Page 13 of 140 results (0.006 seconds)

CVSS: 8.1EPSS: 2%CPEs: 5EXPL: 0

Microsoft Exchange Server Spoofing Vulnerability Una vulnerabilidad de Suplantación de Identidad de Microsoft Exchange Server This vulnerability allows network-adjacent attackers to tamper with update data on affected installations of Microsoft Exchange Server. User interaction is required to exploit this vulnerability. The specific flaw exists within the handling of Exchange Server Help updates. The issue results from a missing integrity check on update downloads. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31209 https://www.zerodayinitiative.com/advisories/ZDI-21-615 •

CVSS: 8.8EPSS: 96%CPEs: 5EXPL: 1

Microsoft Exchange Server Security Feature Bypass Vulnerability Una vulnerabilidad de Omisión de la Característica de Seguridad de Microsoft Exchange Server This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of mailbox export. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. Microsoft Exchange Server contains an unspecified vulnerability that allows for security feature bypass. • http://packetstormsecurity.com/files/163895/Microsoft-Exchange-ProxyShell-Remote-Code-Execution.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31207 https://www.zerodayinitiative.com/advisories/ZDI-21-819 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 8.8EPSS: 0%CPEs: 5EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Exchange Server. Este ID de CVE es diferente de CVE-2021-31195 This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange Server. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the OAB service. The issue results from the lack of proper validation of user-supplied data, which can allow arbitrary files write to OAB folders. An attacker can leverage this vulnerability to execute arbitrary code in the context of SYSTEM. • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31198 https://www.zerodayinitiative.com/advisories/ZDI-21-894 • CWE-20: Improper Input Validation •

CVSS: 8.8EPSS: 90%CPEs: 5EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Exchange Server. Este ID de CVE es diferente de CVE-2021-31198 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31195 •

CVSS: 9.0EPSS: 0%CPEs: 5EXPL: 0

Microsoft Exchange Server Remote Code Execution Vulnerability Una vulnerabilidad de Ejecución de Código Remota de Microsoft Exchange Server. Este ID de CVE es diferente de CVE-2021-28480, CVE-2021-28481, CVE-2021-28482 • https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28483 •