Show plain JSON{"id": "CVE-2023-33131", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "secure@microsoft.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.8, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "REQUIRED", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 2.8}]}, "published": "2023-06-14T00:15:12.087", "references": [{"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33131", "tags": ["Patch", "Vendor Advisory"], "source": "secure@microsoft.com"}, {"url": "http://packetstormsecurity.com/files/173361/Microsoft-365-MSO-2306-Build-16.0.16529.20100-Remote-Code-Execution.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-33131", "tags": ["Patch", "Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}, {"type": "Secondary", "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "description": [{"lang": "en", "value": "CWE-94"}]}], "descriptions": [{"lang": "en", "value": "Microsoft Outlook Remote Code Execution Vulnerability"}], "lastModified": "2025-02-28T21:15:23.230", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "CF5DDD09-902E-4881-98D0-CB896333B4AA"}, {"criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "26A3B226-5D7C-4556-9350-5222DC8EFC2C"}, {"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "75F7306B-D1DA-48C2-AF87-4480E161D794"}, {"criteria": "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "BA9BCD55-F71E-4920-B906-A1386843776A"}, {"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7B6DF1E-0DDA-4809-B216-7CEFE0A53E2B"}, {"criteria": "cpe:2.3:a:microsoft:outlook:2013:sp1:*:*:rt:*:*:*", "vulnerable": true, "matchCriteriaId": "DDA98A76-D0D1-4BFA-BEAC-1C2313F7B859"}, {"criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:x64:*", "vulnerable": true, "matchCriteriaId": "0E6FF8E4-A3AF-4EC2-AAFD-D4FB80A3851A"}, {"criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:x86:*", "vulnerable": true, "matchCriteriaId": "1E7C0D0D-7FE2-4FA4-AE4B-1B5D197BE982"}, {"criteria": "cpe:2.3:a:microsoft:outlook_rt:2013:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "714B6904-1F99-403A-B0FE-763893EB4F08"}], "operator": "OR"}]}], "sourceIdentifier": "secure@microsoft.com"}