Back to directory
WRITEUP #1937

Control Your Types Or Get Pwned: Remote Code Execution In Exchange Powershell Backend

RCEWindows
by@chudyPB(Piotr Bazydło)
Program
Checkmk
Published
Nov 16, 2022
Added to HackDex
Nov 17, 2022
Read Full Writeuphttps://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
RELATED WRITEUPS
Vulnerabilities in Open Source C2 Frameworks
RCEOS command injection
[2,500$ Bug Bounty Write-Up] Remote Code Execution (RCE) via unclaimed Node package
RCEDependency confusion
Attacking PowerShell CLIXML Deserialization
DeserializationInsecure deserialization
Zero-Click Calendar invite — Critical zero-click vulnerability chain in macOS
RCEArbitrary file write
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
RCETLD hacking

Built with ❤️ by Shubham Rawat