Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 9 | 15.02.0 ~ 15.02.0858.010 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 20 | 15.01.0 ~ 15.01.2242.008 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2013 Cumulative Update 23 | 15.00.0 ~ 15.00.1497.015 | cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 19 | 15.01.0 ~ 15.01.2176.012 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 8 | 15.02.0 ~ 15.02.0792.013 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Microsoft Exchange Server contains a remote code execution caused by improper input validation in the server component, letting remote attackers execute arbitrary code, exploit requires network access to the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-28481.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet