Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-26412, CVE-2021-26854, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065, CVE-2021-27078.
This indicates an attack attempt to exploit a Remote Code Execution in Microsoft Exchange Server.The vulnerability is due to insufficient sanitization when handling a malicious request. A remote attacker may be able to exploit this to disclose data or execute arbitrary code within the context of the application, via a crafted HTTP request.
Microsoft Exchange Server 2016 Cumulative Update 19
Microsoft Exchange Server 2019 Cumulative Update 8
Microsoft Exchange Server 2013 Cumulative Update 23
Microsoft Exchange Server 2019 Cumulative Update 7
Microsoft Exchange Server 2016 Cumulative Update 18
System Compromise: Remote attackers can gain control of vulnerable systems.
Apply the most recent upgrade or patch from the vendor.
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-26855
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Exchange(1 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
No Data |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
No Data |
Name | URL |
---|---|
charlottelatest/CVE-2021-26855 | https://github.com/charlottelatest/CVE-2021-26855 |
h4x0r-dz/CVE-2021-26855 | https://github.com/h4x0r-dz/CVE-2021-26855 |
hackerschoice/CVE-2021-26855 | https://github.com/hackerschoice/CVE-2021-26855 |
alt3kx/CVE-2021-26855_PoC | https://github.com/alt3kx/CVE-2021-26855_PoC |
p0wershe11/ProxyLogon | https://github.com/p0wershe11/ProxyLogon |
herwonowr/exprolog | https://github.com/herwonowr/exprolog |
cert-lv/exchange_webshell_detection | https://github.com/cert-lv/exchange_webshell_detection |
srvaccount/CVE-2021-26855-PoC | https://github.com/srvaccount/CVE-2021-26855-PoC |
ZephrFish/Exch-CVE-2021-26855 | https://github.com/ZephrFish/Exch-CVE-2021-26855 |
pussycat0x/CVE-2021-26855-SSRF | https://github.com/pussycat0x/CVE-2021-26855-SSRF |
Name | URL |
---|---|
charlottelatest/CVE-2021-26855 | github.com |
h4x0r-dz/CVE-2021-26855 | github.com |
hackerschoice/CVE-2021-26855 | github.com |
alt3kx/CVE-2021-26855_PoC | github.com |
p0wershe11/ProxyLogon | github.com |
herwonowr/exprolog | github.com |
cert-lv/exchange_webshell_detection | github.com |
srvaccount/CVE-2021-26855-PoC | github.com |
ZephrFish/Exch-CVE-2021-26855 | github.com |
pussycat0x/CVE-2021-26855-SSRF | github.com |