Insufficient granularity of access control in Microsoft Office SharePoint allows an authorized attacker to execute code over a network.
Analyzing vulnerability vectors…
Your command center for real-time vulnerability intelligence — built for security professionals who need answers fast.
Get the full picture on any CVE — kill chain diagrams, exploit sequences, technical breakdowns, and key risks. No credit card required.