9.8
CVSSv3

CVE-2023-21716

Published: 14/02/2023 Updated: 23/02/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Microsoft Word Remote Code Execution Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft word 2013

microsoft office web apps 2013

microsoft sharepoint foundation 2013

microsoft sharepoint enterprise server 2016

microsoft office online server 2016

microsoft sharepoint enterprise server 2013

microsoft sharepoint server 2019

microsoft office 2019

microsoft office long term servicing channel 2021

microsoft sharepoint server -

Github Repositories

A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document. The attacker could deliver this file as an email attachment (or other means).

CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document The attacker could deliver this file as an email attachment (or other means) Background Microsoft Word is the word processing application includ

RTF Crash POC Python 3.11 Windows 10

CVE-2023-21716 RTF Crash POC Python 311 Windows 10

CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption twittercom/jduck A vulnerability within Microsoft Office's wwlib allows attackers to achieve remote code execution with the privileges of the victim that opens a malicious RTF document The attacker could deliver this file as an email attachment (or other means) Background Microsoft Word is the word pro

Microsoft Word 远程代码执行漏洞

CVE-2023-21716-POC Microsoft Word 远程代码执行漏洞

test of exploit for CVE-2023-21716

CVE-2023-21716_exploit test of exploit for CVE-2023-21716 source: wwwdeepwatchcom/labs/poc-exploit-released-for-critical-windows-word-vulnerability-cve-2023-21716/

POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption

CVE-2023-21716 POC : CVE-2023-21716 Microsoft Word RTF Font Table Heap Corruption

Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - CVE-2024-21413 POC

CVE-2024-21413 - POC Usage: python CVE-2024-21413py -host examplecom -port 25 -from sender@examplecom -recipient recipient@examplecom -url xxxxxxxx/path/to/shared/file/r0tb1trtf Noter00tb1t : is the shared test file (word in this case) from the attacker machine (xxxxxxxx) To ensure compliance with SPF, DKIM, and DMARC, use legitimate $IP and domain Make sure to inst

CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC 🚀 Usage Ensure you have appropriate permissions and authorization from the target system owner before using this script Prerequisites Python 3x impacket-smbserver Usage Example sudo python3 CVE-2024-21413py 🛠️ Features Email Sending: Utilizes SMTP to s

CVE-2024-21413 exploit

CVE-2024-21413 - Expect Script POC Microsoft Outlook Leak credentials & Remote Code Execution Vulnerability when chained with CVE-2023-21716 (through the preview panel) CVSS:31 98 / 85 Outlook should warm you about the risk on opening an external link => but this is not the case! usage: /cve-2024-21413sh mxfqdn port sender recipient url /cve-2024-21413sh

Microsoft Outlook Information Disclosure Vulnerability (leak password hash)

📜 CVE-2024-21413 Microsoft Outlook Remote Code Execution Vulnerability Microsoft Outlook Leak credentials & Remote Code Execution Vulnerability when chained with CVE-2023-21716 Outlook should warn you about the risk on opening an external link => but this is not the case! 🚀 usage: /cve-2024-21413sh mxfqdn port sender recipient url example: /cve-2024-2

Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC

CVE-2024-21413 - Expect Script POC Microsoft Outlook Leak credentials & Remote Code Execution Vulnerability when chained with CVE-2023-21716 (through the preview panel) CVSS:31 98 / 85 Outlook should warm you about the risk on opening an external link => but this is not the case! usage: /cve-2024-21413sh mxfqdn port sender recipient url /cve-2024-21413sh