The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of OneNote

2 Microsoft SharePoint: Cross Site Scripting
An attacker can trigger a Cross Site Scripting of Microsoft SharePoint, in order to run JavaScript code in the context of the web site...
3089664, CERTFR-2015-AVI-379, CVE-2015-2522, MS15-099, VIGILANCE-VUL-17846
3 Microsoft Office, SharePoint: four vulnerabilities
Several vulnerabilities were announced in Microsoft Office et SharePoint...
3089664, CERTFR-2015-AVI-379, CVE-2015-2520, CVE-2015-2521, CVE-2015-2523, CVE-2015-2545, MS15-099, VIGILANCE-VUL-17845
4 Windows, Office, Lync: multiple vulnerabilities of Graphics Component
Several vulnerabilities were announced in Windows, Office, and Lync...
3089656, CERTFR-2015-AVI-380, CVE-2015-2506, CVE-2015-2507, CVE-2015-2508, CVE-2015-2510, CVE-2015-2511, CVE-2015-2512, CVE-2015-2517, CVE-2015-2518, CVE-2015-2527, CVE-2015-2529, CVE-2015-2546, CVE-2018-7249, CVE-2018-7250, MS15-097, VIGILANCE-VUL-17843, ZDI-15-457
2 Windows, Office: three vulnerabilities of XML Core Services
An attacker can use several vulnerabilities of XML Core Services of Windows...
3080129, CERTFR-2015-AVI-338, CVE-2015-2434, CVE-2015-2440, CVE-2015-2471, MS15-084, VIGILANCE-VUL-17634, ZDI-15-381
3 Microsoft Office: eight vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
3080790, CERTFR-2015-AVI-335, CERTFR-2015-AVI-342, CVE-2015-1642, CVE-2015-2423, CVE-2015-2466, CVE-2015-2467, CVE-2015-2468, CVE-2015-2469, CVE-2015-2470, CVE-2015-2477, MS15-081, VIGILANCE-VUL-17631
4 Microsoft Office: six vulnerabilities of Graphics Component
An attacker can use several vulnerabilities of Graphics Component of Microsoft Office...
3078662, CERTFR-2015-AVI-334, CVE-2015-2431, CVE-2015-2435, CVE-2015-2455, CVE-2015-2456, CVE-2015-2463, CVE-2015-2464, MS15-080, VIGILANCE-VUL-17628, ZDI-15-387, ZDI-15-388
3 Microsoft Office: eight vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
3072620, CERTFR-2015-AVI-297, CVE-2015-2375, CVE-2015-2376, CVE-2015-2377, CVE-2015-2378, CVE-2015-2379, CVE-2015-2380, CVE-2015-2415, CVE-2015-2424, MS15-070, VIGILANCE-VUL-17360, ZDI-15-326, ZDI-15-327, ZDI-15-328
3 Microsoft Office: three vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
3064949, CERTFR-2015-AVI-246, CVE-2015-1759, CVE-2015-1760, CVE-2015-1770, MS15-059, VIGILANCE-VUL-17091
3 Microsoft Office: two vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
3057181, CERTFR-2015-AVI-211, CVE-2015-1682, CVE-2015-1683, MS15-046, VIGILANCE-VUL-16887, ZDI-15-182
3 Microsoft Office: five vulnerabilities
An attacker can use several vulnerabilities of Microsoft Office...
3048019, CERTFR-2015-AVI-151, CVE-2015-1639, CVE-2015-1641, CVE-2015-1649, CVE-2015-1650, CVE-2015-1651, MS15-033, VIGILANCE-VUL-16596, ZDI-15-132
Our database contains other pages. You can request a free trial to read them.

Display information about OneNote: