[ { "id": 404270939, "name": "CVE-2021-40444", "full_name": "ozergoker\/CVE-2021-40444", "owner": { "login": "ozergoker", "id": 86879266, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4", "html_url": "https:\/\/github.com\/ozergoker" }, "html_url": "https:\/\/github.com\/ozergoker\/CVE-2021-40444", "description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444", "fork": false, "created_at": "2021-09-08T08:32:40Z", "updated_at": "2022-06-10T10:41:24Z", "pushed_at": "2021-09-29T11:39:26Z", "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 17, "score": 0 }, { "id": 404560139, "name": "CVE-2021-40444", "full_name": "DarkSprings\/CVE-2021-40444", "owner": { "login": "DarkSprings", "id": 90366126, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4", "html_url": "https:\/\/github.com\/DarkSprings" }, "html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-40444", "description": "CVE-2021-40444 POC", "fork": false, "created_at": "2021-09-09T02:30:26Z", "updated_at": "2021-09-17T10:41:29Z", "pushed_at": "2021-09-09T02:34:39Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 6, "score": 0 }, { "id": 404570413, "name": "CVE-2021-40444-POC", "full_name": "rfcxv\/CVE-2021-40444-POC", "owner": { "login": "rfcxv", "id": 90367910, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90367910?v=4", "html_url": "https:\/\/github.com\/rfcxv" }, "html_url": "https:\/\/github.com\/rfcxv\/CVE-2021-40444-POC", "description": null, "fork": false, "created_at": "2021-09-09T03:15:57Z", "updated_at": "2023-01-31T19:13:05Z", "pushed_at": "2021-09-09T03:26:21Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 16, "score": 0 }, { "id": 404667016, "name": "CVE-2021-40444_EXP_JS", "full_name": "bambooqj\/CVE-2021-40444_EXP_JS", "owner": { "login": "bambooqj", "id": 20792621, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20792621?v=4", "html_url": "https:\/\/github.com\/bambooqj" }, "html_url": "https:\/\/github.com\/bambooqj\/CVE-2021-40444_EXP_JS", "description": "根据已知样本反编译代码", "fork": false, "created_at": "2021-09-09T09:46:00Z", "updated_at": "2023-03-01T16:39:10Z", "pushed_at": "2021-09-09T09:46:32Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 4, "score": 0 }, { "id": 404779804, "name": "cve-2021-40444-analysis", "full_name": "Immersive-Labs-Sec\/cve-2021-40444-analysis", "owner": { "login": "Immersive-Labs-Sec", "id": 79456607, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4", "html_url": "https:\/\/github.com\/Immersive-Labs-Sec" }, "html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/cve-2021-40444-analysis", "description": null, "fork": false, "created_at": "2021-09-09T15:43:08Z", "updated_at": "2021-09-14T08:18:40Z", "pushed_at": "2021-09-14T08:18:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 404899720, "name": "CVE-2021-40444", "full_name": "vysecurity\/CVE-2021-40444", "owner": { "login": "vysecurity", "id": 3596242, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4", "html_url": "https:\/\/github.com\/vysecurity" }, "html_url": "https:\/\/github.com\/vysecurity\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-09-09T23:41:52Z", "updated_at": "2021-09-10T16:34:33Z", "pushed_at": "2021-09-09T23:41:53Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 405030498, "name": "CVE-2021-40444-Sample", "full_name": "Udyz\/CVE-2021-40444-Sample", "owner": { "login": "Udyz", "id": 39673284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4", "html_url": "https:\/\/github.com\/Udyz" }, "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-40444-Sample", "description": "CVE-2021-40444 Sample ", "fork": false, "created_at": "2021-09-10T09:43:41Z", "updated_at": "2023-04-09T04:59:15Z", "pushed_at": "2021-09-11T10:35:20Z", "stargazers_count": 76, "watchers_count": 76, "has_discussions": false, "forks_count": 52, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 52, "watchers": 76, "score": 0 }, { "id": 405152543, "name": "CVE-2021-40444", "full_name": "lockedbyte\/CVE-2021-40444", "owner": { "login": "lockedbyte", "id": 37779789, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4", "html_url": "https:\/\/github.com\/lockedbyte" }, "html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444", "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", "updated_at": "2023-04-28T08:34:06Z", "pushed_at": "2021-12-25T18:31:02Z", "stargazers_count": 1464, "watchers_count": 1464, "has_discussions": false, "forks_count": 485, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 485, "watchers": 1464, "score": 0 }, { "id": 405266779, "name": "CVE-2021-40444-docx-Generate", "full_name": "fengjixuchui\/CVE-2021-40444-docx-Generate", "owner": { "login": "fengjixuchui", "id": 2487206, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4", "html_url": "https:\/\/github.com\/fengjixuchui" }, "html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2021-40444-docx-Generate", "description": null, "fork": false, "created_at": "2021-09-11T02:49:37Z", "updated_at": "2023-04-18T00:33:40Z", "pushed_at": "2021-09-11T02:49:31Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 5, "score": 0 }, { "id": 405292789, "name": "CVE-2021-40444-docx-Generate", "full_name": "KnoooW\/CVE-2021-40444-docx-Generate", "owner": { "login": "KnoooW", "id": 4646393, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4646393?v=4", "html_url": "https:\/\/github.com\/KnoooW" }, "html_url": "https:\/\/github.com\/KnoooW\/CVE-2021-40444-docx-Generate", "description": null, "fork": false, "created_at": "2021-09-11T05:31:52Z", "updated_at": "2021-10-14T23:45:35Z", "pushed_at": "2021-09-11T03:11:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 405428447, "name": "Caboom", "full_name": "mansk1es\/Caboom", "owner": { "login": "mansk1es", "id": 74832816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74832816?v=4", "html_url": "https:\/\/github.com\/mansk1es" }, "html_url": "https:\/\/github.com\/mansk1es\/Caboom", "description": "A malicious .cab creation tool for CVE-2021-40444", "fork": false, "created_at": "2021-09-11T16:31:05Z", "updated_at": "2022-11-15T17:43:58Z", "pushed_at": "2021-09-12T09:08:23Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 12, "score": 0 }, { "id": 405599465, "name": "cve-2021-40444", "full_name": "jamesrep\/cve-2021-40444", "owner": { "login": "jamesrep", "id": 15976537, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15976537?v=4", "html_url": "https:\/\/github.com\/jamesrep" }, "html_url": "https:\/\/github.com\/jamesrep\/cve-2021-40444", "description": "Reverse engineering the \"A Letter Before Court 4.docx\" malicious files exploting cve-2021-40444", "fork": false, "created_at": "2021-09-12T09:27:40Z", "updated_at": "2021-09-12T12:00:29Z", "pushed_at": "2021-09-12T12:00:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 405620068, "name": "Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx", "full_name": "W1kyri3\/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx", "owner": { "login": "W1kyri3", "id": 81154240, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81154240?v=4", "html_url": "https:\/\/github.com\/W1kyri3" }, "html_url": "https:\/\/github.com\/W1kyri3\/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx", "description": null, "fork": false, "created_at": "2021-09-12T11:12:58Z", "updated_at": "2021-09-12T11:12:59Z", "pushed_at": "2021-09-11T09:21:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 405716870, "name": "CVE-2021-40444_builders", "full_name": "aslitsecurity\/CVE-2021-40444_builders", "owner": { "login": "aslitsecurity", "id": 9478055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4", "html_url": "https:\/\/github.com\/aslitsecurity" }, "html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders", "description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit", "fork": false, "created_at": "2021-09-12T18:05:53Z", "updated_at": "2023-04-09T04:59:44Z", "pushed_at": "2021-10-11T20:53:19Z", "stargazers_count": 168, "watchers_count": 168, "has_discussions": false, "forks_count": 47, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 47, "watchers": 168, "score": 0 }, { "id": 405915598, "name": "CVE-2021-40444", "full_name": "khoaduynu\/CVE-2021-40444", "owner": { "login": "khoaduynu", "id": 45584422, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45584422?v=4", "html_url": "https:\/\/github.com\/khoaduynu" }, "html_url": "https:\/\/github.com\/khoaduynu\/CVE-2021-40444", "description": "POC for CVE-2021-40444", "fork": false, "created_at": "2021-09-13T09:46:04Z", "updated_at": "2021-09-13T09:46:04Z", "pushed_at": "2021-09-13T09:46:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 406384562, "name": "CVE-2021-40444", "full_name": "js-on\/CVE-2021-40444", "owner": { "login": "js-on", "id": 55274241, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4", "html_url": "https:\/\/github.com\/js-on" }, "html_url": "https:\/\/github.com\/js-on\/CVE-2021-40444", "description": "partly working PoC, check lockedbytes PoC for full experience!", "fork": false, "created_at": "2021-09-14T13:45:36Z", "updated_at": "2022-11-09T18:13:42Z", "pushed_at": "2021-09-14T13:56:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 406397884, "name": "MSHTMHell", "full_name": "Jeromeyoung\/MSHTMHell", "owner": { "login": "Jeromeyoung", "id": 39945364, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39945364?v=4", "html_url": "https:\/\/github.com\/Jeromeyoung" }, "html_url": "https:\/\/github.com\/Jeromeyoung\/MSHTMHell", "description": "Malicious document builder for CVE-2021-40444 ", "fork": false, "created_at": "2021-09-14T14:20:38Z", "updated_at": "2022-02-08T02:13:27Z", "pushed_at": "2021-09-14T13:49:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 406457018, "name": "CVE-2021-40444", "full_name": "k8gege\/CVE-2021-40444", "owner": { "login": "k8gege", "id": 42312878, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4", "html_url": "https:\/\/github.com\/k8gege" }, "html_url": "https:\/\/github.com\/k8gege\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-09-14T17:10:48Z", "updated_at": "2022-07-24T12:36:09Z", "pushed_at": "2021-09-14T17:19:26Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 20, "score": 0 }, { "id": 406942491, "name": "CVE-2021-40444", "full_name": "klezVirus\/CVE-2021-40444", "owner": { "login": "klezVirus", "id": 8959898, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4", "html_url": "https:\/\/github.com\/klezVirus" }, "html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444", "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", "updated_at": "2023-04-26T07:36:27Z", "pushed_at": "2022-06-22T20:21:42Z", "stargazers_count": 741, "watchers_count": 741, "has_discussions": false, "forks_count": 168, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "0day", "cve-2021-40444", "msword", "office", "rce", "remote-code-execution" ], "visibility": "public", "forks": 168, "watchers": 741, "score": 0 }, { "id": 407116716, "name": "CVE-2021-40444-CAB", "full_name": "Udyz\/CVE-2021-40444-CAB", "owner": { "login": "Udyz", "id": 39673284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4", "html_url": "https:\/\/github.com\/Udyz" }, "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-40444-CAB", "description": "CVE-2021-40444 - Custom CAB templates from MakeCAB", "fork": false, "created_at": "2021-09-16T10:14:08Z", "updated_at": "2022-11-15T17:44:22Z", "pushed_at": "2021-09-16T10:20:10Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 10, "score": 0 }, { "id": 407245865, "name": "CVE-2021-40444-URL-Extractor", "full_name": "gh0stxplt\/CVE-2021-40444-URL-Extractor", "owner": { "login": "gh0stxplt", "id": 87348587, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87348587?v=4", "html_url": "https:\/\/github.com\/gh0stxplt" }, "html_url": "https:\/\/github.com\/gh0stxplt\/CVE-2021-40444-URL-Extractor", "description": "Python script to extract embedded URLs from doc files (.docx, .docm, .rtf)", "fork": false, "created_at": "2021-09-16T16:54:50Z", "updated_at": "2022-12-16T04:13:08Z", "pushed_at": "2021-09-20T19:01:46Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-40444", "python" ], "visibility": "public", "forks": 3, "watchers": 4, "score": 0 }, { "id": 408221589, "name": "CVE-2021-40444--CABless", "full_name": "Edubr2020\/CVE-2021-40444--CABless", "owner": { "login": "Edubr2020", "id": 60452468, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452468?v=4", "html_url": "https:\/\/github.com\/Edubr2020" }, "html_url": "https:\/\/github.com\/Edubr2020\/CVE-2021-40444--CABless", "description": "Modified code so that we don´t need to rely on CAB archives", "fork": false, "created_at": "2021-09-19T19:46:28Z", "updated_at": "2023-01-13T19:06:05Z", "pushed_at": "2021-09-22T20:07:51Z", "stargazers_count": 100, "watchers_count": 100, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 100, "score": 0 }, { "id": 409931314, "name": "CVE-2021-40444_CAB_archives", "full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives", "owner": { "login": "kal1gh0st", "id": 56889513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4", "html_url": "https:\/\/github.com\/kal1gh0st" }, "html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives", "description": "CVE 2021 40444 Windows Exploit services.dll", "fork": false, "created_at": "2021-09-24T10:59:34Z", "updated_at": "2021-12-15T00:43:34Z", "pushed_at": "2021-10-21T09:46:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 411631202, "name": "Docx-Exploit-2021", "full_name": "LazarusReborn\/Docx-Exploit-2021", "owner": { "login": "LazarusReborn", "id": 89079373, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89079373?v=4", "html_url": "https:\/\/github.com\/LazarusReborn" }, "html_url": "https:\/\/github.com\/LazarusReborn\/Docx-Exploit-2021", "description": "This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444", "fork": false, "created_at": "2021-09-29T10:35:55Z", "updated_at": "2022-04-11T07:58:23Z", "pushed_at": "2021-09-29T10:45:43Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "botnet", "docx", "exploit", "payload", "rat", "rce" ], "visibility": "public", "forks": 3, "watchers": 4, "score": 0 }, { "id": 412946991, "name": "CVE-2021-40444", "full_name": "H0j3n\/CVE-2021-40444", "owner": { "login": "H0j3n", "id": 51261763, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4", "html_url": "https:\/\/github.com\/H0j3n" }, "html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-10-03T01:13:42Z", "updated_at": "2022-10-19T04:22:19Z", "pushed_at": "2021-10-10T06:32:11Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-40444" ], "visibility": "public", "forks": 4, "watchers": 10, "score": 0 }, { "id": 417517068, "name": "MSHTML-CVE-2021-40444", "full_name": "metehangenel\/MSHTML-CVE-2021-40444", "owner": { "login": "metehangenel", "id": 31937891, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31937891?v=4", "html_url": "https:\/\/github.com\/metehangenel" }, "html_url": "https:\/\/github.com\/metehangenel\/MSHTML-CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-10-15T13:52:34Z", "updated_at": "2022-12-16T15:56:59Z", "pushed_at": "2021-09-16T17:53:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 417748789, "name": "TIC4301_Project", "full_name": "factionsypho\/TIC4301_Project", "owner": { "login": "factionsypho", "id": 40175487, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4", "html_url": "https:\/\/github.com\/factionsypho" }, "html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project", "description": "TIC4301 Project - CVE-2021-40444", "fork": false, "created_at": "2021-10-16T07:07:26Z", "updated_at": "2021-12-06T13:36:02Z", "pushed_at": "2021-12-06T13:35:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 420818304, "name": "CVE-2021-40444", "full_name": "TiagoSergio\/CVE-2021-40444", "owner": { "login": "TiagoSergio", "id": 24528913, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4", "html_url": "https:\/\/github.com\/TiagoSergio" }, "html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-10-24T23:17:12Z", "updated_at": "2021-10-24T23:17:28Z", "pushed_at": "2021-10-24T23:17:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 422246280, "name": "CVE-2021-40444-POC", "full_name": "0xK4gura\/CVE-2021-40444-POC", "owner": { "login": "0xK4gura", "id": 92495243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4", "html_url": "https:\/\/github.com\/0xK4gura" }, "html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC", "description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.", "fork": false, "created_at": "2021-10-28T14:55:46Z", "updated_at": "2022-10-03T07:13:46Z", "pushed_at": "2021-10-31T08:15:00Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 8, "score": 0 }, { "id": 425935080, "name": "word_mshtml", "full_name": "Zeop-CyberSec\/word_mshtml", "owner": { "login": "Zeop-CyberSec", "id": 68154603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4", "html_url": "https:\/\/github.com\/Zeop-CyberSec" }, "html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml", "description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.", "fork": false, "created_at": "2021-11-08T17:38:30Z", "updated_at": "2021-12-11T21:29:07Z", "pushed_at": "2021-11-09T11:12:53Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 430718153, "name": "CVE-2021-40444", "full_name": "Alexcot25051999\/CVE-2021-40444", "owner": { "login": "Alexcot25051999", "id": 94846095, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4", "html_url": "https:\/\/github.com\/Alexcot25051999" }, "html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-11-22T13:29:20Z", "updated_at": "2021-11-22T13:41:39Z", "pushed_at": "2021-11-22T13:41:36Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 431721742, "name": "CVE-2021-40444-exp", "full_name": "lisinan988\/CVE-2021-40444-exp", "owner": { "login": "lisinan988", "id": 87479262, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4", "html_url": "https:\/\/github.com\/lisinan988" }, "html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp", "description": null, "fork": false, "created_at": "2021-11-25T05:13:05Z", "updated_at": "2021-11-25T05:13:19Z", "pushed_at": "2021-11-25T05:13:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 439810103, "name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "owner": { "login": "34zY", "id": 55347142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4", "html_url": "https:\/\/github.com\/34zY" }, "html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "description": "CVE-2021-40444", "fork": false, "created_at": "2021-12-19T08:16:07Z", "updated_at": "2023-04-20T01:23:27Z", "pushed_at": "2021-12-19T08:27:33Z", "stargazers_count": 62, "watchers_count": 62, "has_discussions": false, "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 24, "watchers": 62, "score": 0 }, { "id": 442372306, "name": "CVE-2021-40444", "full_name": "MRacumen\/CVE-2021-40444", "owner": { "login": "MRacumen", "id": 73010693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4", "html_url": "https:\/\/github.com\/MRacumen" }, "html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444", "description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "fork": false, "created_at": "2021-12-28T06:33:25Z", "updated_at": "2021-12-28T09:38:18Z", "pushed_at": "2021-12-28T06:44:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 486415935, "name": "CVE-2021-40444", "full_name": "RedLeavesChilde\/CVE-2021-40444", "owner": { "login": "RedLeavesChilde", "id": 104541969, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104541969?v=4", "html_url": "https:\/\/github.com\/RedLeavesChilde" }, "html_url": "https:\/\/github.com\/RedLeavesChilde\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2022-04-28T02:14:10Z", "updated_at": "2022-04-28T02:14:10Z", "pushed_at": "2022-04-28T02:14:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 528470832, "name": "CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-", "full_name": "nvchungkma\/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-", "owner": { "login": "nvchungkma", "id": 59444526, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59444526?v=4", "html_url": "https:\/\/github.com\/nvchungkma" }, "html_url": "https:\/\/github.com\/nvchungkma\/CVE-2021-40444-Microsoft-Office-Word-Remote-Code-Execution-", "description": null, "fork": false, "created_at": "2022-08-24T14:55:11Z", "updated_at": "2022-08-24T14:55:11Z", "pushed_at": "2022-08-24T14:55:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]