[ { "id": 610690231, "name": "CVE-2023-21716", "full_name": "FeatherStark\/CVE-2023-21716", "owner": { "login": "FeatherStark", "id": 42148584, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42148584?v=4", "html_url": "https:\/\/github.com\/FeatherStark", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FeatherStark\/CVE-2023-21716", "description": null, "fork": false, "created_at": "2023-03-07T09:34:12Z", "updated_at": "2024-06-20T18:43:22Z", "pushed_at": "2023-03-07T09:35:33Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 610826985, "name": "CVE-2023-21716", "full_name": "Xnuvers007\/CVE-2023-21716", "owner": { "login": "Xnuvers007", "id": 62522733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62522733?v=4", "html_url": "https:\/\/github.com\/Xnuvers007", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Xnuvers007\/CVE-2023-21716", "description": "RTF Crash POC Python 3.11 Windows 10", "fork": false, "created_at": "2023-03-07T15:03:43Z", "updated_at": "2024-09-03T19:57:00Z", "pushed_at": "2023-03-07T15:17:47Z", "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 48, "score": 0, "subscribers_count": 2 }, { "id": 611115173, "name": "CVE-2023-21716", "full_name": "gyaansastra\/CVE-2023-21716", "owner": { "login": "gyaansastra", "id": 35690123, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4", "html_url": "https:\/\/github.com\/gyaansastra", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gyaansastra\/CVE-2023-21716", "description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).", "fork": false, "created_at": "2023-03-08T06:20:45Z", "updated_at": "2024-09-08T05:45:03Z", "pushed_at": "2023-03-08T06:21:58Z", "stargazers_count": 59, "watchers_count": 59, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 59, "score": 0, "subscribers_count": 4 }, { "id": 611392512, "name": "CVE-2023-21716_YARA_Results", "full_name": "mikesxrs\/CVE-2023-21716_YARA_Results", "owner": { "login": "mikesxrs", "id": 12898100, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12898100?v=4", "html_url": "https:\/\/github.com\/mikesxrs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mikesxrs\/CVE-2023-21716_YARA_Results", "description": "Results of retrohunt for files matching YARA rules from https:\/\/github.com\/AmgdGocha\/Detection-Rules\/blob\/main\/CVE-2023-21716.yar", "fork": false, "created_at": "2023-03-08T18:25:39Z", "updated_at": "2024-06-20T18:43:33Z", "pushed_at": "2023-03-11T00:04:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 612019137, "name": "CVE-2023-21716-POC", "full_name": "3yujw7njai\/CVE-2023-21716-POC", "owner": { "login": "3yujw7njai", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/3yujw7njai", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2023-21716-POC", "description": "Microsoft Word 远程代码执行漏洞", "fork": false, "created_at": "2023-03-10T02:46:32Z", "updated_at": "2024-06-20T18:43:17Z", "pushed_at": "2023-03-10T02:48:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 618503913, "name": "CVE-2023-21716_exploit", "full_name": "hv0l\/CVE-2023-21716_exploit", "owner": { "login": "hv0l", "id": 61795418, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61795418?v=4", "html_url": "https:\/\/github.com\/hv0l", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hv0l\/CVE-2023-21716_exploit", "description": "test of exploit for CVE-2023-21716", "fork": false, "created_at": "2023-03-24T15:58:25Z", "updated_at": "2024-08-09T20:17:43Z", "pushed_at": "2023-03-24T16:00:42Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 628735666, "name": "CVE-2023-21716", "full_name": "JMousqueton\/CVE-2023-21716", "owner": { "login": "JMousqueton", "id": 4148567, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4", "html_url": "https:\/\/github.com\/JMousqueton", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JMousqueton\/CVE-2023-21716", "description": "POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption", "fork": false, "created_at": "2023-04-16T21:12:29Z", "updated_at": "2024-09-19T21:32:04Z", "pushed_at": "2023-04-16T21:16:25Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 653288165, "name": "CVE-2023-21716", "full_name": "Lord-of-the-IoT\/CVE-2023-21716", "owner": { "login": "Lord-of-the-IoT", "id": 109588583, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109588583?v=4", "html_url": "https:\/\/github.com\/Lord-of-the-IoT", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Lord-of-the-IoT\/CVE-2023-21716", "description": "python program to exploit CVE-2023-21716", "fork": false, "created_at": "2023-06-13T19:04:45Z", "updated_at": "2023-07-04T08:47:54Z", "pushed_at": "2023-06-13T19:04:46Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 714215346, "name": "CVE-2023-21716-EXPLOIT.py", "full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py", "owner": { "login": "MojithaR", "id": 127576267, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4", "html_url": "https:\/\/github.com\/MojithaR", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py", "description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability", "fork": false, "created_at": "2023-11-04T08:49:14Z", "updated_at": "2024-08-23T04:10:50Z", "pushed_at": "2023-11-05T12:23:00Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 858182132, "name": "CVE-2023-21716-POC", "full_name": "RonF98\/CVE-2023-21716-POC", "owner": { "login": "RonF98", "id": 181740430, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181740430?v=4", "html_url": "https:\/\/github.com\/RonF98", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RonF98\/CVE-2023-21716-POC", "description": "Proof Of Concept for CVE-2023-21716 Microsoft Word Heap Corruption", "fork": false, "created_at": "2024-09-16T13:04:45Z", "updated_at": "2024-11-25T09:52:09Z", "pushed_at": "2024-09-23T13:46:22Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 880750787, "name": "poc-cve-2023-21716", "full_name": "n0s3ns33\/poc-cve-2023-21716", "owner": { "login": "n0s3ns33", "id": 186808597, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/186808597?v=4", "html_url": "https:\/\/github.com\/n0s3ns33", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/n0s3ns33\/poc-cve-2023-21716", "description": "POC CVE 2023-21716", "fork": false, "created_at": "2024-10-30T09:38:36Z", "updated_at": "2024-11-28T15:01:34Z", "pushed_at": "2024-10-30T09:42:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-21716", "exploit", "poc", "poc-cve-2023-21716", "rce", "rtf" ], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 } ]