A vulnerability was found in Microsoft Exchange Server 2013 CU23/2016 CU21/2019 CU10 (Groupware Software). It has been declared as critical. Applying a patch is able to eliminate this problem. A possible mitigation has been published immediately after the disclosure of the vulnerability.
Microsoft Exchange Server 2013 CU23/2016 CU21/2019 CU10 Remote Privilege Escalation
- Virtual Patching
- July 14, 2021
- 7:04 am
CVE-2024-9632 : X.ORG X SERVER UP TO 21.1.13 BITMAP_XKBSETCOMPATMAP SYM_INTERPRET HEAP-BASED OVERFLOW
Description A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker
CVE-2024-51568 : PSAUX CYBERPANEL UP TO 2.3.4 FILE MANAGER /FILEMANAGER/UPLOAD PROCESSUTILITIES.OUTPUTEXECUTIONER OS COMMAND INJECTION
Description CyberPanel (aka Cyber Panel) before 2.3.5 allows Command Injection via completePath in the ProcessUtilities.outputExecutioner() sink. There is /filemanager/upload (aka
CVE-2024-8923 : SERVICENOW NOW PLATFORM IMPROPER AUTHENTICATION
Description ServiceNow has addressed an input validation vulnerability that was identified in the Now Platform. This vulnerability could enable an