PoC-in-GitHub/2024/CVE-2024-21413.json
2026-01-02 03:45:00 +09:00

724 lines
No EOL
27 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 758191027,
"name": "CVE-2024-21413",
"full_name": "duy-31\/CVE-2024-21413",
"owner": {
"login": "duy-31",
"id": 20819326,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20819326?v=4",
"html_url": "https:\/\/github.com\/duy-31",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/duy-31\/CVE-2024-21413",
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC",
"fork": false,
"created_at": "2024-02-15T19:57:38Z",
"updated_at": "2025-11-10T02:14:16Z",
"pushed_at": "2024-02-17T07:08:49Z",
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 33,
"watchers": 156,
"score": 0,
"subscribers_count": 2
},
{
"id": 758555813,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"full_name": "xaitax\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"owner": {
"login": "xaitax",
"id": 5014849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
"html_url": "https:\/\/github.com\/xaitax",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xaitax\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2025-12-31T19:28:18Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 753,
"watchers_count": 753,
"has_discussions": false,
"forks_count": 161,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 161,
"watchers": 753,
"score": 0,
"subscribers_count": 10
},
{
"id": 758688293,
"name": "CVE-2024-21413-POC",
"full_name": "r00tb1t\/CVE-2024-21413-POC",
"owner": {
"login": "r00tb1t",
"id": 150359865,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150359865?v=4",
"html_url": "https:\/\/github.com\/r00tb1t",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r00tb1t\/CVE-2024-21413-POC",
"description": "Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC",
"fork": false,
"created_at": "2024-02-16T21:10:31Z",
"updated_at": "2024-07-23T13:37:41Z",
"pushed_at": "2024-02-16T22:23:37Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 16,
"score": 0,
"subscribers_count": 1
},
{
"id": 758949379,
"name": "CVE-2024-21413",
"full_name": "CMNatic\/CVE-2024-21413",
"owner": {
"login": "CMNatic",
"id": 4163116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4163116?v=4",
"html_url": "https:\/\/github.com\/CMNatic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CMNatic\/CVE-2024-21413",
"description": "CVE-2024-21413 PoC for THM Lab",
"fork": false,
"created_at": "2024-02-17T14:52:52Z",
"updated_at": "2025-12-31T13:02:38Z",
"pushed_at": "2024-03-13T02:44:28Z",
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 187,
"score": 0,
"subscribers_count": 2
},
{
"id": 759610035,
"name": "CVE-2024-21413",
"full_name": "MSeymenD\/CVE-2024-21413",
"owner": {
"login": "MSeymenD",
"id": 83572774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83572774?v=4",
"html_url": "https:\/\/github.com\/MSeymenD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MSeymenD\/CVE-2024-21413",
"description": "CVE-2024-21413 Açığını Kullanarak Giriş Bilgilerini Alma",
"fork": false,
"created_at": "2024-02-19T01:37:15Z",
"updated_at": "2024-02-19T01:48:46Z",
"pushed_at": "2024-02-19T01:54:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 760445057,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"full_name": "Mdusmandasthaheer\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"owner": {
"login": "Mdusmandasthaheer",
"id": 122736342,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122736342?v=4",
"html_url": "https:\/\/github.com\/Mdusmandasthaheer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mdusmandasthaheer\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"description": null,
"fork": false,
"created_at": "2024-02-20T12:41:15Z",
"updated_at": "2025-09-15T11:35:40Z",
"pushed_at": "2024-02-20T13:37:39Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 762261193,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"full_name": "ahmetkarakayaoffical\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"owner": {
"login": "ahmetkarakayaoffical",
"id": 100443477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100443477?v=4",
"html_url": "https:\/\/github.com\/ahmetkarakayaoffical",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ahmetkarakayaoffical\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"description": "Bu betik, Microsoft Outlook'ta keşfedilen ve CVSS değeri 9.8 olan önemli bir güvenlik açığı olan CVE-2024-21413 için bir kavram kanıtı (PoC) sunmaktadır. MonikerLink hatası olarak adlandırılan bu güvenlik açığı, yerel NTLM bilgilerinin potansiyel sızıntısı ve uzaktan kod çalıştırma olasılığı dahil olmak üzere geniş kapsamlı etkilere sahiptir.",
"fork": false,
"created_at": "2024-02-23T12:13:11Z",
"updated_at": "2025-10-07T09:11:48Z",
"pushed_at": "2024-02-24T15:36:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 765116138,
"name": "CVE-2024-21413",
"full_name": "dshabani96\/CVE-2024-21413",
"owner": {
"login": "dshabani96",
"id": 107131685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107131685?v=4",
"html_url": "https:\/\/github.com\/dshabani96",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dshabani96\/CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2024-02-29T10:07:34Z",
"updated_at": "2025-04-24T12:34:35Z",
"pushed_at": "2024-02-29T13:22:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 795596778,
"name": "CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
"full_name": "X-Projetion\/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
"owner": {
"login": "X-Projetion",
"id": 161194427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
"html_url": "https:\/\/github.com\/X-Projetion",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/X-Projetion\/CVE-2024-21413-Microsoft-Outlook-RCE-Exploit",
"description": "CVE-2024-21413 Microsoft Outlook RCE Exploit",
"fork": false,
"created_at": "2024-05-03T16:09:54Z",
"updated_at": "2024-11-06T05:33:54Z",
"pushed_at": "2024-05-03T16:11:46Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 799194864,
"name": "CVE-2024-21413",
"full_name": "th3Hellion\/CVE-2024-21413",
"owner": {
"login": "th3Hellion",
"id": 93284551,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93284551?v=4",
"html_url": "https:\/\/github.com\/th3Hellion",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/th3Hellion\/CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2024-05-11T12:28:22Z",
"updated_at": "2024-05-11T12:34:27Z",
"pushed_at": "2024-05-11T12:34:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 816689478,
"name": "CVE-2024-21413",
"full_name": "ShubhamKanhere307\/CVE-2024-21413",
"owner": {
"login": "ShubhamKanhere307",
"id": 173140854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173140854?v=4",
"html_url": "https:\/\/github.com\/ShubhamKanhere307",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ShubhamKanhere307\/CVE-2024-21413",
"description": "This script is the Proof of Concept (PoC) of the CVE-2024-21413, a significant security vulnerability discovered in the Microsoft Windows Outlook having a strong 9.8 critical CVSS score. Named as #MonikerLink Bug, this vulnerability allows the attacker to execute the arbitrary code remotely on the victim's machine, thus becomes a full-fledged RCE. ",
"fork": false,
"created_at": "2024-06-18T08:11:33Z",
"updated_at": "2024-06-18T08:18:16Z",
"pushed_at": "2024-06-18T08:18:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 821343809,
"name": "CVE-2024-21413",
"full_name": "olebris\/CVE-2024-21413",
"owner": {
"login": "olebris",
"id": 78493240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78493240?v=4",
"html_url": "https:\/\/github.com\/olebris",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/olebris\/CVE-2024-21413",
"description": "CVE-2024-21413 PoC",
"fork": false,
"created_at": "2024-06-28T10:27:34Z",
"updated_at": "2024-06-28T10:27:55Z",
"pushed_at": "2024-06-28T10:27:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823551343,
"name": "Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape",
"full_name": "Redfox-Security\/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape",
"owner": {
"login": "Redfox-Security",
"id": 173128884,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173128884?v=4",
"html_url": "https:\/\/github.com\/Redfox-Security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Redfox-Security\/Unveiling-Moniker-Link-CVE-2024-21413-Navigating-the-Latest-Cybersecurity-Landscape",
"description": null,
"fork": false,
"created_at": "2024-07-03T08:45:05Z",
"updated_at": "2024-07-03T08:45:08Z",
"pushed_at": "2024-07-03T08:45:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 850327133,
"name": "CVE-2024-21413",
"full_name": "ThemeHackers\/CVE-2024-21413",
"owner": {
"login": "ThemeHackers",
"id": 107047730,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107047730?v=4",
"html_url": "https:\/\/github.com\/ThemeHackers",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThemeHackers\/CVE-2024-21413",
"description": "CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC",
"fork": false,
"created_at": "2024-08-31T13:18:43Z",
"updated_at": "2025-12-05T10:40:31Z",
"pushed_at": "2025-06-05T03:39:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},
{
"id": 898401287,
"name": "CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"full_name": "D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"owner": {
"login": "D1se0",
"id": 164921056,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164921056?v=4",
"html_url": "https:\/\/github.com\/D1se0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/D1se0\/CVE-2024-21413-Vulnerabilidad-Outlook-LAB",
"description": null,
"fork": false,
"created_at": "2024-12-04T10:26:37Z",
"updated_at": "2025-03-25T03:32:25Z",
"pushed_at": "2024-12-05T09:50:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cibersecurity",
"cve",
"cve-2024-21413",
"exploit",
"hacking",
"hacking-etico",
"lab",
"outlook"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 954971949,
"name": "Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413",
"full_name": "ArtemCyberLab\/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413",
"owner": {
"login": "ArtemCyberLab",
"id": 193649833,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/193649833?v=4",
"html_url": "https:\/\/github.com\/ArtemCyberLab",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ArtemCyberLab\/Project-NTLM-Hash-Capture-and-Phishing-Email-Exploitation-for-CVE-2024-21413",
"description": "The project was created to demonstrate the use of various tools for capturing NTLM hashes from users on a network and for executing phishing attacks using email. This showcases how network authentication vulnerabilities and phishing methods can be exploited to compromise systems.",
"fork": false,
"created_at": "2025-03-25T22:49:05Z",
"updated_at": "2025-03-25T22:51:49Z",
"pushed_at": "2025-03-25T22:51:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 981389350,
"name": "CVE-2024-21413",
"full_name": "PolarisXSec\/CVE-2024-21413",
"owner": {
"login": "PolarisXSec",
"id": 210077807,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210077807?v=4",
"html_url": "https:\/\/github.com\/PolarisXSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PolarisXSec\/CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2025-05-11T01:55:39Z",
"updated_at": "2025-05-11T02:49:20Z",
"pushed_at": "2025-05-11T02:27:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 993208444,
"name": "Moniker-Link-CVE-2024-21413",
"full_name": "MQKGitHub\/Moniker-Link-CVE-2024-21413",
"owner": {
"login": "MQKGitHub",
"id": 100727141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100727141?v=4",
"html_url": "https:\/\/github.com\/MQKGitHub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MQKGitHub\/Moniker-Link-CVE-2024-21413",
"description": null,
"fork": false,
"created_at": "2025-05-30T11:57:00Z",
"updated_at": "2025-05-30T11:58:33Z",
"pushed_at": "2025-05-30T11:58:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1062223539,
"name": "Email-exploit-Moniker-Link-CVE-2024-21413-",
"full_name": "yass2400012\/Email-exploit-Moniker-Link-CVE-2024-21413-",
"owner": {
"login": "yass2400012",
"id": 92322913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92322913?v=4",
"html_url": "https:\/\/github.com\/yass2400012",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yass2400012\/Email-exploit-Moniker-Link-CVE-2024-21413-",
"description": null,
"fork": false,
"created_at": "2025-09-23T01:28:42Z",
"updated_at": "2025-09-23T01:51:48Z",
"pushed_at": "2025-09-23T01:51:45Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1091168829,
"name": "CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC",
"full_name": "gurleen-147\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC",
"owner": {
"login": "gurleen-147",
"id": 241869242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/241869242?v=4",
"html_url": "https:\/\/github.com\/gurleen-147",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/gurleen-147\/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability-PoC",
"description": "This repository contains research notes and a high-level proof-of-concept (PoC) for CVE-2024-21413, a vulnerability observed in certain mail clients when handling SMB\/moniker-style links embedded in messages. The PoC and experiments documented here were performed in a controlled lab environment on systems.",
"fork": false,
"created_at": "2025-11-06T16:42:03Z",
"updated_at": "2025-11-27T21:39:16Z",
"pushed_at": "2025-11-22T18:53:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 1100261943,
"name": "Moniker-Link-CVE-2024-21413-",
"full_name": "hau2212\/Moniker-Link-CVE-2024-21413-",
"owner": {
"login": "hau2212",
"id": 81369957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81369957?v=4",
"html_url": "https:\/\/github.com\/hau2212",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hau2212\/Moniker-Link-CVE-2024-21413-",
"description": "On February 13th, 2024, Microsoft announced a Microsoft Outlook RCE & credential leak vulnerability with the assigned CVE of CVE-2024-21413 (Moniker Link). Haifei Li of Check Point Research is credited with discovering the vulnerability. The vulnerability bypasses Outlook's security mechanisms when handing a specific type of hyperlink .",
"fork": false,
"created_at": "2025-11-20T03:47:53Z",
"updated_at": "2025-11-28T07:28:22Z",
"pushed_at": "2025-11-20T06:11:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1106925776,
"name": "CVE-2024-21413",
"full_name": "mmathivanan17\/CVE-2024-21413",
"owner": {
"login": "mmathivanan17",
"id": 57169379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57169379?v=4",
"html_url": "https:\/\/github.com\/mmathivanan17",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mmathivanan17\/CVE-2024-21413",
"description": "Outlook exploitation",
"fork": false,
"created_at": "2025-11-30T08:22:06Z",
"updated_at": "2025-12-06T11:31:22Z",
"pushed_at": "2025-11-30T08:25:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 11,
"score": 0,
"subscribers_count": 0
},
{
"id": 1126136152,
"name": "THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-",
"full_name": "eylommaayan\/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-",
"owner": {
"login": "eylommaayan",
"id": 56929518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56929518?v=4",
"html_url": "https:\/\/github.com\/eylommaayan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/eylommaayan\/THM---CVE-2024-21413-Moniker-Link-Microsoft-Outlook-",
"description": "ב־13 בפברואר 2024 פרסמה Microsoft חולשת אבטחה חמורה ב־Microsoft Outlook, אשר קיבלה את הזיהוי CVE-2024-21413, ומוכרת בשם Moniker Link Vulnerability. החולשה מאפשרת לתוקף לעקוף את מנגנון Protected View של Outlook",
"fork": false,
"created_at": "2026-01-01T07:41:33Z",
"updated_at": "2026-01-01T08:04:21Z",
"pushed_at": "2026-01-01T08:04:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]