Page 11 of 109 results (0.027 seconds)

CVSS: 5.5EPSS: 1%CPEs: 5EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Vulnerabilidad de Ejecución Remota de Código de Microsoft Exchange Server Este ID de CVE es diferente CVE-2020-17084. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-17083 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.1EPSS: 0%CPEs: 5EXPL: 0

<p>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.</p> <p>To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.</p> <p>The security update corrects the way that Exchange handles these token validations. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-16969 •

CVSS: 8.1EPSS: 0%CPEs: 5EXPL: 0

An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'. Se presenta una vulnerabilidad de elevación de privilegios en Microsoft Exchange Server, también se conoce como "Microsoft Exchange Server Elevation of Privilege Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0692 •

CVSS: 9.0EPSS: 97%CPEs: 6EXPL: 19

A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en el software Microsoft Exchange cuando el software no puede manejar apropiadamente los objetos en la memoria, también se conoce como "Microsoft Exchange Memory Corruption Vulnerability". This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Authentication is required to exploit this vulnerability. The specific flaw exists within the Exchange Control Panel web application. The product fails to generate a unique cryptographic key at installation, which can result in deserialization of untrusted data. • https://www.exploit-db.com/exploits/48168 https://www.exploit-db.com/exploits/48153 https://github.com/zcgonvh/CVE-2020-0688 https://github.com/Jumbo-WJB/CVE-2020-0688 https://github.com/onSec-fr/CVE-2020-0688-Scanner https://github.com/ravinacademy/CVE-2020-0688 https://github.com/MrTiz/CVE-2020-0688 https://github.com/youncyb/CVE-2020-0688 https://github.com/W01fh4cker/CVE-2020-0688-GUI https://github.com/righter83/CVE-2020-0688 https://github.com/ktpdpro • CWE-287: Improper Authentication •

CVSS: 9.8EPSS: 4%CPEs: 5EXPL: 0

A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'. Se presenta una vulnerabilidad de ejecución de código remota en Microsoft Exchange por medio de la deserialización de metadatos mediante PowerShell, también se conoce como "Microsoft Exchange Remote Code Execution Vulnerability". • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1373 • CWE-502: Deserialization of Untrusted Data •