PoC-in-GitHub/2023/CVE-2023-36884.json
2025-01-16 03:32:55 +09:00

289 lines
No EOL
10 KiB
JSON

[
{
"id": 665579742,
"name": "CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline",
"full_name": "Maxwitat\/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline",
"owner": {
"login": "Maxwitat",
"id": 18595261,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18595261?v=4",
"html_url": "https:\/\/github.com\/Maxwitat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maxwitat\/CVE-2023-36884-Scripts-for-Intune-Remediation-SCCM-Compliance-Baseline",
"description": "The remediation script should set the reg entries described in https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2023-36884 . The detection script checks if they exist. Provided AS-IS without any warrenty.",
"fork": false,
"created_at": "2023-07-12T14:13:20Z",
"updated_at": "2024-10-29T07:55:17Z",
"pushed_at": "2023-07-21T05:59:06Z",
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 23,
"score": 0,
"subscribers_count": 2
},
{
"id": 665987322,
"name": "Storm0978-RomCom-Campaign",
"full_name": "deepinstinct\/Storm0978-RomCom-Campaign",
"owner": {
"login": "deepinstinct",
"id": 21313699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21313699?v=4",
"html_url": "https:\/\/github.com\/deepinstinct",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/deepinstinct\/Storm0978-RomCom-Campaign",
"description": "Recent Campaign abusing CVE-2023-36884",
"fork": false,
"created_at": "2023-07-13T12:54:00Z",
"updated_at": "2023-08-13T07:22:41Z",
"pushed_at": "2023-07-13T13:02:01Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 666813276,
"name": "CVE-2023-36884",
"full_name": "zerosorai\/CVE-2023-36884",
"owner": {
"login": "zerosorai",
"id": 30239081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30239081?v=4",
"html_url": "https:\/\/github.com\/zerosorai",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zerosorai\/CVE-2023-36884",
"description": "This is an emergency solution while Microsoft addresses the vulnerability.",
"fork": false,
"created_at": "2023-07-15T16:56:18Z",
"updated_at": "2024-05-05T07:07:24Z",
"pushed_at": "2023-07-15T17:44:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 667439983,
"name": "CVE-2023-36884-Checker",
"full_name": "tarraschk\/CVE-2023-36884-Checker",
"owner": {
"login": "tarraschk",
"id": 2057917,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2057917?v=4",
"html_url": "https:\/\/github.com\/tarraschk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tarraschk\/CVE-2023-36884-Checker",
"description": "Script to check for CVE-2023-36884 hardening",
"fork": false,
"created_at": "2023-07-17T14:02:40Z",
"updated_at": "2024-08-29T02:04:36Z",
"pushed_at": "2023-07-18T10:33:30Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-36884",
"cybersecurity",
"hardening",
"microsoft",
"powershell",
"security",
"windows"
],
"visibility": "public",
"forks": 3,
"watchers": 14,
"score": 0,
"subscribers_count": 2
},
{
"id": 667711887,
"name": "CVE-2023-36884_patcher",
"full_name": "or2me\/CVE-2023-36884_patcher",
"owner": {
"login": "or2me",
"id": 2864169,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2864169?v=4",
"html_url": "https:\/\/github.com\/or2me",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/or2me\/CVE-2023-36884_patcher",
"description": "CVE-2023-36884 临时补丁",
"fork": false,
"created_at": "2023-07-18T06:22:36Z",
"updated_at": "2023-07-18T06:30:10Z",
"pushed_at": "2023-07-18T06:33:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 668894882,
"name": "CVE-2023-36884",
"full_name": "ToddMaxey\/CVE-2023-36884",
"owner": {
"login": "ToddMaxey",
"id": 41805243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41805243?v=4",
"html_url": "https:\/\/github.com\/ToddMaxey",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ToddMaxey\/CVE-2023-36884",
"description": "PowerShell Script for initial mitigation of vulnerability",
"fork": false,
"created_at": "2023-07-20T21:10:49Z",
"updated_at": "2023-07-20T21:10:49Z",
"pushed_at": "2023-07-20T21:18:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 672065439,
"name": "Fix-CVE-2023-36884",
"full_name": "ridsoliveira\/Fix-CVE-2023-36884",
"owner": {
"login": "ridsoliveira",
"id": 12295572,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12295572?v=4",
"html_url": "https:\/\/github.com\/ridsoliveira",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ridsoliveira\/Fix-CVE-2023-36884",
"description": null,
"fork": false,
"created_at": "2023-07-28T20:39:37Z",
"updated_at": "2023-07-31T22:01:50Z",
"pushed_at": "2023-07-28T21:55:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 672575679,
"name": "CVE-2023-36884",
"full_name": "raresteak\/CVE-2023-36884",
"owner": {
"login": "raresteak",
"id": 28923946,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28923946?v=4",
"html_url": "https:\/\/github.com\/raresteak",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/raresteak\/CVE-2023-36884",
"description": "#comeonits2023 #ie9 #Storm-0978",
"fork": false,
"created_at": "2023-07-30T14:53:25Z",
"updated_at": "2023-07-31T03:04:46Z",
"pushed_at": "2023-07-30T15:04:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 697748384,
"name": "CVE-2023-36884-MS-Office-HTML-RCE",
"full_name": "jakabakos\/CVE-2023-36884-MS-Office-HTML-RCE",
"owner": {
"login": "jakabakos",
"id": 42498816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42498816?v=4",
"html_url": "https:\/\/github.com\/jakabakos",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jakabakos\/CVE-2023-36884-MS-Office-HTML-RCE",
"description": "MS Office and Windows HTML RCE (CVE-2023-36884) - PoC and exploit",
"fork": false,
"created_at": "2023-09-28T11:53:44Z",
"updated_at": "2025-01-10T17:22:52Z",
"pushed_at": "2023-11-02T09:08:31Z",
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 36,
"score": 0,
"subscribers_count": 3
}
]