U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Keyword (text search): cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*
  • CPE Name Search: true
There are 37 matching records.
Displaying matches 21 through 37.
Vuln ID Summary CVSS Severity
CVE-2022-41123

Microsoft Exchange Server Elevation of Privilege Vulnerability

Published: November 09, 2022; 5:15:25 PM -0500
V3.1: 7.8 HIGH
V2.0:(not available)
CVE-2022-41080

Microsoft Exchange Server Elevation of Privilege Vulnerability

Published: November 09, 2022; 5:15:21 PM -0500
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-41079

Microsoft Exchange Server Spoofing Vulnerability

Published: November 09, 2022; 5:15:21 PM -0500
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2022-41078

Microsoft Exchange Server Spoofing Vulnerability

Published: November 09, 2022; 5:15:21 PM -0500
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2022-41082

Microsoft Exchange Server Remote Code Execution Vulnerability.

Published: October 02, 2022; 9:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-41040

Microsoft Exchange Server Elevation of Privilege Vulnerability.

Published: October 02, 2022; 9:15:08 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2022-34692

Microsoft Exchange Server Information Disclosure Vulnerability

Published: August 09, 2022; 4:15:10 PM -0400
V3.1: 5.3 MEDIUM
V2.0:(not available)
CVE-2022-30134

Microsoft Exchange Server Information Disclosure Vulnerability

Published: August 09, 2022; 4:15:09 PM -0400
V3.1: 6.5 MEDIUM
V2.0:(not available)
CVE-2022-24516

Microsoft Exchange Server Elevation of Privilege Vulnerability

Published: August 09, 2022; 4:15:09 PM -0400
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2022-24477

Microsoft Exchange Server Elevation of Privilege Vulnerability

Published: August 09, 2022; 4:15:09 PM -0400
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2022-21980

Microsoft Exchange Server Elevation of Privilege Vulnerability

Published: August 09, 2022; 4:15:09 PM -0400
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2022-21979

Microsoft Exchange Server Information Disclosure Vulnerability

Published: August 09, 2022; 4:15:09 PM -0400
V3.1: 4.8 MEDIUM
V2.0:(not available)
CVE-2022-21978

Microsoft Exchange Server Elevation of Privilege Vulnerability.

Published: May 10, 2022; 5:15:09 PM -0400
V3.1: 8.2 HIGH
V2.0: 7.2 HIGH
CVE-2012-2284

The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.

Published: October 18, 2012; 1:55:01 PM -0400
V3.x:(not available)
V2.0: 2.1 LOW
CVE-2011-0290

The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors.

Published: October 21, 2011; 6:55:03 AM -0400
V3.x:(not available)
V2.0: 6.5 MEDIUM
CVE-2000-0216

Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list.

Published: February 29, 2000; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-1322

The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.

Published: November 12, 1998; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 4.6 MEDIUM