Page 2 of 17 results (0.008 seconds)

CVSS: 7.5EPSS: 21%CPEs: 2EXPL: 0

12 Mar 2001 — Buffer overflow in Internet Mail Service (IMS) for Microsoft Exchange 5.5 and 5.0 allows remote attackers to conduct a denial of service via AUTH or AUTHINFO commands. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ169174 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 10%CPEs: 1EXPL: 1

11 Dec 2000 — Microsoft Exchange Server 5.5 does not properly handle a MIME header with a blank charset specified, which allows remote attackers to cause a denial of service via a charset="" command, aka the "Malformed MIME Header" vulnerability. • http://www.securityfocus.com/bid/1869 •

CVSS: 7.5EPSS: 6%CPEs: 2EXPL: 0

31 Dec 1999 — Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error). • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-007 •

CVSS: 9.1EPSS: 8%CPEs: 2EXPL: 0

13 Dec 1999 — Modifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0993 • CWE-665: Improper Initialization •

CVSS: 5.0EPSS: 18%CPEs: 3EXPL: 0

06 Aug 1999 — Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237927 •

CVSS: 10.0EPSS: 9%CPEs: 1EXPL: 0

01 Dec 1998 — The LDAP bind function in Exchange 5.5 has a buffer overflow that allows a remote attacker to conduct a denial of service or execute commands. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-009 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.5EPSS: 5%CPEs: 22EXPL: 0

26 Jun 1998 — Information from SSL-encrypted sessions via PKCS #1. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 • CWE-327: Use of a Broken or Risky Cryptographic Algorithm •