Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Microsoft | Microsoft Office LTSC 2021 | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Outlook 2016 | 16.0.0.0 ~ 16.0.5387.1000 | - | |
| Microsoft | Microsoft 365 Apps for Enterprise | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office 2019 | 19.0.0 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Outlook 2013 Service Pack 1 | 15.0.0.0 ~ 15.0.5537.1000 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploit for the CVE-2023-23397 | https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY | POC Details |
| 2 | None | https://github.com/j0eyv/CVE-2023-23397 | POC Details |
| 3 | CVE-2023-23397 - Microsoft Outlook Vulnerability | https://github.com/alicangnll/CVE-2023-23397 | POC Details |
| 4 | Python script to create a message with the vulenrability properties set | https://github.com/grn-bogo/CVE-2023-23397 | POC Details |
| 5 | Simple PoC in PowerShell for CVE-2023-23397 | https://github.com/ka7ana/CVE-2023-23397 | POC Details |
| 6 | None | https://github.com/api0cradle/CVE-2023-23397-POC-Powershell | POC Details |
| 7 | CVE-2023-23397 Remediation Script (Powershell) | https://github.com/im007/CVE-2023-23397 | POC Details |
| 8 | PoC for CVE-2023-23397 | https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell | POC Details |
| 9 | Exploit POC for CVE-2023-23397 | https://github.com/ahmedkhlief/CVE-2023-23397-POC | POC Details |
| 10 | Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send. | https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT | POC Details |
| 11 | None | https://github.com/djackreuter/CVE-2023-23397-PoC | POC Details |
| 12 | CVE-2023-23397 C# PoC | https://github.com/moneertv/CVE-2023-23397 | POC Details |
| 13 | None | https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook | POC Details |
| 14 | Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email. | https://github.com/Trackflaw/CVE-2023-23397 | POC Details |
| 15 | Patch for MS Outlook Critical Vulnerability - CVSS 9.8 | https://github.com/SecCTechs/CVE-2023-23397 | POC Details |
| 16 | Proof of Concept for CVE-2023-23397 in Python | https://github.com/tiepologian/CVE-2023-23397 | POC Details |
| 17 | Python script for sending e-mails with CVE-2023-23397 payload using SMTP | https://github.com/BronzeBee/cve-2023-23397 | POC Details |
| 18 | None | https://github.com/stevesec/CVE-2023-23397 | POC Details |
| 19 | An exploitation demo of Outlook Elevation of Privilege Vulnerability | https://github.com/madelynadams9/CVE-2023-23397-Report | POC Details |
| 20 | CVE-2023-23397 powershell patch script for Windows 10 and 11 | https://github.com/Zeppperoni/CVE-2023-23397-Patch | POC Details |
| 21 | None | https://github.com/jacquesquail/CVE-2023-23397 | POC Details |
| 22 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/CKevens/CVE-2023-23397-POC | POC Details |
| 23 | CVE-2023-23397 PoC | https://github.com/vlad-a-man/CVE-2023-23397 | POC Details |
| 24 | None | https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397 | POC Details |
| 25 | This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes. | https://github.com/Pushkarup/CVE-2023-23397 | POC Details |
| 26 | None | https://github.com/ducnorth2712/CVE-2023-23397 | POC Details |
| 27 | C implementation of Outlook 0-click vulnerability | https://github.com/alsaeroth/CVE-2023-23397-POC | POC Details |
| 28 | Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application. | https://github.com/TheUnknownSoul/CVE-2023-23397-PoW | POC Details |
| 29 | An exploitation demo of Outlook Elevation of Privilege Vulnerability | https://github.com/Cyb3rMaddy/CVE-2023-23397-Report | POC Details |
| 30 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/3yujw7njai/CVE-2023-23397-POC | POC Details |
| 31 | CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlook | https://github.com/Symbolexe/CVE-2023-23397 | POC Details |
| 32 | C implementation of Outlook 0-click vulnerability | https://github.com/sarsaeroth/CVE-2023-23397-POC | POC Details |
| 33 | None | https://github.com/shaolinsec/CVE-2023-23397 | POC Details |
| 34 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/AiK1d/CVE-2023-23397-POC | POC Details |
| 35 | Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability | https://github.com/Agentgilspy/CVE-2023-23397 | POC Details |
| 36 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Microsoft%20Outlook%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-23397.md | POC Details |
| 37 | Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability | https://github.com/Gilospy/CVE-2023-23397 | POC Details |
| 38 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/P4x1s/CVE-2023-23397-POC | POC Details |
| 39 | Two POCs I created for the CVE-2023-23397 Outlook NTLM vulnerability, to be used internally. | https://github.com/Phaedrik/CVE-2023-23397-POC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-23415 | 9.8 CRITICAL | Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability |
| CVE-2023-23392 | 9.8 CRITICAL | HTTP Protocol Stack Remote Code Execution Vulnerability |
| CVE-2023-21708 | 9.8 CRITICAL | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2023-23403 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24907 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24867 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-23413 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24868 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24909 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-23406 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24871 | 8.8 HIGH | Windows Bluetooth Service Remote Code Execution Vulnerability |
| CVE-2023-24913 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24872 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-23388 | 8.8 HIGH | Windows Bluetooth Driver Elevation of Privilege Vulnerability |
| CVE-2023-24876 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-24864 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability |
| CVE-2023-23383 | 8.2 HIGH | Service Fabric Explorer Spoofing Vulnerability |
| CVE-2023-24892 | 8.2 HIGH | Microsoft Edge (Chromium-based) Webview2 Spoofing Vulnerability |
| CVE-2023-23405 | 8.1 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2023-24869 | 8.1 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
Showing top 20 of 74 CVEs. View all on vendor page → →
No comments yet