Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft Office 2019 | 19.0.0 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft 365 Apps for Enterprise | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office LTSC 2021 | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office 2016 | 16.0.0 ~ 16.0.5435.1001 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC | https://github.com/duy-31/CVE-2024-21413 | POC Details |
| 2 | Microsoft-Outlook-Remote-Code-Execution-Vulnerability | https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | POC Details |
| 3 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC | https://github.com/r00tb1t/CVE-2024-21413-POC | POC Details |
| 4 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) | https://github.com/labesterOct/CVE-2024-21413 | POC Details |
| 5 | CVE-2024-21413 PoC for THM Lab | https://github.com/CMNatic/CVE-2024-21413 | POC Details |
| 6 | CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Alma | https://github.com/MSeymenD/CVE-2024-21413 | POC Details |
| 7 | None | https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | POC Details |
| 8 | Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir. | https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | POC Details |
| 9 | CVE-2024-21413 exploit | https://github.com/DevAkabari/CVE-2024-21413 | POC Details |
| 10 | None | https://github.com/dshabani96/CVE-2024-21413 | POC Details |
| 11 | CVE-2024-21413 Microsoft Outlook RCE Exploit | https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit | POC Details |
| 12 | None | https://github.com/th3Hellion/CVE-2024-21413 | POC Details |
| 13 | This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. | https://github.com/ShubhamKanhere307/CVE-2024-21413 | POC Details |
| 14 | CVE-2024-21413 PoC | https://github.com/olebris/CVE-2024-21413 | POC Details |
| 15 | This is a mailer that use console prompt to exploit this vulnerability | https://github.com/DerZiad/CVE-2024-21413 | POC Details |
| 16 | None | https://github.com/Redfox-Secuirty/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape | POC Details |
| 17 | Microsoft Outlook Remote Code Execution Vulnerability. | https://github.com/HYZ3K/CVE-2024-21413 | POC Details |
| 18 | CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC | https://github.com/ThemeHackers/CVE-2024-21413 | POC Details |
| 19 | None | https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB | POC Details |
| 20 | None | https://github.com/Cyber-Trambon/CVE-2024-21413-exploit | POC Details |
| 21 | The project was created to demonstrate the use of various tools for capturing NTLM hashes from users on a network and for executing phishing attacks using email. This showcases how network authentication vulnerabilities and phishing methods can be exploited to compromise systems. | https://github.com/ArtemCyberLab/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413 | POC Details |
| 22 | None | https://github.com/Redfox-Security/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape | POC Details |
| 23 | None | https://github.com/PolarisXSec/CVE-2024-21413 | POC Details |
| 24 | None | https://github.com/MQKGitHub/Moniker-Link-CVE-2024-21413 | POC Details |
| 25 | None | https://github.com/yass2400012/Email-exploit-Moniker-Link-CVE-2024-21413- | POC Details |
| 26 | This repository contains research notes and a high-level proof-of-concept (PoC) for CVE-2024-21413, a vulnerability observed in certain mail clients when handling SMB/moniker-style links embedded in messages. The PoC and experiments documented here were performed in a controlled lab environment on systems. | https://github.com/gurleen-147/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC | POC Details |
| 27 | None | https://github.com/hau2212/Moniker-Link-CVE-2024-21413- | POC Details |
| 28 | Outlook exploitation | https://github.com/mmathivanan17/CVE-2024-21413 | POC Details |
| 29 | ב־13 בפברואר 2024 פרסמה Microsoft חולשת אבטחה חמורה ב־Microsoft Outlook, אשר קיבלה את הזיהוי CVE-2024-21413, ומוכרת בשם Moniker Link Vulnerability. החולשה מאפשרת לתוקף לעקוף את מנגנון Protected View של Outlook | https://github.com/eylommaayan/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook- | POC Details |
| 30 | None | https://github.com/ViniciusFariasDev/cve-2024-21413-outlook-monikerlink-lab | POC Details |
| 31 | None | https://github.com/dionissh/CVE-2024-21413 | POC Details |
| 32 | Technical write-up on CVE-2024-21413 (Moniker Link vulnerability) | https://github.com/securenetexpert/CVE-2024-21413-Moniker-Link-Writeup | POC Details |
| 33 | Laboratorio criado para PenTest da Vuln CVE 2024-214113(MONIKER LINK) | https://github.com/SallocinAvalcante/lab-SMB-responder-CVE-2024-21413 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-21401 | 9.8 CRITICAL | Microsoft Entra Jira Single-Sign-On Plugin Elevation of Privilege Vulnerability |
| CVE-2024-21410 | 9.8 CRITICAL | Microsoft Exchange Server Elevation of Privilege Vulnerability |
| CVE-2024-21364 | 9.3 CRITICAL | Microsoft Azure Site Recovery Elevation of Privilege Vulnerability |
| CVE-2024-21403 | 9.0 CRITICAL | Microsoft Azure Kubernetes Service Confidential Container Elevation of Privilege Vulnerabi |
| CVE-2024-21376 | 9.0 CRITICAL | Microsoft Azure Kubernetes Service Confidential Container Remote Code Execution Vulnerabil |
| CVE-2024-21353 | 8.8 HIGH | Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability |
| CVE-2024-21368 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21352 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21350 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21369 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21349 | 8.8 HIGH | Microsoft ActiveX Data Objects Remote Code Execution Vulnerability |
| CVE-2024-21391 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21372 | 8.8 HIGH | Windows OLE Remote Code Execution Vulnerability |
| CVE-2024-21375 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21420 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21361 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21365 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21367 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2024-21378 | 8.8 HIGH | Microsoft Outlook Remote Code Execution Vulnerability |
| CVE-2024-21370 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
Showing top 20 of 72 CVEs. View all on vendor page → →
No comments yet