Microsoft Office 2007 SP3, Microsoft Office 2010 SP2, Microsoft Office 2013 SP1, Microsoft Office 2016, Microsoft Windows Vista SP2, Windows Server 2008 SP2, Windows 7 SP1, Windows 8.1 allow remote attackers to execute arbitrary code via a crafted document, aka "Microsoft Office/WordPad Remote Code Execution Vulnerability w/Windows API."
https://securelist.com/vulnerability-report-q1-2024/112554/
https://securityaffairs.com/162420/hacking/ukraine-campaign-old-ms-office-bug.html
https://www.deepinstinct.com/blog/uncorking-old-wine-zero-day-cobalt-strike-loader?&web_view=true
https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-215a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa22-117a
https://www.cisa.gov/news-events/cybersecurity-advisories/aa20-133a
https://www.mandiant.com/resources/blog/cve-2017-0199-hta-handler
https://www.exploit-db.com/exploits/42995/
https://www.exploit-db.com/exploits/41934/
https://www.exploit-db.com/exploits/41894/
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0199
https://ics-cert.us-cert.gov/advisories/ICSMA-18-058-02