239 results (0.003 seconds)

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2025 — Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25007 • CWE-1286: Improper Validation of Syntactic Correctness of Input •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2025 — Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25006 • CWE-167: Improper Handling of Additional Special Element •

CVSS: 6.8EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2025 — Improper input validation in Microsoft Exchange Server allows an authorized attacker to perform tampering over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25005 • CWE-20: Improper Input Validation •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

12 Aug 2025 — Exposure of sensitive information to an unauthorized actor in Microsoft Exchange Server allows an unauthorized attacker to disclose information over a network. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33051 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.0EPSS: 0%CPEs: 4EXPL: 0

06 Aug 2025 — On April 18th 2025, Microsoft announced Exchange Server Security Changes for Hybrid Deployments and accompanying non-security Hot Fix. Microsoft made these changes in the general interest of improving the security of hybrid Exchange deployments. Following further investigation, Microsoft identified specific security implications tied to the guidance and configuration steps outlined in the April announcement. Microsoft is issuing CVE-2025-53786 to document a vulnerability that is addressed by taking the step... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53786 • CWE-287: Improper Authentication •

CVSS: 7.8EPSS: 10%CPEs: 3EXPL: 0

12 Nov 2024 — Microsoft Exchange Server Spoofing Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49040 • CWE-451: User Interface (UI) Misrepresentation of Critical Information •

CVSS: 10.0EPSS: 4%CPEs: 3EXPL: 0

12 Mar 2024 — Microsoft Exchange Server Remote Code Execution Vulnerability Vulnerabilidad de ejecución remota de código de Microsoft Exchange Server • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-26198 • CWE-426: Untrusted Search Path •

CVSS: 10.0EPSS: 1%CPEs: 3EXPL: 0

13 Feb 2024 — Microsoft Exchange Server Elevation of Privilege Vulnerability Vulnerabilidad de elevación de privilegios de Microsoft Exchange Server Microsoft Exchange Server contains an unspecified vulnerability that allows for privilege escalation. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-21410 • CWE-287: Improper Authentication •

CVSS: 5.5EPSS: 0%CPEs: 788EXPL: 1

15 Nov 2023 — An information disclosure vulnerability exists in multiple ManageEngine products that can result in encryption keys being exposed. A low-privileged OS user with access to the host where an affected ManageEngine product is installed can view and use the exposed key to decrypt product database passwords. This allows the user to access the ManageEngine product database. Existe una vulnerabilidad de divulgación de información en varios productos ManageEngine que puede provocar la exposición de claves de cifrado... • https://www.manageengine.com/security/advisory/CVE/CVE-2023-6105.html • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.8EPSS: 20%CPEs: 3EXPL: 0

14 Nov 2023 — Microsoft Exchange Server Spoofing Vulnerability Vulnerabilidad de suplantación de identidad de Microsoft Exchange Server. This vulnerability allows remote attackers to relay NTLM credentials on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The specific flaw exists within the IsUNCPath method. The issue results from the lack of proper input validation. An attacker can leverage this vulnerability to relay NTLM credentials in the context of SYSTEM. • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-36035 • CWE-502: Deserialization of Untrusted Data •