272 lines
No EOL
8.7 KiB
JSON
272 lines
No EOL
8.7 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "lockedbyte/CVE-2021-40444",
|
||
"html_url": "https://github.com/lockedbyte/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 PoC",
|
||
"stargazers_count": 1618,
|
||
"forks_count": 481,
|
||
"created_at": "2021-09-10T16:55:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "klezVirus/CVE-2021-40444",
|
||
"html_url": "https://github.com/klezVirus/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||
"stargazers_count": 805,
|
||
"forks_count": 170,
|
||
"created_at": "2021-09-15T22:34:35Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444_builders",
|
||
"full_name": "aslitsecurity/CVE-2021-40444_builders",
|
||
"html_url": "https://github.com/aslitsecurity/CVE-2021-40444_builders",
|
||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||
"stargazers_count": 171,
|
||
"forks_count": 43,
|
||
"created_at": "2021-09-12T18:05:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444--CABless",
|
||
"full_name": "Edubr2020/CVE-2021-40444--CABless",
|
||
"html_url": "https://github.com/Edubr2020/CVE-2021-40444--CABless",
|
||
"description": "Modified code so that we don´t need to rely on CAB archives",
|
||
"stargazers_count": 101,
|
||
"forks_count": 22,
|
||
"created_at": "2021-09-19T19:46:28Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40449-Exploit",
|
||
"full_name": "KaLendsi/CVE-2021-40449-Exploit",
|
||
"html_url": "https://github.com/KaLendsi/CVE-2021-40449-Exploit",
|
||
"description": "windows 10 14393 LPE",
|
||
"stargazers_count": 95,
|
||
"forks_count": 46,
|
||
"created_at": "2021-10-20T09:24:36Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40449_poc",
|
||
"full_name": "Kristal-g/CVE-2021-40449_poc",
|
||
"html_url": "https://github.com/Kristal-g/CVE-2021-40449_poc",
|
||
"description": "Exploit for CVE-2021-40449",
|
||
"stargazers_count": 52,
|
||
"forks_count": 14,
|
||
"created_at": "2021-11-07T16:15:19Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40449",
|
||
"full_name": "hakivvi/CVE-2021-40449",
|
||
"html_url": "https://github.com/hakivvi/CVE-2021-40449",
|
||
"description": "LPE exploit for a UAF in Windows (CVE-2021-40449).",
|
||
"stargazers_count": 41,
|
||
"forks_count": 15,
|
||
"created_at": "2021-10-25T04:58:49Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "k8gege/CVE-2021-40444",
|
||
"html_url": "https://github.com/k8gege/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 19,
|
||
"forks_count": 6,
|
||
"created_at": "2021-09-14T17:10:48Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "ozergoker/CVE-2021-40444",
|
||
"html_url": "https://github.com/ozergoker/CVE-2021-40444",
|
||
"description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
|
||
"stargazers_count": 17,
|
||
"forks_count": 7,
|
||
"created_at": "2021-09-08T08:32:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-POC",
|
||
"full_name": "rfcxv/CVE-2021-40444-POC",
|
||
"html_url": "https://github.com/rfcxv/CVE-2021-40444-POC",
|
||
"description": null,
|
||
"stargazers_count": 14,
|
||
"forks_count": 14,
|
||
"created_at": "2021-09-09T03:15:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "H0j3n/CVE-2021-40444",
|
||
"html_url": "https://github.com/H0j3n/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 9,
|
||
"forks_count": 4,
|
||
"created_at": "2021-10-03T01:13:42Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40449-NtGdiResetDC-UAF",
|
||
"full_name": "BL0odz/CVE-2021-40449-NtGdiResetDC-UAF",
|
||
"html_url": "https://github.com/BL0odz/CVE-2021-40449-NtGdiResetDC-UAF",
|
||
"description": null,
|
||
"stargazers_count": 9,
|
||
"forks_count": 6,
|
||
"created_at": "2022-02-20T16:23:26Z"
|
||
},
|
||
{
|
||
"name": "CVE2021-40444",
|
||
"full_name": "aydianosec/CVE2021-40444",
|
||
"html_url": "https://github.com/aydianosec/CVE2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 8,
|
||
"forks_count": 5,
|
||
"created_at": "2021-09-14T01:37:25Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-POC",
|
||
"full_name": "kagura-maru/CVE-2021-40444-POC",
|
||
"html_url": "https://github.com/kagura-maru/CVE-2021-40444-POC",
|
||
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
|
||
"stargazers_count": 8,
|
||
"forks_count": 1,
|
||
"created_at": "2021-10-28T14:55:46Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "DarkSprings/CVE-2021-40444",
|
||
"html_url": "https://github.com/DarkSprings/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 POC",
|
||
"stargazers_count": 6,
|
||
"forks_count": 9,
|
||
"created_at": "2021-09-09T02:30:26Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-docx-Generate",
|
||
"full_name": "fengjixuchui/CVE-2021-40444-docx-Generate",
|
||
"html_url": "https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate",
|
||
"description": null,
|
||
"stargazers_count": 4,
|
||
"forks_count": 3,
|
||
"created_at": "2021-09-11T02:49:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444_EXP_JS",
|
||
"full_name": "bambooqj/CVE-2021-40444_EXP_JS",
|
||
"html_url": "https://github.com/bambooqj/CVE-2021-40444_EXP_JS",
|
||
"description": "根据已知样本反编译代码",
|
||
"stargazers_count": 3,
|
||
"forks_count": 4,
|
||
"created_at": "2021-09-09T09:46:00Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "vysecurity/CVE-2021-40444",
|
||
"html_url": "https://github.com/vysecurity/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-09T23:41:52Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "MRacumen/CVE-2021-40444",
|
||
"html_url": "https://github.com/MRacumen/CVE-2021-40444",
|
||
"description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2021-12-28T06:33:25Z"
|
||
},
|
||
{
|
||
"name": "CVE2021-40444-document-Scanner",
|
||
"full_name": "InfoSecPolkCounty/CVE2021-40444-document-Scanner",
|
||
"html_url": "https://github.com/InfoSecPolkCounty/CVE2021-40444-document-Scanner",
|
||
"description": "Scans Microsoft office documents for malicious xml entries",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-14T19:59:53Z"
|
||
},
|
||
{
|
||
"name": "cve-2021-40449-poc",
|
||
"full_name": "CppXL/cve-2021-40449-poc",
|
||
"html_url": "https://github.com/CppXL/cve-2021-40449-poc",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 1,
|
||
"created_at": "2021-11-12T11:49:10Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-CAB",
|
||
"full_name": "Phuong39/CVE-2021-40444-CAB",
|
||
"html_url": "https://github.com/Phuong39/CVE-2021-40444-CAB",
|
||
"description": "CVE-2021-40444 - Custom CAB templates from MakeCAB",
|
||
"stargazers_count": 0,
|
||
"forks_count": 5,
|
||
"created_at": "2021-09-16T10:32:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-4044",
|
||
"full_name": "phirojshah/CVE-2021-4044",
|
||
"html_url": "https://github.com/phirojshah/CVE-2021-4044",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-09-05T15:15:28Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "Alexcot25051999/CVE-2021-40444",
|
||
"html_url": "https://github.com/Alexcot25051999/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-11-22T13:29:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "RedLeavesChilde/CVE-2021-40444",
|
||
"html_url": "https://github.com/RedLeavesChilde/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2022-04-28T02:14:10Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "hqdat809/CVE-2021-40444",
|
||
"html_url": "https://github.com/hqdat809/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2023-06-05T02:27:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "khoaduynu/CVE-2021-40444",
|
||
"html_url": "https://github.com/khoaduynu/CVE-2021-40444",
|
||
"description": "POC for CVE-2021-40444",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-13T09:46:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40449",
|
||
"full_name": "toanthang1842002/CVE-2021-40449",
|
||
"html_url": "https://github.com/toanthang1842002/CVE-2021-40449",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2023-07-17T04:07:44Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "MohamedAboHelal/CVE-2021-40444",
|
||
"html_url": "https://github.com/MohamedAboHelal/CVE-2021-40444",
|
||
"description": "CVE-2021-40444",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2023-12-24T16:20:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "tiagob0b/CVE-2021-40444",
|
||
"html_url": "https://github.com/tiagob0b/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-10-24T23:17:12Z"
|
||
}
|
||
] |