Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/FeatherStark/CVE-2023-21716 | POC Details |
| 2 | RTF Crash POC Python 3.11 Windows 10 | https://github.com/Xnuvers007/CVE-2023-21716 | POC Details |
| 3 | A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means). | https://github.com/gyaansastra/CVE-2023-21716 | POC Details |
| 4 | Results of retrohunt for files matching YARA rules from https://github.com/AmgdGocha/Detection-Rules/blob/main/CVE-2023-21716.yar | https://github.com/mikesxrs/CVE-2023-21716_YARA_Results | POC Details |
| 5 | Microsoft Word 远程代码执行漏洞 | https://github.com/CKevens/CVE-2023-21716-POC | POC Details |
| 6 | test of exploit for CVE-2023-21716 | https://github.com/hv0l/CVE-2023-21716_exploit | POC Details |
| 7 | POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption | https://github.com/JMousqueton/CVE-2023-21716 | POC Details |
| 8 | python program to exploit CVE-2023-21716 | https://github.com/Lord-of-the-IoT/CVE-2023-21716 | POC Details |
| 9 | This is an exploit file which is used to check CVE-2021-21716 vulnerability | https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py | POC Details |
| 10 | Microsoft Word 远程代码执行漏洞 | https://github.com/3yujw7njai/CVE-2023-21716-POC | POC Details |
| 11 | POC CVE 2023-21716 | https://github.com/n0s3ns33/poc-cve-2023-21716 | POC Details |
| 12 | Proof Of Concept for CVE-2023-21716 Microsoft Word Heap Corruption | https://github.com/RonF98/CVE-2023-21716-POC | POC Details |
| 13 | Microsoft Word 远程代码执行漏洞 | https://github.com/AiK1d/CVE-2023-21716-POC | POC Details |
| 14 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%85%B6%E4%BB%96%E6%BC%8F%E6%B4%9E/Microsoft%20Word%20%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2023-21716.md | POC Details |
| 15 | Microsoft Word 远程代码执行漏洞 | https://github.com/P4x1s/CVE-2023-21716-POC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2023-21689 | 9.8 CRITICAL | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner |
| CVE-2023-21690 | 9.8 CRITICAL | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner |
| CVE-2023-21692 | 9.8 CRITICAL | Microsoft Protected Extensible Authentication Protocol (PEAP) Remote Code Execution Vulner |
| CVE-2023-21803 | 9.8 CRITICAL | Windows iSCSI Discovery Service Remote Code Execution Vulnerability |
| CVE-2023-21685 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21684 | 8.8 HIGH | Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability |
| CVE-2023-21706 | 8.8 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-21705 | 8.8 HIGH | Microsoft SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21707 | 8.8 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-21717 | 8.8 HIGH | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
| CVE-2023-21529 | 8.8 HIGH | Microsoft Exchange Server Remote Code Execution Vulnerability |
| CVE-2023-21713 | 8.8 HIGH | Microsoft SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21798 | 8.8 HIGH | Microsoft ODBC Driver Remote Code Execution Vulnerability |
| CVE-2023-21799 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21686 | 8.8 HIGH | Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability |
| CVE-2023-21797 | 8.8 HIGH | Microsoft ODBC Driver Remote Code Execution Vulnerability |
| CVE-2023-21777 | 8.7 HIGH | Azure App Service on Azure Stack Hub Elevation of Privilege Vulnerability |
| CVE-2023-23374 | 8.3 HIGH | Microsoft Edge (Chromium-based) Remote Code Execution Vulnerability |
| CVE-2023-21806 | 8.2 HIGH | Power BI Report Server Spoofing Vulnerability |
| CVE-2023-21778 | 8.0 HIGH | Microsoft Dynamics Unified Service Desk Remote Code Execution Vulnerability |
Showing top 20 of 78 CVEs. View all on vendor page → →
No comments yet