CVE-2021-31949

Microsoft Outlook Remote Code Execution Vulnerability
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:*:*
cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:-:*:*:*
cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*
cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*

History

28 Feb 2025, 21:15

Type Values Removed Values Added
CWE CWE-94

21 Nov 2024, 06:06

Type Values Removed Values Added
References () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31949 - Patch, Vendor Advisory () https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31949 - Patch, Vendor Advisory

01 Aug 2023, 23:15

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 7.8
v2 : 6.8
v3 : 7.3

Information

Published : 2021-06-08 23:15

Updated : 2025-02-28 21:15


NVD link : CVE-2021-31949

Mitre link : CVE-2021-31949

CVE.ORG link : CVE-2021-31949


JSON object : View

Products Affected

microsoft

  • office
  • outlook
  • 365_apps
CWE
NVD-CWE-noinfo CWE-94

Improper Control of Generation of Code ('Code Injection')