Microsoft Exchange Server 2019 Cumulative Update 8

CPE Details

Microsoft Exchange Server 2019 Cumulative Update 8
2019
2021-02-26
22h13 +00:00
2021-08-17
15h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:*

Informations

Vendor

microsoft

Product

exchange_server

Version

2019

Update

cumulative_update_8

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2024-49040 2024-11-12 17h53 +00:00 Microsoft Exchange Server Spoofing Vulnerability
7.5
High
CVE-2024-26198 2024-03-12 16h57 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
8.8
High
CVE-2023-36777 2023-09-12 16h58 +00:00 Microsoft Exchange Server Information Disclosure Vulnerability
5.7
Medium
CVE-2023-21709 2023-08-08 17h08 +00:00 Microsoft Exchange Server Elevation of Privilege Vulnerability
9.8
Critical
CVE-2021-34523 2021-07-14 17h54 +00:00 Microsoft Exchange Server Elevation of Privilege Vulnerability
9.8
Critical
CVE-2021-34473 2021-07-14 17h54 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9.8
Critical
CVE-2021-33766 2021-07-14 17h53 +00:00 Microsoft Exchange Server Information Disclosure Vulnerability
7.5
High
CVE-2021-31209 2021-05-11 19h11 +00:00 Microsoft Exchange Server Spoofing Vulnerability
8.1
High
CVE-2021-31207 2021-05-11 19h11 +00:00 Microsoft Exchange Server Security Feature Bypass Vulnerability
6.6
Medium
CVE-2021-31198 2021-05-11 19h11 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-31195 2021-05-11 19h11 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
8.8
High
CVE-2021-28483 2021-04-13 17h33 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9
Critical
CVE-2021-28481 2021-04-13 17h33 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9.8
Critical
CVE-2021-28482 2021-04-13 17h33 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
8.8
High
CVE-2021-28480 2021-04-13 17h33 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9.8
Critical
CVE-2021-27065 2021-03-02 23h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-26858 2021-03-02 23h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-26855 2021-03-02 23h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9.8
Critical
CVE-2021-26857 2021-03-02 23h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
7.8
High
CVE-2021-27078 2021-03-02 22h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9.1
Critical
CVE-2021-26854 2021-03-02 22h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
7.2
High
CVE-2021-26412 2021-03-02 22h55 +00:00 Microsoft Exchange Server Remote Code Execution Vulnerability
9.1
Critical
CVE-2021-24085 2021-02-25 22h01 +00:00 Microsoft Exchange Server Spoofing Vulnerability
6.5
Medium
CVE-2012-2284 2012-10-18 15h00 +00:00 The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
2.1
CVE-2011-0290 2011-10-21 08h00 +00:00 The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors.
6.5
CVE-1999-1322 2001-09-12 02h00 +00:00 The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.
4.6
CVE-2000-0216 2000-03-22 04h00 +00:00 Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list.
5