高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Microsoft | Microsoft Office LTSC 2021 | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Outlook 2016 | 16.0.0.0 ~ 16.0.5387.1000 | - | |
| Microsoft | Microsoft 365 Apps for Enterprise | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office 2019 | 19.0.0 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Outlook 2013 Service Pack 1 | 15.0.0.0 ~ 15.0.5537.1000 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | Exploit for the CVE-2023-23397 | https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY | POC詳細 |
| 2 | None | https://github.com/j0eyv/CVE-2023-23397 | POC詳細 |
| 3 | CVE-2023-23397 - Microsoft Outlook Vulnerability | https://github.com/alicangnll/CVE-2023-23397 | POC詳細 |
| 4 | Python script to create a message with the vulenrability properties set | https://github.com/grn-bogo/CVE-2023-23397 | POC詳細 |
| 5 | Simple PoC in PowerShell for CVE-2023-23397 | https://github.com/ka7ana/CVE-2023-23397 | POC詳細 |
| 6 | None | https://github.com/api0cradle/CVE-2023-23397-POC-Powershell | POC詳細 |
| 7 | CVE-2023-23397 Remediation Script (Powershell) | https://github.com/im007/CVE-2023-23397 | POC詳細 |
| 8 | PoC for CVE-2023-23397 | https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell | POC詳細 |
| 9 | Exploit POC for CVE-2023-23397 | https://github.com/ahmedkhlief/CVE-2023-23397-POC | POC詳細 |
| 10 | Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send. | https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT | POC詳細 |
| 11 | None | https://github.com/djackreuter/CVE-2023-23397-PoC | POC詳細 |
| 12 | CVE-2023-23397 C# PoC | https://github.com/moneertv/CVE-2023-23397 | POC詳細 |
| 13 | None | https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook | POC詳細 |
| 14 | Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email. | https://github.com/Trackflaw/CVE-2023-23397 | POC詳細 |
| 15 | Patch for MS Outlook Critical Vulnerability - CVSS 9.8 | https://github.com/SecCTechs/CVE-2023-23397 | POC詳細 |
| 16 | Proof of Concept for CVE-2023-23397 in Python | https://github.com/tiepologian/CVE-2023-23397 | POC詳細 |
| 17 | Python script for sending e-mails with CVE-2023-23397 payload using SMTP | https://github.com/BronzeBee/cve-2023-23397 | POC詳細 |
| 18 | None | https://github.com/stevesec/CVE-2023-23397 | POC詳細 |
| 19 | An exploitation demo of Outlook Elevation of Privilege Vulnerability | https://github.com/madelynadams9/CVE-2023-23397-Report | POC詳細 |
| 20 | CVE-2023-23397 powershell patch script for Windows 10 and 11 | https://github.com/Zeppperoni/CVE-2023-23397-Patch | POC詳細 |
| 21 | None | https://github.com/jacquesquail/CVE-2023-23397 | POC詳細 |
| 22 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/CKevens/CVE-2023-23397-POC | POC詳細 |
| 23 | CVE-2023-23397 PoC | https://github.com/vlad-a-man/CVE-2023-23397 | POC詳細 |
| 24 | None | https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397 | POC詳細 |
| 25 | This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes. | https://github.com/Pushkarup/CVE-2023-23397 | POC詳細 |
| 26 | None | https://github.com/ducnorth2712/CVE-2023-23397 | POC詳細 |
| 27 | C implementation of Outlook 0-click vulnerability | https://github.com/alsaeroth/CVE-2023-23397-POC | POC詳細 |
| 28 | Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application. | https://github.com/TheUnknownSoul/CVE-2023-23397-PoW | POC詳細 |
| 29 | An exploitation demo of Outlook Elevation of Privilege Vulnerability | https://github.com/Cyb3rMaddy/CVE-2023-23397-Report | POC詳細 |
| 30 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/3yujw7njai/CVE-2023-23397-POC | POC詳細 |
| 31 | CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlook | https://github.com/Symbolexe/CVE-2023-23397 | POC詳細 |
| 32 | C implementation of Outlook 0-click vulnerability | https://github.com/sarsaeroth/CVE-2023-23397-POC | POC詳細 |
| 33 | None | https://github.com/shaolinsec/CVE-2023-23397 | POC詳細 |
| 34 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/AiK1d/CVE-2023-23397-POC | POC詳細 |
| 35 | Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability | https://github.com/Agentgilspy/CVE-2023-23397 | POC詳細 |
| 36 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Microsoft%20Outlook%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-23397.md | POC詳細 |
| 37 | Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability | https://github.com/Gilospy/CVE-2023-23397 | POC詳細 |
| 38 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/P4x1s/CVE-2023-23397-POC | POC詳細 |
| 39 | Two POCs I created for the CVE-2023-23397 Outlook NTLM vulnerability, to be used internally. | https://github.com/Phaedrik/CVE-2023-23397-POC | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成| CVE-2023-23415 | 9.8 CRITICAL | Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability |
| CVE-2023-23392 | 9.8 CRITICAL | HTTP Protocol Stack Remote Code Execution Vulnerability |
| CVE-2023-21708 | 9.8 CRITICAL | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2023-23403 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24907 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24867 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-23413 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24868 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24909 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-23406 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24871 | 8.8 HIGH | Windows Bluetooth Service Remote Code Execution Vulnerability |
| CVE-2023-24913 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24872 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-23388 | 8.8 HIGH | Windows Bluetooth Driver Elevation of Privilege Vulnerability |
| CVE-2023-24876 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24864 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability |
| CVE-2023-23383 | 8.2 HIGH | Service Fabric Explorer Spoofing Vulnerability |
| CVE-2023-24892 | 8.2 HIGH | Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability |
| CVE-2023-23405 | 8.1 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2023-24869 | 8.1 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
Showing 20 of 74 CVEs. View all on vendor page →
まだコメントはありません