PoC-in-GitHub/2021/CVE-2021-40444.json
2022-02-20 09:14:10 +09:00

362 lines
No EOL
12 KiB
JSON

[
{
"id": 405152543,
"name": "CVE-2021-40444",
"full_name": "lockedbyte\/CVE-2021-40444",
"owner": {
"login": "lockedbyte",
"id": 37779789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
"html_url": "https:\/\/github.com\/lockedbyte"
},
"html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2022-02-19T20:59:00Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1368,
"watchers_count": 1368,
"forks_count": 450,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 450,
"watchers": 1368,
"score": 0
},
{
"id": 405716870,
"name": "CVE-2021-40444_builders",
"full_name": "aslitsecurity\/CVE-2021-40444_builders",
"owner": {
"login": "aslitsecurity",
"id": 9478055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
"html_url": "https:\/\/github.com\/aslitsecurity"
},
"html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
"fork": false,
"created_at": "2021-09-12T18:05:53Z",
"updated_at": "2022-02-17T13:28:29Z",
"pushed_at": "2021-10-11T20:53:19Z",
"stargazers_count": 163,
"watchers_count": 163,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 45,
"watchers": 163,
"score": 0
},
{
"id": 406942491,
"name": "CVE-2021-40444",
"full_name": "klezVirus\/CVE-2021-40444",
"owner": {
"login": "klezVirus",
"id": 8959898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
"html_url": "https:\/\/github.com\/klezVirus"
},
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2022-02-17T09:23:38Z",
"pushed_at": "2021-10-12T23:05:07Z",
"stargazers_count": 569,
"watchers_count": 569,
"forks_count": 126,
"allow_forking": true,
"is_template": false,
"topics": [
"0day",
"cve-2021-40444",
"msword",
"office",
"rce",
"remote-code-execution"
],
"visibility": "public",
"forks": 126,
"watchers": 569,
"score": 0
},
{
"id": 409931314,
"name": "CVE-2021-40444_CAB_archives",
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
"description": "CVE 2021 40444 Windows Exploit services.dll",
"fork": false,
"created_at": "2021-09-24T10:59:34Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-10-21T09:46:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 412946991,
"name": "CVE-2021-40444",
"full_name": "H0j3n\/CVE-2021-40444",
"owner": {
"login": "H0j3n",
"id": 51261763,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
"html_url": "https:\/\/github.com\/H0j3n"
},
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-03T01:13:42Z",
"updated_at": "2022-01-26T02:35:54Z",
"pushed_at": "2021-10-10T06:32:11Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-40444"
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"score": 0
},
{
"id": 417748789,
"name": "TIC4301_Project",
"full_name": "factionsypho\/TIC4301_Project",
"owner": {
"login": "factionsypho",
"id": 40175487,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4",
"html_url": "https:\/\/github.com\/factionsypho"
},
"html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project",
"description": "TIC4301 Project - CVE-2021-40444",
"fork": false,
"created_at": "2021-10-16T07:07:26Z",
"updated_at": "2021-12-06T13:36:02Z",
"pushed_at": "2021-12-06T13:35:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 420818304,
"name": "CVE-2021-40444",
"full_name": "TiagoSergio\/CVE-2021-40444",
"owner": {
"login": "TiagoSergio",
"id": 24528913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
"html_url": "https:\/\/github.com\/TiagoSergio"
},
"html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-24T23:17:12Z",
"updated_at": "2021-10-24T23:17:28Z",
"pushed_at": "2021-10-24T23:17:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 422246280,
"name": "CVE-2021-40444-POC",
"full_name": "0xK4gura\/CVE-2021-40444-POC",
"owner": {
"login": "0xK4gura",
"id": 92495243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4",
"html_url": "https:\/\/github.com\/0xK4gura"
},
"html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC",
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
"fork": false,
"created_at": "2021-10-28T14:55:46Z",
"updated_at": "2022-01-26T02:46:54Z",
"pushed_at": "2021-10-31T08:15:00Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 425935080,
"name": "word_mshtml",
"full_name": "Zeop-CyberSec\/word_mshtml",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
"description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
"fork": false,
"created_at": "2021-11-08T17:38:30Z",
"updated_at": "2021-12-11T21:29:07Z",
"pushed_at": "2021-11-09T11:12:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 430718153,
"name": "CVE-2021-40444",
"full_name": "Alexcot25051999\/CVE-2021-40444",
"owner": {
"login": "Alexcot25051999",
"id": 94846095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
"html_url": "https:\/\/github.com\/Alexcot25051999"
},
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-11-22T13:29:20Z",
"updated_at": "2021-11-22T13:41:39Z",
"pushed_at": "2021-11-22T13:41:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 431721742,
"name": "CVE-2021-40444-exp",
"full_name": "lisinan988\/CVE-2021-40444-exp",
"owner": {
"login": "lisinan988",
"id": 87479262,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
"html_url": "https:\/\/github.com\/lisinan988"
},
"html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp",
"description": null,
"fork": false,
"created_at": "2021-11-25T05:13:05Z",
"updated_at": "2021-11-25T05:13:19Z",
"pushed_at": "2021-11-25T05:13:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 439810103,
"name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"owner": {
"login": "34zY",
"id": 55347142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
"html_url": "https:\/\/github.com\/34zY"
},
"html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
"updated_at": "2022-01-25T08:55:47Z",
"pushed_at": "2021-12-19T08:27:33Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 53,
"score": 0
},
{
"id": 442372306,
"name": "CVE-2021-40444",
"full_name": "MRacumen\/CVE-2021-40444",
"owner": {
"login": "MRacumen",
"id": 73010693,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4",
"html_url": "https:\/\/github.com\/MRacumen"
},
"html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444",
"description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"fork": false,
"created_at": "2021-12-28T06:33:25Z",
"updated_at": "2021-12-28T09:38:18Z",
"pushed_at": "2021-12-28T06:44:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
}
]