CVE-2023-23397
EPSS Score
Source: FIRST.org · 2026-05-23CVSS v3.1
Source: VulnerabilityLookup (CIRCL)Description
NVDAffected Products
Attack Intelligence
Google Project Zero
Exploits & PoC
Exploit for the CVE-2023-23397
Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.
Simple PoC in PowerShell for CVE-2023-23397
Proof of Concept for CVE-2023-23397 in Python
Python script for sending e-mails with CVE-2023-23397 payload using SMTP
Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send.
CVE-2023-23397 PoC
Exploit POC for CVE-2023-23397
Python script to create a message with the vulenrability properties set
This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educat
CVE-2023-23397 - Microsoft Outlook Vulnerability
CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。
CVE-2023-23397 C# PoC
Patch for MS Outlook Critical Vulnerability - CVSS 9.8
An exploitation demo of Outlook Elevation of Privilege Vulnerability
Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application.
Two POCs I created for the CVE-2023-23397 Outlook NTLM vulnerability, to be used internally.
CVE-2023-23397 Remediation Script (Powershell)
CVE-2023-23397 powershell patch script for Windows 10 and 11
CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlook
Demonstration of CVE-2023-23397 Outlook Privellege Escalation vulnerability