Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2021-42321

Description

Microsoft Exchange Server Remote Code Execution Vulnerability

POC

Reference

- http://packetstormsecurity.com/files/166153/Microsoft-Exchange-Server-Remote-Code-Execution.html

- http://packetstormsecurity.com/files/168131/Microsoft-Exchange-Server-ChainedSerializationBinder-Remote-Code-Execution.html

Github

- https://github.com/0x0021h/expbox

- https://github.com/0x7n6/OSCP

- https://github.com/0xStrygwyr/OSCP-Guide

- https://github.com/0xZipp0/OSCP

- https://github.com/0xsyr0/OSCP

- https://github.com/20142995/sectool

- https://github.com/7BitsTeam/CVE-2022-23277

- https://github.com/7BitsTeam/exch_CVE-2021-42321

- https://github.com/AMatheusFeitosaM/OSCP-Cheat

- https://github.com/ARPSyndicate/cvemon

- https://github.com/AdamCrosser/awesome-vuln-writeups

- https://github.com/DarkSprings/CVE-2021-42321

- https://github.com/Deep-Bagchi/ysoserial.net

- https://github.com/EnriqueSanchezdelVillar/NotesHck

- https://github.com/FDlucifer/Proxy-Attackchain

- https://github.com/Faizan-Khanx/OSCP

- https://github.com/Ly0nt4r/OSCP

- https://github.com/Mr-xn/Penetration_Testing_POC

- https://github.com/NaInSec/CVE-PoC-in-GitHub

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/ReflectedThanatos/OSCP-cheatsheet

- https://github.com/SYRTI/POC_to_review

- https://github.com/SantoriuHen/NotesHck

- https://github.com/SenukDias/OSCP_cheat

- https://github.com/SirElmard/ethical_hacking

- https://github.com/SohelParashar/.Net-Deserialization-Cheat-Sheet

- https://github.com/TrojanAZhen/Self_Back

- https://github.com/UNC1739/awesome-vulnerability-research

- https://github.com/VishuGahlyan/OSCP

- https://github.com/WhooAmii/POC_to_review

- https://github.com/Y4er/dotnet-deserialization

- https://github.com/e-hakson/OSCP

- https://github.com/eljosep/OSCP-Guide

- https://github.com/exfilt/CheatSheet

- https://github.com/f0ur0four/Insecure-Deserialization

- https://github.com/fazilbaig1/oscp

- https://github.com/gmeier909/exchange_tools

- https://github.com/hktalent/bug-bounty

- https://github.com/hktalent/ysoserial.net

- https://github.com/irsdl/ysonet

- https://github.com/jitmondal1/OSCP

- https://github.com/kgwanjala/oscp-cheatsheet

- https://github.com/lions2012/Penetration_Testing_POC

- https://github.com/mandiant/heyserial

- https://github.com/nitishbadole/oscp-note-3

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oscpname/OSCP_cheat

- https://github.com/parth45/cheatsheet

- https://github.com/puckiestyle/ysoserial.net

- https://github.com/pwntester/ysoserial.net

- https://github.com/retr0-13/proxy_Attackchain

- https://github.com/revanmalang/OSCP

- https://github.com/secret-arrow/ysoserial.net

- https://github.com/soosmile/POC

- https://github.com/timb-machine-mirrors/CVE-2021-42321_poc

- https://github.com/timb-machine-mirrors/testanull-CVE-2021-42321_poc.py

- https://github.com/trhacknon/Pocingit

- https://github.com/txuswashere/OSCP

- https://github.com/winterwolf32/CVE-S---Penetration_Testing_POC-

- https://github.com/xhref/OSCP

- https://github.com/xnyuq/cve-2021-42321

- https://github.com/xuetusummer/Penetration_Testing_POC

- https://github.com/zecool/cve