CVE-2021-28483

Description from NVD

Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2021-28480, CVE-2021-28481, CVE-2021-28482.

Information Acquisition Date:2021-04-27T14:03Z
CVSS 2.0: 7.7 HIGH CVSS 3.x: 9.0 CRITICAL

▼ CVSS3 Vec CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

▼ CVSS2 Vec AV:A/AC:L/Au:S/C:C/I:C/A:C

NVD References

 https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-28483
     source:MISC
     tags:Patch    Vendor Advisory    

Refer to Information on External Sites

CVE InfomationExploits or more Infomation
mitreEXPLOIT DATABASE
NVD0day.today
vulmon.comgithub
CVE DetailsTwitter
JVN ENG JPN
Reconshell

Software Tag: Exchange(2 tweets)



List of frequently cited URLs

URLNum of Times Referred to
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2...10
http://travaux.ovh.net/?do=details&id=499595
https://techcommunity.microsoft.com/t5/exchange-team-blog/r...5
https://vfeed.io4
https://www.tenable.com/blog/cve-2021-28480-cve-2021-28481-...4
https://twitter.com/GossiTheDog/status/13820164342897049603
https://msrc-blog.microsoft.com/2021/04/13/april-2021-updat...3

Information from Twitter

User URL Info Source Date
VulmonFeeds http://vulmon.com/vulnerabilitydetails?qid=CVE-2021-28480 Source VulmonFeeds      1509084882294689798 2022/03/30

List of frequently cited URLs

URLNum of Times Referred to
msrc.microsoft.com10
travaux.ovh.net5
techcommunity.microsoft.com5
vfeed.io4
www.tenable.com4
twitter.com3
msrc-blog.microsoft.com3

Information from Twitter

User URL Info Source
VulmonFeeds vulmon.com Show Tweet

GitHub Search Results: Up to 10
NameURL
ZephrFish/ExchangeRCE-CVE-2021-28480 https://github.com/ZephrFish/ExchangeRCE-CVE-2021-28480

GitHub Search Results: Up to 10
NameURL
ZephrFish/ExchangeRCE-CVE-2021-28480 github.com

2022/04/13 Score : 1
Added Har-sia Database : 2021/04/14
Last Modified : 2022/04/13
Highest Scored Date : 2021/04/14
Highest Score : 39