Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability.
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: VMware(2 tweets) Windows(2 tweets)
List of frequently cited URLs
User | URL | Info Source | Date |
---|---|---|---|
DragonJAR | https://twitter.com/DragonJAR/status/1633489790594154496/vi... | Source DragonJAR 1633489790594154496 | 2023/03/09 |
MariaRusanova88 | https://twitter.com/DragonJAR/status/1633489790594154496 | Source MariaRusanova88 1633851545707220994 | 2023/03/10 |
dark_relay2 | https://www.darkrelay.com/post/vulnerability-and-exploit-an... | Source dark_relay2 1640405816657448960 | 2023/03/28 |
__kokumoto | https://www.securityweek.com/most-weaponized-vulnerabilitie... | Source __kokumoto 1641088615957815296 | 2023/03/29 |
housu_jp | https://msrc.microsoft.com/blog/2022/05/guidance-for-cve-20... | Source housu_jp 1641388225964179456 | 2023/03/30 |
0xP0ch1ta | https://l4dybug.medium.com/reproduction-of-cve-2022-30190-z... | Source 0xP0ch1ta 1644545720358436866 | 2023/04/08 |
netsecu | https://www.seqrite.com/blog/cve-2022-30190-zero-day-vulner... | Source netsecu 1646665012436516872 | 2023/04/14 |
List of frequently cited URLs
User | URL | Info Source |
---|---|---|
DragonJAR | twitter.com | Show Tweet |
MariaRusanova88 | twitter.com | Show Tweet |
dark_relay2 | darkrelay.com | Show Tweet |
__kokumoto | securityweek.com | Show Tweet |
housu_jp | msrc.microsoft.com | Show Tweet |
0xP0ch1ta | l4dybug.medium.com | Show Tweet |
netsecu | seqrite.com | Show Tweet |
Name | URL |
---|---|
JMousqueton/PoC-CVE-2022-30190 | https://github.com/JMousqueton/PoC-CVE-2022-30190 |
onecloudemoji/CVE-2022-30190 | https://github.com/onecloudemoji/CVE-2022-30190 |
komomon/CVE-2022-30190-follina-Office-MSDT-Fixed | https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed |
bytecaps/CVE-2022-30190 | https://github.com/bytecaps/CVE-2022-30190 |
archanchoudhury/MSDT_CVE-2022-30190 | https://github.com/archanchoudhury/MSDT_CVE-2022-30190 |
PaddlingCode/cve-2022-30190 | https://github.com/PaddlingCode/cve-2022-30190 |
drgreenthumb93/CVE-2022-30190-follina | https://github.com/drgreenthumb93/CVE-2022-30190-follina |
DerZiad/CVE-2022-30190 | https://github.com/DerZiad/CVE-2022-30190 |
ErrorNoInternet/FollinaScanner | https://github.com/ErrorNoInternet/FollinaScanner |
sudoaza/CVE-2022-30190 | https://github.com/sudoaza/CVE-2022-30190 |
Name | URL |
---|---|
JMousqueton/PoC-CVE-2022-30190 | github.com |
onecloudemoji/CVE-2022-30190 | github.com |
komomon/CVE-2022-30190-follina-Office-MSDT-Fixed | github.com |
bytecaps/CVE-2022-30190 | github.com |
archanchoudhury/MSDT_CVE-2022-30190 | github.com |
PaddlingCode/cve-2022-30190 | github.com |
drgreenthumb93/CVE-2022-30190-follina | github.com |
DerZiad/CVE-2022-30190 | github.com |
ErrorNoInternet/FollinaScanner | github.com |
sudoaza/CVE-2022-30190 | github.com |