Page 8 of 238 results (0.006 seconds)

CVSS: 6.5EPSS: 0%CPEs: 2EXPL: 0

Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker. Una vulnerabilidad de escalada de privilegios en DXL Broker para Windows anterior a 6.0.0.280 permite a los usuarios locales obtener privilegios elevados al explotar controles de directorio débiles en el directorio de registros. Esto puede provocar un ataque de denegación de servicio al DXL Broker. • https://kcm.trellix.com/corporate/index?page=content&id=SB10383 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVSS: 8.8EPSS: 95%CPEs: 5EXPL: 7

Microsoft Exchange Server Elevation of Privilege Vulnerability Una Vulnerabilidad de Elevación de Privilegios en Microsoft Exchange Server This vulnerability allows remote attackers to escalate privileges on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The specific flaw exists within the Autodiscover service. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to escalate privileges to resources normally protected from the user. Microsoft Exchange Server allows for server-side request forgery. • https://github.com/kljunowsky/CVE-2022-41040-POC https://github.com/TaroballzChen/CVE-2022-41040-metasploit-ProxyNotShell https://github.com/numanturle/CVE-2022-41040 https://github.com/d3duct1v/CVE-2022-41040 https://github.com/r3dcl1ff/CVE-2022-41040 https://github.com/ITPATJIDR/CVE-2022-41040 http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41040 https://www.kb.c • CWE-918: Server-Side Request Forgery (SSRF) •

CVSS: 8.8EPSS: 15%CPEs: 5EXPL: 7

Microsoft Exchange Server Remote Code Execution Vulnerability Una Vulnerabilidad de Ejecución de Código Remota en Microsoft Exchange Server This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Exchange. Authentication is required to exploit this vulnerability. The specific flaw exists within the DagNetMultiValuedProperty class. The issue results from the exposure of a dangerous function. An attacker can leverage this vulnerability to execute code in the context of SYSTEM. Microsoft Exchange Server contains an unspecified vulnerability that allows for authenticated remote code execution. • https://github.com/balki97/OWASSRF-CVE-2022-41082-POC https://github.com/notareaperbutDR34P3r/http-vuln-CVE-2022-41082 https://github.com/notareaperbutDR34P3r/vuln-CVE-2022-41082 https://github.com/SUPRAAA-1337/CVE-2022-41082 https://github.com/sikkertech/CVE-2022-41082 https://github.com/bigherocenter/CVE-2022-41082-POC http://packetstormsecurity.com/files/170066/Microsoft-Exchange-ProxyNotShell-Remote-Code-Execution.html https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41082& • CWE-502: Deserialization of Untrusted Data •

CVSS: 5.3EPSS: 0%CPEs: 4EXPL: 0

Microsoft Exchange Server Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Microsoft Exchange. Este ID de CVE es diferente de CVE-2022-21979, CVE-2022-30134 • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-34692 •

CVSS: 6.5EPSS: 1%CPEs: 5EXPL: 0

Microsoft Exchange Server Information Disclosure Vulnerability Una vulnerabilidad de Divulgación de Información de Microsoft Exchange. Este ID de CVE es diferente de CVE-2022-21979, CVE-2022-34692 • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30134 •