Apr-21| 04:57 \nlg_vsx.gif| lg_icvsx.gif| | 468| 13-Apr-21| 04:57 \nlg_vtx.gif| lg_icvtx.gif| | 502| 13-Apr-21| 04:57 \nlg_xddo.gif| lg_icxddoc.gif| | 337| 13-Apr-21| 04:57 \nlg_xsn.gif| lg_icxsn.gif| | 323| 13-Apr-21| 04:57 \nopenfold.gif| openfold.gif| | 142| 13-Apr-21| 04:57 \nituser.gif| ituser.gif| | 1595| 15-Apr-21| 08:19 \nblueprintmtpro.eot| blueprintmtpro.eot| | 24734| 13-Apr-21| 04:57 \nblueprintmtpro.svg| blueprintmtpro.svg| | 105256| 13-Apr-21| 04:57 \nblueprintmtpro.ttf| blueprintmtpro.ttf| | 49468| 13-Apr-21| 04:57 \nblueprintmtpro.woff| blueprintmtpro.woff| | 31724| 13-Apr-21| 04:57 \nblueprintmtprolarge.png| blueprintmtprolarge.png| | 1563| 13-Apr-21| 04:57 \nblueprintmtprosmall.png| blueprintmtprosmall.png| | 1326| 13-Apr-21| 04:57 \ncalibri.eot| calibri.eot| | 167788| 13-Apr-21| 04:57 \ncalibri.svg| calibri.svg| | 365292| 13-Apr-21| 04:57 \ncalibri.ttf| calibri.ttf| | 350124| 13-Apr-21| 04:57 \ncalibri.woff| calibri.woff| | 184156| 13-Apr-21| 04:57 \ncalibrilarge.png| calibrilarge.png| | 1318| 13-Apr-21| 04:57 \ncalibrismall.png| calibrismall.png| | 1170| 13-Apr-21| 04:57 \ncenturygothic.eot| centurygothic.eot| | 60600| 13-Apr-21| 04:57 \ncenturygothic.svg| centurygothic.svg| | 165961| 13-Apr-21| 04:57 \ncenturygothic.ttf| centurygothic.ttf| | 124584| 13-Apr-21| 04:57 \ncenturygothic.woff| centurygothic.woff| | 79732| 13-Apr-21| 04:57 \ncenturygothiclarge.png| centurygothiclarge.png| | 1589| 13-Apr-21| 04:57 \ncenturygothicsmall.png| centurygothicsmall.png| | 1351| 13-Apr-21| 04:57 \ncorbel.eot| corbel.eot| | 96453| 13-Apr-21| 04:57 \ncorbel.svg| corbel.svg| | 185947| 13-Apr-21| 04:57 \ncorbel.ttf| corbel.ttf| | 200316| 13-Apr-21| 04:57 \ncorbel.woff| corbel.woff| | 106184| 13-Apr-21| 04:57 \ncorbellarge.png| corbellarge.png| | 1351| 13-Apr-21| 04:57 \ncorbelsmall.png| corbelsmall.png| | 1171| 13-Apr-21| 04:57 \nimpact.eot| impact.eot| | 56550| 13-Apr-21| 04:57 \nimpact.svg| impact.svg| | 162607| 13-Apr-21| 04:57 \nimpact.ttf| impact.ttf| | 129012| 13-Apr-21| 04:57 \nimpact.woff| impact.woff| | 76992| 13-Apr-21| 04:57 \nimpactlarge.png| impactlarge.png| | 1304| 13-Apr-21| 04:57 \nimpactsmall.png| impactsmall.png| | 1150| 13-Apr-21| 04:57 \nshellicons.eot| shellicons.eot| | 47960| 15-Apr-21| 08:19 \nshellicons.svg| shellicons.svg| | 57730| 15-Apr-21| 08:19 \nshellicons.ttf| shellicons.ttf| | 47768| 15-Apr-21| 08:19 \nshellicons.woff| shellicons.woff| | 26452| 15-Apr-21| 08:19 \ntypewriterelite.eot| typewriterelite.eot| | 27328| 13-Apr-21| 04:57 \ntypewriterelite.svg| typewriterelite.svg| | 77944| 13-Apr-21| 04:57 \ntypewriterelite.ttf| typewriterelite.ttf| | 51708| 13-Apr-21| 04:57 \ntypewriterelite.woff| typewriterelite.woff| | 30976| 13-Apr-21| 04:57 \ntypewriterelitelarge.png| typewriterelitelarge.png| | 1548| 13-Apr-21| 04:57 \ntypewriterelitesmall.png| typewriterelitesmall.png| | 1296| 13-Apr-21| 04:57 \nhelp.xml| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1025| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1026| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1029| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1030| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1032| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1033| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1035| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1037| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1038| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1043| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1044| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1045| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1048| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1050| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1051| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1053| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1054| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1055| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1057| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1058| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1060| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1061| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1062| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1063| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1066| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1081| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1086| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_1087| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_2070| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nwsshelp.xml_2074| microsoft.sharepoint.powershell.dll-help.xml| | 3657496| 15-Apr-21| 08:19 \nicvsdm.gif_14| icvsdm.gif| | 1290| 15-Apr-21| 08:19 \nicvsdx.gif_14| icvsdx.gif| | 1288| 15-Apr-21| 08:19 \nlg_icvsdm.gif_14| lg_icvsdm.gif| | 577| 15-Apr-21| 08:19 \nlg_icvsdx.gif_14| lg_icvsdx.gif| | 540| 15-Apr-21| 08:19 \npickerhierarchycontrol.js_14| pickerhierarchycontrol.js| | 126114| 15-Apr-21| 08:19 \nfldswss3.xml_14| fieldswss3.xml| | 50728| 15-Apr-21| 08:19 \ndispform.aspx_piclib_14| dispform.aspx| | 14311| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.silverlight.dll_14| microsoft.sharepoint.client.silverlight.dll| 14.0.7006.1000| 273016| 15-Apr-21| 08:19 \nmicrosoft.sharepoint.client.silverlight.runtime.dll_14| microsoft.sharepoint.client.silverlight.runtime.dll| 14.0.7007.1000| 146040| 15-Apr-21| 08:19 \nblog.xsl_14| blog.xsl| | 40342| 15-Apr-21| 08:19 \nviewcategory.asp_blog_categories_14| viewcategory.aspx| | 13786| 15-Apr-21| 08:19 \nschema.xml_blog_comments_14| schema.xml| | 39634| 15-Apr-21| 08:19 \nviewcomment.asp_blog_comments_14| viewcomment.aspx| | 13786| 15-Apr-21| 08:19 \nviewpost.asp_blog_posts_14| viewpost.aspx| | 13786| 15-Apr-21| 08:19 \ndmslstdispform_aspx_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndepl.xsd_14| deploymentmanifest.xsd| | 74297| 15-Apr-21| 08:19 \ndocicon.xml_14| docicon.xml| | 14475| 15-Apr-21| 08:19 \nfldtypes.xsl_14| fldtypes.xsl| | 128231| 15-Apr-21| 08:19 \ndatepicker.debug.js_14| datepicker.debug.js| | 30848| 15-Apr-21| 08:19 \ndatepick.js_14| datepicker.js| | 20413| 15-Apr-21| 08:19 \nentityeditor.debug.js_14| entityeditor.debug.js| | 59260| 15-Apr-21| 08:19 \nentityeditor.js_14| entityeditor.js| | 38002| 15-Apr-21| 08:19 \ninplview.debug.js_14| inplview.debug.js| | 57512| 15-Apr-21| 08:19 \ninplview.js_14| inplview.js| | 39415| 15-Apr-21| 08:19 \njsgrid.debug.js_14| jsgrid.debug.js| | 785068| 15-Apr-21| 08:19 \njsgrid.js_14| jsgrid.js| | 400019| 15-Apr-21| 08:19 \nsp.debug.js_14| sp.debug.js| | 575930| 15-Apr-21| 08:19 \nsp.js_14| sp.js| | 390757| 15-Apr-21| 08:19 \nsp.ribbon.debug.js_14| sp.ribbon.debug.js| | 325227| 15-Apr-21| 08:19 \nsp.runtime.debug.js_14| sp.runtime.debug.js| | 110347| 15-Apr-21| 08:19 \nsp.runtime.js_14| sp.runtime.js| | 68791| 15-Apr-21| 08:19 \nsp.ui.rte.debug.js_14| sp.ui.rte.debug.js| | 594574| 15-Apr-21| 08:19 \nsp.ui.rte.js_14| sp.ui.rte.js| | 365926| 15-Apr-21| 08:19 \nspgantt.debug.js_14| spgantt.debug.js| | 39173| 15-Apr-21| 08:19 \nspgantt.js_14| spgantt.js| | 19338| 15-Apr-21| 08:19 \ndispform.asx_0071_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0083_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0082_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0072_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0038_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndispform.asx_0084_14| dispform.aspx| | 13786| 15-Apr-21| 08:19 \ndefformt.asc_14| defaulttemplates.ascx| | 170271| 15-Apr-21| 08:19 \nactredir.asx_14| actionredirect.aspx| | 896| 15-Apr-21| 08:19 \naggsetngs.asx_14| aggregationsettings.aspx| | 8163| 15-Apr-21| 08:19 \nctmark.asx_14| calltrackmark.aspx| | 211| 15-Apr-21| 08:19 \nclcnfm.asx_14| circulationconfirm.aspx| | 216| 15-Apr-21| 08:19 \ncreate.asx_14| create.aspx| | 33257| 15-Apr-21| 08:19 \ndeacfeat.asx_14| deactivatefeature.aspx| | 4240| 15-Apr-21| 08:19 \ndeletemu.asx_14| deletemu.aspx| | 188| 15-Apr-21| 08:19 \nfilter.asx_14| filter.aspx| | 1793| 15-Apr-21| 08:19 \ngbredir.asx_14| groupboardredirect.aspx| | 216| 15-Apr-21| 08:19 \niframe.asx_14| iframe.aspx| | 1494| 15-Apr-21| 08:19 \nlistedit.asx_14| listedit.aspx| | 46078| 15-Apr-21| 08:19 \nmngct.asx_14| managecontenttype.aspx| | 10409| 15-Apr-21| 08:19 \nmngfeat.asx_14| managefeatures.aspx| | 4911| 15-Apr-21| 08:19 \nmngsubwb.asx_14| mngsubwebs.aspx| | 12291| 15-Apr-21| 08:19 \ndefault.asx_mobile_14| default.aspx| | 1513| 15-Apr-21| 08:19 \nmbllogin.asx_mobile_14| mbllogin.aspx| | 5337| 15-Apr-21| 08:19 \nmblwiki.asx_mobile_14| mblwiki.aspx| | 3598| 15-Apr-21| 08:19 \nmblwp.asx_mobile_14| mblwp.aspx| | 3603| 15-Apr-21| 08:19 \npickerdialog.mas_14| pickerdialog.master| | 8739| 15-Apr-21| 08:19 \nrtedlg.mas_14| rtedialog.master| | 3153| 15-Apr-21| 08:19 \npicker.asx_14| picker.aspx| | 8613| 15-Apr-21| 08:19 \npckrrst.asx_14| pickerresult.aspx| | 3| 15-Apr-21| 08:19 \nprjsetng.asx_14| prjsetng.aspx| | 16037| 15-Apr-21| 08:19 \nreqfeat.asx_14| reqfeatures.aspx| | 3750| 15-Apr-21| 08:19 \nsrchrslt.asx_14| searchresults.aspx| | 6013| 15-Apr-21| 08:19 \nsettings.asx_14| settings.aspx| | 9565| 15-Apr-21| 08:19 \nsetwa.asx_14| setwhereabouts.aspx| | 212| 15-Apr-21| 08:19 \nsurvedit.asx_14| survedit.aspx| | 36103| 15-Apr-21| 08:19 \nvwgrpprm.asx_14| viewgrouppermissions.aspx| | 5046| 15-Apr-21| 08:19 \nviewlsts.asx_14| viewlsts.aspx| | 16520| 15-Apr-21| 08:19 \nvwstyles.xsl_14| vwstyles.xsl| | 121144| 15-Apr-21| 08:19 \ncui.debug.js| cui.debug.js| | 646903| 15-Apr-21| 08:19 \ncui.js| cui.js| | 362624| 15-Apr-21| 08:19 \nmicrosoft.web.commandui.dll| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-21| 10:13 \nmicrosoft.web.commandui.dll_0001| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-21| 10:13 \nxlsrv.commandui.dll| microsoft.web.commandui.dll| 15.0.5085.1000| 134976| 16-Apr-21| 10:13 \n \n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Foundation 2013: May 11, 2021 (KB5001935)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-05-11T07:00:00", "id": "KB5001935", "href": "https://support.microsoft.com/en-us/help/5001935", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-05-19T10:46:25", "description": "None\n## Summary\n\nThis security update resolves a Microsoft Word remote code execution vulnerability and SharePoint Denial of Service Update. To learn more about the vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-26418](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-26418>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28474](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28474>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-28478](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-28478>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31171](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31171>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31172](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31172>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31173](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31173>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31181](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31181>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft SharePoint Enterprise Server 2016 installed on the computer.\n\nThis public update delivers Feature Pack 2 for SharePoint Server 2016. Feature Pack 2 contains the following feature:\n\n * SharePoint Framework (SPFx)\nThis public update also delivers all the features that were included in Feature Pack 1 for SharePoint Server 2016, including:\n * Administrative Actions Logging\n * MinRole enhancements\n * SharePoint Custom Tiles\n * Hybrid Taxonomy\n * OneDrive API for SharePoint on-premises\n * OneDrive for Business modern user experience (available to Software Assurance customers)\nThe OneDrive for Business modern user experience requires an active Software Assurance contract at the time that the experience is enabled, either by installation of the public update or by manual enablement. If you don't have an active Software Assurance contract at the time of enablement, you must turn off the OneDrive for Business modern user experience.For more information, see the following Microsoft Docs articles:\n * [New features included in the November 2016 Public Update for SharePoint Server 2016 (Feature Pack 1)](<https://go.microsoft.com/fwlink/?linkid=832679>)\n * [New features included in the September 2017 Public Update for SharePoint Server 2016 (Feature Pack 2)](<https://go.microsoft.com/fwlink/?linkid=856819>)\n\n## Improvements and fixes\n\nThis update contains a fix for the following nonsecurity issue in SharePoint Server 2016:\n\n * Fixes an issue in which SharePoint Designer doesn't work well on the site that disables the Wiki Home Page feature.\nThis update also contains a fix for the following nonsecurity issue in Project Server 2016:\n * The **Export to Excel** function doesn't work for the **Capacity and Engagements Heatmap** view on the Capacity Planning page.\n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001917>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001917 for the 64-bit version of SharePoint Enterprise Server 2016](<http://www.microsoft.com/download/details.aspx?familyid=650bb002-b472-4d9b-b36e-d960150b2ab7>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504719](<https://support.microsoft.com/kb/4504719>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nsts2016-kb5001917-fullfile-x64-glb.exe| | 0E3C0BC8BC8614C86DAB613B6FF4BCD415F6D5195750CFE2BED27239C1CD2FD7 \n \n### File information\n\nDownload [the list of files that are included in security update 5001917](<https://download.microsoft.com/download/7/9/b/79b19775-9b49-463f-b6d3-dee969985e4b/5001917.csv>).\n\n## Information about protection and security\n\nProtect yourself online: [Windows Security support](<https://support.microsoft.com/hub/4099151>)Learn how we guard against cyber threats: [Microsoft Security](<https://www.microsoft.com/security>)\n", "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "baseScore": 8.8, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1", "userInteraction": "NONE"}, "impactScore": 5.9}, "published": "2021-05-11T07:00:00", "type": "mskb", "title": "Description of the security update for SharePoint Enterprise Server 2016: May 11, 2021 (KB5001917)", "bulletinFamily": "microsoft", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.5, "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 6.4, "acInsufInfo": false, "obtainUserPrivilege": false}, "cvelist": ["CVE-2021-26418", "CVE-2021-28474", "CVE-2021-28478", "CVE-2021-31171", "CVE-2021-31172", "CVE-2021-31173", "CVE-2021-31181"], "modified": "2021-05-11T07:00:00", "id": "KB5001917", "href": "https://support.microsoft.com/en-us/help/5001917", "cvss": {"score": 6.5, "vector": "AV:N/AC:L/Au:S/C:P/I:P/A:P"}}, {"lastseen": "2023-05-19T10:46:26", "description": "None\n## Summary\n\nThis security update resolves a Microsoft Excel remote code execution vulnerability, Office information disclosure vulnerability. To learn more about the vulnerabilities, see the following security advisories:\n\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31174](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31174>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31175](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31175>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31177](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31177>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31178](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31178>)\n * [Microsoft Common Vulnerabilities and Exposures CVE-2021-31179](<https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-31179>)\n\n**Note: **To apply this security update, you must have the release version of Microsoft Office 2016 installed on the computer.\n\nBe aware that the update in the Microsoft Download Center applies to the Microsoft Installer (.msi)-based edition of Office 2016. It doesn't apply to the Office 2016 Click-to-Run editions, such as Microsoft Office 365 Home (see [What version of Office am I using?](<https://support.office.com/article/About-Office-What-version-of-Office-am-I-using-932788B8-A3CE-44BF-BB09-E334518B8B19>)). \n\n## How to get and install the update\n\n### Method 1: Microsoft Update\n\nThis update is available from Microsoft Update. When you turn on automatic updating, this update will be downloaded and installed automatically. For more information about how to get security updates automatically, see [Windows Update: FAQ](<https://support.microsoft.com/help/12373/windows-update-faq>).\n\n### Method 2: Microsoft Update Catalog\n\nTo get the standalone package for this update, go to the [Microsoft Update Catalog](<http://www.catalog.update.microsoft.com/Search.aspx?q=KB5001918>) website.\n\n### Method 3: Microsoft Download Center\n\nYou can get the standalone update package through the Microsoft Download Center. Follow the installation instructions on the download page to install the update.\n\n * [Download security update 5001918 for the 32-bit version of Excel 2016](<http://www.microsoft.com/download/details.aspx?familyid=8a39e8f6-771d-4775-9342-0bfdf4625414>)\n * [Download security update 5001918 for the 64-bit version of Excel 2016](<http://www.microsoft.com/download/details.aspx?familyid=369c4470-f556-4a78-810c-3f54f0f74f18>)\n\n## More information\n\n### Security update deployment information\n\nFor deployment information about this update, see Security update deployment information: May 11, 2021.\n\n### Security update replacement information\n\nThis security update replaces previously released security update [4504721](<https://support.microsoft.com/kb/4504721>).\n\n### File hash information\n\nFile name| | SHA256 hash \n---|---|--- \nexcel2016-kb5001918-fullfile-x86-glb.exe| | C9E92AC96C80C7B522AE2833C2030229277ABDA02465738ACD472F14BF0C69AD \nexcel2016-kb5001918-fullfile-x64-glb.exe| | F6679ECA020C6899A090D276301F678C949FDD09E8C108897DB7B7E0E1E43C43 \n \n### File information\n\nThe English (United States) version of this software update installs files that have the attributes that are listed in the following table. The dates and times for these files are listed in Coordinated Universal Time (UTC). The dates and times for these files on your local computer are displayed in your local time together with your current daylight saving time (DST) bias. Additionally, the dates and times may change when you perform certain operations on the files.\n\n#### \n\n__\n\nFor all supported x86-based versions of Excel 2016\n\nFile identifier| File name| File version| File size| Date| Time \n---|---|---|---|---|--- \nxlintl32.dll_1025| xlintl32.dll| 16.0.5149.1000| 17106744| 15-Apr-21| 03:11 \nxlintl32.dll_1026| xlintl32.dll| 16.0.5149.1000| 17151280| 15-Apr-21| 03:11 \nxlintl32.dll_1029| xlintl32.dll| 16.0.5149.1000| 17184624| 15-Apr-21| 03:11 \nxlintl32.dll_1030| xlintl32.dll| 16.0.5149.1000| 17086808| 15-Apr-21| 03:11 \nxllex.dll_1030| xllex.dll| 16.0.4684.1000| 46312| 15-Apr-21| 03:11 \nxlintl32.dll_1031| xlintl32.dll| 16.0.5149.1000| 17225568| 15-Apr-21| 03:11 \nxlintl32.dll_1032| xlintl32.dll| 16.0.5149.1000| 17257280| 15-Apr-21| 03:11 \nxlintl32.dll_3082| xlintl32.dll| 16.0.5149.1000| 17136008| 15-Apr-21| 03:11 \nxlintl32.dll_1061| xlintl32.dll| 16.0.5149.1000| 17074024| 15-Apr-21| 03:11 \nxlintl32.dll_1035| xlintl32.dll| 16.0.5149.1000| 17084744| 15-Apr-21| 03:11 \nxlintl32.dll_1036| xlintl32.dll| 16.0.5149.1000| 17207160| 15-Apr-21| 03:11 \nxlintl32.dll_1037| xlintl32.dll| 16.0.5149.1000| 17041720| 15-Apr-21| 03:11 \nxlintl32.dll_1081| xlintl32.dll| 16.0.5149.1000| 17189184| 15-Apr-21| 03:11 \nxlintl32.dll_1050| xlintl32.dll| 16.0.5149.1000| 17111448| 15-Apr-21| 03:11 \nxlintl32.dll_1038| xlintl32.dll| 16.0.5149.1000| 17196368| 15-Apr-21| 03:11 \nxlintl32.dll_1057| xlintl32.dll| 16.0.5149.1000| 17079144| 15-Apr-21| 03:11 \nxlintl32.dll_1040| xlintl32.dll| 16.0.5149.1000| 17122168| 15-Apr-21| 03:11 \nxlintl32.dll_1041| xlintl32.dll| 16.0.5149.1000| 17139544| 15-Apr-21| 03:11 \nxlintl32.dll_1087| xlintl32.dll| 16.0.5149.1000| 17207600| 15-Apr-21| 03:11 \nxlintl32.dll_1042| xlintl32.dll| 16.0.5149.1000| 17123128| 15-Apr-21| 03:11 \nxlintl32.dll_1063| xlintl32.dll| 16.0.5149.1000| 17156480| 15-Apr-21| 03:11 \nxlintl32.dll_1062| xlintl32.dll| 16.0.5149.1000| 17131384| 15-Apr-21| 03:11 \nxlintl32.dll_1086| xlintl32.dll| 16.0.5149.1000| 17083760| 15-Apr-21| 03:11 \nxlintl32.dll_1044| xlintl32.dll| 16.0.5149.1000| 17071464| 15-Apr-21| 03:11 \nxlintl32.dll_1043| xlintl32.dll| 16.0.5149.1000| 17130864| 15-Apr-21| 03:11 \nxlintl32.dll_1045| xlintl32.dll| 16.0.5149.1000| 17202056| 15-Apr-21| 03:12 \nxlintl32.dll_1046| xlintl32.dll| 16.0.5149.1000| 17150328| 15-Apr-21| 03:12 \nxlintl32.dll_2070| xlintl32.dll| 16.0.5149.1000| 17151872| 15-Apr-21| 03:12 \nxlintl32.dll_1048| xlintl32.dll| 16.0.5149.1000| 17207672| 15-Apr-21| 03:12 \nxlintl32.dll_1049| xlintl32.dll| 16.0.5149.1000| 17142576| 15-Apr-21| 03:12 \nxlintl32.dll_1051| xlintl32.dll| 16.0.5149.1000| 17196912| 15-Apr-21| 03:12 \nxlintl32.dll_1060| xlintl32.dll| 16.0.5149.1000| 17120648| 15-Apr-21| 03:12 \nxlintl32.dll_2074| xlintl32.dll| 16.0.5149.1000| 17134984| 15-Apr-21| 03:12 \nxlintl32.dll_9242| xlintl32.dll| 16.0.5149.1000| 17134480| 15-Apr-21| 03:12 \nxlintl32.dll_1053| xlintl32.dll| 16.0.5149.1000| 17077616| 15-Apr-21| 03:12 \nxlintl32.dll_1054| xlintl32.dll| 16.0.5149.1000| 17144608| 15-Apr-21| 03:12 \nxlintl32.dll_1055| xlintl32.dll| 16.0.5149.1000| 17183624| 15-Apr-21| 03:12 \nxlintl32.dll_1058| xlintl32.dll| 16.0.5149.1000| 17147208| 15-Apr-21| 03:12 \nxlintl32.dll_1066| xlintl32.dll| 16.0.5149.1000| 17198936| 15-Apr-21| 03:12 \nxlintl32.dll_2052| xlintl32.dll| 16.0.5149.1000| 16975680| 15-Apr-21| 03:12 \nxlintl32.dll_1028| xlintl32.dll| 16.0.5149.1000| 16989488| 15-Apr-21| 03:12 \natpvbada.xlam_1030| atpvbada.xlam| | 54808| 15-Apr-21| 03:11 \natpvbade.xlam_1031| atpvbade.xlam| | 54814| 15-Apr-21| 03:11 \natpvbaes.xlam_3082| atpvbaes.xlam| | 54796| 15-Apr-21| 03:11 \natpvbafi.xlam_1035| atpvbafi.xlam| | 54821| 15-Apr-21| 03:11 \natpvbafr.xlam_1036| atpvbafr.xlam| | 54867| 15-Apr-21| 03:11 \natpvbait.xlam_1040| atpvbait.xlam| | 54845| 15-Apr-21| 03:11 \natpvbajp.xlam_1041| atpvbajp.xlam| | 54939| 15-Apr-21| 03:11 \natpvbako.xlam_1042| atpvbako.xlam| | 54843| 15-Apr-21| 03:11 \natpvbano.xlam_1044| atpvbano.xlam| | 54823| 15-Apr-21| 03:11 \natpvbanl.xlam_1043| atpvbanl.xlam| | 54791| 15-Apr-21| 03:11 \natpvbapb.xlam_1046| atpvbapb.xlam| | 54805| 15-Apr-21| 03:12 \natpvbptg.xlam_2070| atpvbptg.xlam| | 54748| 15-Apr-21| 03:12 \natpvbasv.xlam_1053| atpvbasv.xlam| | 54857| 15-Apr-21| 03:12 \natpvbacs.xlam_2052| atpvbacs.xlam| | 54805| 15-Apr-21| 03:12 \natpvbatc.xlam_1028| atpvbatc.xlam| | 54851| 15-Apr-21| 03:12 \nclient.models.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.models.dll| | 142816| 14-Apr-21| 10:06 \nclient.windows.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.windows.dll| | 0| 14-Apr-21| 10:06 \ncontainer35.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.exe| | 27376| 14-Apr-21| 10:06 \ncontainer35.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.exe.config| | 137| 14-Apr-21| 10:06 \ncontainer40.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx40.exe| | 27384| 14-Apr-21| 10:06 \ncontainer40.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx40.exe.config| | 137| 14-Apr-21| 10:06 \ncontainer45.exe.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx45.exe| | 28800| 14-Apr-21| 10:06 \ncontainer45.exe.config.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.container.netfx45.exe.config| | 137| 14-Apr-21| 10:06 \ndocument.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 224928| 14-Apr-21| 10:06 \ndocument.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 275496| 14-Apr-21| 10:06 \ndocument.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 271400| 14-Apr-21| 10:06 \ndocument.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 14-Apr-21| 10:06 \ndocument.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 241312| 14-Apr-21| 10:06 \ndocument.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279632| 14-Apr-21| 10:06 \ndocument.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 287824| 14-Apr-21| 10:06 \ndocument.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 14-Apr-21| 10:06 \ndocument.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 339608| 14-Apr-21| 10:06 \ndocument.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229016| 14-Apr-21| 10:06 \ndocument.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234608| 14-Apr-21| 10:06 \ndocument.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229024| 14-Apr-21| 10:06 \ndocument.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229016| 14-Apr-21| 10:06 \ndocument.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238680| 14-Apr-21| 10:06 \ndocument.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.dll| | 2663464| 14-Apr-21| 10:06 \ndocument.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 304208| 14-Apr-21| 10:06 \ndocument.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226392| 14-Apr-21| 10:06 \ndocument.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 261792| 14-Apr-21| 10:06 \ndocument.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238664| 14-Apr-21| 10:06 \ndocument.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 241304| 14-Apr-21| 10:06 \ndocument.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 14-Apr-21| 10:06 \ndocument.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 246824| 14-Apr-21| 10:06 \ndocument.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 324688| 14-Apr-21| 10:06 \ndocument.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 257688| 14-Apr-21| 10:06 \ndocument.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 323232| 14-Apr-21| 10:06 \ndocument.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 231904| 14-Apr-21| 10:06 \ndocument.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 14-Apr-21| 10:06 \ndocument.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 287784| 14-Apr-21| 10:06 \ndocument.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226416| 14-Apr-21| 10:06 \ndocument.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 255056| 14-Apr-21| 10:06 \ndocument.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 347800| 14-Apr-21| 10:06 \ndocument.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 14-Apr-21| 10:06 \ndocument.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 332880| 14-Apr-21| 10:06 \ndocument.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 341064| 14-Apr-21| 10:06 \ndocument.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 14-Apr-21| 10:06 \ndocument.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 328784| 14-Apr-21| 10:06 \ndocument.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 285152| 14-Apr-21| 10:06 \ndocument.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 237216| 14-Apr-21| 10:06 \ndocument.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233120| 14-Apr-21| 10:06 \ndocument.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234576| 14-Apr-21| 10:06 \ndocument.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233112| 14-Apr-21| 10:06 \ndocument.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 291920| 14-Apr-21| 10:06 \ndocument.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 365648| 14-Apr-21| 10:06 \ndocument.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 283688| 14-Apr-21| 10:06 \ndocument.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 324648| 14-Apr-21| 10:06 \ndocument.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 227808| 14-Apr-21| 10:06 \ndocument.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226344| 14-Apr-21| 10:06 \ndocument.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 339616| 14-Apr-21| 10:06 \ndocument.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 233120| 14-Apr-21| 10:06 \ndocument.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 226344| 14-Apr-21| 10:06 \ndocument.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 349256| 14-Apr-21| 10:06 \ndocument.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 320552| 14-Apr-21| 10:06 \ndocument.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238672| 14-Apr-21| 10:06 \ndocument.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 265880| 14-Apr-21| 10:06 \ndocument.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234568| 14-Apr-21| 10:06 \ndocument.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234576| 14-Apr-21| 10:06 \ndocument.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 236000| 14-Apr-21| 10:06 \ndocument.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 286368| 14-Apr-21| 10:06 \ndocument.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 261784| 14-Apr-21| 10:06 \ndocument.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 322016| 14-Apr-21| 10:06 \ndocument.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 234536| 14-Apr-21| 10:06 \ndocument.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 14-Apr-21| 10:06 \ndocument.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 14-Apr-21| 10:06 \ndocument.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 281056| 14-Apr-21| 10:06 \ndocument.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 231904| 14-Apr-21| 10:06 \ndocument.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230440| 14-Apr-21| 10:06 \ndocument.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 229024| 14-Apr-21| 10:06 \ndocument.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 361512| 14-Apr-21| 10:06 \ndocument.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 341032| 14-Apr-21| 10:06 \ndocument.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 326112| 14-Apr-21| 10:06 \ndocument.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 230480| 14-Apr-21| 10:06 \ndocument.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279632| 14-Apr-21| 10:06 \ndocument.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 279592| 14-Apr-21| 10:06 \ndocument.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 283728| 14-Apr-21| 10:06 \ndocument.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 271440| 14-Apr-21| 10:06 \nexptoows.xla.1029| exptoows.xla| | 98304| 14-Apr-21| 10:09 \ndocument.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 238632| 14-Apr-21| 10:06 \ndocument.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 250920| 14-Apr-21| 10:06 \ndocument.xmlserializers.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.xmlserializers.dll| | 1007256| 14-Apr-21| 10:06 \ndocument.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 216728| 14-Apr-21| 10:06 \ndocument.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.document.resources.dll| | 222248| 14-Apr-21| 10:06 \ndocumentformat.openxml.dll.07275332_82e4_4820_9fdd_2423cd8daa85| documentformat.openxml.dll| | 0| 14-Apr-21| 10:06 \ndocumentservices.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52936| 14-Apr-21| 10:06 \ndocumentservices.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52904| 14-Apr-21| 10:06 \ndocumentservices.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62504| 14-Apr-21| 10:06 \ndocumentservices.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57016| 14-Apr-21| 10:06 \ndocumentservices.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56992| 14-Apr-21| 10:06 \ndocumentservices.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54360| 14-Apr-21| 10:06 \ndocumentservices.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.dll| | 409128| 14-Apr-21| 10:06 \ndocumentservices.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62544| 14-Apr-21| 10:06 \ndocumentservices.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 14-Apr-21| 10:06 \ndocumentservices.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61128| 14-Apr-21| 10:06 \ndocumentservices.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58408| 14-Apr-21| 10:06 \ndocumentservices.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61088| 14-Apr-21| 10:06 \ndocumentservices.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62504| 14-Apr-21| 10:06 \ndocumentservices.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62544| 14-Apr-21| 10:06 \ndocumentservices.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58440| 14-Apr-21| 10:06 \ndocumentservices.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61080| 14-Apr-21| 10:06 \ndocumentservices.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54312| 14-Apr-21| 10:06 \ndocumentservices.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56984| 14-Apr-21| 10:06 \ndocumentservices.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 14-Apr-21| 10:06 \ndocumentservices.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \ndocumentservices.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 56984| 14-Apr-21| 10:06 \ndocumentservices.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 59872| 14-Apr-21| 10:06 \ndocumentservices.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52888| 14-Apr-21| 10:06 \ndocumentservices.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 62552| 14-Apr-21| 10:06 \ndocumentservices.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61104| 14-Apr-21| 10:06 \ndocumentservices.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 61080| 14-Apr-21| 10:06 \ndocumentservices.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52936| 14-Apr-21| 10:06 \ndocumentservices.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 57008| 14-Apr-21| 10:06 \ndocumentservices.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 58408| 14-Apr-21| 10:06 \ndocumentservices.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52912| 14-Apr-21| 10:06 \ndocumentservices.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 55776| 14-Apr-21| 10:06 \ndocumentservices.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 54352| 14-Apr-21| 10:06 \ndocumentservices.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.documentservices.resources.dll| | 52896| 14-Apr-21| 10:06 \neventsource.dll.07275332_82e4_4820_9fdd_2423cd8daa85| eventsource.dll| | 0| 14-Apr-21| 10:06 \nexcel.af_za.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.am_et.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 82984| 14-Apr-21| 10:06 \nexcel.as_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 104928| 14-Apr-21| 10:06 \nexcel.az_latn_az.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 80352| 14-Apr-21| 10:06 \nexcel.be_by.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 14-Apr-21| 10:06 \nexcel.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 92640| 14-Apr-21| 10:06 \nexcel.bn_bd.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 109024| 14-Apr-21| 10:06 \nexcel.bn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 106144| 14-Apr-21| 10:06 \nexcel.bs_latn_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.ca_es_valencia.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.cy_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 14-Apr-21| 10:06 \nexcel.editorribbon.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.editorribbon.dll| | 42672| 14-Apr-21| 10:06 \nexcel.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 95320| 14-Apr-21| 10:06 \nexcel.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.extensions.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.extensions.dll| | 288416| 14-Apr-21| 10:06 \nexcel.fa_ir.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 81568| 14-Apr-21| 10:06 \nexcel.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.fil_ph.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78936| 14-Apr-21| 10:06 \nexcel.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 14-Apr-21| 10:06 \nexcel.ga_ie.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.gd_gb.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 14-Apr-21| 10:06 \nexcel.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 76256| 14-Apr-21| 10:06 \nexcel.gu_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 105704| 14-Apr-21| 10:06 \nexcel.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102048| 14-Apr-21| 10:06 \nexcel.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.hy_am.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91176| 14-Apr-21| 10:06 \nexcel.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.is_is.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 82984| 14-Apr-21| 10:06 \nexcel.ka_ge.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 106144| 14-Apr-21| 10:06 \nexcel.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 14-Apr-21| 10:06 \nexcel.km_kh.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103504| 14-Apr-21| 10:06 \nexcel.kn_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 107608| 14-Apr-21| 10:06 \nexcel.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78888| 14-Apr-21| 10:06 \nexcel.kok_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.ky_kg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 14-Apr-21| 10:06 \nexcel.lb_lu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78928| 14-Apr-21| 10:06 \nexcel.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.mi_nz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.mk_mk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 89760| 14-Apr-21| 10:06 \nexcel.ml_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 117216| 14-Apr-21| 10:06 \nexcel.mn_mn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91216| 14-Apr-21| 10:06 \nexcel.mr_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74840| 14-Apr-21| 10:06 \nexcel.mt_mt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74840| 14-Apr-21| 10:06 \nexcel.ne_np.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102040| 14-Apr-21| 10:06 \nexcel.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.nn_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.or_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 107600| 14-Apr-21| 10:06 \nexcel.pa_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 102048| 14-Apr-21| 10:06 \nexcel.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77464| 14-Apr-21| 10:06 \nexcel.prs_af.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 14-Apr-21| 10:06 \nexcel.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 14-Apr-21| 10:06 \nexcel.quz_pe.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 78928| 14-Apr-21| 10:06 \nexcel.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77496| 14-Apr-21| 10:06 \nexcel.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.sd_arab_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85656| 14-Apr-21| 10:06 \nexcel.si_lk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 99408| 14-Apr-21| 10:06 \nexcel.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.sq_al.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 77472| 14-Apr-21| 10:06 \nexcel.sr_cyrl_ba.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 89760| 14-Apr-21| 10:06 \nexcel.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 91176| 14-Apr-21| 10:06 \nexcel.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74832| 14-Apr-21| 10:06 \nexcel.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 74792| 14-Apr-21| 10:06 \nexcel.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.sw_ke.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.ta_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 111656| 14-Apr-21| 10:06 \nexcel.te_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 103464| 14-Apr-21| 10:06 \nexcel.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 97952| 14-Apr-21| 10:06 \nexcel.themes.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.themes.dll| | 67407000| 14-Apr-21| 10:06 \nexcel.tk_tm.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73368| 14-Apr-21| 10:06 \nexcel.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 73376| 14-Apr-21| 10:06 \nexcel.tt_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.ug_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87128| 14-Apr-21| 10:06 \nexcel.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 87080| 14-Apr-21| 10:06 \nexcel.ur_pk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 85664| 14-Apr-21| 10:06 \nexcel.uz_latn_uz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 76256| 14-Apr-21| 10:06 \nexcel.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 84448| 14-Apr-21| 10:06 \nexcel.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 70736| 14-Apr-21| 10:06 \nexcel.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.resources.dll| | 70744| 14-Apr-21| 10:06 \nfil9270b25a9451a19a141d6fe93a590a7c.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.excel.dll| | 1535528| 14-Apr-21| 10:06 \nhis.connectors.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.hostintegration.connectors.dll| | 5224528| 14-Apr-21| 10:06 \nlocalytics.dll.07275332_82e4_4820_9fdd_2423cd8daa85| localytics.dll| | 0| 14-Apr-21| 10:06 \nmashup.addintelemetry.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.addintelemetry.dll| | 37928| 14-Apr-21| 10:06 \nmashupcompression.dll.07275332_82e4_4820_9fdd_2423cd8daa85| mashupcompression.dll| | 127648| 14-Apr-21| 10:06 \nmashupengine.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 709712| 14-Apr-21| 10:06 \nmashupengine.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 813536| 14-Apr-21| 10:06 \nmashupengine.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 599080| 14-Apr-21| 10:06 \nmashupengine.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 585376| 14-Apr-21| 10:06 \nmashupengine.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 590888| 14-Apr-21| 10:06 \nmashupengine.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 629216| 14-Apr-21| 10:06 \nmashupengine.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 881704| 14-Apr-21| 10:06 \nmashupengine.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 603176| 14-Apr-21| 10:06 \nmashupengine.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 558160| 14-Apr-21| 10:06 \nmashupengine.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 578632| 14-Apr-21| 10:06 \nmashupengine.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 581280| 14-Apr-21| 10:06 \nmashupengine.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 622240| 14-Apr-21| 10:06 \nmashupengine.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 589472| 14-Apr-21| 10:06 \nmashupengine.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 659104| 14-Apr-21| 10:06 \nmashupengine.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 999072| 14-Apr-21| 10:06 \nmashupengine.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 573088| 14-Apr-21| 10:06 \nmashupengine.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 635944| 14-Apr-21| 10:06 \nmashupengine.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 573088| 14-Apr-21| 10:06 \nmashupengine.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 607320| 14-Apr-21| 10:06 \nmashupengine.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 652368| 14-Apr-21| 10:06 \nmashupengine.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 779304| 14-Apr-21| 10:06 \nmashupengine.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 615464| 14-Apr-21| 10:06 \nmashupengine.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 586832| 14-Apr-21| 10:06 \nmashupengine.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 604640| 14-Apr-21| 10:06 \nmashupengine.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 577176| 14-Apr-21| 10:06 \nmashupengine.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 574504| 14-Apr-21| 10:06 \nmashupengine.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 612832| 14-Apr-21| 10:06 \nmashupengine.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 615464| 14-Apr-21| 10:06 \nmashupengine.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 594984| 14-Apr-21| 10:06 \nmashupengine.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 599120| 14-Apr-21| 10:06 \nmashupengine.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 611368| 14-Apr-21| 10:06 \nmashupengine.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 812072| 14-Apr-21| 10:06 \nmashupengine.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 616240| 14-Apr-21| 10:06 \nmashupengine.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570448| 14-Apr-21| 10:06 \nmashupengine.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 775208| 14-Apr-21| 10:06 \nmashupengine.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570408| 14-Apr-21| 10:06 \nmashupengine.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 570440| 14-Apr-21| 10:06 \nmashupengine.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 578648| 14-Apr-21| 10:06 \nmashupengine.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 937632| 14-Apr-21| 10:06 \nmashupengine.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 594984| 14-Apr-21| 10:06 \nmashupengine.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 803920| 14-Apr-21| 10:06 \nmashupengine.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 659104| 14-Apr-21| 10:06 \nmashupengine.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 521296| 14-Apr-21| 10:06 \nmashupengine.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.resources.dll| | 528024| 14-Apr-21| 10:06 \nmicrosoft.data.edm.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.edm.netfx35.dll| | 667864| 14-Apr-21| 10:06 \nmicrosoft.data.odata.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.odata.netfx35.dll| | 1461472| 14-Apr-21| 10:06 \nmicrosoft.data.odata.qu.35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.odata.query.netfx35.dll| | 188152| 14-Apr-21| 10:06 \nmicrosoft.data.sapclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.data.sapclient.dll| | 927408| 14-Apr-21| 10:06 \nmicrosoft.mashup.client.initialize.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.initialization.dll| | 0| 14-Apr-21| 10:06 \nmicrosoft.mashup.client.ui.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.client.ui.dll| | 43292712| 14-Apr-21| 10:06 \nmicrosoft.mashup.eventsource.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.eventsource.dll| | 160808| 14-Apr-21| 10:06 \nmicrosoft.mashup.sapbwprovider.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.sapbwprovider.dll| | 317600| 14-Apr-21| 10:06 \nmicrosoft.mashup.shims.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.shims.dll| | 31200| 14-Apr-21| 10:06 \nmicrosoft.mashupengine.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashupengine.dll| | 13881384| 14-Apr-21| 10:06 \nmicrosoft.odata.core.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.core.netfx35.dll| | 1444576| 14-Apr-21| 10:06 \nmicrosoft.odata.core.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.core.netfx35.v7.dll| | 1267944| 14-Apr-21| 10:06 \nmicrosoft.odata.edm.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.edm.netfx35.dll| | 785632| 14-Apr-21| 10:06 \nmicrosoft.odata.edm.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.odata.edm.netfx35.v7.dll| | 751840| 14-Apr-21| 10:06 \nmicrosoft.powerbi.adomdclient.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.powerbi.adomdclient.dll| | 1111232| 14-Apr-21| 10:06 \nmicrosoft.spatial.netfx35.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.spatial.netfx35.dll| | 133336| 14-Apr-21| 10:06 \nmicrosoft.spatial.netfx35.v7.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.spatial.netfx35.v7.dll| | 131296| 14-Apr-21| 10:06 \nmicrsoft.mashup.internallibrary.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.internallibrary.dll| | 166952| 14-Apr-21| 10:06 \noauth.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.dll| | 89760| 14-Apr-21| 10:06 \noauth.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 14-Apr-21| 10:06 \noauth.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.fr_fr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.gl_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.he_il.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.hi_in.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 14-Apr-21| 10:06 \noauth.hr_hr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.hu_hu.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.id_id.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.it_it.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ja_jp.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22184| 14-Apr-21| 10:06 \noauth.kk_kz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.ko_kr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.lt_lt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.lv_lv.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ms_my.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.nb_no.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.nl_nl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.pl_pl.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.pt_br.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.pt_pt.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ro_ro.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.ru_ru.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22704| 14-Apr-21| 10:06 \noauth.sk_sk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sl_si.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sr_cyrl_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.sr_latn_cs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sr_latn_rs.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.sv_se.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.th_th.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 23216| 14-Apr-21| 10:06 \noauth.tr_tr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21680| 14-Apr-21| 10:06 \noauth.uk_ua.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.vi_vn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 22192| 14-Apr-21| 10:06 \noauth.zh_cn.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21168| 14-Apr-21| 10:06 \noauth.zh_tw.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oauth.resources.dll| | 21168| 14-Apr-21| 10:06 \noledbinteropdll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbinterop.dll| | 147616| 14-Apr-21| 10:06 \noledbprovider.ar_sa.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.bg_bg.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.ca_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.cs_cz.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.da_dk.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.de_de.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.el_gr.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.es_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.et_ee.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.eu_es.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.resources.dll| | 20144| 14-Apr-21| 10:06 \noledbprovider.fi_fi.resources.dll.07275332_82e4_4820_9fdd_2423cd8daa85| microsoft.mashup.oledbprovider.res