Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft Exchange Server 2019 | Cumulative Update 2 | - | |
| Microsoft | Microsoft Exchange Server 2016 | Cumulative Update 13 | - | |
| Microsoft | Microsoft Exchange Server 2013 | Cumulative Update 23 | - | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 3 | unspecified | - | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 14 | unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2019-1424 | Microsoft Windows Netlogon 输入验证错误漏洞 | |
| CVE-2019-1447 | Microsoft Office Online Server 输入验证错误漏洞 | |
| CVE-2019-1445 | Microsoft Office Online Server 输入验证错误漏洞 | |
| CVE-2019-1432 | Microsoft Windows DirectWrite 信息泄露漏洞 | |
| CVE-2019-1430 | Microsoft Windows Media Foundation 缓冲区错误漏洞 | |
| CVE-2019-1429 | Microsoft Internet Explorer 缓冲区错误漏洞 | |
| CVE-2019-1428 | Microsoft ChakraCore和Microsoft Edge 缓冲区错误漏洞 | |
| CVE-2019-1427 | Microsoft Edge和ChakraCore 缓冲区错误漏洞 | |
| CVE-2019-1426 | Microsoft Edge和ChakraCore 缓冲区错误漏洞 | |
| CVE-2019-1425 | Microsoft Visual Studio 后置链接漏洞 | |
| CVE-2019-1433 | Microsoft Windows Graphics组件安全漏洞 | |
| CVE-2019-1423 | Microsoft Windows和Microsoft Windows Server 后置链接漏洞 | |
| CVE-2019-1422 | Microsoft Windows和Microsoft Windows Server 后置链接漏洞 | |
| CVE-2019-1420 | Microsoft Windows和Microsoft Windows Server 安全漏洞 | |
| CVE-2019-1419 | Microsoft Windows和Microsoft Windows Server 缓冲区错误漏洞 | |
| CVE-2019-1418 | Microsoft Windows Modules Installer Service 信息泄露漏洞 | |
| CVE-2019-1417 | Microsoft Windows Data Sharing Service 安全漏洞 | |
| CVE-2019-1416 | Windows Subsystem for Linux 竞争条件问题漏洞 | |
| CVE-2019-1415 | Windows Installer 安全漏洞 | |
| CVE-2019-1413 | Microsoft Edge 输入验证错误漏洞 |
Showing top 20 of 72 CVEs. View all on vendor page → →
No comments yet