[ { "id": 610690231, "name": "CVE-2023-21716", "full_name": "FeatherStark\/CVE-2023-21716", "owner": { "login": "FeatherStark", "id": 42148584, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42148584?v=4", "html_url": "https:\/\/github.com\/FeatherStark" }, "html_url": "https:\/\/github.com\/FeatherStark\/CVE-2023-21716", "description": null, "fork": false, "created_at": "2023-03-07T09:34:12Z", "updated_at": "2023-03-15T16:06:08Z", "pushed_at": "2023-03-07T09:35:33Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 610826985, "name": "CVE-2023-21716", "full_name": "Xnuvers007\/CVE-2023-21716", "owner": { "login": "Xnuvers007", "id": 62522733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62522733?v=4", "html_url": "https:\/\/github.com\/Xnuvers007" }, "html_url": "https:\/\/github.com\/Xnuvers007\/CVE-2023-21716", "description": "RTF Crash POC Python 3.11 Windows 10", "fork": false, "created_at": "2023-03-07T15:03:43Z", "updated_at": "2023-03-22T22:02:42Z", "pushed_at": "2023-03-07T15:17:47Z", "stargazers_count": 30, "watchers_count": 30, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 30, "score": 0 }, { "id": 611115173, "name": "CVE-2023-21716", "full_name": "gyaansastra\/CVE-2023-21716", "owner": { "login": "gyaansastra", "id": 35690123, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4", "html_url": "https:\/\/github.com\/gyaansastra" }, "html_url": "https:\/\/github.com\/gyaansastra\/CVE-2023-21716", "description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).", "fork": false, "created_at": "2023-03-08T06:20:45Z", "updated_at": "2023-03-23T04:35:27Z", "pushed_at": "2023-03-08T06:21:58Z", "stargazers_count": 54, "watchers_count": 54, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 54, "score": 0 }, { "id": 611392512, "name": "CVE-2023-21716_YARA_Results", "full_name": "mikesxrs\/CVE-2023-21716_YARA_Results", "owner": { "login": "mikesxrs", "id": 12898100, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12898100?v=4", "html_url": "https:\/\/github.com\/mikesxrs" }, "html_url": "https:\/\/github.com\/mikesxrs\/CVE-2023-21716_YARA_Results", "description": "Results of retrohunt for files matching YARA rules from https:\/\/github.com\/AmgdGocha\/Detection-Rules\/blob\/main\/CVE-2023-21716.yar", "fork": false, "created_at": "2023-03-08T18:25:39Z", "updated_at": "2023-03-08T18:25:39Z", "pushed_at": "2023-03-11T00:04:47Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 612019137, "name": "CVE-2023-21716-POC", "full_name": "CKevens\/CVE-2023-21716-POC", "owner": { "login": "CKevens", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/CKevens" }, "html_url": "https:\/\/github.com\/CKevens\/CVE-2023-21716-POC", "description": "Microsoft Word 远程代码执行漏洞", "fork": false, "created_at": "2023-03-10T02:46:32Z", "updated_at": "2023-03-10T02:48:24Z", "pushed_at": "2023-03-10T02:48:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 } ]