Lucene search

K
githubexploit296ECE66-CC92-53E6-9959-06669247F867
HistoryNov 28, 2023 - 3:47 a.m.

Exploit for Externally Controlled Reference to a Resource in Another Sphere in Microsoft

2023-11-2803:47:32
270
externally controlled reference
microsoft word
cve-2022-30190
163 email backdoor
image steganography
automated attack chain
github repository
python
pycrypto module
wmi module
enum34 module
netifaces module
social engineering
remote control commands
anti-virus
privilege escalation
task manager
smtp server
imap server
screenshots
pop-up windows
shutting down
learning and exchange.

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.963

Percentile

99.6%

AmzWord

an automated attack chain based on CVE-2022-30190, …

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

7.8

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS

0.963

Percentile

99.6%