Search Results (Refine Search)
- Keyword (text search): cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:*
- CPE Name Search: true
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2023-36777 |
Microsoft Exchange Server Information Disclosure Vulnerability Published: September 12, 2023; 1:15:14 PM -0400 |
V4.0:(not available) V3.1: 5.7 MEDIUM V2.0:(not available) |
CVE-2023-21709 |
Microsoft Exchange Server Elevation of Privilege Vulnerability Published: August 08, 2023; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0:(not available) |
CVE-2021-34523 |
Microsoft Exchange Server Elevation of Privilege Vulnerability Published: July 14, 2021; 2:15:12 PM -0400 |
V4.0:(not available) V3.1: 9.0 CRITICAL V2.0: 7.5 HIGH |
CVE-2021-34473 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: July 14, 2021; 2:15:11 PM -0400 |
V4.0:(not available) V3.1: 9.1 CRITICAL V2.0: 10.0 HIGH |
CVE-2021-33768 |
Microsoft Exchange Server Elevation of Privilege Vulnerability Published: July 14, 2021; 2:15:10 PM -0400 |
V4.0:(not available) V3.1: 8.0 HIGH V2.0: 5.2 MEDIUM |
CVE-2021-33766 |
Microsoft Exchange Server Information Disclosure Vulnerability Published: July 14, 2021; 2:15:10 PM -0400 |
V4.0:(not available) V3.1: 7.3 HIGH V2.0: 5.0 MEDIUM |
CVE-2021-31206 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: July 14, 2021; 2:15:09 PM -0400 |
V4.0:(not available) V3.1: 7.6 HIGH V2.0: 7.9 HIGH |
CVE-2021-31196 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: July 14, 2021; 2:15:09 PM -0400 |
V4.0:(not available) V3.1: 7.2 HIGH V2.0: 6.5 MEDIUM |
CVE-2021-31209 |
Microsoft Exchange Server Spoofing Vulnerability Published: May 11, 2021; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0: 5.8 MEDIUM |
CVE-2021-31207 |
Microsoft Exchange Server Security Feature Bypass Vulnerability Published: May 11, 2021; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 6.6 MEDIUM V2.0: 6.5 MEDIUM |
CVE-2021-31198 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: May 11, 2021; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 7.8 HIGH V2.0: 6.8 MEDIUM |
CVE-2021-31195 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: May 11, 2021; 3:15:10 PM -0400 |
V4.0:(not available) V3.1: 6.5 MEDIUM V2.0: 6.8 MEDIUM |
CVE-2021-28483 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: April 13, 2021; 4:15:21 PM -0400 |
V4.0:(not available) V3.1: 9.0 CRITICAL V2.0: 7.7 HIGH |
CVE-2021-28482 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: April 13, 2021; 4:15:21 PM -0400 |
V4.0:(not available) V3.1: 8.8 HIGH V2.0: 9.0 HIGH |
CVE-2021-28481 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: April 13, 2021; 4:15:21 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2021-28480 |
Microsoft Exchange Server Remote Code Execution Vulnerability Published: April 13, 2021; 4:15:21 PM -0400 |
V4.0:(not available) V3.1: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2012-2284 |
The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors. Published: October 18, 2012; 1:55:01 PM -0400 |
V4.0:(not available) V3.x:(not available) V2.0: 2.1 LOW |
CVE-2011-0290 |
The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors. Published: October 21, 2011; 6:55:03 AM -0400 |
V4.0:(not available) V3.x:(not available) V2.0: 6.5 MEDIUM |
CVE-2000-0216 |
Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list. Published: February 29, 2000; 12:00:00 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0: 5.0 MEDIUM |
CVE-1999-1322 |
The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext. Published: November 12, 1998; 12:00:00 AM -0500 |
V4.0:(not available) V3.x:(not available) V2.0: 4.6 MEDIUM |