
CVE-2023-28295 – Microsoft Publisher Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-28295
17 Jun 2023 — Microsoft Publisher Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28295 • CWE-190: Integer Overflow or Wraparound •

CVE-2023-28287 – Microsoft Publisher Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-28287
17 Jun 2023 — Microsoft Publisher Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28287 • CWE-416: Use After Free •

CVE-2023-33133 – Microsoft Excel Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-33133
13 Jun 2023 — Microsoft Excel Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33133 • CWE-122: Heap-based Buffer Overflow •

CVE-2023-33131 – Microsoft Outlook Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-33131
13 Jun 2023 — Microsoft Outlook Remote Code Execution Vulnerability Microsoft Outlook suffers from a remote code execution via a maliciously crafted word file. • https://packetstorm.news/files/id/173361 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-33146 – Microsoft Office Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-33146
13 Jun 2023 — Microsoft Office Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage th... • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33146 • CWE-122: Heap-based Buffer Overflow •

CVE-2023-32029 – Microsoft Excel Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-32029
13 Jun 2023 — Microsoft Excel Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-32029 • CWE-125: Out-of-bounds Read •

CVE-2023-29344 – Microsoft Office Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-29344
05 Jun 2023 — Microsoft Office Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-29344 • CWE-122: Heap-based Buffer Overflow •

CVE-2023-24953 – Microsoft Excel Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-24953
09 May 2023 — Microsoft Excel Remote Code Execution Vulnerability • https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24953 • CWE-416: Use After Free •

CVE-2023-28285 – Microsoft Office Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-28285
11 Apr 2023 — Microsoft Office Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this... • https://packetstorm.news/files/id/173140 • CWE-416: Use After Free •

CVE-2023-28311 – Microsoft Word Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2023-28311
11 Apr 2023 — Microsoft Word Remote Code Execution Vulnerability This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office Word. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of DOCX files. Crafted data in a DOCX file can trigger a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in t... • https://packetstorm.news/files/id/171882 • CWE-122: Heap-based Buffer Overflow •