尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Microsoft | Microsoft Office LTSC 2021 | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Outlook 2016 | 16.0.0.0 ~ 16.0.5387.1000 | - | |
| Microsoft | Microsoft 365 Apps for Enterprise | 16.0.1 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Office 2019 | 19.0.0 ~ https://aka.ms/OfficeSecurityReleases | - | |
| Microsoft | Microsoft Outlook 2013 Service Pack 1 | 15.0.0.0 ~ 15.0.5537.1000 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Exploit for the CVE-2023-23397 | https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY | POC详情 |
| 2 | None | https://github.com/j0eyv/CVE-2023-23397 | POC详情 |
| 3 | CVE-2023-23397 - Microsoft Outlook Vulnerability | https://github.com/alicangnll/CVE-2023-23397 | POC详情 |
| 4 | Python script to create a message with the vulenrability properties set | https://github.com/grn-bogo/CVE-2023-23397 | POC详情 |
| 5 | Simple PoC in PowerShell for CVE-2023-23397 | https://github.com/ka7ana/CVE-2023-23397 | POC详情 |
| 6 | None | https://github.com/api0cradle/CVE-2023-23397-POC-Powershell | POC详情 |
| 7 | CVE-2023-23397 Remediation Script (Powershell) | https://github.com/im007/CVE-2023-23397 | POC详情 |
| 8 | PoC for CVE-2023-23397 | https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell | POC详情 |
| 9 | Exploit POC for CVE-2023-23397 | https://github.com/ahmedkhlief/CVE-2023-23397-POC | POC详情 |
| 10 | Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send. | https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT | POC详情 |
| 11 | None | https://github.com/djackreuter/CVE-2023-23397-PoC | POC详情 |
| 12 | CVE-2023-23397 C# PoC | https://github.com/moneertv/CVE-2023-23397 | POC详情 |
| 13 | None | https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook | POC详情 |
| 14 | Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email. | https://github.com/Trackflaw/CVE-2023-23397 | POC详情 |
| 15 | Patch for MS Outlook Critical Vulnerability - CVSS 9.8 | https://github.com/SecCTechs/CVE-2023-23397 | POC详情 |
| 16 | Proof of Concept for CVE-2023-23397 in Python | https://github.com/tiepologian/CVE-2023-23397 | POC详情 |
| 17 | Python script for sending e-mails with CVE-2023-23397 payload using SMTP | https://github.com/BronzeBee/cve-2023-23397 | POC详情 |
| 18 | None | https://github.com/stevesec/CVE-2023-23397 | POC详情 |
| 19 | An exploitation demo of Outlook Elevation of Privilege Vulnerability | https://github.com/madelynadams9/CVE-2023-23397-Report | POC详情 |
| 20 | CVE-2023-23397 powershell patch script for Windows 10 and 11 | https://github.com/Zeppperoni/CVE-2023-23397-Patch | POC详情 |
| 21 | None | https://github.com/jacquesquail/CVE-2023-23397 | POC详情 |
| 22 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/CKevens/CVE-2023-23397-POC | POC详情 |
| 23 | CVE-2023-23397 PoC | https://github.com/vlad-a-man/CVE-2023-23397 | POC详情 |
| 24 | None | https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397 | POC详情 |
| 25 | This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes. | https://github.com/Pushkarup/CVE-2023-23397 | POC详情 |
| 26 | None | https://github.com/ducnorth2712/CVE-2023-23397 | POC详情 |
| 27 | C implementation of Outlook 0-click vulnerability | https://github.com/alsaeroth/CVE-2023-23397-POC | POC详情 |
| 28 | Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application. | https://github.com/TheUnknownSoul/CVE-2023-23397-PoW | POC详情 |
| 29 | An exploitation demo of Outlook Elevation of Privilege Vulnerability | https://github.com/Cyb3rMaddy/CVE-2023-23397-Report | POC详情 |
| 30 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/3yujw7njai/CVE-2023-23397-POC | POC详情 |
| 31 | CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlook | https://github.com/Symbolexe/CVE-2023-23397 | POC详情 |
| 32 | C implementation of Outlook 0-click vulnerability | https://github.com/sarsaeroth/CVE-2023-23397-POC | POC详情 |
| 33 | None | https://github.com/shaolinsec/CVE-2023-23397 | POC详情 |
| 34 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/AiK1d/CVE-2023-23397-POC | POC详情 |
| 35 | Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability | https://github.com/Agentgilspy/CVE-2023-23397 | POC详情 |
| 36 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Microsoft%20Outlook%20%E6%9D%83%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E%20CVE-2023-23397.md | POC详情 |
| 37 | Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability | https://github.com/Gilospy/CVE-2023-23397 | POC详情 |
| 38 | CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。 | https://github.com/P4x1s/CVE-2023-23397-POC | POC详情 |
| 39 | Two POCs I created for the CVE-2023-23397 Outlook NTLM vulnerability, to be used internally. | https://github.com/Phaedrik/CVE-2023-23397-POC | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论