CVE-2022-30190
EPSS Score
Source: FIRST.org · 2026-05-23CVSS v3.1
Source: VulnerabilityLookup (CIRCL)CVSS v2 (legacy)
Description
NVDAffected Products
Google Project Zero
Exploits & PoC
CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。
POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
CVE-2022-30190 Follina POC
Microsoft Office Word Rce 复现(CVE-2022-30190)
This Repository Talks about the Follina MSDT from Defender Perspective
Proof of Concept of CVE-2022-30190
Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)
Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files
A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)
All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word.
CVE-2022-30190 | MS-MSDT Follina One Click
Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go
Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hacke
Just another PoC for the new MSDT-Exploit
This is exploit of CVE-2022-30190 on PowerPoint.
A Command Line based python tool for exploit Zero-Day vulnerability in MSDT (Microsoft Support Diagnostic Tool) also know as 'Follina' CVE-2022-30190.
MS-MSDT Follina CVE-2022-30190 PoC document generator
CVE-2022-30190 remediation via removal of ms-msdt from Windows registry
This project demonstrates a proof-of-concept exploit for CVE-2022-30190, also known as "Follina"—a critical remote code execution vulnerability affect
Remote Access Shell for Windows (based on cve-2022-30190)
Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.
Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)
Server to host/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190)
An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft
Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190)
MSDT protocol disabler (CVE-2022-30190 patch tool)
The CVE-2022-30190-follina Workarounds Patch
A very simple MSDT "Follina" exploit **patched**
Follina POC by John Hammond
proof of concept to CVE-2022-30190 (follina)
An Unofficial Patch Follina CVE-2022-30190 (patch) by micrisoft Guidelines.
Follina (CVE-2022-30190) proof-of-concept
A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defens
A proof of concept for CVE-2022-30190 (Follina).
Aka Follina = benign POC.
CVE-2022-30190- A Zero-Click RCE Vulnerability In MSDT
Mitigates the "Folina"-ZeroDay (CVE-2022-30190)
Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector
Microsoft Support Diagnostic Tool (CVE-2022-30190)
Repository containing the compromised certificate seen in recent CVE-2022-30190 (Follina) attacks.
CVE-2022-30190(follina)
Implementation of FOLLINA-CVE-2022-30190
An exploitation of CVE-2022-30190 (Follina)
An automated attack chain based on CVE-2022-30190, 163 email backdoor, and image steganography.
The script is from https://github.com/JohnHammond/msdt-follina, just make it simple for me to use it and this script aim at generating the payload fo
Static Malware Analysis of Follina (CVE-2022-30190) from Blue Team Labs Online
Picking up processes that have triggered ASR related to CVE-2022-30190
CVE-2022-30190 or "Follina" 0day proof of concept
Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION.
PDQ Package I created for CVE-2022-30190
Simple Follina poc exploit
This is to patch CVE-2022-30190. Use at your own risk.
Powershell script to mitigate cve-2022-30190
Notes related to CVE-2022-30190
Mitigation for CVE-2022-30190
this is my simple article about CVE 2022-30190 (Follina) analysis. I use the lab from Letsdefend.
These are two Python scripts compiled to easily and quickly apply temporary protection against the CVE-2022-30190 vulnerability (Follina)
These are the source codes of the Python scripts to apply the temporary protection against the CVE-2022-30190 vulnerability (Follina)
CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina
Python file scanner created in 2021 scanning for known and potential vulns
follina zero day vulnerability to help Microsoft to mitigate the attack
this is a demo attack of FOLLINA exploit , a vulnerability that has been discovered in May 2022 and stood unpatched until June 2022
Implementation of CVE-2022-30190 in C
Educational Follina PoC Tool
A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)
Educational exploit for CVE-2022-30190
PoC of CVE-2022-30190
Project on CVE-2022-30190 exploitation and mitigation strategies
Project Repository for Exploitation, Detection and Mitigation of Folina Vulnerability (CVE-2022-30190)
Exploration of the Follina (CVE-2022-30190) Microsoft Office vulnerability, including a detailed analysis, proof-of-concept exploitation in a controll
We are presented with a security alert indicating the detection of the Follina (CVE-2022-30190) vulnerability. A malicious Word document triggered msd
Educational Proof-of-Concept for the CVE-2022-30190 (Follina) vulnerability.
Full exploit chain lab and Suricata IDS detection for CVE-2022-30190 (Follina) - MSDT RCE