<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CVE-2021-28482 &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/cve-2021-28482/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Sun, 02 May 2021 10:20:46 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼</title>
		<link>https://ailog.tw/lifelog/2021/05/02/exchange/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Sun, 02 May 2021 10:20:46 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Windows]]></category>
		<category><![CDATA[CVE-2021-28480]]></category>
		<category><![CDATA[CVE-2021-28481]]></category>
		<category><![CDATA[CVE-2021-28482]]></category>
		<category><![CDATA[CVE-2021-28483]]></category>
		<category><![CDATA[Exchange]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=7976</guid>

					<description><![CDATA[微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼，有在維護 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/05/02/exchange/" class="more-link">閱讀全文<span class="screen-reader-text">〈微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt;">微軟Microsoft Exchange Server又被發現安全漏洞，允許攻擊者遠端執行任意程式碼，有在維護該平台主機的管理者記得盡快更新。<span id="more-7976"></span></span></p>
<p><span style="font-size: 14pt;">攻擊者透過該漏洞(CVE-2021-28480~28483)，可以透過遠端發送特製請求，利用此漏洞進而執行任意代碼。</span></p>
<p><span style="font-size: 14pt;">影響的Exchange版本：</span><br />
<span style="font-size: 14pt;">Microsoft Exchange Server 2013  </span><br />
<span style="font-size: 14pt;">Microsoft Exchange Server 2016  </span><br />
<span style="font-size: 14pt;">Microsoft Exchange Server 2019 </span></p>
<p><span style="font-size: 14pt;">解決方法：</span><br />
<span style="font-size: 14pt;">微軟官方已釋出對應的修補更新程式。</span><br />
<span style="font-size: 14pt;">CVE-2021-28480：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28480">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28480</a></span></p>
<p><span style="font-size: 14pt;">CVE-2021-28481：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28481">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28481</a></span></p>
<p><span style="font-size: 14pt;">CVE-2021-28482：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28482">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28482</a></span></p>
<p><span style="font-size: 14pt;">CVE-2021-28483：</span><br />
<span style="font-size: 14pt;"><a href="https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28483">https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-28483</a></span></p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
