Published: 10/11/2021 Updated: 10/11/2021
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Microsoft Exchange Server Spoofing Vulnerability. Exploitation Less Likely.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft exchange server 2013

microsoft exchange server 2016

microsoft exchange server 2019

Github Repositories

Microsoft Exchange Exploit CVE-2021-41349 Exploitation of CVE-2021-41349 This exploiting tool creates a Form for posting XSS Payload to the target Exchange server You need to create a js containing your desire to do Usage Create Your js Payload and upload it somewhare run the CVE-2021-41349py same as following steps python3 CVE-2021-41349py "mailtargetcom

Introduction expbox is an exploit code collection repository List CVE-2021-41349 Exchange XSS PoC <= Exchange 2013 update 23 <= Exchange 2016 update 22 <= Exchange 2019 update 11 CVE-2021–3945 Django-helpdesk stored XSS PoC <= 030 Note All content comes from the I