PoC-in-GitHub/2021/CVE-2021-40444.json

362 lines
12 KiB
JSON
Raw Normal View History

2021-09-08 18:12:39 +09:00
[
2021-09-11 06:12:36 +09:00
{
"id": 405152543,
"name": "CVE-2021-40444",
"full_name": "lockedbyte\/CVE-2021-40444",
"owner": {
"login": "lockedbyte",
"id": 37779789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
"html_url": "https:\/\/github.com\/lockedbyte"
},
"html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
2021-09-11 12:11:58 +09:00
"description": "CVE-2021-40444 PoC",
2021-09-11 06:12:36 +09:00
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
2022-02-15 21:14:26 +09:00
"updated_at": "2022-02-15T08:16:44Z",
2021-12-26 09:14:14 +09:00
"pushed_at": "2021-12-25T18:31:02Z",
2022-02-15 21:14:26 +09:00
"stargazers_count": 1367,
"watchers_count": 1367,
2022-02-16 03:14:11 +09:00
"forks_count": 450,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-02-16 03:14:11 +09:00
"forks": 450,
2022-02-15 21:14:26 +09:00
"watchers": 1367,
2021-09-12 06:13:54 +09:00
"score": 0
},
2021-09-13 06:14:24 +09:00
{
"id": 405716870,
"name": "CVE-2021-40444_builders",
"full_name": "aslitsecurity\/CVE-2021-40444_builders",
"owner": {
"login": "aslitsecurity",
"id": 9478055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
"html_url": "https:\/\/github.com\/aslitsecurity"
},
"html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
"fork": false,
"created_at": "2021-09-12T18:05:53Z",
2022-01-30 15:14:02 +09:00
"updated_at": "2022-01-30T03:23:07Z",
2021-10-12 06:12:46 +09:00
"pushed_at": "2021-10-11T20:53:19Z",
2022-01-30 15:14:02 +09:00
"stargazers_count": 162,
"watchers_count": 162,
2021-11-01 00:12:44 +09:00
"forks_count": 44,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-11-01 00:12:44 +09:00
"forks": 44,
2022-01-30 15:14:02 +09:00
"watchers": 162,
2021-09-14 00:13:11 +09:00
"score": 0
},
2021-09-16 18:14:12 +09:00
{
"id": 406942491,
"name": "CVE-2021-40444",
"full_name": "klezVirus\/CVE-2021-40444",
"owner": {
"login": "klezVirus",
"id": 8959898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
"html_url": "https:\/\/github.com\/klezVirus"
},
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
2022-02-17 03:14:16 +09:00
"updated_at": "2022-02-16T16:21:01Z",
2021-10-13 12:13:01 +09:00
"pushed_at": "2021-10-12T23:05:07Z",
2022-02-17 03:14:16 +09:00
"stargazers_count": 568,
"watchers_count": 568,
"forks_count": 126,
2021-09-16 18:14:12 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [
"0day",
"cve-2021-40444",
"msword",
"office",
"rce",
"remote-code-execution"
],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2022-02-17 03:14:16 +09:00
"forks": 126,
"watchers": 568,
2021-09-17 00:13:06 +09:00
"score": 0
},
2021-12-16 21:13:47 +09:00
{
"id": 409931314,
"name": "CVE-2021-40444_CAB_archives",
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
"description": "CVE 2021 40444 Windows Exploit services.dll",
"fork": false,
"created_at": "2021-09-24T10:59:34Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-10-21T09:46:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2021-09-20 06:12:36 +09:00
"score": 0
2021-09-30 00:13:20 +09:00
},
2021-10-03 12:13:09 +09:00
{
"id": 412946991,
"name": "CVE-2021-40444",
"full_name": "H0j3n\/CVE-2021-40444",
"owner": {
"login": "H0j3n",
"id": 51261763,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
"html_url": "https:\/\/github.com\/H0j3n"
},
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-03T01:13:42Z",
2022-01-26 15:14:08 +09:00
"updated_at": "2022-01-26T02:35:54Z",
2021-10-10 18:12:39 +09:00
"pushed_at": "2021-10-10T06:32:11Z",
2022-01-26 15:14:08 +09:00
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
2021-10-03 12:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [
"cve-2021-40444"
],
2021-10-03 12:13:09 +09:00
"visibility": "public",
2022-01-26 15:14:08 +09:00
"forks": 3,
"watchers": 9,
2021-10-03 12:13:09 +09:00
"score": 0
2021-10-16 18:12:32 +09:00
},
{
"id": 417748789,
"name": "TIC4301_Project",
"full_name": "factionsypho\/TIC4301_Project",
"owner": {
"login": "factionsypho",
"id": 40175487,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4",
"html_url": "https:\/\/github.com\/factionsypho"
},
"html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project",
"description": "TIC4301 Project - CVE-2021-40444",
"fork": false,
"created_at": "2021-10-16T07:07:26Z",
2021-12-07 03:14:40 +09:00
"updated_at": "2021-12-06T13:36:02Z",
"pushed_at": "2021-12-06T13:35:59Z",
2021-10-16 18:12:32 +09:00
"stargazers_count": 0,
"watchers_count": 0,
2021-10-17 00:12:34 +09:00
"forks_count": 1,
2021-10-16 18:12:32 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-17 00:12:34 +09:00
"forks": 1,
2021-10-16 18:12:32 +09:00
"watchers": 0,
"score": 0
2021-10-25 12:13:14 +09:00
},
{
"id": 420818304,
"name": "CVE-2021-40444",
"full_name": "TiagoSergio\/CVE-2021-40444",
"owner": {
"login": "TiagoSergio",
"id": 24528913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
"html_url": "https:\/\/github.com\/TiagoSergio"
},
"html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-24T23:17:12Z",
"updated_at": "2021-10-24T23:17:28Z",
"pushed_at": "2021-10-24T23:17:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-29 00:14:29 +09:00
},
{
"id": 422246280,
"name": "CVE-2021-40444-POC",
"full_name": "0xK4gura\/CVE-2021-40444-POC",
"owner": {
"login": "0xK4gura",
"id": 92495243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4",
"html_url": "https:\/\/github.com\/0xK4gura"
},
"html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC",
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
"fork": false,
"created_at": "2021-10-28T14:55:46Z",
2022-01-26 15:14:08 +09:00
"updated_at": "2022-01-26T02:46:54Z",
2021-10-31 18:12:52 +09:00
"pushed_at": "2021-10-31T08:15:00Z",
2022-01-26 15:14:08 +09:00
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
2021-10-29 00:14:29 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-26 15:14:08 +09:00
"forks": 1,
"watchers": 6,
2021-10-29 00:14:29 +09:00
"score": 0
2021-11-09 21:16:40 +09:00
},
{
"id": 425935080,
"name": "word_mshtml",
"full_name": "Zeop-CyberSec\/word_mshtml",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
"description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
"fork": false,
"created_at": "2021-11-08T17:38:30Z",
2021-12-12 09:13:11 +09:00
"updated_at": "2021-12-11T21:29:07Z",
2021-11-09 21:16:40 +09:00
"pushed_at": "2021-11-09T11:12:53Z",
2021-12-12 09:13:11 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-11-10 03:13:29 +09:00
"forks_count": 1,
2021-11-09 21:16:40 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-11-10 03:13:29 +09:00
"forks": 1,
2021-12-12 09:13:11 +09:00
"watchers": 1,
2021-11-09 21:16:40 +09:00
"score": 0
2021-11-23 03:15:36 +09:00
},
{
"id": 430718153,
"name": "CVE-2021-40444",
"full_name": "Alexcot25051999\/CVE-2021-40444",
"owner": {
"login": "Alexcot25051999",
"id": 94846095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
"html_url": "https:\/\/github.com\/Alexcot25051999"
},
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-11-22T13:29:20Z",
"updated_at": "2021-11-22T13:41:39Z",
"pushed_at": "2021-11-22T13:41:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-11-25 15:13:08 +09:00
},
{
"id": 431721742,
"name": "CVE-2021-40444-exp",
"full_name": "lisinan988\/CVE-2021-40444-exp",
"owner": {
"login": "lisinan988",
"id": 87479262,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
"html_url": "https:\/\/github.com\/lisinan988"
},
"html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp",
"description": null,
"fork": false,
"created_at": "2021-11-25T05:13:05Z",
"updated_at": "2021-11-25T05:13:19Z",
"pushed_at": "2021-11-25T05:13:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-12-19 21:13:54 +09:00
},
{
"id": 439810103,
"name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"owner": {
"login": "34zY",
"id": 55347142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
"html_url": "https:\/\/github.com\/34zY"
},
"html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
2022-01-25 21:16:04 +09:00
"updated_at": "2022-01-25T08:55:47Z",
2021-12-19 21:13:54 +09:00
"pushed_at": "2021-12-19T08:27:33Z",
2022-01-25 21:16:04 +09:00
"stargazers_count": 53,
"watchers_count": 53,
2022-02-13 21:13:57 +09:00
"forks_count": 20,
2021-12-19 21:13:54 +09:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-02-13 21:13:57 +09:00
"forks": 20,
2022-01-25 21:16:04 +09:00
"watchers": 53,
2021-12-28 21:13:44 +09:00
"score": 0
},
{
"id": 442372306,
"name": "CVE-2021-40444",
"full_name": "MRacumen\/CVE-2021-40444",
"owner": {
"login": "MRacumen",
"id": 73010693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4",
"html_url": "https:\/\/github.com\/MRacumen"
},
"html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444",
"description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"fork": false,
"created_at": "2021-12-28T06:33:25Z",
"updated_at": "2021-12-28T09:38:18Z",
"pushed_at": "2021-12-28T06:44:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
2021-12-19 21:13:54 +09:00
"score": 0
2021-09-08 18:12:39 +09:00
}
]