From efddf807693d23627030171c9738638d1dc6fd26 Mon Sep 17 00:00:00 2001 From: righel Date: Tue, 29 Oct 2024 05:33:14 +0000 Subject: [PATCH] automatic update --- ms-exchange-versions-cves-dict.json | 633 +++++++++++++++++++++++++++- 1 file changed, 630 insertions(+), 3 deletions(-) diff --git a/ms-exchange-versions-cves-dict.json b/ms-exchange-versions-cves-dict.json index 65d7c7b..b541a4c 100644 --- a/ms-exchange-versions-cves-dict.json +++ b/ms-exchange-versions-cves-dict.json @@ -5621,7 +5621,16 @@ }, "15.1.1034.33": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_6:*:*:*:*:*:*", - "cves": [] + "cves": [ + { + "cvss": 5.8, + "cvss-time": "2018-01-02T17:25:00", + "cwe": "CWE-20", + "id": "CVE-2017-11932", + "last-modified": "2018-01-02T17:25:00", + "summary": "Microsoft Exchange Server 2016 CU5 and Microsoft Exchange Server 2016 CU5 allow a spoofing vulnerability due to the way Outlook Web Access (OWA) validates web requests, aka \"Microsoft Exchange Spoofing Vulnerability\"." + } + ] }, "15.1.1261.35": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_7:*:*:*:*:*:*", @@ -5663,6 +5672,14 @@ "15.1.1261.37": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_7:*:*:*:*:*:*", "cves": [ + { + "cvss": 5.8, + "cvss-time": "2018-01-02T17:25:00", + "cwe": "CWE-20", + "id": "CVE-2017-11932", + "last-modified": "2018-01-02T17:25:00", + "summary": "Microsoft Exchange Server 2016 CU5 and Microsoft Exchange Server 2016 CU5 allow a spoofing vulnerability due to the way Outlook Web Access (OWA) validates web requests, aka \"Microsoft Exchange Spoofing Vulnerability\"." + }, { "cvss": 4.3, "cvss-time": "2020-08-24T17:37:00", @@ -5797,6 +5814,14 @@ "15.1.1415.7": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_8:*:*:*:*:*:*", "cves": [ + { + "cvss": 10.0, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-787", + "id": "CVE-2018-8154", + "last-modified": "2020-08-24T17:37:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server. This CVE ID is unique from CVE-2018-8151." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -5828,12 +5853,52 @@ "id": "CVE-2021-27065", "last-modified": "2024-07-25T17:34:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 5.8, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-290", + "id": "CVE-2018-8153", + "last-modified": "2020-08-24T17:37:00", + "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests, aka \"Microsoft Exchange Spoofing Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 5.8, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "CWE-79", + "id": "CVE-2018-8152", + "last-modified": "2019-10-03T00:03:00", + "summary": "An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka \"Microsoft Exchange Server Elevation of Privilege Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 5.8, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "CWE-79", + "id": "CVE-2018-8159", + "last-modified": "2019-10-03T00:03:00", + "summary": "An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka \"Microsoft Exchange Elevation of Privilege Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 4.3, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "CWE-119", + "id": "CVE-2018-8151", + "last-modified": "2019-10-03T00:03:00", + "summary": "An information disclosure vulnerability exists when Microsoft Exchange improperly handles objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server. This CVE ID is unique from CVE-2018-8154." } ] }, "15.1.1466.10": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_9:*:*:*:*:*:*", "cves": [ + { + "cvss": 10.0, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-787", + "id": "CVE-2018-8302", + "last-modified": "2020-08-24T17:37:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -5857,6 +5922,14 @@ "id": "CVE-2021-26858", "last-modified": "2024-07-25T17:53:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 4.0, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2018-8374", + "last-modified": "2020-08-24T17:37:00", + "summary": "A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka \"Microsoft Exchange Server Tampering Vulnerability.\" This affects Microsoft Exchange Server." } ] }, @@ -5960,6 +6033,14 @@ "last-modified": "2020-08-24T17:37:00", "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server." }, + { + "cvss": 10.0, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-787", + "id": "CVE-2018-8154", + "last-modified": "2020-08-24T17:37:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server. This CVE ID is unique from CVE-2018-8151." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -5984,6 +6065,38 @@ "last-modified": "2024-07-25T17:53:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 5.8, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-290", + "id": "CVE-2018-8153", + "last-modified": "2020-08-24T17:37:00", + "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web Access (OWA) fails to properly handle web requests, aka \"Microsoft Exchange Spoofing Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 5.8, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "CWE-79", + "id": "CVE-2018-8152", + "last-modified": "2019-10-03T00:03:00", + "summary": "An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka \"Microsoft Exchange Server Elevation of Privilege Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 5.8, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "CWE-79", + "id": "CVE-2018-8159", + "last-modified": "2019-10-03T00:03:00", + "summary": "An elevation of privilege vulnerability exists when Microsoft Exchange Outlook Web Access (OWA) fails to properly handle web requests, aka \"Microsoft Exchange Elevation of Privilege Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 4.3, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "CWE-119", + "id": "CVE-2018-8151", + "last-modified": "2019-10-03T00:03:00", + "summary": "An information disclosure vulnerability exists when Microsoft Exchange improperly handles objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server. This CVE ID is unique from CVE-2018-8154." + }, { "cvss": 4.0, "cvss-time": "2020-08-24T17:37:00", @@ -6155,6 +6268,14 @@ "last-modified": "2020-08-24T17:37:00", "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server." }, + { + "cvss": 10.0, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-787", + "id": "CVE-2018-8302", + "last-modified": "2020-08-24T17:37:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka \"Microsoft Exchange Memory Corruption Vulnerability.\" This affects Microsoft Exchange Server." + }, { "cvss": 9.3, "cvss-time": "2019-10-03T00:03:00", @@ -6218,6 +6339,14 @@ "id": "CVE-2018-8604", "last-modified": "2019-10-03T00:03:00", "summary": "A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka \"Microsoft Exchange Server Tampering Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 4.0, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2018-8374", + "last-modified": "2020-08-24T17:37:00", + "summary": "A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka \"Microsoft Exchange Server Tampering Vulnerability.\" This affects Microsoft Exchange Server." } ] }, @@ -6271,6 +6400,14 @@ "id": "CVE-2019-0588", "last-modified": "2020-08-24T17:37:00", "summary": "An information disclosure vulnerability exists when the Microsoft Exchange PowerShell API grants calendar contributors more view permissions than intended, aka \"Microsoft Exchange Information Disclosure Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 4.0, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2018-8604", + "last-modified": "2019-10-03T00:03:00", + "summary": "A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka \"Microsoft Exchange Server Tampering Vulnerability.\" This affects Microsoft Exchange Server." } ] }, @@ -6417,6 +6554,14 @@ "id": "CVE-2019-0588", "last-modified": "2020-08-24T17:37:00", "summary": "An information disclosure vulnerability exists when the Microsoft Exchange PowerShell API grants calendar contributors more view permissions than intended, aka \"Microsoft Exchange Information Disclosure Vulnerability.\" This affects Microsoft Exchange Server." + }, + { + "cvss": 4.0, + "cvss-time": "2019-10-03T00:03:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2018-8604", + "last-modified": "2019-10-03T00:03:00", + "summary": "A tampering vulnerability exists when Microsoft Exchange Server fails to properly handle profile data, aka \"Microsoft Exchange Server Tampering Vulnerability.\" This affects Microsoft Exchange Server." } ] }, @@ -6738,12 +6883,36 @@ "id": "CVE-2019-1266", "last-modified": "2020-08-24T17:37:00", "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web App (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'." + }, + { + "cvss": 4.0, + "cvss-time": "2020-05-04T14:14:00", + "cwe": "CWE-200", + "id": "CVE-2019-1084", + "last-modified": "2020-05-04T14:14:00", + "summary": "An information disclosure vulnerability exists when Exchange allows creation of entities with Display Names having non-printable characters. An authenticated attacker could exploit this vulnerability by creating entities with invalid display names, which, when added to conversations, remain invisible. This security update addresses the issue by validating display names upon creation in Microsoft Exchange, and by rendering invalid display names correctly in Microsoft Outlook clients., aka 'Microsoft Exchange Information Disclosure Vulnerability'." + }, + { + "cvss": 3.5, + "cvss-time": "2020-04-09T13:19:00", + "cwe": "CWE-79", + "id": "CVE-2019-1137", + "last-modified": "2020-04-09T13:19:00", + "summary": "A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server, aka 'Microsoft Exchange Server Spoofing Vulnerability'." } ] }, "15.1.1713.9": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_12:*:*:*:*:*:*", "cves": [ + { + "cvss": 7.8, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2019-1233", + "last-modified": "2020-08-24T17:37:00", + "summary": "A denial of service vulnerability exists in Microsoft Exchange Server software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Denial of Service Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -6775,6 +6944,14 @@ "id": "CVE-2021-27065", "last-modified": "2024-07-25T17:34:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 4.3, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-79", + "id": "CVE-2019-1266", + "last-modified": "2020-08-24T17:37:00", + "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web App (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'." } ] }, @@ -6882,6 +7059,14 @@ "last-modified": "2024-02-13T17:23:00", "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." }, + { + "cvss": 7.5, + "cvss-time": "2019-11-14T19:34:00", + "cwe": "CWE-502", + "id": "CVE-2019-1373", + "last-modified": "2019-11-14T19:34:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -6935,6 +7120,14 @@ "15.1.1847.7": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_14:*:*:*:*:*:*", "cves": [ + { + "cvss": 9.0, + "cvss-time": "2024-02-13T17:23:00", + "cwe": "CWE-287", + "id": "CVE-2020-0688", + "last-modified": "2024-02-13T17:23:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -6943,6 +7136,14 @@ "last-modified": "2024-02-15T20:18:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 6.8, + "cvss-time": "2021-07-21T11:39:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-0692", + "last-modified": "2021-07-21T11:39:00", + "summary": "An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'." + }, { "cvss": 6.8, "cvss-time": "2024-07-25T17:53:00", @@ -7045,6 +7246,14 @@ "15.1.1913.7": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_15:*:*:*:*:*:*", "cves": [ + { + "cvss": 9.0, + "cvss-time": "2024-02-13T17:23:00", + "cwe": "CWE-287", + "id": "CVE-2020-0688", + "last-modified": "2024-02-13T17:23:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7053,6 +7262,14 @@ "last-modified": "2024-02-15T20:18:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 6.8, + "cvss-time": "2021-07-21T11:39:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-0692", + "last-modified": "2021-07-21T11:39:00", + "summary": "An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'." + }, { "cvss": 6.8, "cvss-time": "2024-07-25T17:53:00", @@ -7135,6 +7352,14 @@ "15.1.1979.6": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_16:*:*:*:*:*:*", "cves": [ + { + "cvss": 9.0, + "cvss-time": "2023-12-31T22:15:00", + "cwe": "CWE-269", + "id": "CVE-2020-16875", + "last-modified": "2023-12-31T22:15:00", + "summary": "

A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.

\n

An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.

\n

The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.

\n" + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7176,6 +7401,14 @@ "15.1.2044.12": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_17:*:*:*:*:*:*", "cves": [ + { + "cvss": 9.0, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17117", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7207,6 +7440,38 @@ "id": "CVE-2021-27065", "last-modified": "2024-07-25T17:34:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 6.5, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17132", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, + { + "cvss": 6.5, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17142", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, + { + "cvss": 6.5, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17143", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" + }, + { + "cvss": 6.0, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17141", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" } ] }, @@ -7350,6 +7615,14 @@ "last-modified": "2023-12-31T19:15:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 9.0, + "cvss-time": "2023-12-31T22:15:00", + "cwe": "CWE-269", + "id": "CVE-2020-16875", + "last-modified": "2023-12-31T22:15:00", + "summary": "

A remote code execution vulnerability exists in Microsoft Exchange server due to improper validation of cmdlet arguments.

\n

An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user. Exploitation of the vulnerability requires an authenticated user in a certain Exchange role to be compromised.

\n

The security update addresses the vulnerability by correcting how Microsoft Exchange handles cmdlet arguments.

\n" + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7523,6 +7796,14 @@ "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" }, + { + "cvss": 4.3, + "cvss-time": "2023-12-31T20:15:00", + "cwe": "NVD-CWE-Other", + "id": "CVE-2020-16969", + "last-modified": "2023-12-31T20:15:00", + "summary": "

An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.

\n

To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.

\n

The security update corrects the way that Exchange handles these token validations.

\n" + }, { "cvss": 4.0, "cvss-time": "2023-12-31T19:15:00", @@ -7552,6 +7833,14 @@ "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" }, + { + "cvss": 9.0, + "cvss-time": "2023-12-31T19:15:00", + "cwe": "CWE-120", + "id": "CVE-2020-17084", + "last-modified": "2023-12-31T19:15:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -7615,6 +7904,22 @@ "id": "CVE-2020-17141", "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, + { + "cvss": 4.0, + "cvss-time": "2023-12-31T19:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17085", + "last-modified": "2023-12-31T19:15:00", + "summary": "Microsoft Exchange Server Denial of Service Vulnerability" + }, + { + "cvss": 3.5, + "cvss-time": "2023-12-31T19:15:00", + "cwe": "CWE-79", + "id": "CVE-2020-17083", + "last-modified": "2023-12-31T19:15:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" } ] }, @@ -7894,6 +8199,14 @@ "last-modified": "2023-12-29T17:15:00", "summary": "

A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.

\n

This update addresses this vulnerability.

\n

To prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.

\n" }, + { + "cvss": 4.3, + "cvss-time": "2023-12-31T20:15:00", + "cwe": "NVD-CWE-Other", + "id": "CVE-2020-16969", + "last-modified": "2023-12-31T20:15:00", + "summary": "

An information disclosure vulnerability exists in how Microsoft Exchange validates tokens when handling certain messages. An attacker who successfully exploited the vulnerability could use this to gain further information from a user.

\n

To exploit the vulnerability, an attacker could include specially crafted OWA messages that could be loaded, without warning or filtering, from the attacker-controlled URL. This callback vector provides an information disclosure tactic used in web beacons and other types of tracking systems.

\n

The security update corrects the way that Exchange handles these token validations.

\n" + }, { "cvss": 4.0, "cvss-time": "2023-12-31T19:15:00", @@ -7923,6 +8236,14 @@ "last-modified": "2023-12-30T00:15:00", "summary": "Microsoft Exchange Remote Code Execution Vulnerability" }, + { + "cvss": 9.0, + "cvss-time": "2023-12-31T19:15:00", + "cwe": "CWE-120", + "id": "CVE-2020-17084", + "last-modified": "2023-12-31T19:15:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -8026,12 +8347,36 @@ "id": "CVE-2021-1730", "last-modified": "2023-12-29T17:15:00", "summary": "

A spoofing vulnerability exists in Microsoft Exchange Server which could result in an attack that would allow a malicious actor to impersonate the user.

\n

This update addresses this vulnerability.

\n

To prevent these types of attacks, Microsoft recommends customers to download inline images from different DNSdomains than the rest of OWA. Please see further instructions in the FAQ to put in place this mitigations.

\n" + }, + { + "cvss": 4.0, + "cvss-time": "2023-12-31T19:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17085", + "last-modified": "2023-12-31T19:15:00", + "summary": "Microsoft Exchange Server Denial of Service Vulnerability" + }, + { + "cvss": 3.5, + "cvss-time": "2023-12-31T19:15:00", + "cwe": "CWE-79", + "id": "CVE-2020-17083", + "last-modified": "2023-12-31T19:15:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" } ] }, "15.1.2106.6": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_18:*:*:*:*:*:*", "cves": [ + { + "cvss": 9.0, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17117", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -8088,6 +8433,30 @@ "last-modified": "2023-12-29T17:16:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 6.5, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17132", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, + { + "cvss": 6.5, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17142", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, + { + "cvss": 6.5, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17143", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" + }, { "cvss": 6.0, "cvss-time": "2023-12-29T17:15:00", @@ -8096,6 +8465,14 @@ "last-modified": "2023-12-29T17:15:00", "summary": "Microsoft Exchange Server Spoofing Vulnerability" }, + { + "cvss": 6.0, + "cvss-time": "2023-12-30T00:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-17141", + "last-modified": "2023-12-30T00:15:00", + "summary": "Microsoft Exchange Remote Code Execution Vulnerability" + }, { "cvss": 5.8, "cvss-time": "2023-12-29T17:15:00", @@ -8165,6 +8542,14 @@ "last-modified": "2023-12-29T17:16:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 6.0, + "cvss-time": "2023-12-29T17:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2021-24085", + "last-modified": "2023-12-29T17:15:00", + "summary": "Microsoft Exchange Server Spoofing Vulnerability" + }, { "cvss": 5.8, "cvss-time": "2023-12-29T17:15:00", @@ -8178,6 +8563,22 @@ "15.1.2176.12": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", "cves": [ + { + "cvss": 10.0, + "cvss-time": "2024-07-26T19:26:00", + "cwe": "CWE-918", + "id": "CVE-2021-34473", + "last-modified": "2024-07-26T19:26:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 7.5, + "cvss-time": "2024-02-13T17:20:00", + "cwe": "CWE-287", + "id": "CVE-2021-34523", + "last-modified": "2024-02-13T17:20:00", + "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" + }, { "cvss": 6.8, "cvss-time": "2023-08-02T00:15:00", @@ -8209,12 +8610,45 @@ "id": "CVE-2021-31209", "last-modified": "2023-08-02T00:15:00", "summary": "Microsoft Exchange Server Spoofing Vulnerability" + }, + { + "cvss": 5.0, + "cvss-time": "2024-07-24T16:45:00", + "cwe": "CWE-287", + "id": "CVE-2021-33766", + "last-modified": "2024-07-24T16:45:00", + "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" } ] }, "15.1.2176.14": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", - "cves": [] + "cves": [ + { + "cvss": 10.0, + "cvss-time": "2024-07-26T19:26:00", + "cwe": "CWE-918", + "id": "CVE-2021-34473", + "last-modified": "2024-07-26T19:26:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 7.5, + "cvss-time": "2024-02-13T17:20:00", + "cwe": "CWE-287", + "id": "CVE-2021-34523", + "last-modified": "2024-02-13T17:20:00", + "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" + }, + { + "cvss": 5.0, + "cvss-time": "2024-07-24T16:45:00", + "cwe": "CWE-287", + "id": "CVE-2021-33766", + "last-modified": "2024-07-24T16:45:00", + "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" + } + ] }, "15.1.2176.2": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:*", @@ -8504,6 +8938,14 @@ "last-modified": "2024-07-26T19:25:00", "summary": "Microsoft Exchange Server Security Feature Bypass Vulnerability" }, + { + "cvss": 6.0, + "cvss-time": "2023-12-29T17:15:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2021-24085", + "last-modified": "2023-12-29T17:15:00", + "summary": "Microsoft Exchange Server Spoofing Vulnerability" + }, { "cvss": 5.8, "cvss-time": "2023-08-02T00:15:00", @@ -8618,6 +9060,14 @@ "15.1.2242.10": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*", "cves": [ + { + "cvss": 10.0, + "cvss-time": "2024-07-26T19:26:00", + "cwe": "CWE-918", + "id": "CVE-2021-34473", + "last-modified": "2024-07-26T19:26:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, { "cvss": 7.9, "cvss-time": "2023-12-28T23:15:00", @@ -8626,6 +9076,14 @@ "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 7.5, + "cvss-time": "2024-02-13T17:20:00", + "cwe": "CWE-287", + "id": "CVE-2021-34523", + "last-modified": "2024-02-13T17:20:00", + "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" + }, { "cvss": 6.5, "cvss-time": "2024-08-22T14:13:00", @@ -8641,6 +9099,14 @@ "id": "CVE-2021-33768", "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" + }, + { + "cvss": 5.0, + "cvss-time": "2024-07-24T16:45:00", + "cwe": "CWE-287", + "id": "CVE-2021-33766", + "last-modified": "2024-07-24T16:45:00", + "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" } ] }, @@ -8768,6 +9234,14 @@ "15.1.2242.8": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:*", "cves": [ + { + "cvss": 10.0, + "cvss-time": "2024-07-26T19:26:00", + "cwe": "CWE-918", + "id": "CVE-2021-34473", + "last-modified": "2024-07-26T19:26:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, { "cvss": 7.9, "cvss-time": "2023-12-28T23:15:00", @@ -8776,6 +9250,14 @@ "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 7.5, + "cvss-time": "2024-02-13T17:20:00", + "cwe": "CWE-287", + "id": "CVE-2021-34523", + "last-modified": "2024-02-13T17:20:00", + "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" + }, { "cvss": 6.8, "cvss-time": "2023-08-02T00:15:00", @@ -8823,6 +9305,14 @@ "id": "CVE-2021-33768", "last-modified": "2023-12-28T23:15:00", "summary": "Microsoft Exchange Server Elevation of Privilege Vulnerability" + }, + { + "cvss": 5.0, + "cvss-time": "2024-07-24T16:45:00", + "cwe": "CWE-287", + "id": "CVE-2021-33766", + "last-modified": "2024-07-24T16:45:00", + "summary": "Microsoft Exchange Server Information Disclosure Vulnerability" } ] }, @@ -11595,6 +12085,38 @@ "15.1.2507.32": { "cpe": "cpe:/a:microsoft:exchange_server:2016:cumulative_update_23:*:*:*:*:*:*", "cves": [ + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36744", + "last-modified": "2023-09-15T16:30:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36756", + "last-modified": "2023-09-15T14:15:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36745", + "last-modified": "2023-09-15T16:28:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36757", + "last-modified": "2023-09-14T22:37:00", + "summary": "Microsoft Exchange Server Spoofing Vulnerability" + }, { "cvss": 8.0, "cvss-time": null, @@ -12504,7 +13026,32 @@ }, "15.1.845.36": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_5:*:*:*:*:*:*", - "cves": [] + "cves": [ + { + "cvss": 5.8, + "cvss-time": "2017-07-17T18:48:00", + "cwe": "CWE-601", + "id": "CVE-2017-8621", + "last-modified": "2017-07-17T18:48:00", + "summary": "Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an open redirect vulnerability that could lead to spoofing, aka \"Microsoft Exchange Open Redirect Vulnerability\"." + }, + { + "cvss": 4.3, + "cvss-time": "2017-07-14T13:21:00", + "cwe": "CWE-79", + "id": "CVE-2017-8560", + "last-modified": "2017-07-14T13:21:00", + "summary": "Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka \"Microsoft Exchange Cross-Site Scripting Vulnerability\". This CVE ID is unique from CVE-2017-8559." + }, + { + "cvss": 4.3, + "cvss-time": "2017-07-14T13:25:00", + "cwe": "CWE-79", + "id": "CVE-2017-8559", + "last-modified": "2017-07-14T13:25:00", + "summary": "Microsoft Exchange Server 2010 SP3, Exchange Server 2013 SP3, Exchange Server 2013 CU16, and Exchange Server 2016 CU5 allows an elevation of privilege vulnerability due to the way that Exchange Outlook Web Access (OWA) handles web requests, aka \"Microsoft Exchange Cross-Site Scripting Vulnerability\". This CVE ID is unique from CVE-2017-8560." + } + ] }, "15.2.1118.12": { "cpe": "cpe:/a:microsoft:exchange_server:2019:cumulative_update_12:*:*:*:*:*:*", @@ -14876,6 +15423,38 @@ "15.2.1258.25": { "cpe": "cpe:/a:microsoft:exchange_server:2019:cumulative_update_13:*:*:*:*:*:*", "cves": [ + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36744", + "last-modified": "2023-09-15T16:30:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36756", + "last-modified": "2023-09-15T14:15:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36745", + "last-modified": "2023-09-15T16:28:00", + "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 8.0, + "cvss-time": null, + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2023-36757", + "last-modified": "2023-09-14T22:37:00", + "summary": "Microsoft Exchange Server Spoofing Vulnerability" + }, { "cvss": 8.0, "cvss-time": null, @@ -15162,6 +15741,14 @@ "15.2.330.10": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_2:*:*:*:*:*:*", "cves": [ + { + "cvss": 7.8, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2019-1233", + "last-modified": "2020-08-24T17:37:00", + "summary": "A denial of service vulnerability exists in Microsoft Exchange Server software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Denial of Service Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -15193,6 +15780,14 @@ "id": "CVE-2021-27065", "last-modified": "2024-07-25T17:34:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" + }, + { + "cvss": 4.3, + "cvss-time": "2020-08-24T17:37:00", + "cwe": "CWE-79", + "id": "CVE-2019-1266", + "last-modified": "2020-08-24T17:37:00", + "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web App (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'." } ] }, @@ -15372,6 +15967,14 @@ "id": "CVE-2019-1266", "last-modified": "2020-08-24T17:37:00", "summary": "A spoofing vulnerability exists in Microsoft Exchange Server when Outlook Web App (OWA) fails to properly handle web requests, aka 'Microsoft Exchange Spoofing Vulnerability'." + }, + { + "cvss": 3.5, + "cvss-time": "2020-04-09T13:19:00", + "cwe": "CWE-79", + "id": "CVE-2019-1137", + "last-modified": "2020-04-09T13:19:00", + "summary": "A cross-site-scripting (XSS) vulnerability exists when Microsoft Exchange Server does not properly sanitize a specially crafted web request to an affected Exchange server, aka 'Microsoft Exchange Server Spoofing Vulnerability'." } ] }, @@ -15398,6 +16001,14 @@ "15.2.464.11": { "cpe": "cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_3:*:*:*:*:*:*", "cves": [ + { + "cvss": 9.0, + "cvss-time": "2024-02-13T17:23:00", + "cwe": "CWE-287", + "id": "CVE-2020-0688", + "last-modified": "2024-02-13T17:23:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00", @@ -15406,6 +16017,14 @@ "last-modified": "2024-02-15T20:18:00", "summary": "Microsoft Exchange Server Remote Code Execution Vulnerability" }, + { + "cvss": 6.8, + "cvss-time": "2021-07-21T11:39:00", + "cwe": "NVD-CWE-noinfo", + "id": "CVE-2020-0692", + "last-modified": "2021-07-21T11:39:00", + "summary": "An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka 'Microsoft Exchange Server Elevation of Privilege Vulnerability'." + }, { "cvss": 6.8, "cvss-time": "2024-07-25T17:53:00", @@ -15524,6 +16143,14 @@ "last-modified": "2024-02-13T17:23:00", "summary": "A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'." }, + { + "cvss": 7.5, + "cvss-time": "2019-11-14T19:34:00", + "cwe": "CWE-502", + "id": "CVE-2019-1373", + "last-modified": "2019-11-14T19:34:00", + "summary": "A remote code execution vulnerability exists in Microsoft Exchange through the deserialization of metadata via PowerShell, aka 'Microsoft Exchange Remote Code Execution Vulnerability'." + }, { "cvss": 7.5, "cvss-time": "2024-02-15T20:18:00",