Page 13 of 238 results (0.006 seconds)

CVSS: 8.0EPSS: 0%CPEs: 4EXPL: 0

Microsoft Exchange Server Elevation of Privilege Vulnerability Una vulnerabilidad de Elevación de Privilegios en Microsoft Exchange Server. Este ID de CVE es diferente de CVE-2021-34470, CVE-2021-34523 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33768 •

CVSS: 7.5EPSS: 46%CPEs: 5EXPL: 2

Microsoft Exchange Server Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Microsoft Exchange This vulnerability allows remote attackers to disclose sensitive information on affected installations of Microsoft Exchange Server. Authentication is not required to exploit this vulnerability. The specific flaw exists within the authentication of requests to web services within the ecp web application. By issuing a crafted request, an attacker can bypass authentication. An attacker can leverage this vulnerability to disclose information from the server. Microsoft Exchange Server contains an information disclosure vulnerability which can allow an unauthenticated attacker to steal email traffic from target. • https://github.com/bhdresh/CVE-2021-33766 https://github.com/demossl/CVE-2021-33766-ProxyToken https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-33766 https://www.zerodayinitiative.com/advisories/ZDI-21-798 • CWE-287: Improper Authentication •

CVSS: 8.0EPSS: 53%CPEs: 5EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Exchange Server. . Este ID de CVE es diferente de CVE-2021-31196, CVE-2021-34473 This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. User interaction is required to exploit this vulnerability. The specific flaw exists within the parsing of CAB files. When handling filenames specified within a CAB file, the process does not properly validate a user-supplied path prior to using it in file operations. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31206 https://www.zerodayinitiative.com/advisories/ZDI-21-826 •

CVSS: 7.2EPSS: 9%CPEs: 5EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Exchange Server. . Este ID de CVE es diferente de CVE-2021-31206, CVE-2021-34473 Microsoft Exchange Server contains an information disclosure vulnerability that allows for remote code execution. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31196 •

CVSS: 8.1EPSS: 2%CPEs: 5EXPL: 0

Microsoft Exchange Server Spoofing Vulnerability Una vulnerabilidad de Suplantación de Identidad de Microsoft Exchange Server This vulnerability allows network-adjacent attackers to tamper with update data on affected installations of Microsoft Exchange Server. User interaction is required to exploit this vulnerability. The specific flaw exists within the handling of Exchange Server Help updates. The issue results from a missing integrity check on update downloads. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209 https://www.zerodayinitiative.com/advisories/ZDI-21-615 •