238 results (0.007 seconds)

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

Microsoft Exchange Server Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49040 • CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Exchange Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26198 • CWE-426: Untrusted Search Path •

CVSS: 9.8EPSS: 8%CPEs: 3EXPL: 0

Microsoft Exchange Server Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Microsoft Exchange Server Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410 • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 788EXPL: 1

An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database. Existe una vulnerabilidad de divulgación de información en varios productos ManageEngine que puede provocar la exposición de claves de cifrado. Un usuario de sistema operativo con pocos privilegios y acceso al host donde está instalado un producto ManageEngine afectado puede ver y utilizar la clave expuesta para descifrar las contraseñas de la base de datos del producto. • https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html https://www.tenable.com/security/research/tra-2023-35 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 0%CPEs: 3EXPL: 0

Microsoft Exchange Server Spoofing Vulnerability Vulnerabilidad de suplantación de identidad de Microsoft Exchange Server. This vulnerability allows remote attackers to relay NTLM credentials on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The specific flaw exists within the IsUNCPath method. The issue results from the lack of proper input validation. An attacker can leverage this vulnerability to relay NTLM credentials in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035 • CWE-502: Deserialization of Untrusted Data •