PoC-in-GitHub/2021/CVE-2021-40444.json
2024-10-29 21:30:55 +09:00

133 lines
No EOL
4.7 KiB
JSON

[
{
"id": 405152543,
"name": "CVE-2021-40444",
"full_name": "lockedbyte\/CVE-2021-40444",
"owner": {
"login": "lockedbyte",
"id": 37779789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
"html_url": "https:\/\/github.com\/lockedbyte",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2024-10-29T12:09:28Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1589,
"watchers_count": 1589,
"has_discussions": false,
"forks_count": 483,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 483,
"watchers": 1589,
"score": 0,
"subscribers_count": 28
},
{
"id": 406942491,
"name": "CVE-2021-40444",
"full_name": "klezVirus\/CVE-2021-40444",
"owner": {
"login": "klezVirus",
"id": 8959898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
"html_url": "https:\/\/github.com\/klezVirus",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2024-10-28T14:49:31Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 798,
"watchers_count": 798,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"cve-2021-40444",
"msword",
"office",
"rce",
"remote-code-execution"
],
"visibility": "public",
"forks": 169,
"watchers": 798,
"score": 0,
"subscribers_count": 18
},
{
"id": 409931314,
"name": "CVE-2021-40444_CAB_archives",
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
"description": "CVE 2021 40444 Windows Exploit services.dll",
"fork": false,
"created_at": "2021-09-24T10:59:34Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-10-21T09:46:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 834897913,
"name": "Follina-CVE-and-CVE-2021-40444",
"full_name": "basim-ahmad\/Follina-CVE-and-CVE-2021-40444",
"owner": {
"login": "basim-ahmad",
"id": 106730920,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106730920?v=4",
"html_url": "https:\/\/github.com\/basim-ahmad",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/basim-ahmad\/Follina-CVE-and-CVE-2021-40444",
"description": "This repository contains scripts and resources for exploiting the Follina CVE and CVE-2021-40444 vulnerabilities in Microsoft Office. The scripts generate malicious document files that can execute arbitrary code on the target system.",
"fork": false,
"created_at": "2024-07-28T17:23:43Z",
"updated_at": "2024-07-29T06:57:10Z",
"pushed_at": "2024-07-29T06:57:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]