Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 9 | 15.02.0 ~ 15.02.0858.010 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_9:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 20 | 15.01.0 ~ 15.01.2242.008 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_20:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2013 Cumulative Update 23 | 15.00.0 ~ 15.00.1497.015 | cpe:2.3:a:microsoft:exchange_server:2013:cumulative_update_23:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2016 Cumulative Update 19 | 15.01.0 ~ 15.01.2176.012 | cpe:2.3:a:microsoft:exchange_server:2016:cumulative_update_19:*:*:*:*:*:* | |
| Microsoft | Microsoft Exchange Server 2019 Cumulative Update 8 | 15.02.0 ~ 15.02.0792.013 | cpe:2.3:a:microsoft:exchange_server:2019:cumulative_update_8:*:*:*:*:*:* |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | ProxyToken (CVE-2021-33766) : An Authentication Bypass in Microsoft Exchange Server POC exploit | https://github.com/bhdresh/CVE-2021-33766 | POC Details |
| 2 | CVE-2021-33766-poc | https://github.com/demossl/CVE-2021-33766-ProxyToken | POC Details |
| 3 | Microsoft Exchange Server Information Disclosure Vulnerability. This vulnerability enables an attacker to bypass authentication and gain access to the Exchange Server's internal. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-33766.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2021-34473 | 9.1 CRITICAL | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2021-34523 | 9.0 CRITICAL | Microsoft Exchange Server Elevation of Privilege Vulnerability |
| CVE-2021-33756 | 8.8 HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability |
| CVE-2021-34525 | 8.8 HIGH | Windows DNS Server Remote Code Execution Vulnerability |
| CVE-2021-33752 | 8.8 HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability |
| CVE-2021-33750 | 8.8 HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability |
| CVE-2021-34508 | 8.8 HIGH | Windows Kernel Remote Code Execution Vulnerability |
| CVE-2021-33749 | 8.8 HIGH | Windows DNS Snap-in Remote Code Execution Vulnerability |
| CVE-2021-34494 | 8.8 HIGH | Windows DNS Server Remote Code Execution Vulnerability |
| CVE-2021-33780 | 8.8 HIGH | Windows DNS Server Remote Code Execution Vulnerability |
| CVE-2021-34469 | 8.2 HIGH | Microsoft Office Security Feature Bypass Vulnerability |
| CVE-2021-33767 | 8.2 HIGH | Open Enclave SDK Elevation of Privilege Vulnerability |
| CVE-2021-33779 | 8.1 HIGH | Windows AD FS Security Feature Bypass Vulnerability |
| CVE-2021-33786 | 8.1 HIGH | Windows LSA Security Feature Bypass Vulnerability |
| CVE-2021-33781 | 8.1 HIGH | Azure AD Security Feature Bypass Vulnerability |
| CVE-2021-34520 | 8.1 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2021-34492 | 8.1 HIGH | Windows Certificate Spoofing Vulnerability |
| CVE-2021-34474 | 8.0 HIGH | Dynamics Business Central Remote Code Execution Vulnerability |
| CVE-2021-33754 | 8.0 HIGH | Windows DNS Server Remote Code Execution Vulnerability |
| CVE-2021-34470 | 8.0 HIGH | Microsoft Exchange Server Elevation of Privilege Vulnerability |
Showing top 20 of 90 CVEs. View all on vendor page → →
No comments yet