gyaansastra / CVE-2023-21716
A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).
☆59Updated last year
Related projects ⓘ
Alternatives and complementary repositories for CVE-2023-21716
- ☆130Updated 10 months ago
- Proof-of-Concept for CVE-2024-21345☆69Updated 6 months ago
- Proof of Concept Code for CVE-2023-32353: Local privilege escalation via iTunes in Windows☆34Updated last year
- ☆78Updated 7 months ago
- Arbitrary File Delete in Windows Installer before 10.0.19045.2193☆29Updated 2 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆31Updated last year
- Analysis of the vulnerability☆47Updated 10 months ago
- ☆71Updated last year
- Plantronics Desktop Hub LPE☆36Updated 6 months ago
- Apt style exploitation of Chrome 0day CVE-2023-4357☆43Updated last year
- ☆68Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated 8 months ago
- Create Anti-Copy DRM Malware☆46Updated 3 months ago
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69Updated last year
- CVE-2024-30090 - LPE PoC☆95Updated last month
- ☆16Updated 7 months ago
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆35Updated last year
- Activation cache poisoning to elevate from medium to high integrity (CVE-2024-6769)☆53Updated last month
- ☆38Updated 5 months ago
- This is a pre-authenticated RCE exploit for VMware vRealize Operations Manager☆48Updated last year
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆54Updated last year
- ☆27Updated 7 months ago
- This repository contains a list of python scripts to work with Microsoft RPC for research purposes.☆43Updated 4 months ago
- I have documented all of the AMSI patches that I learned till now☆68Updated last year
- ☆32Updated 4 months ago
- The program uses the Windows API functions to traverse through directories and locate DLL files with RWX section☆95Updated last year
- ☆24Updated last year
- AV/EDR evasion via direct system calls.☆106Updated 11 months ago
- ☆73Updated last year
- ☆106Updated 2 months ago