mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-30 18:56:19 +00:00
87 lines
4.1 KiB
Markdown
87 lines
4.1 KiB
Markdown
### [CVE-2021-42321](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42321)
|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Microsoft Exchange Server Remote Code Execution Vulnerability
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- http://packetstormsecurity.com/files/166153/Microsoft-Exchange-Server-Remote-Code-Execution.html
|
|
- http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html
|
|
|
|
#### Github
|
|
- https://github.com/0x0021h/expbox
|
|
- https://github.com/0x7n6/OSCP
|
|
- https://github.com/0xStrygwyr/OSCP-Guide
|
|
- https://github.com/0xZipp0/OSCP
|
|
- https://github.com/0xsyr0/OSCP
|
|
- https://github.com/20142995/sectool
|
|
- https://github.com/7BitsTeam/CVE-2022-23277
|
|
- https://github.com/7BitsTeam/exch_CVE-2021-42321
|
|
- https://github.com/AMatheusFeitosaM/OSCP-Cheat
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/AdamCrosser/awesome-vuln-writeups
|
|
- https://github.com/DarkSprings/CVE-2021-42321
|
|
- https://github.com/Deep-Bagchi/ysoserial.net
|
|
- https://github.com/EnriqueSanchezdelVillar/NotesHck
|
|
- https://github.com/FDlucifer/Proxy-Attackchain
|
|
- https://github.com/Faizan-Khanx/OSCP
|
|
- https://github.com/Ly0nt4r/OSCP
|
|
- https://github.com/Mr-xn/Penetration_Testing_POC
|
|
- https://github.com/NaInSec/CVE-PoC-in-GitHub
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/ReflectedThanatos/OSCP-cheatsheet
|
|
- https://github.com/SYRTI/POC_to_review
|
|
- https://github.com/SantoriuHen/NotesHck
|
|
- https://github.com/SenukDias/OSCP_cheat
|
|
- https://github.com/SirElmard/ethical_hacking
|
|
- https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet
|
|
- https://github.com/TrojanAZhen/Self_Back
|
|
- https://github.com/UNC1739/awesome-vulnerability-research
|
|
- https://github.com/VishuGahlyan/OSCP
|
|
- https://github.com/WhooAmii/POC_to_review
|
|
- https://github.com/Y4er/dotnet-deserialization
|
|
- https://github.com/e-hakson/OSCP
|
|
- https://github.com/eljosep/OSCP-Guide
|
|
- https://github.com/exfilt/CheatSheet
|
|
- https://github.com/f0ur0four/Insecure-Deserialization
|
|
- https://github.com/fazilbaig1/oscp
|
|
- https://github.com/gmeier909/exchange_tools
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/hktalent/ysoserial.net
|
|
- https://github.com/irsdl/ysonet
|
|
- https://github.com/jitmondal1/OSCP
|
|
- https://github.com/kgwanjala/oscp-cheatsheet
|
|
- https://github.com/lions2012/Penetration_Testing_POC
|
|
- https://github.com/mandiant/heyserial
|
|
- https://github.com/nitishbadole/oscp-note-3
|
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
|
- https://github.com/oscpname/OSCP_cheat
|
|
- https://github.com/parth45/cheatsheet
|
|
- https://github.com/puckiestyle/ysoserial.net
|
|
- https://github.com/pwntester/ysoserial.net
|
|
- https://github.com/retr0-13/proxy_Attackchain
|
|
- https://github.com/revanmalang/OSCP
|
|
- https://github.com/secret-arrow/ysoserial.net
|
|
- https://github.com/soosmile/POC
|
|
- https://github.com/timb-machine-mirrors/CVE-2021-42321_poc
|
|
- https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py
|
|
- https://github.com/trhacknon/Pocingit
|
|
- https://github.com/txuswashere/OSCP
|
|
- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-
|
|
- https://github.com/xhref/OSCP
|
|
- https://github.com/xnyuq/cve-2021-42321
|
|
- https://github.com/xuetusummer/Penetration_Testing_POC
|
|
- https://github.com/zecool/cve
|
|
|