Microsoft Acknowledges, Exchange Zero-day Flaws are Being Exploited Ke...
Highlights:
One primary constraint of these vulnerabilities is that an attacker must have authenticated access to an Exchange server to use these exploits.
Microsoft has issued a list of remed...