CVE-2024-21413
Published Feb 13, 2024
Last updated a month ago
Overview
- Description
- Microsoft Outlook Remote Code Execution Vulnerability
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
#day68 Just wrapped up a deep dive into the moniker link vulnerability (CVE-2024-21413) on TryHackMe. It was an awesome experience to learn about exploitation, remediation, and detection techniques. Excited to keep honing my cybersecurity skills! #cybersecurity #Tryhackme https
@Rahmat2283
Nov 7, 2024 3:58 PM
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Completed the Moniker Link (CVE-2024-21413) room on TryHackMe, enhancing my skills in vulnerability exploitation. @RealTryHackMe #TryHackMe #CVE2024 https://t.co/VHRESQsQje https://t.co/QvVRQvZoAe
@anish_op_007
Nov 7, 2024 3:32 PM
31 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
馃敂CVE-2024-21413: El 13 de febrero de 2024, Microsoft notific贸 sobre una vulnerabilidad en su aplicaci贸n Outlook. Est谩 considerada como cr铆tica (9,8). Os contamos cu谩les son las versiones afectadas en el siguiente enlace: 鉃★笍https://t.co/nE1rVjURtZ 馃捇 https://t.co/kPhRu12I52
@fluproject
Oct 26, 2024 1:01 PM
154 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Day 4 of my 30-day TryHackMe challenge -Completed the Exploitation Basics module -Exploited a real-world vulnerability with CVE-2024-21413 -Got hands-on with Metasploit and Meterpreter for post-exploitation -Finished with a CTF lab in the Blue room, hacking a Windows machine htt
@trickysali
Oct 25, 2024 8:56 PM
95 Impressions
0 Retweets
5 Likes
0 Bookmarks
1 Reply
0 Quotes
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- secure@microsoft.com
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*", "vulnerable": true, "matchCriteriaId": "40C15EDD-98D4-4D06-BA06-21AE0F33C72D" }, { "criteria": "cpe:2.3:a:microsoft:office:2016:*:-:*:-:*:-:*", "vulnerable": true, "matchCriteriaId": "DC9D0A78-9F16-41E0-910E-E93269DB9B30" }, { "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF177984-A906-43FA-BF60-298133FBBD6B" }, { "criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B3EF1E5-4757-4CFA-AE72-6BA876D3C9FD" } ], "operator": "OR" } ] } ]