{"id":39983,"date":"2021-03-12T15:54:14","date_gmt":"2021-03-12T15:54:14","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32100\/Critics-Fume-After-Github-Removes-Exploit-Code-For-Exchange-Vulnerabilities.html"},"modified":"2021-03-12T15:54:14","modified_gmt":"2021-03-12T15:54:14","slug":"critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/","title":{"rendered":"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities"},"content":{"rendered":"<figure class=\"intro-image intro-left\"><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/03\/github-microsoft-800x421.png\" alt=\"Critics fume after Github removes exploit code for Exchange vulnerabilities\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"><a title=\"86 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/gadgets\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">135<\/span> <span class=\"visually-hidden\"> with 86 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p><!-- cache hit 448:single\/related:ed86a0f56e3c5d45bfa236c0010a5a58 --><!-- empty --><\/p>\n<p>Github has ignited a firestorm after the Microsoft-owned code-sharing repository removed a proof-of-concept exploit for critical vulnerabilities in Microsoft Exchange that have led to as many as 100,000 server infections in recent weeks.<\/p>\n<p>ProxyLogon is the name that researchers have given both to the four Exchange vulnerabilities under attack in the wild and the code that exploits them. Researchers say that Hafnium, a state-sponsored hacking group based in China, started exploiting ProxyLogon in January, and within a few weeks, five other APTs\u2014short for advanced persistent threat groups\u2014followed suit. To date, no fewer than <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/03\/security-unicorn-exchange-server-0-days-were-exploited-by-6-apts\/\">10 APTs have used ProxyLogon<\/a> to target servers around the world.<\/p>\n<p>Microsoft <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/03\/microsoft-issues-emergency-patches-for-4-exploited-0days-in-exchange\/\">issued emergency patches<\/a> last week, but as of Tuesday, an estimated 125,000 Exchange servers had yet to install it, security firm Palo Alto Networks <a href=\"https:\/\/unit42.paloaltonetworks.com\/remediation-steps-for-the-microsoft-exchange-server-vulnerabilities\/\">said<\/a>. The FBI and the Cybersecurity and Infrastructure Security Agency have warned that ProxyLogon poses a serious threat to businesses, nonprofits, and government agencies that remain vulnerable.<\/p>\n<p>On Wednesday, a researcher published what\u2019s believed to be the first largely working proof-of-concept (PoC) exploit for the vulnerabilities. Based in Vietnam, the researcher also published a post on Medium describing how the exploit works. With a few tweaks, hackers would have most of what they needed to launch their own in-the-wild RCEs, security speak for remote code execution exploits.<\/p>\n<p>Publishing PoC exploits for patched vulnerabilities is a standard practice among security researchers. It helps them understand how the attacks work so that they can build better defenses. The open source Metasploit hacking framework provides all the tools needed to exploit tens of thousands of patched exploits and is used by black hats and white hats alike.<\/p>\n<p>Within hours of the PoC going live, however, Github removed it. By Thursday, some researchers were fuming about the takedown. Critics accused Microsoft of censoring content of vital interest to the security community because it harmed Microsoft interests. Some critics pledged to remove large bodies of their work on Github in response.<\/p>\n<p>\u201cWow, I am completely speechless here,\u201d Dave Kennedy, founder of security firm TrustedSec, <a href=\"https:\/\/twitter.com\/HackingDave\/status\/1370070863505199108\">wrote<\/a> on Twitter. \u201cMicrosoft really did remove the PoC code from Github. This is huge, removing a security researcher&#8217;s code from GitHub against their own product and which has already been patched.\u201d<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<div class=\"twitter-tweet\">\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Wow, I am completely speechless here. <\/p>\n<p>Microsoft really did remove the PoC code from Github.<\/p>\n<p>This is huge, removing a security researchers code from GitHub against their own product and which has already been patched.<\/p>\n<p>This is not good. <a href=\"https:\/\/t.co\/yqO7sebCSU\">https:\/\/t.co\/yqO7sebCSU<\/a><\/p>\n<p>\u2014 Dave Kennedy (@HackingDave) <a href=\"https:\/\/twitter.com\/HackingDave\/status\/1370070863505199108?ref_src=twsrc%5Etfw\">March 11, 2021<\/a><\/p><\/blockquote>\n<\/div>\n<p>TrustedSec is one of countless security firms that has been overwhelmed by desperate calls from organizations hit by ProxyLogon. Plenty of Kennedy\u2019s peers agreed with his sentiments.<\/p>\n<p>\u201cIs there a benefit to metasploit, or is literally everyone who uses it a script kiddie?\u201d <a href=\"https:\/\/twitter.com\/taviso\/status\/1370101773470367745\">said<\/a> Tavis Ormandy, a member of Google\u2019s Project Zero, a vulnerability research group that regularly publishes PoCs almost immediately after a patch becomes available. \u201cIt\u2019s unfortunate that there\u2019s no way to share research and tools with professionals without also sharing them with attackers, but many people (like me) believe the benefits outweigh the risks.<\/p>\n<div class=\"twitter-tweet\">\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">Is there a benefit to metasploit, or is literally everyone who uses it a script kiddie? It&#8217;s unfortunate that there&#8217;s no way to share research and tools with professionals without also sharing them with attackers, but many people (like me) believe the benefits outweigh the risks.<\/p>\n<p>\u2014 Tavis Ormandy (@taviso) <a href=\"https:\/\/twitter.com\/taviso\/status\/1370101773470367745?ref_src=twsrc%5Etfw\">March 11, 2021<\/a><\/p><\/blockquote>\n<\/div>\n<p>Some researchers claimed Github had a double standard that allowed PoC code for patched vulnerabilities affecting other organizations\u2019 software but removed them for Microsoft products. Microsoft declined to comment, and Github didn\u2019t respond to an email seeking comment.<\/p>\n<h2>A dissenting view<\/h2>\n<p>Marcus Hutchins, a security researcher at Kryptos Logic, pushed back on those critics. He said Github has indeed removed PoCs for patched vulnerabilities affecting non-Microsoft software. He also made a case for Github removing the Exchange exploit.<\/p>\n<p>\u201cI\u2019ve seen Github remove malicious code before, and not just code targeted at Microsoft products,\u201d he told me in a direct message. \u201cI highly doubt MS played any role in the removal and it just simply fell afoul of Github\u2019s \u2018Active malware or exploits\u2019 policy in the [terms of service], due to the exploit being extremely recent and the large number of servers at imminent risk of ransomware.\u201d<\/p>\n<p>Responding to Kennedy on Twitter, Hutchins&nbsp;<a href=\"https:\/\/twitter.com\/MalwareTechBlog\/status\/1370098050186706950\">added<\/a>, &#8220;&#8216;Has already been patched.&#8217; Dude, there\u2019s more than 50,000 unpatched exchange servers out there. Releasing a full ready to go RCE chain is not security research, it\u2019s recklessness and stupid.\u201d<\/p>\n<div class=\"twitter-tweet\">\n<blockquote class=\"twitter-tweet\" data-lang=\"en\">\n<p lang=\"en\" dir=\"ltr\">&#8220;Has already been patched&#8221;. Dude, there&#8217;s more than 50,000 unpatched exchange servers out there. Releasing a full ready to go RCE chain is not security research, it&#8217;s recklessness and stupid.<\/p>\n<p>\u2014 MalwareTech (@MalwareTechBlog) <a href=\"https:\/\/twitter.com\/MalwareTechBlog\/status\/1370098050186706950?ref_src=twsrc%5Etfw\">March 11, 2021<\/a><\/p><\/blockquote>\n<\/div>\n<p>A post published by <a href=\"https:\/\/www.vice.com\/en\/article\/n7vpaz\/researcher-publishes-code-to-exploit-microsoft-exchange-vulnerabilities-on-github\">Motherboard<\/a> provided a statement from Github that confirmed Hutchins\u2019 guess that the PoC was removed because it violated Github&#8217;s terms of service. The statement read:<\/p>\n<blockquote>\n<p>We understand that the publication and distribution of proof of concept exploit code has educational and research value to the security community, and our goal is to balance that benefit with keeping the broader ecosystem safe. In accordance with our Acceptable Use Policies, we disabled the gist following reports that it contains proof of concept code for a recently disclosed vulnerability that is being actively exploited.<\/p>\n<\/blockquote>\n<p>The PoC removed from Github remains available on archive sites. Ars isn\u2019t linking to it or the Medium post until more servers are patched.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32100\/Critics-Fume-After-Github-Removes-Exploit-Code-For-Exchange-Vulnerabilities.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":39984,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[9265],"class_list":["post-39983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemicrosoftemailflawcensorship"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-12T15:54:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"421\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities\",\"datePublished\":\"2021-03-12T15:54:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/\"},\"wordCount\":937,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png\",\"keywords\":[\"headline,microsoft,email,flaw,censorship\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/\",\"name\":\"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png\",\"datePublished\":\"2021-03-12T15:54:14+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/03\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png\",\"width\":800,\"height\":421},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,microsoft,email,flaw,censorship\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemicrosoftemailflawcensorship\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-03-12T15:54:14+00:00","og_image":[{"width":800,"height":421,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities","datePublished":"2021-03-12T15:54:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/"},"wordCount":937,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png","keywords":["headline,microsoft,email,flaw,censorship"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/","url":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/","name":"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png","datePublished":"2021-03-12T15:54:14+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/03\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities.png","width":800,"height":421},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/critics-fume-after-github-removes-exploit-code-for-exchange-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,microsoft,email,flaw,censorship","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemicrosoftemailflawcensorship\/"},{"@type":"ListItem","position":3,"name":"Critics Fume After Github Removes Exploit Code For Exchange Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=39983"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/39983\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/39984"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=39983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=39983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=39983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}