Microsoft Access Tampering Vulnerability - CVE-2018-0799ID: oval:org.secpod.oval:def:43446 | Date: (C)2018-01-11 (M)2021-06-02 |
Class: VULNERABILITY | Family: windows |
A cross-site-scripting (XSS) vulnerability exists when Microsoft Access does not properly sanitize inputs to image fields edited within Design view. An attacker could exploit the vulnerability by sending a specially crafted file to a victim, or by hosting the file on a web server. The attacker who successfully exploited the vulnerability could then run javascript in the security context of the current user. The attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on a remote site on behalf of the user, and inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to ensure that Microsoft Access properly sanitizes image field values.
Platform: |
Microsoft Windows 7 |
Microsoft Windows 8 |
Microsoft Windows 8.1 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2012 |
Microsoft Windows Server 2012 R2 |
Microsoft Windows Vista |
Microsoft Windows 10 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2016 |
Microsoft Windows XP |
Product: |
Microsoft SharePoint Server 2013 |
Microsoft SharePoint Server 2016 |