RSS   Podatności dla 'Lync server'   RSS

2021-05-11
 
CVE-2021-26421

NVD-CWE-noinfo
 

 
Skype for Business and Lync Spoofing Vulnerability

 
 
CVE-2021-26422

CWE-77
 

 
Skype for Business and Lync Remote Code Execution Vulnerability

 
2021-02-25
 
CVE-2021-24099

NVD-CWE-noinfo
 

 
Skype for Business and Lync Denial of Service Vulnerability

 
 
CVE-2021-24073

NVD-CWE-noinfo
 

 
Skype for Business and Lync Spoofing Vulnerability

 
2019-06-12
 
CVE-2019-1029

CWE-20
 

 
A denial of service vulnerability exists in Skype for Business, aka 'Skype for Business and Lync Server Denial of Service Vulnerability'.

 
2019-04-08
 
CVE-2019-0798

CWE-20
 

 
A spoofing vulnerability exists when a Lync Server or Skype for Business Server does not properly sanitize a specially crafted request, aka 'Skype for Business and Lync Spoofing Vulnerability'.

 
2015-09-08
 
CVE-2015-2536

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in Microsoft Lync Server 2013 and Skype for Business Server 2015 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Skype for Business Server and Lync Server XSS Elevation of Privilege Vulnerability."

 
 
CVE-2015-2532

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in Microsoft Lync Server 2013 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Lync Server XSS Information Disclosure Vulnerability."

 
 
CVE-2015-2531

CWE-79
 

 
Cross-site scripting (XSS) vulnerability in the jQuery engine in Microsoft Lync Server 2013 and Skype for Business Server 2015 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka "Skype for Business Server and Lync Server XSS Information Disclosure Vulnerability."

 
2014-09-09
 
CVE-2014-4071

CWE-Other
 

 
The Server in Microsoft Lync Server 2013 allows remote attackers to cause a denial of service (NULL pointer dereference and daemon hang) via a crafted request, aka "Lync Denial of Service Vulnerability."

 


Copyright 2021, cxsecurity.com

 

Back to Top