Microsoft Exchange Server Remote Code Execution Vulnerability.UPDATED VERSION ALLOWS FOR HTTPS CHECK AS WELL
# exchange-vuln-check.nse
FOR HTTP:
`nmap -p80 <target-ip> --script exchange-vuln-check.nse`
FOR HTTPS:
`nmap -p443 <target-ip> --script exchange-vuln-check.nse`
SAVE RESULTS IN A FILE
`nmap -p80 <target-ip> --script exchange-vuln-check.nse -oN results.txt`
# http-vuln-CVE-2022-41082
Microsoft Exchange Server Remote Code Execution Vulnerability.
`nmap -p <port> --script vuln-CVE-2022-41082 <target>`
[4.0K] /data/pocs/a9552acd014ed38e69752c84bf84c9a85d2ef418
├── [2.6K] exchange-vuln-check.nse
├── [ 465] README.md
└── [2.7K] vuln-CVE-2022-41082.nse
0 directories, 3 files