Microsoft Acknowledges, Exchange Zero-day Flaws are Being Exploited Keywords: Microsoft, z...
Highlights:
One primary constraint of these vulnerabilities is that an attacker must have authenticated access to an Exchange server to use these exploits.
Microsoft has issued a list of remed...