Page 47 of 238 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list. • http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0176.html •

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error). • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-007 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Modifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0993 • CWE-665: Improper Initialization •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled. • http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237927 http://www.ciac.org/ciac/bulletins/j-056.shtml http://www.securityfocus.com/bid/567 https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-027 •

CVSS: 10.0EPSS: 1%CPEs: 1EXPL: 0

The LDAP bind function in Exchange 5.5 has a buffer overflow that allows a remote attacker to conduct a denial of service or execute commands. • https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-009 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •