CVE-2021-26855
EPSS Score
Source: FIRST.org · 2026-05-23CVSS v3.1
Source: VulnerabilityLookup (CIRCL)CVSS v2 (legacy)
Description
NVDAffected Products
Attack Intelligence
Google Project Zero
Exploits & PoC
C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode injection
[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell]
A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as th
ProxyLogon(CVE-2021-26855+CVE-2021-27065) Exchange Server RCE(SSRF->GetWebShell)
Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-202
PoC of proxylogon chain SSRF(CVE-2021-26855) to write file by testanull, censored by github
Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.
Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)
ProxyLogon is the formally generic name for CVE-2021-26855, a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authent
CVE-2021-26855: PoC (Not a HoneyPoC for once!)
CVE-2021-26855 & CVE-2021-27065
A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865
This script helps to identify CVE-2021-26855 ssrf Poc
RCE exploit for Microsoft Exchange Server (CVE-2021-26855).
PoC exploit code for CVE-2021-26855
CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrar
RCE exploit for ProxyLogon vulnerability in Microsoft Exchange
ProxyLogon (CVE-2021-26855+CVE-2021-27065) Exchange Server RCE (SSRF->GetWebShell)
Microsoft Exchange ProxyLogon PoC (CVE-2021-26855)
CVE-2021-26855 SSRF Exchange Server
IoC determination for exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.
CVE-2021-26855 exp
CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065
Module pack for #ProxyLogon (part. of my contribute for Metasploit-Framework) [CVE-2021-26855 && CVE-2021-27065]
POC of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865, ProxyLogon poc
patched to work
CVE-2021-26855 proxyLogon metasploit exploit script
Scanner and PoC for CVE-2021-26855
Chaining CVE-2021-26855 and CVE-2021-26857 to exploit Microsoft Exchange
Microsoft Exchange CVE-2021-26855&CVE-2021-27065
This script test the CVE-2021-26855 vulnerability on Exchange Server.
CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065
Microsoft Exchange Proxylogon Exploit Chain EXP分析
analytics ProxyLogo Mail exchange RCE
針對近期微軟公布修補遭駭客攻擊的Exchange Server漏洞問題,台灣DEVCORE表示早在1月5日便已發現安全漏洞後,並且向微軟通報此項編號命名為「CVE-2021-26855 」,以及「CVE-2021-27065」的零日漏洞,同時也將此項漏洞稱為「ProxyLogon」。 此次揭露的「
C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode in…
C# POC for CVE-2021-26855 aka ProxyLogon, supports the classically semi-interactive web shell as well as shellcode in…
CVE-2021-26855
Clone from gist
An advanced exploit for Microsoft Exchange Server (CVE-2021-26855, CVE-2021-27065) enhanced with Convergent Time Theory principles, achieving near-pe
CTT-enhanced version of the Microsoft Exchange Server SSRF to RCE exploit (ProxyShell/ProxyLogon), another CVSS 10.0 critical vulnerability that affec