272 lines
No EOL
9.4 KiB
JSON
272 lines
No EOL
9.4 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2023-23397-POC-Powershell",
|
||
"full_name": "api0cradle/CVE-2023-23397-POC-Powershell",
|
||
"html_url": "https://github.com/api0cradle/CVE-2023-23397-POC-Powershell",
|
||
"description": null,
|
||
"stargazers_count": 343,
|
||
"forks_count": 62,
|
||
"created_at": "2023-03-16T19:43:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397_EXPLOIT_0DAY",
|
||
"full_name": "sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY",
|
||
"html_url": "https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY",
|
||
"description": "Exploit for the CVE-2023-23397",
|
||
"stargazers_count": 160,
|
||
"forks_count": 42,
|
||
"created_at": "2023-03-15T17:03:38Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "Trackflaw/CVE-2023-23397",
|
||
"html_url": "https://github.com/Trackflaw/CVE-2023-23397",
|
||
"description": "Simple PoC of the CVE-2023-23397 vulnerability with the payload sent by email.",
|
||
"stargazers_count": 123,
|
||
"forks_count": 27,
|
||
"created_at": "2023-03-20T16:31:54Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "ka7ana/CVE-2023-23397",
|
||
"html_url": "https://github.com/ka7ana/CVE-2023-23397",
|
||
"description": "Simple PoC in PowerShell for CVE-2023-23397",
|
||
"stargazers_count": 39,
|
||
"forks_count": 11,
|
||
"created_at": "2023-03-16T19:10:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "tiepologian/CVE-2023-23397",
|
||
"html_url": "https://github.com/tiepologian/CVE-2023-23397",
|
||
"description": "Proof of Concept for CVE-2023-23397 in Python",
|
||
"stargazers_count": 25,
|
||
"forks_count": 4,
|
||
"created_at": "2023-03-21T18:38:00Z"
|
||
},
|
||
{
|
||
"name": "OutlookNTLM_CVE-2023-23397",
|
||
"full_name": "Muhammad-Ali007/OutlookNTLM_CVE-2023-23397",
|
||
"html_url": "https://github.com/Muhammad-Ali007/OutlookNTLM_CVE-2023-23397",
|
||
"description": null,
|
||
"stargazers_count": 21,
|
||
"forks_count": 1,
|
||
"created_at": "2023-07-14T22:02:55Z"
|
||
},
|
||
{
|
||
"name": "cve-2023-23397",
|
||
"full_name": "BronzeBee/cve-2023-23397",
|
||
"html_url": "https://github.com/BronzeBee/cve-2023-23397",
|
||
"description": "Python script for sending e-mails with CVE-2023-23397 payload using SMTP",
|
||
"stargazers_count": 17,
|
||
"forks_count": 1,
|
||
"created_at": "2023-03-22T11:00:47Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-PoC",
|
||
"full_name": "djackreuter/CVE-2023-23397-PoC",
|
||
"html_url": "https://github.com/djackreuter/CVE-2023-23397-PoC",
|
||
"description": null,
|
||
"stargazers_count": 9,
|
||
"forks_count": 2,
|
||
"created_at": "2023-03-18T21:14:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397_EXPLOIT",
|
||
"full_name": "BillSkiCO/CVE-2023-23397_EXPLOIT",
|
||
"html_url": "https://github.com/BillSkiCO/CVE-2023-23397_EXPLOIT",
|
||
"description": "Generates meeting requests taking advantage of CVE-2023-23397. This requires the outlook thick client to send.",
|
||
"stargazers_count": 7,
|
||
"forks_count": 7,
|
||
"created_at": "2023-03-17T17:35:14Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-POC",
|
||
"full_name": "ahmedkhlief/CVE-2023-23397-POC",
|
||
"html_url": "https://github.com/ahmedkhlief/CVE-2023-23397-POC",
|
||
"description": "Exploit POC for CVE-2023-23397",
|
||
"stargazers_count": 6,
|
||
"forks_count": 7,
|
||
"created_at": "2023-03-17T10:18:26Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "vlad-a-man/CVE-2023-23397",
|
||
"html_url": "https://github.com/vlad-a-man/CVE-2023-23397",
|
||
"description": "CVE-2023-23397 PoC",
|
||
"stargazers_count": 6,
|
||
"forks_count": 2,
|
||
"created_at": "2023-05-07T18:21:35Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "grn-bogo/CVE-2023-23397",
|
||
"html_url": "https://github.com/grn-bogo/CVE-2023-23397",
|
||
"description": "Python script to create a message with the vulenrability properties set",
|
||
"stargazers_count": 4,
|
||
"forks_count": 3,
|
||
"created_at": "2023-03-16T15:00:26Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "Pushkarup/CVE-2023-23397",
|
||
"html_url": "https://github.com/Pushkarup/CVE-2023-23397",
|
||
"description": "This script exploits CVE-2023-23397, a Zero-Day vulnerability in Microsoft Outlook, allowing the generation of malicious emails for testing and educational purposes.",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2023-10-26T09:26:32Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "alicangnll/CVE-2023-23397",
|
||
"html_url": "https://github.com/alicangnll/CVE-2023-23397",
|
||
"description": "CVE-2023-23397 - Microsoft Outlook Vulnerability",
|
||
"stargazers_count": 3,
|
||
"forks_count": 1,
|
||
"created_at": "2023-03-16T14:07:15Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-POC",
|
||
"full_name": "AiK1d/CVE-2023-23397-POC",
|
||
"html_url": "https://github.com/AiK1d/CVE-2023-23397-POC",
|
||
"description": "CVE-2023-23397漏洞的简单PoC,有效载荷通过电子邮件发送。",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-31T03:35:30Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-POC-Using-Interop-Outlook",
|
||
"full_name": "ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook",
|
||
"html_url": "https://github.com/ahmedkhlief/CVE-2023-23397-POC-Using-Interop-Outlook",
|
||
"description": null,
|
||
"stargazers_count": 2,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-19T08:07:58Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "j0eyv/CVE-2023-23397",
|
||
"html_url": "https://github.com/j0eyv/CVE-2023-23397",
|
||
"description": null,
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-16T12:02:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "SecCTechs/CVE-2023-23397",
|
||
"html_url": "https://github.com/SecCTechs/CVE-2023-23397",
|
||
"description": "Patch for MS Outlook Critical Vulnerability - CVSS 9.8",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-20T17:45:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "moneertv/CVE-2023-23397",
|
||
"html_url": "https://github.com/moneertv/CVE-2023-23397",
|
||
"description": "CVE-2023-23397 C# PoC ",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-18T21:44:46Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-Report",
|
||
"full_name": "Cyb3rMaddy/CVE-2023-23397-Report",
|
||
"html_url": "https://github.com/Cyb3rMaddy/CVE-2023-23397-Report",
|
||
"description": "An exploitation demo of Outlook Elevation of Privilege Vulnerability",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-24T19:47:42Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-PoC-PowerShell",
|
||
"full_name": "cleverg0d/CVE-2023-23397-PoC-PowerShell",
|
||
"html_url": "https://github.com/cleverg0d/CVE-2023-23397-PoC-PowerShell",
|
||
"description": "PoC for CVE-2023-23397",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-17T06:52:42Z"
|
||
},
|
||
{
|
||
"name": "expl_outlook_cve_2023_23397_securiteinfo.yar",
|
||
"full_name": "securiteinfo/expl_outlook_cve_2023_23397_securiteinfo.yar",
|
||
"html_url": "https://github.com/securiteinfo/expl_outlook_cve_2023_23397_securiteinfo.yar",
|
||
"description": "Yara rule compatible with ClamAV based on expl_outlook_cve_2023_23397yar",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-23T08:26:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "ducnorth2712/CVE-2023-23397",
|
||
"html_url": "https://github.com/ducnorth2712/CVE-2023-23397",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2023-12-28T02:20:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "Symbolexe/CVE-2023-23397",
|
||
"html_url": "https://github.com/Symbolexe/CVE-2023-23397",
|
||
"description": "CVE-2023-23397: Remote Code Execution Vulnerability in Microsoft Outlook",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-06-22T14:25:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "stevesec/CVE-2023-23397",
|
||
"html_url": "https://github.com/stevesec/CVE-2023-23397",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-23T13:40:18Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "jacquesquail/CVE-2023-23397",
|
||
"html_url": "https://github.com/jacquesquail/CVE-2023-23397",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-29T01:17:22Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397",
|
||
"full_name": "im007/CVE-2023-23397",
|
||
"html_url": "https://github.com/im007/CVE-2023-23397",
|
||
"description": "CVE-2023-23397 Remediation Script (Powershell)",
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2023-03-17T03:38:50Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-POC",
|
||
"full_name": "sarsaeroth/CVE-2023-23397-POC",
|
||
"html_url": "https://github.com/sarsaeroth/CVE-2023-23397-POC",
|
||
"description": "C implementation of Outlook 0-click vulnerability",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-02-07T07:08:55Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-Patch",
|
||
"full_name": "Zeppperoni/CVE-2023-23397-Patch",
|
||
"html_url": "https://github.com/Zeppperoni/CVE-2023-23397-Patch",
|
||
"description": "CVE-2023-23397 powershell patch script for Windows 10 and 11 ",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2023-03-24T19:54:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2023-23397-PoW",
|
||
"full_name": "TheUnknownSoul/CVE-2023-23397-PoW",
|
||
"html_url": "https://github.com/TheUnknownSoul/CVE-2023-23397-PoW",
|
||
"description": "Proof of Work of CVE-2023-23397 for vulnerable Microsoft Outlook client application.",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-03-20T09:49:01Z"
|
||
}
|
||
] |