## https://sploitus.com/exploit?id=7D9656D6-DD0C-58C9-9F66-EC208C59DB56
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
</head>
<body>
<h1>Microsoft Outlook Remote Code Execution Vulnerability PoC</h1>
<p>This script showcases a proof of concept (PoC) for CVE-2024-21413, a critical security flaw identified in Microsoft Outlook with a CVSS score of 9.8. Dubbed the #MonikerLink exploit, this vulnerability carries extensive consequences, such as potential disclosure of local NTLM data and the risk of remote code execution. Furthermore, it underscores an attack vector capable of circumventing Office Protected View, thus broadening its menace to additional Office software.</p>
<h2>Usage:</h2>
<p>To use this script:</p>
<ol>
<li>Clone the repository to your local machine:</li>
<pre><code>https://github.com/Mdusmandasthaheer/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability.git</code></pre>
<li>Run the script:</li>
<pre><code>python script.py</code></pre>
</ol>
<h2>Demo:</h2>
<a href="https://youtu.be/Iin1F5K8pQo">
<img src="https://img.youtube.com/vi/Iin1F5K8pQo/maxresdefault.jpg" alt="Watch the video">
</a>
<h2>License:</h2>
<p>This project is licensed under the MIT License. See the <a href="LICENSE">LICENSE</a> file for details.</p>
</body>
</html>