Show filters
260 Total Results
Displaying 81-90 of 260
Sort by:
Attacker Value
Unknown
CVE-2021-31198
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-31207
Disclosure Date: May 11, 2021 (last updated February 22, 2025)
Microsoft Exchange Server Security Feature Bypass Vulnerability
0
Attacker Value
Unknown
CVE-2021-28480
Disclosure Date: April 13, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-28481
Disclosure Date: April 13, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-28483
Disclosure Date: April 13, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-26858
Disclosure Date: March 03, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-27078
Disclosure Date: March 03, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-26854
Disclosure Date: March 03, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-26412
Disclosure Date: March 03, 2021 (last updated November 28, 2024)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2021-1730
Disclosure Date: February 25, 2021 (last updated November 28, 2024)
<p>A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.</p>
<p>This update addresses this vulnerability.</p>
<p>To prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.</p>
0