[ { "id": 610690231, "name": "CVE-2023-21716", "full_name": "FeatherStark\/CVE-2023-21716", "owner": { "login": "FeatherStark", "id": 42148584, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42148584?v=4", "html_url": "https:\/\/github.com\/FeatherStark" }, "html_url": "https:\/\/github.com\/FeatherStark\/CVE-2023-21716", "description": null, "fork": false, "created_at": "2023-03-07T09:34:12Z", "updated_at": "2023-05-26T15:17:52Z", "pushed_at": "2023-03-07T09:35:33Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 610826985, "name": "CVE-2023-21716", "full_name": "Xnuvers007\/CVE-2023-21716", "owner": { "login": "Xnuvers007", "id": 62522733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62522733?v=4", "html_url": "https:\/\/github.com\/Xnuvers007" }, "html_url": "https:\/\/github.com\/Xnuvers007\/CVE-2023-21716", "description": "RTF Crash POC Python 3.11 Windows 10", "fork": false, "created_at": "2023-03-07T15:03:43Z", "updated_at": "2023-09-14T08:01:28Z", "pushed_at": "2023-03-07T15:17:47Z", "stargazers_count": 46, "watchers_count": 46, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 46, "score": 0, "subscribers_count": 3 }, { "id": 611115173, "name": "CVE-2023-21716", "full_name": "gyaansastra\/CVE-2023-21716", "owner": { "login": "gyaansastra", "id": 35690123, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4", "html_url": "https:\/\/github.com\/gyaansastra" }, "html_url": "https:\/\/github.com\/gyaansastra\/CVE-2023-21716", "description": "A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).", "fork": false, "created_at": "2023-03-08T06:20:45Z", "updated_at": "2023-09-16T13:54:07Z", "pushed_at": "2023-03-08T06:21:58Z", "stargazers_count": 59, "watchers_count": 59, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 59, "score": 0, "subscribers_count": 4 }, { "id": 611392512, "name": "CVE-2023-21716_YARA_Results", "full_name": "mikesxrs\/CVE-2023-21716_YARA_Results", "owner": { "login": "mikesxrs", "id": 12898100, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12898100?v=4", "html_url": "https:\/\/github.com\/mikesxrs" }, "html_url": "https:\/\/github.com\/mikesxrs\/CVE-2023-21716_YARA_Results", "description": "Results of retrohunt for files matching YARA rules from https:\/\/github.com\/AmgdGocha\/Detection-Rules\/blob\/main\/CVE-2023-21716.yar", "fork": false, "created_at": "2023-03-08T18:25:39Z", "updated_at": "2023-04-09T02:53:29Z", "pushed_at": "2023-03-11T00:04:47Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 612019137, "name": "CVE-2023-21716-POC", "full_name": "CKevens\/CVE-2023-21716-POC", "owner": { "login": "CKevens", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/CKevens" }, "html_url": "https:\/\/github.com\/CKevens\/CVE-2023-21716-POC", "description": "Microsoft Word 远程代码执行漏洞", "fork": false, "created_at": "2023-03-10T02:46:32Z", "updated_at": "2023-04-08T01:31:47Z", "pushed_at": "2023-03-10T02:48:21Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 618503913, "name": "CVE-2023-21716_exploit", "full_name": "hv0l\/CVE-2023-21716_exploit", "owner": { "login": "hv0l", "id": 61795418, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61795418?v=4", "html_url": "https:\/\/github.com\/hv0l" }, "html_url": "https:\/\/github.com\/hv0l\/CVE-2023-21716_exploit", "description": "test of exploit for CVE-2023-21716", "fork": false, "created_at": "2023-03-24T15:58:25Z", "updated_at": "2023-08-31T17:26:41Z", "pushed_at": "2023-03-24T16:00:42Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 628735666, "name": "CVE-2023-21716", "full_name": "JMousqueton\/CVE-2023-21716", "owner": { "login": "JMousqueton", "id": 4148567, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4", "html_url": "https:\/\/github.com\/JMousqueton" }, "html_url": "https:\/\/github.com\/JMousqueton\/CVE-2023-21716", "description": "POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption", "fork": false, "created_at": "2023-04-16T21:12:29Z", "updated_at": "2023-10-02T05:29:13Z", "pushed_at": "2023-04-16T21:16:25Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 653288165, "name": "CVE-2023-21716", "full_name": "Lord-of-the-IoT\/CVE-2023-21716", "owner": { "login": "Lord-of-the-IoT", "id": 109588583, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109588583?v=4", "html_url": "https:\/\/github.com\/Lord-of-the-IoT" }, "html_url": "https:\/\/github.com\/Lord-of-the-IoT\/CVE-2023-21716", "description": "python program to exploit CVE-2023-21716", "fork": false, "created_at": "2023-06-13T19:04:45Z", "updated_at": "2023-07-04T08:47:54Z", "pushed_at": "2023-06-13T19:04:46Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 714215346, "name": "CVE-2023-21716-EXPLOIT.py", "full_name": "MojithaR\/CVE-2023-21716-EXPLOIT.py", "owner": { "login": "MojithaR", "id": 127576267, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127576267?v=4", "html_url": "https:\/\/github.com\/MojithaR" }, "html_url": "https:\/\/github.com\/MojithaR\/CVE-2023-21716-EXPLOIT.py", "description": "This is an exploit file which is used to check CVE-2021-21716 vulnerability", "fork": false, "created_at": "2023-11-04T08:49:14Z", "updated_at": "2023-11-04T08:52:03Z", "pushed_at": "2023-11-04T08:52:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 } ]