{"vulnerability": "CVE-2024-30103", "sightings": [{"uuid": "989304d8-ba04-43cc-8432-7b03cedcc02c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13148", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 \ud83c\udd98 CVE-2024-30103: Critical Microsoft Outlook Zero-Click RCE Flaw Executes as Email is Opened.\n\nhttps://cybersecuritynews.com/microsoft-outlook-zero-click-rce-flaw/", "creation_timestamp": "2024-06-13T18:50:28.000000Z"}, {"uuid": "003c902d-d3c3-4f30-95de-7a85edd021e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1308", "content": "", "creation_timestamp": "2024-06-12T04:00:00.000000Z"}, {"uuid": "351f32e7-291a-475d-b74e-c2c8e3247d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "published-proof-of-concept", "source": "https://t.me/binary_xor/1388", "content": "#outlook #rce\n\nCritical Microsoft Outlook Vulnerability Executes as Email is Opened\n\nhttps://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerability", "creation_timestamp": "2024-06-13T09:43:24.000000Z"}, {"uuid": "2cfe66f9-0b75-421c-b68e-23ba9bbec809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://t.me/hackingbra/163", "content": "CVE-2024-30103: Critical Microsoft Outlook Zero-Click RCE Flaw Executes as Email is Opened.\n\nhttps://cybersecuritynews.com/microsoft-outlook-zero-click-rce-flaw/", "creation_timestamp": "2024-06-13T19:03:28.000000Z"}, {"uuid": "86314d09-85b2-430e-9fb6-750427419849", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/217", "content": "\ud83e\udd77\ud83c\udffb DEFCON 32 is over and you can find the links on the interesting researches (in our view) below:\n\n\ud83d\uded1SQL Injection Isn't Dead. Smuggling Queries at the Protocol Level\n\n\ud83d\uded1A TWO-PART SAGA: CONTINUING THE JOURNEY OF HACKING MALWARE C2S\n\n\ud83d\uded1Outlook Unleashing RCE Chaos: CVE-2024-30103 &amp; CVE-2024-38021\n\n\ud83d\uded1Gotta Cache \u2018em all: Bending the rules of web cache exploitation\n\n\ud83d\uded1NTLM: the last ride\n\n\ud83d\uded1HookChain: a new perspective for Bypassing EDR Solutions\n\n\ud83d\uded1sshamble: Unexpected Exposures in SSH\n\n\ud83d\uded1MaLDAPtive LDAP Obfuscation Deobfuscation and Detection\n\n\ud83d\uded1Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine\n\n\ud83d\uded1Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming\n\nAll presentations from DEFCON32: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/", "creation_timestamp": "2024-08-12T13:33:20.000000Z"}, {"uuid": "9b609d24-c5b6-4c7b-ad53-d08506880559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "published-proof-of-concept", "source": "https://t.me/poxek/4295", "content": "\ud83e\udd77\ud83c\udffb DEFCON 32 is over and you can find the links on the interesting researches (in our view) below:\n\n\ud83d\uded1SQL Injection Isn't Dead. Smuggling Queries at the Protocol Level\n\n\ud83d\uded1A TWO-PART SAGA: CONTINUING THE JOURNEY OF HACKING MALWARE C2S\n\n\ud83d\uded1Outlook Unleashing RCE Chaos: CVE-2024-30103 &amp; CVE-2024-38021\n\n\ud83d\uded1Gotta Cache \u2018em all: Bending the rules of web cache exploitation\n\n\ud83d\uded1NTLM: the last ride\n\n\ud83d\uded1HookChain: a new perspective for Bypassing EDR Solutions\n\n\ud83d\uded1sshamble: Unexpected Exposures in SSH\n\n\ud83d\uded1MaLDAPtive LDAP Obfuscation Deobfuscation and Detection\n\n\ud83d\uded1Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine\n\n\ud83d\uded1Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming\n\nAll presentations from DEFCON32: https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/", "creation_timestamp": "2024-08-12T15:58:24.000000Z"}, {"uuid": "dc763b00-b33b-4c3f-b4d2-c33507f6d4af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/2289", "content": "\u200aYou\u2019ve Got Mail: Critical Microsoft Outlook Vulnerability Executes as Email is Opened\n\nhttps://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerability", "creation_timestamp": "2024-06-12T10:56:29.000000Z"}, {"uuid": "9c9d97ae-2a92-40b9-828d-7896221e21aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://t.me/kasperskyb2b/1300", "content": "\ud83e\ude79\ud83e\ude79\ud83e\ude79 \u0418\u044e\u043d\u044c\u0441\u043a\u0438\u0439 Patch Tuesday: \u0431\u0435\u0437 \u0447\u0443\u0434\u0435\u0441\n\n\u0421\u0432\u0435\u0436\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a \u0437\u0430\u043f\u043b\u0430\u0442\u043e\u043a \u0438\u0437 \u0420\u0435\u0434\u043c\u043e\u043d\u0434\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 58 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 (\u0432\u043a\u043b\u044e\u0447\u0430\u044f 7 \u0432 Chromium/Edge), \u043d\u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e. \u0422\u043e\u043b\u044c\u043a\u043e \u043e\u0434\u043d\u0430 CVE \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439, \u0435\u0449\u0451 38 \u0438\u043c\u0435\u044e\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0438 12 - \u0441\u0440\u0435\u0434\u043d\u0438\u0439.\n\n\u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u0437\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0447\u0438\u0441\u043b\u043e \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 EoP \u043e\u043f\u0435\u0440\u0435\u0434\u0438\u043b\u043e \u0432\u0441\u0435 \u043f\u0440\u043e\u0447\u0438\u0435. \u041e\u0431\u0449\u0438\u0439 \u0441\u0447\u0451\u0442 \u0442\u0430\u043a\u043e\u0432: EoP - 25, RCE - 18, DoS - 5, \u0435\u0449\u0451 3 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f CVE-2023-50868, \u0430\u0442\u0430\u043a\u0430 Keytrap, \u043f\u0430\u0440\u0430\u043b\u0438\u0437\u0443\u044e\u0449\u0430\u044f \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 DNSSEC. \u041d\u0435\u0432\u0437\u0438\u0440\u0430\u044f \u043d\u0430 \u043c\u0435\u0434\u0438\u0439\u043d\u044b\u0439 \u0440\u0435\u0437\u043e\u043d\u0430\u043d\u0441, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0439 \u0434\u044b\u0440\u044b \u043f\u043e\u043a\u0430 \u043d\u0435 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u043e.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2024-30080, CVSS 9.8) \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 MSMQ, \u043e\u043d\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a RCE. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e MSMQ \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0451\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e, \u0440\u0438\u0441\u043a \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u0432\u044b\u0441\u043e\u043a.\n\n\u0421\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0442\u0435\u0440\u0435\u0441 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442 CVE-2024-30064 \u0438 -30068, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043a EoP \u0432 \u044f\u0434\u0440\u0435 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 \u043a\u043e\u0434\u0443 \u0441\u043e\u0432\u0435\u0440\u0448\u0430\u0442\u044c \u043f\u043e\u0431\u0435\u0433 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0440\u0435\u0434. \u0414\u0440\u0443\u0433\u0430\u044f \u043e\u043f\u0430\u0441\u043d\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0449\u0430\u044f RCE - CVE-2024-30103 \u0432 Outlook, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u0438\u0437 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 DLL \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n #\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2024-06-13T10:33:43.000000Z"}, {"uuid": "f622d6fe-b0f2-4192-8219-167a11f93491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://t.me/bizone_channel/1268", "content": "\ud83d\udd3a \u041d\u043e\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Microsoft Outlook: \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f\u00a0\u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043e\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u044b\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0438\u0441\u044c\u043c\u0430\n\n\u041d\u0430 \u0434\u043d\u044f\u0445 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-30103 \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f Microsoft Outlook \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c CVSS 8,8.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f Microsoft Outlook \u0447\u0435\u0440\u0435\u0437 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0443 \u043f\u0438\u0441\u044c\u043c\u0430 \u0441 \u043d\u0435\u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u043c \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u044b\u043c. \n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2024-30103 \u043d\u0430 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0435 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043e\u0442 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u044b\u043c \u043f\u0438\u0441\u044c\u043c\u0430, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0435\u0435 \u0447\u0440\u0435\u0437\u0432\u044b\u0447\u0430\u0439\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u0432 \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438.\n\n\u041f\u043e\u043a\u0430 \u0447\u0442\u043e \u0432 \u0441\u0435\u0442\u0438 \u043d\u0435 \u0442\u0430\u043a \u043c\u043d\u043e\u0433\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e \u043d\u043e\u0432\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Microsoft Outlook.\u00a0Proof-of-\u0441oncept \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043e\u043b\u0436\u0435\u043d \u0431\u044b\u0442\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u043d\u0430 \u043a\u043e\u043d\u0444\u0435\u0440\u0435\u043d\u0446\u0438\u0438 DEFCON 32.\n\nMicrosoft \u0443\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043e\u0448\u0438\u0431\u043a\u0443 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438\u00a0Outlook \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 16.0.5452.1000.\n\n\u041c\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u043e\u0447\u0442\u043e\u0432\u044b\u0439 \u0430\u0433\u0435\u043d\u0442 Microsoft Outlook \u0434\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0447\u0442\u043e\u0431\u044b \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u043a\u00a0\u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443.", "creation_timestamp": "2024-06-13T12:47:55.000000Z"}, {"uuid": "6fa9e131-b790-464f-9ddc-07193eb609ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://t.me/true_secator/5848", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b \u0438\u044e\u043d\u044c\u0441\u043a\u0438\u0439 PatchTuesday \u043e\u0442 Microsoft \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 51 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 18 RCE \u0438 0-day, \u0430 \u0442\u0430\u043a\u0436\u0435 7 - \u0432 Chromium/Edge.\n\n\u041a \u0443\u0434\u0438\u0432\u043b\u0435\u043d\u0438\u044e, \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430 CVE \u0432 Microsoft Message Queuing \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439, \u0435\u0449\u0451 38 \u0438\u043c\u0435\u044e\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0438 12 - \u0441\u0440\u0435\u0434\u043d\u0438\u0439, \u0430 \u0432 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0438 \u043f\u043e \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044f\u043c \u043f\u0440\u0435\u0432\u0430\u043b\u0438\u0440\u0443\u0435\u0442 EoP - 25 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0435\u043c \u0443\u0436\u0435 18 - RCE, 5 - DoS \u0438 3 - \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b \u043d\u0443\u043b\u044c - CVE-2023-50868 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 DNS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u0430\u0442\u0430\u043a\u0443 Keytrap, \u043f\u043e \u043f\u043e\u0432\u043e\u0434\u0443 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u043e \u043c\u043d\u043e\u0433\u043e \u0448\u0443\u043c\u0438\u0445\u0438, \u043d\u043e \u0434\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u043b\u043e\u0441\u043a\u043e\u0441\u0442\u0438 \u0442\u0430\u043a \u0438 \u043d\u0435 \u0434\u043e\u0448\u043b\u043e.\n\n\u041e\u0442\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2024-30080 \u0441 CVSS 9.8) \u0432 MSMQ \u043d\u0435 \u0433\u0440\u043e\u0437\u0438\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0451\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\n\u0414\u0440\u0443\u0433\u043e\u0439 \u0432\u0430\u0436\u043d\u044b\u0439 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a, CVE-2024-30103 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 8,8), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0447\u0435\u0440\u043d\u044b\u0435 \u0441\u043f\u0438\u0441\u043a\u0438 \u0440\u0435\u0435\u0441\u0442\u0440\u0430  Microsoft Outlook \u0438 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b DLL.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438 c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0438\u0437 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u043d\u0435\u0432\u0435\u043b\u0438\u043a\u0430 \u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u043e \u0441\u0435\u0442\u0438 \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0430 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0447\u0435\u043d\u044c \u043f\u0440\u043e\u0441\u0442\u043e.\n\n\u0412\u0441\u0451 \u044d\u0442\u043e \u0432 \u0441\u043e\u0432\u043e\u043a\u0443\u043f\u043d\u043e\u0441\u0442\u0438, \u043a\u0430\u043a \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b Morphisec, \u043f\u0440\u0435\u0434\u0432\u0435\u0449\u0430\u0435\u0442 \u043d\u0430\u0447\u0430\u043b\u043e \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 Microsoft Office \u0438 EoP-\u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u044f\u0434\u0440\u0435 Windows.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0441 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\u043c \u043a\u0430\u0436\u0434\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0430 \u0432\u043b\u0438\u044f\u0435\u0442, - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2024-06-13T13:47:26.000000Z"}, {"uuid": "06ca05d6-8580-4471-b84b-d47ba210bdc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://t.me/binary_xor/883", "content": "#outlook #rce\n\nCritical Microsoft Outlook Vulnerability Executes as Email is Opened\n\nhttps://blog.morphisec.com/cve-2024-30103-microsoft-outlook-vulnerability", "creation_timestamp": "2024-06-13T11:43:24.000000Z"}, {"uuid": "2159eb23-26e5-4e25-aa02-e7964e323da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30103", "type": "seen", "source": "https://t.me/club31337/2323", "content": "https://blog.morphisec.com/cve-2024-38021-microsoft-outlook-moniker-rce-vulnerability\n\n#ZeroClick #RCE #Outlook\n\nUnlike the previously discovered vulnerability CVE-2024-30103 disclosed in June - which required authentication (at least an NTLM token) - this new vulnerability does not require any authentication. \nIt requires 0clicks for known senders else 1\n\n\u269c\ufe0f @club1337", "creation_timestamp": "2024-11-11T02:29:01.000000Z"}]}