Skip to content

Commit

Permalink
Update README.MD
Browse files Browse the repository at this point in the history
  • Loading branch information
nu11secur1ty authored Mar 22, 2024
1 parent 030b156 commit 758e95f
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion 2024/CVE-2024-21413/README.MD
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,11 @@ Client Version is 20240308003.16
## Description:
By sending a malicious (.docm) file, to the victim using the Outlook mail – app of 365, the attacker will wait for the victim to click on it by using and executing his malicious code after the victim opens this file. After this action, the attacker can get control of some parts of the Windows services, he can steal sensitive information, and make a bot machine from the victim’s PC.

STATUS: MEDIUM- Vulnerability
STATUS: MEDIUM-HIGH Vulnerability

## Exploit:
The exploit can be deployed on a remote attacking server, as you can see on the second [video](https://youtu.be/zxrlV8lgoB0?si=YrTOR3wk_QLuABbd).
I am not posting a code because these two exploits are generally dangerous, and I am not responsible if someone finds them and breaks someone's system.


## Proof and Exploit - video:
Expand Down

0 comments on commit 758e95f

Please sign in to comment.