CVE-2024-21413

CRITICAL KEV

Microsoft 365 Apps - Improper Input Validation

Title source: rule

Description

Microsoft Outlook Remote Code Execution Vulnerability

Exploits (34)

nomisec WORKING POC 759 stars
by xaitax · client-side
https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
nomisec WORKING POC 217 stars
by CMNatic · client-side
https://github.com/CMNatic/CVE-2024-21413
nomisec WORKING POC 156 stars
by duy-31 · client-side
https://github.com/duy-31/CVE-2024-21413
nomisec SUSPICIOUS 24 stars
by ThemeHackers · client-side
https://github.com/ThemeHackers/CVE-2024-21413
nomisec WORKING POC 16 stars
by r00tb1t · client-side
https://github.com/r00tb1t/CVE-2024-21413-POC
nomisec WORKING POC 11 stars
by mmathivanan17 · remote
https://github.com/mmathivanan17/CVE-2024-21413
nomisec WORKING POC 5 stars
by Mdusmandasthaheer · client-side
https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
nomisec WORKING POC 4 stars
by D1se0 · client-side
https://github.com/D1se0/CVE-2024-21413-Vulnerabilidad-Outlook-LAB
nomisec SUSPICIOUS 4 stars
by ahmetkarakayaoffical · client-side
https://github.com/ahmetkarakayaoffical/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
nomisec WORKING POC 2 stars
by gurleen-147 · client-side
https://github.com/gurleen-147/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC
nomisec WORKING POC 2 stars
by X-Projetion · infoleak
https://github.com/X-Projetion/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit
nomisec WORKING POC 2 stars
by dshabani96 · client-side
https://github.com/dshabani96/CVE-2024-21413
nomisec WORKING POC 1 stars
by PolarisXSec · client-side
https://github.com/PolarisXSec/CVE-2024-21413
nomisec WORKING POC
by FathanahHidayati · client-side
https://github.com/FathanahHidayati/https-github.com-xaitax-CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability
nomisec WRITEUP
by pedro-lucas-melo · client-side
https://github.com/pedro-lucas-melo/Estudo-de-Caso-CVE-2024-21413
nomisec WRITEUP
by TheMursalin · poc
https://github.com/TheMursalin/HTB-Mailing-A-Complete-Walkthrough
nomisec WRITEUP
by E-m-e-k-a · poc
https://github.com/E-m-e-k-a/Moniker-Link-Lab-Setup
gitlab SUSPICIOUS
by ThemeHackers · poc
https://gitlab.com/ThemeHackers/CVE-2024-21413
nomisec WRITEUP
by SallocinAvalcante · poc
https://github.com/SallocinAvalcante/lab-SMB-responder-CVE-2024-21413
nomisec WRITEUP
by securenetexpert · poc
https://github.com/securenetexpert/CVE-2024-21413-Moniker-Link-Writeup
nomisec WORKING POC
by dionissh · client-side
https://github.com/dionissh/CVE-2024-21413
nomisec WRITEUP
by ViniciusFariasDev · poc
https://github.com/ViniciusFariasDev/cve-2024-21413-outlook-monikerlink-lab
nomisec WRITEUP
by eylommaayan · poc
https://github.com/eylommaayan/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-
nomisec WORKING POC
by hau2212 · client-side
https://github.com/hau2212/Moniker-Link-CVE-2024-21413-
nomisec WORKING POC
by yass2400012 · client-side
https://github.com/yass2400012/Email-exploit-Moniker-Link-CVE-2024-21413-
nomisec WRITEUP
by MQKGitHub · poc
https://github.com/MQKGitHub/Moniker-Link-CVE-2024-21413
nomisec WRITEUP
by ArtemCyberLab · infoleak
https://github.com/ArtemCyberLab/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413
github SUSPICIOUS
by Cyber-Trambon · poc
https://github.com/Cyber-Trambon/CVE-2024-21413-exploit
nomisec SUSPICIOUS
by Redfox-Security · poc
https://github.com/Redfox-Security/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape
nomisec WORKING POC
by olebris · client-side
https://github.com/olebris/CVE-2024-21413
nomisec WORKING POC
by ShubhamKanhere307 · client-side
https://github.com/ShubhamKanhere307/CVE-2024-21413
nomisec WORKING POC
by th3Hellion · client-side
https://github.com/th3Hellion/CVE-2024-21413
nomisec WORKING POC
by KartheekKandalam99 · poc
https://github.com/KartheekKandalam99/SVPT_CW_2
nomisec WORKING POC
by MSeymenD · client-side
https://github.com/MSeymenD/CVE-2024-21413

Scores

CVSS v3 9.8
EPSS 0.9299
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2025-02-06
VulnCheck KEV 2024-05-14
InTheWild.io 2024-02-14
ENISA EUVD EUVD-2024-19122
CWE
CWE-20
Status published
Products (4)
microsoft/365_apps
microsoft/office_2016 (2 CPE variants)
microsoft/office_2019 (2 CPE variants)
microsoft/office_long_term_servicing_channel 2021
Published Feb 13, 2024
KEV Added Feb 06, 2025
Tracked Since Feb 18, 2026