Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft Exchange Server 2013 Cumulative Update 23 | 15.00.0 ~ 15.00.1497.015 | cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 19 | 15.01.0 ~ 15.01.2176.012 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 8 | 15.02.0 ~ 15.02.0792.013 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 20 | 15.01.0 ~ 15.01.2242.008 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 9 | 15.02.0 ~ 15.02.0858.010 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | DO NOT RUN THIS. | https://github.com/ZephrFish/CVE-2021-28480_HoneyPoC3 | POC Details |
| 2 | None | https://github.com/Threonic/CVE-2021-28480 | POC Details |
| 3 | Microsoft Exchange Server contains a remote code execution caused by improper input validation in the server component, letting remote attackers execute arbitrary code, exploit requires network access to the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-28480.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-28481 | 9.8 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2021-28483 | 9.0 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2021-28327 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28344 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28329 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28330 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28331 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28332 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28333 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28334 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28335 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28336 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28337 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28338 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28339 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28340 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28356 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28357 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28358 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2021-28355 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
Showing top 20 of 108 CVEs. View all on vendor page → →
No comments yet