Show filters
260 Total Results
Displaying 91-100 of 260
Sort by:
Attacker Value
Unknown
CVE-2020-17141
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Microsoft Exchange Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17142
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Microsoft Exchange Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17143
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Microsoft Exchange Server Information Disclosure Vulnerability
0
Attacker Value
Unknown
CVE-2020-17117
Disclosure Date: December 10, 2020 (last updated November 28, 2024)
Microsoft Exchange Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17084
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17083
Disclosure Date: November 11, 2020 (last updated February 22, 2025)
Microsoft Exchange Server Remote Code Execution Vulnerability
0
Attacker Value
Unknown
CVE-2020-17085
Disclosure Date: November 11, 2020 (last updated November 28, 2024)
Microsoft Exchange Server Denial of Service Vulnerability
0
Attacker Value
Unknown
CVE-2020-16969
Disclosure Date: October 16, 2020 (last updated February 22, 2025)
<p>An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.</p>
<p>To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.</p>
<p>The security update corrects the way that Exchange handles these token validations.</p>
0
Attacker Value
Unknown
CVE-2020-2830
Disclosure Date: April 15, 2020 (last updated November 08, 2023)
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Concurrency). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
0
Attacker Value
Unknown
CVE-2020-2781
Disclosure Date: April 15, 2020 (last updated November 08, 2023)
Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: JSSE). Supported versions that are affected are Java SE: 7u251, 8u241, 11.0.6 and 14; Java SE Embedded: 8u241. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTPS to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized ability to cause a partial denial of service (partial DOS) of Java SE, Java SE Embedded. Note: Applies to client and server deployment of Java. This vulnerability can be exploited through sandboxed Java Web Start applications and sandboxed Java applets. It can also be exploited by supplying data to APIs in the specified Component without using sandboxed Java Web Start applications or sandboxed Java applets, such as through a web service. CVSS 3.0 Base Score 5.3 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L).
0