[ { "id": 665579742, "name": "CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline", "full_name": "Maxwitat\/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline", "owner": { "login": "Maxwitat", "id": 18595261, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4", "html_url": "https:\/\/github.com\/Maxwitat" }, "html_url": "https:\/\/github.com\/Maxwitat\/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline", "description": "The remediation script should set the reg entries described in https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty.", "fork": false, "created_at": "2023-07-12T14:13:20Z", "updated_at": "2024-02-21T11:46:05Z", "pushed_at": "2023-07-21T05:59:06Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 22, "score": 0, "subscribers_count": 2 }, { "id": 665987322, "name": "Storm0978-RomCom-Campaign", "full_name": "deepinstinct\/Storm0978-RomCom-Campaign", "owner": { "login": "deepinstinct", "id": 21313699, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21313699?v=4", "html_url": "https:\/\/github.com\/deepinstinct" }, "html_url": "https:\/\/github.com\/deepinstinct\/Storm0978-RomCom-Campaign", "description": "Recent Campaign abusing CVE-2023-36884", "fork": false, "created_at": "2023-07-13T12:54:00Z", "updated_at": "2023-08-13T07:22:41Z", "pushed_at": "2023-07-13T13:02:01Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 666813276, "name": "CVE-2023-36884", "full_name": "zerosorai\/CVE-2023-36884", "owner": { "login": "zerosorai", "id": 30239081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30239081?v=4", "html_url": "https:\/\/github.com\/zerosorai" }, "html_url": "https:\/\/github.com\/zerosorai\/CVE-2023-36884", "description": "This is an emergency solution while Microsoft addresses the vulnerability.", "fork": false, "created_at": "2023-07-15T16:56:18Z", "updated_at": "2023-08-10T09:12:42Z", "pushed_at": "2023-07-15T17:44:06Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 667439983, "name": "CVE-2023-36884-Checker", "full_name": "tarraschk\/CVE-2023-36884-Checker", "owner": { "login": "tarraschk", "id": 2057917, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2057917?v=4", "html_url": "https:\/\/github.com\/tarraschk" }, "html_url": "https:\/\/github.com\/tarraschk\/CVE-2023-36884-Checker", "description": "Script to check for CVE-2023-36884 hardening", "fork": false, "created_at": "2023-07-17T14:02:40Z", "updated_at": "2024-01-25T20:24:17Z", "pushed_at": "2023-07-18T10:33:30Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-36884", "cybersecurity", "hardening", "microsoft", "powershell", "security", "windows" ], "visibility": "public", "forks": 3, "watchers": 13, "score": 0, "subscribers_count": 1 }, { "id": 667711887, "name": "CVE-2023-36884_patcher", "full_name": "or2me\/CVE-2023-36884_patcher", "owner": { "login": "or2me", "id": 2864169, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2864169?v=4", "html_url": "https:\/\/github.com\/or2me" }, "html_url": "https:\/\/github.com\/or2me\/CVE-2023-36884_patcher", "description": "CVE-2023-36884 临时补丁", "fork": false, "created_at": "2023-07-18T06:22:36Z", "updated_at": "2023-07-18T06:30:10Z", "pushed_at": "2023-07-18T06:33:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 668894882, "name": "CVE-2023-36884", "full_name": "ToddMaxey\/CVE-2023-36884", "owner": { "login": "ToddMaxey", "id": 41805243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41805243?v=4", "html_url": "https:\/\/github.com\/ToddMaxey" }, "html_url": "https:\/\/github.com\/ToddMaxey\/CVE-2023-36884", "description": "PowerShell Script for initial mitigation of vulnerability", "fork": false, "created_at": "2023-07-20T21:10:49Z", "updated_at": "2023-07-20T21:10:49Z", "pushed_at": "2023-07-20T21:18:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 672065439, "name": "Fix-CVE-2023-36884", "full_name": "ridsoliveira\/Fix-CVE-2023-36884", "owner": { "login": "ridsoliveira", "id": 12295572, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12295572?v=4", "html_url": "https:\/\/github.com\/ridsoliveira" }, "html_url": "https:\/\/github.com\/ridsoliveira\/Fix-CVE-2023-36884", "description": null, "fork": false, "created_at": "2023-07-28T20:39:37Z", "updated_at": "2023-07-31T22:01:50Z", "pushed_at": "2023-07-28T21:55:37Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 672575679, "name": "CVE-2023-36884", "full_name": "raresteak\/CVE-2023-36884", "owner": { "login": "raresteak", "id": 28923946, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28923946?v=4", "html_url": "https:\/\/github.com\/raresteak" }, "html_url": "https:\/\/github.com\/raresteak\/CVE-2023-36884", "description": "#comeonits2023 #ie9 #Storm-0978", "fork": false, "created_at": "2023-07-30T14:53:25Z", "updated_at": "2023-07-31T03:04:46Z", "pushed_at": "2023-07-30T15:04:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 697748384, "name": "CVE-2023-36884-MS-Office-HTML-RCE", "full_name": "jakabakos\/CVE-2023-36884-MS-Office-HTML-RCE", "owner": { "login": "jakabakos", "id": 42498816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4", "html_url": "https:\/\/github.com\/jakabakos" }, "html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-36884-MS-Office-HTML-RCE", "description": "MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit", "fork": false, "created_at": "2023-09-28T11:53:44Z", "updated_at": "2024-02-01T13:33:19Z", "pushed_at": "2023-11-02T09:08:31Z", "stargazers_count": 31, "watchers_count": 31, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 31, "score": 0, "subscribers_count": 2 } ]