Microsoft Exchange Server Elevation of Privilege Vulnerability. This CVE ID is unique from CVE-2022-41123.
Attack Vector (AV) | Network | Adjacent | Local | Physical |
---|---|---|---|---|
Attack Complexity (AC) | LOW | High | ||
Privileges Required (PR) | None | Low | High | |
User Interaction (UI) | None | Required | ||
Scope (S) | Unchange | Change | ||
Confidentiality (C) | None | Low | High | |
Integrity (I) | None | Low | High | |
Availability (A) | None | Low | High |
CVE Infomation | Exploits or more Infomation |
---|---|
mitre | EXPLOIT DATABASE |
NVD | 0day.today |
vulmon.com | github |
CVE Details | |
JVN ENG JPN | |
Reconshell |
Software Tag: Exchange(137 tweets) Windows(6 tweets) iOS(3 tweets)
List of frequently cited URLs
List of frequently cited URLs
Name | URL |
---|---|
balki97/OWASSRF-CVE-2022-41082-POC | https://github.com/balki97/OWASSRF-CVE-2022-41082-POC |
Live-Hack-CVE/CVE-2022-41080 | https://github.com/Live-Hack-CVE/CVE-2022-41080 |
ohnonoyesyes/CVE-2022-41080 | https://github.com/ohnonoyesyes/CVE-2022-41080 |
Live-Hack-CVE/CVE-2022-41123 | https://github.com/Live-Hack-CVE/CVE-2022-41123 |
Name | URL |
---|---|
balki97/OWASSRF-CVE-2022-41082-POC | github.com |
Live-Hack-CVE/CVE-2022-41080 | github.com |
ohnonoyesyes/CVE-2022-41080 | github.com |
Live-Hack-CVE/CVE-2022-41123 | github.com |