cve/2021/CVE-2021-31195.md

47 lines
2.4 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-31195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31195)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Exchange%20Server%202013%20Cumulative%20Update%2023&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2019&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Exchange%20Server%202016%20Cumulative%20Update%2020&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%208&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Exchange%20Server%202019%20Cumulative%20Update%209&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=15.00.0%3C%2015.00.1497.018%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=15.01.0%3C%2015.01.2176.014%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=15.01.0%3C%2015.01.2242.010%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=15.02.0%3C%2015.02.0792.015%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Version&message=15.02.0%3C%2015.02.0858.012%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Spoofing&color=brighgreen)
### Description
Microsoft Exchange Server Remote Code Execution Vulnerability
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/sectool
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Astrogeorgeonethree/Starred
- https://github.com/Astrogeorgeonethree/Starred2
- https://github.com/Atem1988/Starred
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/DIVD-NL/ProxyOracleNSE
- https://github.com/FDlucifer/Proxy-Attackchain
- https://github.com/GhostTroops/TOP
- https://github.com/JERRY123S/all-poc
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/hktalent/TOP
- https://github.com/hosch3n/ProxyVulns
- https://github.com/jbmihoub/all-poc
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/retr0-13/proxy_Attackchain
- https://github.com/weeka10/-hktalent-TOP