PoC-in-GitHub/2022/CVE-2022-30190.json

1332 lines
45 KiB
JSON
Raw Normal View History

2022-05-31 14:18:24 +02:00
[
{
"id": 498052694,
"name": "PoC-CVE-2022-30190",
"full_name": "JMousqueton\/PoC-CVE-2022-30190",
"owner": {
"login": "JMousqueton",
"id": 4148567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4",
"html_url": "https:\/\/github.com\/JMousqueton"
},
"html_url": "https:\/\/github.com\/JMousqueton\/PoC-CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
2022-06-08 08:20:02 +02:00
"updated_at": "2022-06-08T02:50:02Z",
2022-06-06 02:15:40 +02:00
"pushed_at": "2022-06-05T21:06:13Z",
2022-06-08 08:20:02 +02:00
"stargazers_count": 103,
"watchers_count": 103,
2022-06-07 02:16:33 +02:00
"forks_count": 38,
2022-05-31 14:18:24 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"follina",
"msoffice",
"poc",
"proof-of-concept",
"rce",
"vulnerability"
],
"visibility": "public",
2022-06-07 02:16:33 +02:00
"forks": 38,
2022-06-08 08:20:02 +02:00
"watchers": 103,
2022-05-31 14:18:24 +02:00
"score": 0
},
{
"id": 498218229,
"name": "CVE-2022-30190",
"full_name": "onecloudemoji\/CVE-2022-30190",
"owner": {
"login": "onecloudemoji",
"id": 46857300,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46857300?v=4",
"html_url": "https:\/\/github.com\/onecloudemoji"
},
"html_url": "https:\/\/github.com\/onecloudemoji\/CVE-2022-30190",
"description": "CVE-2022-30190 Follina POC",
"fork": false,
"created_at": "2022-05-31T06:45:25Z",
2022-06-08 14:17:35 +02:00
"updated_at": "2022-06-08T10:15:12Z",
2022-05-31 14:18:24 +02:00
"pushed_at": "2022-05-31T09:35:37Z",
2022-06-08 14:17:35 +02:00
"stargazers_count": 86,
"watchers_count": 86,
2022-06-07 20:16:07 +02:00
"forks_count": 25,
2022-05-31 14:18:24 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-07 20:16:07 +02:00
"forks": 25,
2022-06-08 14:17:35 +02:00
"watchers": 86,
2022-06-02 02:16:40 +02:00
"score": 0
},
{
"id": 498253545,
"name": "CVE-2022-30190",
"full_name": "2867a0\/CVE-2022-30190",
"owner": {
"login": "2867a0",
"id": 42805417,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42805417?v=4",
"html_url": "https:\/\/github.com\/2867a0"
},
"html_url": "https:\/\/github.com\/2867a0\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-05-31T08:39:09Z",
"updated_at": "2022-06-01T23:05:08Z",
"pushed_at": "2022-05-31T08:43:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-05-31 14:18:24 +02:00
"score": 0
},
{
"id": 498322212,
"name": "CVE-2022-30190",
"full_name": "bytecaps\/CVE-2022-30190",
"owner": {
"login": "bytecaps",
"id": 52679771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
"html_url": "https:\/\/github.com\/bytecaps"
},
"html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-30190",
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
"fork": false,
"created_at": "2022-05-31T12:15:18Z",
2022-06-07 20:16:07 +02:00
"updated_at": "2022-06-07T14:32:46Z",
2022-05-31 20:16:41 +02:00
"pushed_at": "2022-05-31T12:27:50Z",
2022-06-07 20:16:07 +02:00
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 12,
2022-05-31 20:16:41 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-07 20:16:07 +02:00
"forks": 12,
"watchers": 33,
2022-05-31 20:16:41 +02:00
"score": 0
},
{
"id": 498363809,
"name": "MSDT_CVE-2022-30190",
"full_name": "archanchoudhury\/MSDT_CVE-2022-30190",
"owner": {
"login": "archanchoudhury",
"id": 51078911,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51078911?v=4",
"html_url": "https:\/\/github.com\/archanchoudhury"
},
"html_url": "https:\/\/github.com\/archanchoudhury\/MSDT_CVE-2022-30190",
"description": "This Repository Talks about the Follina MSDT from Defender Perspective",
"fork": false,
"created_at": "2022-05-31T14:10:11Z",
2022-06-07 14:18:14 +02:00
"updated_at": "2022-06-07T06:50:31Z",
2022-06-02 14:15:53 +02:00
"pushed_at": "2022-06-02T09:12:54Z",
2022-06-07 14:18:14 +02:00
"stargazers_count": 30,
"watchers_count": 30,
2022-06-04 20:15:33 +02:00
"forks_count": 9,
2022-05-31 20:16:41 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-04 20:15:33 +02:00
"forks": 9,
2022-06-07 14:18:14 +02:00
"watchers": 30,
2022-05-31 20:16:41 +02:00
"score": 0
},
{
"id": 498379315,
"name": "cve-2022-30190",
"full_name": "rickhenderson\/cve-2022-30190",
"owner": {
"login": "rickhenderson",
"id": 4127791,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4127791?v=4",
"html_url": "https:\/\/github.com\/rickhenderson"
},
"html_url": "https:\/\/github.com\/rickhenderson\/cve-2022-30190",
"description": "Aka Follina = benign POC.",
"fork": false,
"created_at": "2022-05-31T14:50:55Z",
"updated_at": "2022-05-31T15:01:16Z",
"pushed_at": "2022-05-31T15:59:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498408278,
"name": "CVE-2022-30190-ASR-Senintel-Process-Pickup",
"full_name": "DOV3Y\/CVE-2022-30190-ASR-Senintel-Process-Pickup",
"owner": {
"login": "DOV3Y",
"id": 89396131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89396131?v=4",
"html_url": "https:\/\/github.com\/DOV3Y"
},
"html_url": "https:\/\/github.com\/DOV3Y\/CVE-2022-30190-ASR-Senintel-Process-Pickup",
"description": "Picking up processes that have triggered ASR related to CVE-2022-30190",
"fork": false,
"created_at": "2022-05-31T16:11:14Z",
"updated_at": "2022-05-31T16:11:14Z",
"pushed_at": "2022-05-31T16:15:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498441804,
2022-06-03 02:18:16 +02:00
"name": "msdt-CVE-2022-30190",
"full_name": "kdk2933\/msdt-CVE-2022-30190",
2022-05-31 20:16:41 +02:00
"owner": {
"login": "kdk2933",
"id": 31010136,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31010136?v=4",
"html_url": "https:\/\/github.com\/kdk2933"
},
2022-06-03 02:18:16 +02:00
"html_url": "https:\/\/github.com\/kdk2933\/msdt-CVE-2022-30190",
2022-05-31 20:16:41 +02:00
"description": "CVE-2022-30190- A Zero-Click RCE Vulnerability In MSDT",
"fork": false,
"created_at": "2022-05-31T17:54:20Z",
2022-06-03 02:18:16 +02:00
"updated_at": "2022-06-02T21:05:10Z",
2022-05-31 20:16:41 +02:00
"pushed_at": "2022-05-31T17:54:21Z",
2022-05-31 14:18:24 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-01 02:17:37 +02:00
},
{
"id": 498443788,
"name": "CVE-2022-30190",
"full_name": "sentinelblue\/CVE-2022-30190",
"owner": {
"login": "sentinelblue",
"id": 70291995,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70291995?v=4",
"html_url": "https:\/\/github.com\/sentinelblue"
},
"html_url": "https:\/\/github.com\/sentinelblue\/CVE-2022-30190",
2022-06-02 20:17:25 +02:00
"description": "Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.",
2022-06-01 02:17:37 +02:00
"fork": false,
"created_at": "2022-05-31T18:00:42Z",
2022-06-02 20:17:25 +02:00
"updated_at": "2022-06-02T14:34:24Z",
"pushed_at": "2022-06-02T14:44:44Z",
2022-06-02 02:16:40 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2022-06-01 02:17:37 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-06-01 20:17:32 +02:00
"topics": [
2022-06-02 20:17:25 +02:00
"alerting",
"asim",
2022-06-01 20:17:32 +02:00
"cve-2022-30190",
2022-06-02 20:17:25 +02:00
"hunting",
2022-06-01 20:17:32 +02:00
"sentinel"
],
2022-06-01 02:17:37 +02:00
"visibility": "public",
"forks": 0,
2022-06-02 02:16:40 +02:00
"watchers": 3,
2022-06-01 02:17:37 +02:00
"score": 0
},
{
"id": 498457928,
"name": "MSDT_CVE-2022-30190-follina-",
"full_name": "aymankhder\/MSDT_CVE-2022-30190-follina-",
"owner": {
"login": "aymankhder",
"id": 12251266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12251266?v=4",
"html_url": "https:\/\/github.com\/aymankhder"
},
"html_url": "https:\/\/github.com\/aymankhder\/MSDT_CVE-2022-30190-follina-",
"description": null,
"fork": false,
"created_at": "2022-05-31T18:45:34Z",
"updated_at": "2022-05-31T18:45:34Z",
"pushed_at": "2022-05-31T18:51:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498462165,
"name": "CVE-2022-30190",
"full_name": "trhacknon\/CVE-2022-30190",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-05-31T18:58:55Z",
2022-06-08 02:15:48 +02:00
"updated_at": "2022-06-07T23:41:28Z",
2022-06-03 08:16:28 +02:00
"pushed_at": "2022-06-03T00:23:24Z",
2022-06-08 02:15:48 +02:00
"stargazers_count": 4,
"watchers_count": 4,
2022-06-01 14:20:01 +02:00
"forks_count": 1,
2022-06-01 02:17:37 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-01 14:20:01 +02:00
"forks": 1,
2022-06-08 02:15:48 +02:00
"watchers": 4,
2022-06-01 02:17:37 +02:00
"score": 0
},
{
"id": 498528729,
"name": "cve-2022-30190",
"full_name": "PaddlingCode\/cve-2022-30190",
"owner": {
"login": "PaddlingCode",
"id": 55930531,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55930531?v=4",
"html_url": "https:\/\/github.com\/PaddlingCode"
},
"html_url": "https:\/\/github.com\/PaddlingCode\/cve-2022-30190",
"description": "CVE-2022-30190 remediation via removal of ms-msdt from Windows registry",
"fork": false,
"created_at": "2022-05-31T23:32:33Z",
2022-06-07 14:18:14 +02:00
"updated_at": "2022-06-07T07:53:31Z",
2022-06-01 02:17:37 +02:00
"pushed_at": "2022-05-31T23:43:02Z",
2022-06-07 14:18:14 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2022-06-07 20:16:07 +02:00
"forks_count": 4,
2022-06-01 02:17:37 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-07 20:16:07 +02:00
"forks": 4,
2022-06-07 14:18:14 +02:00
"watchers": 5,
2022-06-01 02:17:37 +02:00
"score": 0
2022-06-01 08:18:29 +02:00
},
{
"id": 498587421,
"name": "CVE-2022-30190",
"full_name": "ExploitPwner\/CVE-2022-30190",
"owner": {
"login": "ExploitPwner",
"id": 103929208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
"html_url": "https:\/\/github.com\/ExploitPwner"
},
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-30190",
"description": "MSDT 0-Day Mass Exploitation Tool",
"fork": false,
"created_at": "2022-06-01T04:15:25Z",
2022-06-04 14:17:24 +02:00
"updated_at": "2022-06-04T06:43:47Z",
2022-06-01 08:18:29 +02:00
"pushed_at": "2022-06-01T04:25:17Z",
2022-06-04 14:17:24 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-06-04 20:15:33 +02:00
"forks_count": 1,
2022-06-01 08:18:29 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"0day",
"cve-2022-30190",
"exploit",
"msdt",
"zero-click",
"zero-day"
],
"visibility": "public",
2022-06-04 20:15:33 +02:00
"forks": 1,
2022-06-04 14:17:24 +02:00
"watchers": 1,
2022-06-01 08:18:29 +02:00
"score": 0
2022-06-01 14:20:01 +02:00
},
{
"id": 498663128,
"name": "gollina",
"full_name": "dwisiswant0\/gollina",
"owner": {
"login": "dwisiswant0",
"id": 25837540,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
"html_url": "https:\/\/github.com\/dwisiswant0"
},
"html_url": "https:\/\/github.com\/dwisiswant0\/gollina",
"description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go",
"fork": false,
"created_at": "2022-06-01T09:02:00Z",
2022-06-05 20:16:50 +02:00
"updated_at": "2022-06-05T17:24:14Z",
2022-06-01 14:20:01 +02:00
"pushed_at": "2022-06-01T09:31:58Z",
2022-06-05 20:16:50 +02:00
"stargazers_count": 10,
"watchers_count": 10,
2022-06-02 20:17:25 +02:00
"forks_count": 3,
2022-06-01 14:20:01 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-30190",
"follina",
"go",
"golang",
"ms-msdt"
],
"visibility": "public",
2022-06-02 20:17:25 +02:00
"forks": 3,
2022-06-05 20:16:50 +02:00
"watchers": 10,
2022-06-01 14:20:01 +02:00
"score": 0
},
{
"id": 498686009,
"name": "CVE-2022-30190",
"full_name": "hscorpion\/CVE-2022-30190",
"owner": {
"login": "hscorpion",
"id": 22425159,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22425159?v=4",
"html_url": "https:\/\/github.com\/hscorpion"
},
"html_url": "https:\/\/github.com\/hscorpion\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-06-01T10:13:16Z",
2022-06-06 20:22:10 +02:00
"updated_at": "2022-06-06T16:59:02Z",
"pushed_at": "2022-06-06T17:08:13Z",
2022-06-01 14:20:01 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498710957,
"name": "CVE-2022-30190-follina",
"full_name": "drgreenthumb93\/CVE-2022-30190-follina",
"owner": {
"login": "drgreenthumb93",
"id": 50826299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50826299?v=4",
"html_url": "https:\/\/github.com\/drgreenthumb93"
},
"html_url": "https:\/\/github.com\/drgreenthumb93\/CVE-2022-30190-follina",
"description": "Just another PoC for the new MSDT-Exploit",
"fork": false,
"created_at": "2022-06-01T11:37:08Z",
2022-06-08 02:15:48 +02:00
"updated_at": "2022-06-07T21:11:53Z",
2022-06-07 14:18:14 +02:00
"pushed_at": "2022-06-07T08:35:35Z",
2022-06-08 02:15:48 +02:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
2022-06-01 20:17:32 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-08 02:15:48 +02:00
"forks": 3,
"watchers": 4,
2022-06-01 20:17:32 +02:00
"score": 0
},
{
"id": 498780691,
"name": "CVE-2022-30190-POC",
"full_name": "mitespsoc\/CVE-2022-30190-POC",
"owner": {
"login": "mitespsoc",
"id": 105447645,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105447645?v=4",
"html_url": "https:\/\/github.com\/mitespsoc"
},
"html_url": "https:\/\/github.com\/mitespsoc\/CVE-2022-30190-POC",
"description": null,
"fork": false,
"created_at": "2022-06-01T14:55:43Z",
"updated_at": "2022-06-01T15:00:56Z",
"pushed_at": "2022-06-01T15:41:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498808251,
"name": "MSDT-0-Day-CVE-2022-30190-Poc",
"full_name": "Vaisakhkm2625\/MSDT-0-Day-CVE-2022-30190-Poc",
"owner": {
"login": "Vaisakhkm2625",
"id": 68694876,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68694876?v=4",
"html_url": "https:\/\/github.com\/Vaisakhkm2625"
},
"html_url": "https:\/\/github.com\/Vaisakhkm2625\/MSDT-0-Day-CVE-2022-30190-Poc",
"description": null,
"fork": false,
"created_at": "2022-06-01T16:11:33Z",
"updated_at": "2022-06-01T16:13:04Z",
"pushed_at": "2022-06-01T16:48:37Z",
2022-06-01 14:20:01 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-02 02:16:40 +02:00
},
{
"id": 498863365,
"name": "CVE-2022-30190-NSIS",
"full_name": "rouben\/CVE-2022-30190-NSIS",
"owner": {
"login": "rouben",
"id": 2985666,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2985666?v=4",
"html_url": "https:\/\/github.com\/rouben"
},
"html_url": "https:\/\/github.com\/rouben\/CVE-2022-30190-NSIS",
"description": "An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft",
"fork": false,
"created_at": "2022-06-01T18:58:07Z",
2022-06-07 14:18:14 +02:00
"updated_at": "2022-06-07T08:02:05Z",
2022-06-02 02:16:40 +02:00
"pushed_at": "2022-06-01T22:23:34Z",
2022-06-07 14:18:14 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2022-06-02 02:16:40 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-30190",
"microsoft",
"msdt",
"nsis"
],
"visibility": "public",
"forks": 0,
2022-06-07 14:18:14 +02:00
"watchers": 3,
2022-06-02 02:16:40 +02:00
"score": 0
},
{
"id": 498888452,
"name": "Follina-Remediation",
"full_name": "Cosmo121\/Follina-Remediation",
"owner": {
"login": "Cosmo121",
"id": 3526206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4",
"html_url": "https:\/\/github.com\/Cosmo121"
},
"html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation",
"description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)",
"fork": false,
"created_at": "2022-06-01T20:26:56Z",
2022-06-07 14:18:14 +02:00
"updated_at": "2022-06-07T08:31:26Z",
2022-06-02 02:16:40 +02:00
"pushed_at": "2022-06-01T20:29:14Z",
2022-06-07 14:18:14 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2022-06-03 02:18:16 +02:00
"forks_count": 1,
2022-06-02 02:16:40 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-03 02:18:16 +02:00
"forks": 1,
2022-06-07 14:18:14 +02:00
"watchers": 3,
2022-06-02 02:16:40 +02:00
"score": 0
},
{
"id": 498904586,
"name": "CVE-2022-30190",
"full_name": "rayorole\/CVE-2022-30190",
"owner": {
"login": "rayorole",
"id": 87602506,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87602506?v=4",
"html_url": "https:\/\/github.com\/rayorole"
},
"html_url": "https:\/\/github.com\/rayorole\/CVE-2022-30190",
"description": "CVE-2022-30190 or \"Follina\" 0day proof of concept",
"fork": false,
"created_at": "2022-06-01T21:33:18Z",
"updated_at": "2022-06-01T21:36:47Z",
"pushed_at": "2022-06-01T21:36:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498924006,
"name": "2022_PoC-MSDT-Follina-CVE-2022-30190",
"full_name": "ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
"owner": {
"login": "ImproveCybersecurityJaro",
"id": 106711305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106711305?v=4",
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro"
},
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
"description": "Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION.",
"fork": false,
"created_at": "2022-06-01T23:07:26Z",
"updated_at": "2022-06-01T23:07:26Z",
"pushed_at": "2022-06-01T23:30:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 498927734,
"name": "CVE-2022-30190",
"full_name": "sudoaza\/CVE-2022-30190",
"owner": {
"login": "sudoaza",
"id": 555365,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/555365?v=4",
"html_url": "https:\/\/github.com\/sudoaza"
},
"html_url": "https:\/\/github.com\/sudoaza\/CVE-2022-30190",
"description": "MS-MSDT Follina CVE-2022-30190 PoC document generator",
"fork": false,
"created_at": "2022-06-01T23:27:14Z",
2022-06-04 08:17:31 +02:00
"updated_at": "2022-06-04T03:58:04Z",
2022-06-02 02:16:40 +02:00
"pushed_at": "2022-06-01T23:30:26Z",
2022-06-04 08:17:31 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-06-02 02:16:40 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-04 08:17:31 +02:00
"watchers": 2,
2022-06-02 02:16:40 +02:00
"score": 0
2022-06-02 08:16:46 +02:00
},
{
"id": 498968929,
"name": "msdt-disable",
"full_name": "gamingwithevets\/msdt-disable",
"owner": {
"login": "gamingwithevets",
"id": 88830673,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88830673?v=4",
"html_url": "https:\/\/github.com\/gamingwithevets"
},
"html_url": "https:\/\/github.com\/gamingwithevets\/msdt-disable",
"description": "MSDT protocol disabler (CVE-2022-30190 patch tool)",
"fork": false,
"created_at": "2022-06-02T02:47:34Z",
2022-06-02 20:17:25 +02:00
"updated_at": "2022-06-02T15:38:30Z",
2022-06-03 20:23:39 +02:00
"pushed_at": "2022-06-03T14:34:10Z",
2022-06-02 20:17:25 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-06-02 08:16:46 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-02 20:17:25 +02:00
"watchers": 2,
2022-06-02 08:16:46 +02:00
"score": 0
2022-06-02 14:15:53 +02:00
},
{
"id": 499022838,
"name": "FollinaScanner",
"full_name": "ErrorNoInternet\/FollinaScanner",
"owner": {
"login": "ErrorNoInternet",
"id": 61157623,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61157623?v=4",
"html_url": "https:\/\/github.com\/ErrorNoInternet"
},
"html_url": "https:\/\/github.com\/ErrorNoInternet\/FollinaScanner",
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-02T06:45:19Z",
2022-06-07 14:18:14 +02:00
"updated_at": "2022-06-07T10:22:32Z",
2022-06-04 14:17:24 +02:00
"pushed_at": "2022-06-04T07:41:42Z",
2022-06-07 14:18:14 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2022-06-02 14:15:53 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"antivirus",
"cve-2022-30190",
"follina",
"golang",
"scanner"
],
"visibility": "public",
"forks": 0,
2022-06-07 14:18:14 +02:00
"watchers": 5,
2022-06-02 14:15:53 +02:00
"score": 0
},
{
"id": 499027429,
"name": "CVE-2022-30190",
"full_name": "ITMarcin2211\/CVE-2022-30190",
"owner": {
"login": "ITMarcin2211",
"id": 60057530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4",
"html_url": "https:\/\/github.com\/ITMarcin2211"
},
"html_url": "https:\/\/github.com\/ITMarcin2211\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-06-02T07:01:19Z",
"updated_at": "2022-06-02T07:03:36Z",
"pushed_at": "2022-06-02T07:04:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 499073115,
"name": "mitigate-folina",
"full_name": "derco0n\/mitigate-folina",
"owner": {
"login": "derco0n",
"id": 13888192,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13888192?v=4",
"html_url": "https:\/\/github.com\/derco0n"
},
"html_url": "https:\/\/github.com\/derco0n\/mitigate-folina",
"description": "Mitigates the \"Folina\"-ZeroDay (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-02T09:30:13Z",
"updated_at": "2022-06-02T09:32:09Z",
2022-06-08 08:20:02 +02:00
"pushed_at": "2022-06-08T05:57:31Z",
2022-06-02 14:15:53 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2022-06-03 14:19:20 +02:00
"forks_count": 1,
2022-06-02 14:15:53 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-03 14:19:20 +02:00
"forks": 1,
2022-06-02 14:15:53 +02:00
"watchers": 0,
"score": 0
2022-06-02 20:17:25 +02:00
},
{
"id": 499127993,
"name": "CVE-2022-30190-follina-Office-MSDT-Fixed",
"full_name": "komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
2022-06-08 14:17:35 +02:00
"updated_at": "2022-06-08T12:12:42Z",
2022-06-06 14:21:04 +02:00
"pushed_at": "2022-06-06T07:19:53Z",
2022-06-08 14:17:35 +02:00
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
2022-06-02 20:17:25 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-08 14:17:35 +02:00
"forks": 6,
"watchers": 42,
2022-06-02 20:17:25 +02:00
"score": 0
},
{
"id": 499136019,
"name": "CVE-2022-30190",
"full_name": "gyaansastra\/CVE-2022-30190",
"owner": {
"login": "gyaansastra",
"id": 35690123,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4",
"html_url": "https:\/\/github.com\/gyaansastra"
},
"html_url": "https:\/\/github.com\/gyaansastra\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-06-02T12:58:24Z",
2022-06-04 20:15:33 +02:00
"updated_at": "2022-06-04T14:08:59Z",
2022-06-02 20:17:25 +02:00
"pushed_at": "2022-06-02T13:00:33Z",
2022-06-04 20:15:33 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2022-06-02 20:17:25 +02:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
2022-06-04 20:15:33 +02:00
"watchers": 3,
2022-06-02 20:17:25 +02:00
"score": 0
},
{
"id": 499137152,
"name": "CVE-2022-30190-Fix",
"full_name": "swaiist\/CVE-2022-30190-Fix",
"owner": {
"login": "swaiist",
"id": 67833362,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833362?v=4",
"html_url": "https:\/\/github.com\/swaiist"
},
"html_url": "https:\/\/github.com\/swaiist\/CVE-2022-30190-Fix",
"description": null,
"fork": false,
"created_at": "2022-06-02T13:01:46Z",
2022-06-07 14:18:14 +02:00
"updated_at": "2022-06-07T07:22:14Z",
2022-06-02 20:17:25 +02:00
"pushed_at": "2022-06-02T13:11:16Z",
2022-06-03 14:19:20 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-06-02 20:17:25 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-03 14:19:20 +02:00
"watchers": 1,
2022-06-02 20:17:25 +02:00
"score": 0
},
{
"id": 499151925,
"name": "CVE-2022-30190-Follina-Patch",
"full_name": "suegdu\/CVE-2022-30190-Follina-Patch",
"owner": {
"login": "suegdu",
"id": 91017265,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91017265?v=4",
"html_url": "https:\/\/github.com\/suegdu"
},
"html_url": "https:\/\/github.com\/suegdu\/CVE-2022-30190-Follina-Patch",
"description": "The CVE-2022-30190-follina Workarounds Patch",
"fork": false,
"created_at": "2022-06-02T13:43:20Z",
2022-06-06 14:21:04 +02:00
"updated_at": "2022-06-06T12:03:46Z",
2022-06-05 20:16:50 +02:00
"pushed_at": "2022-06-05T12:37:12Z",
2022-06-06 14:21:04 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-06-02 20:17:25 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"administrator",
"cmd",
"cve",
"cve-2022-30190",
"exe",
"microsoft",
"patch",
"program",
"py",
"python",
"windows"
],
"visibility": "public",
"forks": 0,
2022-06-06 14:21:04 +02:00
"watchers": 1,
2022-06-02 20:17:25 +02:00
"score": 0
},
{
"id": 499192008,
"name": "ms-msdt-vulnerability-pdq-package",
"full_name": "castlesmadeofsand\/ms-msdt-vulnerability-pdq-package",
"owner": {
"login": "castlesmadeofsand",
"id": 50452151,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50452151?v=4",
"html_url": "https:\/\/github.com\/castlesmadeofsand"
},
"html_url": "https:\/\/github.com\/castlesmadeofsand\/ms-msdt-vulnerability-pdq-package",
"description": "PDQ Package I created for CVE-2022-30190",
"fork": false,
"created_at": "2022-06-02T15:33:15Z",
"updated_at": "2022-06-02T15:44:35Z",
"pushed_at": "2022-06-02T15:55:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 499194094,
"name": "CVE-2022-30190---Follina---Poc-Exploit",
"full_name": "WesyHub\/CVE-2022-30190---Follina---Poc-Exploit",
"owner": {
"login": "WesyHub",
"id": 35263085,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35263085?v=4",
"html_url": "https:\/\/github.com\/WesyHub"
},
"html_url": "https:\/\/github.com\/WesyHub\/CVE-2022-30190---Follina---Poc-Exploit",
"description": "Simple Follina poc exploit",
"fork": false,
"created_at": "2022-06-02T15:39:20Z",
"updated_at": "2022-06-02T16:56:58Z",
2022-06-03 14:19:20 +02:00
"pushed_at": "2022-06-03T06:49:34Z",
2022-06-02 20:17:25 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 499203683,
"name": "MS-MSDT-Office-RCE-Follina",
"full_name": "AchocolatechipPancake\/MS-MSDT-Office-RCE-Follina",
"owner": {
"login": "AchocolatechipPancake",
"id": 59506742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59506742?v=4",
"html_url": "https:\/\/github.com\/AchocolatechipPancake"
},
"html_url": "https:\/\/github.com\/AchocolatechipPancake\/MS-MSDT-Office-RCE-Follina",
"description": "CVE-2022-30190 | MS-MSDT Follina One Click",
"fork": false,
"created_at": "2022-06-02T16:09:02Z",
2022-06-08 14:17:35 +02:00
"updated_at": "2022-06-08T12:09:51Z",
2022-06-03 14:19:20 +02:00
"pushed_at": "2022-06-03T08:14:10Z",
2022-06-08 14:17:35 +02:00
"stargazers_count": 12,
"watchers_count": 12,
2022-06-08 08:20:02 +02:00
"forks_count": 9,
2022-06-02 20:17:25 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-08 08:20:02 +02:00
"forks": 9,
2022-06-08 14:17:35 +02:00
"watchers": 12,
2022-06-02 20:17:25 +02:00
"score": 0
2022-06-03 08:16:28 +02:00
},
{
"id": 499331391,
"name": "follina",
"full_name": "Noxtal\/follina",
"owner": {
"login": "Noxtal",
"id": 44851191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44851191?v=4",
"html_url": "https:\/\/github.com\/Noxtal"
},
"html_url": "https:\/\/github.com\/Noxtal\/follina",
"description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.",
"fork": false,
"created_at": "2022-06-03T00:25:37Z",
"updated_at": "2022-06-03T00:25:41Z",
2022-06-05 20:16:50 +02:00
"pushed_at": "2022-06-05T15:15:33Z",
2022-06-03 08:16:28 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 499395518,
"name": "CVE-2022-30190",
"full_name": "droidrzrlover\/CVE-2022-30190",
"owner": {
"login": "droidrzrlover",
"id": 19541946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19541946?v=4",
"html_url": "https:\/\/github.com\/droidrzrlover"
},
"html_url": "https:\/\/github.com\/droidrzrlover\/CVE-2022-30190",
"description": "This is to patch CVE-2022-30190. Use at your own risk. ",
"fork": false,
"created_at": "2022-06-03T05:52:36Z",
"updated_at": "2022-06-03T05:53:04Z",
"pushed_at": "2022-06-03T05:53:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
2022-06-03 14:19:20 +02:00
"id": 499410553,
2022-06-03 08:16:28 +02:00
"name": "cve-2022-30190-mitigate",
"full_name": "hilt86\/cve-2022-30190-mitigate",
"owner": {
"login": "hilt86",
"id": 441824,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/441824?v=4",
"html_url": "https:\/\/github.com\/hilt86"
},
"html_url": "https:\/\/github.com\/hilt86\/cve-2022-30190-mitigate",
2022-06-03 14:19:20 +02:00
"description": "Powershell script to mitigate cve-2022-30190",
"fork": false,
"created_at": "2022-06-03T06:54:35Z",
"updated_at": "2022-06-03T06:55:13Z",
"pushed_at": "2022-06-03T06:55:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 499428287,
"name": "CVE-2022-30190",
"full_name": "SrikeshMaharaj\/CVE-2022-30190",
"owner": {
"login": "SrikeshMaharaj",
"id": 24547010,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24547010?v=4",
"html_url": "https:\/\/github.com\/SrikeshMaharaj"
},
"html_url": "https:\/\/github.com\/SrikeshMaharaj\/CVE-2022-30190",
"description": "Follina POC by John Hammond",
2022-06-03 08:16:28 +02:00
"fork": false,
2022-06-03 14:19:20 +02:00
"created_at": "2022-06-03T08:00:01Z",
2022-06-04 20:15:33 +02:00
"updated_at": "2022-06-04T12:35:14Z",
2022-06-03 14:19:20 +02:00
"pushed_at": "2022-06-03T08:04:36Z",
2022-06-04 20:15:33 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-06-03 08:16:28 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-04 20:15:33 +02:00
"watchers": 1,
2022-06-03 08:16:28 +02:00
"score": 0
2022-06-05 02:15:18 +02:00
},
{
"id": 499922590,
"name": "CVE-2022-30190",
"full_name": "DerZiad\/CVE-2022-30190",
"owner": {
"login": "DerZiad",
"id": 40337316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40337316?v=4",
"html_url": "https:\/\/github.com\/DerZiad"
},
"html_url": "https:\/\/github.com\/DerZiad\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-06-04T19:48:37Z",
2022-06-05 08:17:42 +02:00
"updated_at": "2022-06-05T00:28:06Z",
2022-06-05 02:15:18 +02:00
"pushed_at": "2022-06-05T00:00:33Z",
2022-06-05 08:17:42 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-06-05 02:15:18 +02:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
2022-06-05 08:17:42 +02:00
"watchers": 2,
2022-06-05 02:15:18 +02:00
"score": 0
2022-06-05 14:15:22 +02:00
},
{
"id": 500045782,
"name": "CVE-2022-30190-Zero-Click-Zero-Day-in-msdt",
"full_name": "tej7gandhi\/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt",
"owner": {
"login": "tej7gandhi",
"id": 13482291,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13482291?v=4",
"html_url": "https:\/\/github.com\/tej7gandhi"
},
"html_url": "https:\/\/github.com\/tej7gandhi\/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt",
"description": null,
"fork": false,
"created_at": "2022-06-05T08:52:11Z",
"updated_at": "2022-06-05T08:54:30Z",
"pushed_at": "2022-06-05T08:54:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-05 20:16:50 +02:00
},
{
"id": 500111558,
"name": "Folina-CVE-2022-30190-POC",
"full_name": "ItsNee\/Folina-CVE-2022-30190-POC",
"owner": {
"login": "ItsNee",
"id": 28183719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4",
"html_url": "https:\/\/github.com\/ItsNee"
},
"html_url": "https:\/\/github.com\/ItsNee\/Folina-CVE-2022-30190-POC",
"description": null,
"fork": false,
"created_at": "2022-06-05T13:54:04Z",
"updated_at": "2022-06-05T13:55:38Z",
"pushed_at": "2022-06-05T14:33:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-06 14:21:04 +02:00
},
{
"id": 500366448,
"name": "msdt-follina",
"full_name": "IamVSM\/msdt-follina",
"owner": {
"login": "IamVSM",
"id": 5747913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5747913?v=4",
"html_url": "https:\/\/github.com\/IamVSM"
},
"html_url": "https:\/\/github.com\/IamVSM\/msdt-follina",
"description": "Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector",
"fork": false,
"created_at": "2022-06-06T09:17:25Z",
2022-06-08 08:20:02 +02:00
"updated_at": "2022-06-08T05:08:19Z",
2022-06-06 14:21:04 +02:00
"pushed_at": "2022-06-06T09:17:28Z",
2022-06-08 08:20:02 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-06-06 14:21:04 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-08 08:20:02 +02:00
"watchers": 1,
2022-06-06 14:21:04 +02:00
"score": 0
2022-06-06 20:22:10 +02:00
},
{
"id": 500508968,
"name": "FollinaPatcherCLI",
"full_name": "Rojacur\/FollinaPatcherCLI",
"owner": {
"login": "Rojacur",
"id": 106988270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106988270?v=4",
"html_url": "https:\/\/github.com\/Rojacur"
},
"html_url": "https:\/\/github.com\/Rojacur\/FollinaPatcherCLI",
"description": "Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse",
"fork": false,
"created_at": "2022-06-06T16:25:41Z",
"updated_at": "2022-06-06T16:52:06Z",
2022-06-07 14:18:14 +02:00
"pushed_at": "2022-06-07T11:09:03Z",
2022-06-06 20:22:10 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-07 14:18:14 +02:00
},
{
"id": 500786615,
"name": "CVE-2022-30190",
"full_name": "joshuavanderpoll\/CVE-2022-30190",
"owner": {
"login": "joshuavanderpoll",
"id": 16516497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16516497?v=4",
"html_url": "https:\/\/github.com\/joshuavanderpoll"
},
"html_url": "https:\/\/github.com\/joshuavanderpoll\/CVE-2022-30190",
"description": "Microsoft Support Diagnostic Tool (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-07T10:07:52Z",
2022-06-07 20:16:07 +02:00
"updated_at": "2022-06-07T17:16:40Z",
2022-06-07 14:18:14 +02:00
"pushed_at": "2022-06-07T10:10:39Z",
2022-06-07 20:16:07 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-06-07 14:18:14 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-07 20:16:07 +02:00
"watchers": 2,
"score": 0
},
{
"id": 500934660,
"name": "Follina",
"full_name": "abhirules27\/Follina",
"owner": {
"login": "abhirules27",
"id": 23321239,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23321239?v=4",
"html_url": "https:\/\/github.com\/abhirules27"
},
"html_url": "https:\/\/github.com\/abhirules27\/Follina",
"description": "Notes related to CVE-2022-30190",
"fork": false,
"created_at": "2022-06-07T17:11:57Z",
"updated_at": "2022-06-07T17:11:57Z",
"pushed_at": "2022-06-07T17:14:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-06-07 14:18:14 +02:00
"score": 0
2022-06-08 02:15:48 +02:00
},
{
"id": 501026730,
"name": "follina-spring",
"full_name": "dsibilio\/follina-spring",
"owner": {
"login": "dsibilio",
"id": 24280982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24280982?v=4",
"html_url": "https:\/\/github.com\/dsibilio"
},
"html_url": "https:\/\/github.com\/dsibilio\/follina-spring",
"description": "Server to host\/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-07T22:46:23Z",
2022-06-08 14:17:35 +02:00
"updated_at": "2022-06-08T07:49:54Z",
2022-06-08 02:15:48 +02:00
"pushed_at": "2022-06-07T22:54:59Z",
2022-06-08 14:17:35 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-06-08 02:15:48 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-30190",
"cybersecurity",
"follina",
"infosec",
"java",
"mesdetty",
"ms-msdt",
"msdt",
"spring",
"spring-boot"
],
"visibility": "public",
"forks": 0,
2022-06-08 14:17:35 +02:00
"watchers": 2,
"score": 0
},
{
"id": 501212142,
"name": "Deathnote",
"full_name": "Malwareman007\/Deathnote",
"owner": {
"login": "Malwareman007",
"id": 86009160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
"html_url": "https:\/\/github.com\/Malwareman007"
},
"html_url": "https:\/\/github.com\/Malwareman007\/Deathnote",
"description": "Proof of Concept of CVE-2022-30190",
"fork": false,
"created_at": "2022-06-08T10:58:23Z",
"updated_at": "2022-06-08T11:06:38Z",
"pushed_at": "2022-06-08T12:14:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-06-08 02:15:48 +02:00
"score": 0
2022-05-31 14:18:24 +02:00
}
]