A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.
This indicates an attack attempt to exploit a Remote Code Execution Vulnerability in Microsoft Exchange Server.The vulnerability is due to insecure keys. A remote attacker may be able to exploit this to execute arbitrary code within the context of the application, via a crafted HTTP request.
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 3
Microsoft Exchange Server 2016 Cumulative Update 14
Microsoft Exchange Server 2016 Cumulative Update 15
Microsoft Exchange Server 2019 Cumulative Update 4
Microsoft Exchange Server 2010 Service Pack 3 Update Rollup 30
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Exchange(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
psyopsnewsSWE | https://cyberpolygon.com/materials/okhota-na-ataki-ms-excha... | Source psyopsnewsSWE 1631811001443053569 | 2023/03/04 |
fletch_ai | https://bit.ly/3ZIC4Dr | Source fletch_ai 1632915225581084672 | 2023/03/07 |
CyberWarship | https://github.com/Ridter/cve-2020-0688 | Source CyberWarship 1646799774966751232 | 2023/04/14 |
hack_git | https://github.com/Ridter/cve-2020-0688 | Source hack_git 1647334780592070659 | 2023/04/16 |
hack_git | https://t.me/hackgit/8298 | Source hack_git 1647334780592070659 | 2023/04/16 |
hack_git | https://twitter.com/hack_git/status/1647334780592070659/pho... | Source hack_git 1647334780592070659 | 2023/04/16 |
ipssignatures | https://twitter.com/hack_git/status/1647334780592070659 | Source ipssignatures 1647662645766414341 | 2023/04/17 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
psyopsnewsSWE | cyberpolygon.com | Show Tweet |
fletch_ai | bit.ly | Show Tweet |
CyberWarship | github.com | Show Tweet |
hack_git | github.com | Show Tweet |
hack_git | t.me | Show Tweet |
hack_git | twitter.com | Show Tweet |
ipssignatures | twitter.com | Show Tweet |
Name | URL |
---|---|
No Data |
Name | URL |
---|---|
No Data |