cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2013-1289,https://securityvulnerability.io/vulnerability/CVE-2013-1289,,"Cross-site scripting (XSS) vulnerability in Microsoft SharePoint Server 2010 SP1, Groove Server 2010 SP1, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka ""HTML Sanitization Vulnerability.""",Microsoft,"Groove Server,Infopath,Sharepoint Server,Office Web Apps,Sharepoint Foundation",,,0.8496299982070923,false,false,false,false,,false,false,2013-04-09T22:00:00.000Z,0 CVE-2012-2520,https://securityvulnerability.io/vulnerability/CVE-2012-2520,,"Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Communicator 2007 R2, Lync 2010 and 2010 Attendee, SharePoint Server 2007 SP2 and SP3 and 2010 SP1, Groove Server 2010 SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010 SP1, and Office Web Apps 2010 SP1 allows remote attackers to inject arbitrary web script or HTML via a crafted string, aka ""HTML Sanitization Vulnerability.""",Microsoft,"Sharepoint Server,Lync,Groove Server,Office Communicator,Infopath,Sharepoint Services,Office Web Apps,Sharepoint Foundation",,,0.3506999909877777,false,false,false,false,,false,false,2012-10-09T21:00:00.000Z,0 CVE-2011-1892,https://securityvulnerability.io/vulnerability/CVE-2011-1892,,"Microsoft Office Groove 2007 SP2, SharePoint Workspace 2010 Gold and SP1, Office Forms Server 2007 SP2, Office SharePoint Server 2007 SP2, Office SharePoint Server 2010 Gold and SP1, Office Groove Data Bridge Server 2007 SP2, Office Groove Management Server 2007 SP2, Groove Server 2010 Gold and SP1, Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, and Office Web Apps 2010 Gold and SP1 do not properly handle Web Parts containing XML classes referencing external entities, which allows remote authenticated users to read arbitrary files via a crafted XML and XSL file, aka ""SharePoint Remote File Disclosure Vulnerability.""",Microsoft,"Sharepoint Services,Sharepoint Server,Groove Server,Groove,Sharepoint Workspace,Groove Data Bridge Server,Forms Server,Office Web Apps,Sharepoint Foundation,Groove Management Server",,,0.20691999793052673,false,false,false,false,,false,false,2011-09-15T10:00:00.000Z,0 CVE-2010-3324,https://securityvulnerability.io/vulnerability/CVE-2010-3324,,"The toStaticHTML function in Microsoft Internet Explorer 8, and the SafeHTML function in Microsoft Windows SharePoint Services 3.0 SP2, SharePoint Foundation 2010, Office SharePoint Server 2007 SP2, Groove Server 2010, and Office Web Apps, allows remote attackers to bypass the cross-site scripting (XSS) protection mechanism and conduct XSS attacks via a crafted use of the Cascading Style Sheets (CSS) @import rule, aka ""HTML Sanitization Vulnerability,"" a different vulnerability than CVE-2010-1257.",Microsoft,"Sharepoint Services,Groove Server,Internet Explorer,Sharepoint Server,Sharepoint Foundation,Web Apps",,,0.8309000134468079,false,false,false,false,,false,false,2010-09-17T17:46:00.000Z,0 CVE-2010-3146,https://securityvulnerability.io/vulnerability/CVE-2010-3146,,"Multiple untrusted search path vulnerabilities in Microsoft Groove 2007 SP2 allow local users to gain privileges via a Trojan horse (1) mso.dll or (2) GroovePerfmon.dll file in the current working directory, as demonstrated by a directory that contains a Groove vCard (.vcg) or Groove Tool Archive (.gta) file, aka ""Microsoft Groove Insecure Library Loading Vulnerability.""",Microsoft,Groove,,,0.7837399840354919,false,false,false,false,,false,false,2010-08-27T18:10:00.000Z,0 CVE-2008-3068,https://securityvulnerability.io/vulnerability/CVE-2008-3068,,"Microsoft Crypto API 5.131.2600.2180 through 6.0, as used in Outlook, Windows Live Mail, and Office 2007, performs Certificate Revocation List (CRL) checks by using an arbitrary URL from a certificate embedded in a (1) S/MIME e-mail message or (2) signed document, which allows remote attackers to obtain reading times and IP addresses of recipients, and port-scan results, via a crafted certificate with an Authority Information Access (AIA) extension.",Microsoft,"Frontpage,Sharepoint Designer,Office Communicator,Access,Visio Professional,Outlook,Project Standard,Powerpoint,Infopath,Visio Standard,Windows Live Mail,Publisher,Onenote,Excel,Project Professional,Office,Groove",,,0.05584000051021576,false,false,false,false,,false,false,2008-07-07T23:41:00.000Z,0