CVE-2021-3194908.06.2021, 23:15Microsoft Outlook Remote Code Execution VulnerabilityCode InjectionEnginsightProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVectorNISTNIST7.3 HIGHLOCALLOWNONECVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:LmicrosoftCNA7.3 HIGHCVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L/E:U/RL:O/RC:CCVEADP------CISA-ADPADP------Base ScoreCVSS 3.xEPSS ScorePercentile: 71%VendorProductVersionmicrosoft365_apps-𝑥= Vulnerable software versionsCommon Weakness EnumerationCWE-94 - Improper Control of Generation of Code ('Code Injection')The software constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Referenceshttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31949https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-31949