CVE ID | Published | Description | Score | Severity |
---|---|---|---|---|
Microsoft Exchange Server Spoofing Vulnerability | 7.5 |
High |
||
Microsoft Exchange Server Remote Code Execution Vulnerability | 8.8 |
High |
||
Microsoft Exchange Server Information Disclosure Vulnerability | 5.7 |
Medium |
||
Microsoft Exchange Server Elevation of Privilege Vulnerability | 9.8 |
Critical |
||
Microsoft Exchange Server Remote Code Execution Vulnerability | 7.8 |
High |
||
Microsoft Exchange Server Remote Code Execution Vulnerability | 7.8 |
High |
||
Microsoft Exchange Server Remote Code Execution Vulnerability | 9.8 |
Critical |
||
Microsoft Exchange Server Remote Code Execution Vulnerability | 7.8 |
High |
||
A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'. | 9.8 |
Critical |
||
A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web App (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'. | 6.1 |
Medium |
||
A denial of service vulnerability exists in Microsoft Exchange Server software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Denial of Service Vulnerability'. | 7.5 |
High |
||
A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server, aka 'Microsoft Exchange Server Spoofing Vulnerability'. | 5.4 |
Medium |
||
The (1) install and (2) upgrade processes in EMC NetWorker Module for Microsoft Applications (NMM) 2.2.1, 2.3 before build 122, and 2.4 before build 375, when Exchange Server is used, allow local users to read cleartext administrator credentials via unspecified vectors. | 2.1 |
|||
The BlackBerry Collaboration Service in Research In Motion (RIM) BlackBerry Enterprise Server (BES) 5.0.3 through MR4 for Microsoft Exchange and Lotus Domino allows remote authenticated users to log into arbitrary user accounts associated with the same organization, and send messages, read messages, read contact lists, or cause a denial of service (login unavailability), via unspecified vectors. | 6.5 |
|||
The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext. | 4.6 |
|||
Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list. | 5 |