### [CVE-2018-8581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-8581) ![](https://img.shields.io/static/v1?label=Product&message=Microsoft%20Exchange%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Elevation%20of%20Privilege&color=brighgreen) ### Description An elevation of privilege vulnerability exists in Microsoft Exchange Server, aka "Microsoft Exchange Server Elevation of Privilege Vulnerability." This affects Microsoft Exchange Server. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xT11/CVE-POC - https://github.com/1o24er/RedTeam - https://github.com/20142995/sectool - https://github.com/404notf0und/Security-Data-Analysis-and-Visualization - https://github.com/61106960/adPEAS - https://github.com/ARPSyndicate/cvemon - https://github.com/Al1ex/Red-Team - https://github.com/Apri1y/Red-Team-links - https://github.com/CVEDB/PoC-List - https://github.com/CVEDB/awesome-cve-repo - https://github.com/CVEDB/top - https://github.com/CYJoe-Cyclone/Awesome-CobaltStrike - https://github.com/Echocipher/Resource-list - https://github.com/ErdemOzgen/ActiveDirectoryAttacks - https://github.com/FDlucifer/Proxy-Attackchain - https://github.com/GhostTroops/TOP - https://github.com/HackingCost/AD_Pentest - https://github.com/JERRY123S/all-poc - https://github.com/Nieuport/Active-Directory-Kill-Chain-Attack-Defense - https://github.com/Ondrik8/RED-Team - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/R0B1NL1N/AD-Attack-Defense - https://github.com/Ridter/Exchange2domain - https://github.com/SycloverSecurity/http_ntlmrelayx - https://github.com/Whiteh4tWolf/Attack-Defense - https://github.com/WyAtu/CVE-2018-8581 - https://github.com/ZyberPatrol/Active-Directory - https://github.com/aymankhder/AD-attack-defense - https://github.com/bhataasim1/AD-Attack-Defence - https://github.com/cetriext/fireeye_cves - https://github.com/cyberanand1337x/bug-bounty-2022 - https://github.com/diyarit/Ad-Peas - https://github.com/dk47os3r/hongduiziliao - https://github.com/fei9747/Awesome-CobaltStrike - https://github.com/geeksniper/active-directory-pentest - https://github.com/hackeremmen/Active-Directory-Kill-Chain-Attack-Defense- - https://github.com/hangchuanin/Intranet_penetration_history - https://github.com/hasee2018/Safety-net-information - https://github.com/hectorgie/PoC-in-GitHub - https://github.com/hktalent/TOP - https://github.com/hktalent/bug-bounty - https://github.com/hudunkey/Red-Team-links - https://github.com/infosecn1nja/AD-Attack-Defense - https://github.com/jbmihoub/all-poc - https://github.com/john-80/-007 - https://github.com/landscape2024/RedTeam - https://github.com/laoqin1234/https-github.com-HackingCost-AD_Pentest - https://github.com/lp008/Hack-readme - https://github.com/mishmashclone/infosecn1nja-AD-Attack-Defense - https://github.com/nadeemali79/AD-Attack-Defense - https://github.com/nobiusmallyu/kehai - https://github.com/orgTestCodacy11KRepos110MB/repo-3569-collection-document - https://github.com/paramint/AD-Attack-Defense - https://github.com/phackt/Invoke-Recon - https://github.com/qiantu88/CVE-2018-8581 - https://github.com/retr0-13/AD-Attack-Defense - https://github.com/shantanu561993/DomainUserToDomainAdminTechniques - https://github.com/slimdaddy/RedTeam - https://github.com/sunzu94/AD-Attack-Defense - https://github.com/superfish9/pt - https://github.com/svbjdbk123/- - https://github.com/tataev/Security - https://github.com/tom0li/collection-document - https://github.com/twensoo/PersistentThreat - https://github.com/weeka10/-hktalent-TOP - https://github.com/whitfieldsdad/epss - https://github.com/xiaoZ-hc/redtool - https://github.com/yut0u/RedTeam-BlackBox - https://github.com/zer0yu/Awesome-CobaltStrike - https://github.com/zer0yu/Intranet_Penetration_CheetSheets - https://github.com/zer0yu/RedTeam_CheetSheets - https://github.com/zoreforlugcoiz/Devhoster