Microsoft Exchange Server 2007 Service Pack 2 Update Rollup 4

CPE Details

Microsoft Exchange Server 2007 Service Pack 2 Update Rollup 4
2007
2020-04-14
11h14 +00:00
2020-04-14
11h14 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:microsoft:exchange_server:2007:sp2_update_rollup_4:*:*:*:*:*:*

Informations

Vendor

microsoft

Product

exchange_server

Version

2007

Update

sp2_update_rollup_4

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2012-2284 2012-10-18 15h00 +00:00 The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors.
2.1
CVE-2011-0290 2011-10-21 08h00 +00:00 The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors.
6.5
CVE-2010-2091 2010-05-27 17h00 +00:00 Microsoft Outlook Web Access (OWA) 8.2.254.0, when Internet Explorer 7 on Windows Server 2003 is used, does not properly handle the id parameter in a Folder IPF.Note action to the default URI, which might allow remote attackers to obtain sensitive information or conduct cross-site scripting (XSS) attacks via an invalid value.
4.3
CVE-1999-1322 2001-09-12 02h00 +00:00 The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.
4.6
CVE-2000-0216 2000-03-22 04h00 +00:00 Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list.
5