PoC-in-GitHub/2022/CVE-2022-26809.json

425 lines
14 KiB
JSON
Raw Normal View History

2022-04-13 20:15:31 +02:00
[
2022-04-22 14:17:09 +02:00
{
"id": 402009648,
"name": "CVE-2022-26809-RCE",
"full_name": "CberryAIRDROP\/CVE-2022-26809-RCE",
"owner": {
"login": "CberryAIRDROP",
"id": 89909217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89909217?v=4",
"html_url": "https:\/\/github.com\/CberryAIRDROP"
},
"html_url": "https:\/\/github.com\/CberryAIRDROP\/CVE-2022-26809-RCE",
"description": null,
"fork": false,
"created_at": "2021-09-01T09:48:31Z",
"updated_at": "2022-04-22T08:19:40Z",
2022-04-24 14:17:23 +02:00
"pushed_at": "2022-04-24T08:49:21Z",
2022-04-22 14:17:09 +02:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
2022-04-13 20:15:31 +02:00
{
2022-04-14 08:17:49 +02:00
"id": 481455739,
2022-04-18 08:16:20 +02:00
"name": "Microsoft-CVE-2022-26809-The-Little-Boy",
"full_name": "sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
2022-04-13 20:15:31 +02:00
"owner": {
2022-04-14 08:17:49 +02:00
"login": "sherlocksecurity",
"id": 52328067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
"html_url": "https:\/\/github.com\/sherlocksecurity"
2022-04-13 20:15:31 +02:00
},
2022-04-18 08:16:20 +02:00
"html_url": "https:\/\/github.com\/sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
2022-04-14 08:17:49 +02:00
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
2022-04-13 20:15:31 +02:00
"fork": false,
2022-04-14 08:17:49 +02:00
"created_at": "2022-04-14T03:41:32Z",
2022-05-24 14:17:44 +02:00
"updated_at": "2022-05-24T06:36:59Z",
2022-04-18 08:16:20 +02:00
"pushed_at": "2022-04-18T03:28:10Z",
2022-05-24 14:17:44 +02:00
"stargazers_count": 19,
"watchers_count": 19,
2022-05-19 14:15:58 +02:00
"forks_count": 1,
2022-04-14 14:15:53 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-19 14:15:58 +02:00
"forks": 1,
2022-05-24 14:17:44 +02:00
"watchers": 19,
2022-04-14 14:15:53 +02:00
"score": 0
},
{
"id": 481521334,
"name": "CVE-2022-26809",
"full_name": "websecnl\/CVE-2022-26809",
"owner": {
"login": "websecnl",
"id": 20278695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4",
"html_url": "https:\/\/github.com\/websecnl"
},
"html_url": "https:\/\/github.com\/websecnl\/CVE-2022-26809",
"description": "Remote Code Execution Exploit in the RPC Library",
"fork": false,
"created_at": "2022-04-14T08:12:24Z",
2022-05-22 14:15:05 +02:00
"updated_at": "2022-05-22T11:32:39Z",
2022-04-19 20:17:43 +02:00
"pushed_at": "2022-04-19T17:04:04Z",
2022-05-22 14:15:05 +02:00
"stargazers_count": 26,
"watchers_count": 26,
2022-05-19 14:15:58 +02:00
"forks_count": 4,
2022-04-13 20:15:31 +02:00
"allow_forking": true,
"is_template": false,
2022-04-14 14:15:53 +02:00
"topics": [
"cve-2022-26809"
],
2022-04-13 20:15:31 +02:00
"visibility": "public",
2022-05-19 14:15:58 +02:00
"forks": 4,
2022-05-22 14:15:05 +02:00
"watchers": 26,
2022-04-13 20:15:31 +02:00
"score": 0
2022-04-14 14:15:53 +02:00
},
{
"id": 481523929,
"name": "CVE-2022-26809",
"full_name": "auduongxuan\/CVE-2022-26809",
"owner": {
"login": "auduongxuan",
"id": 33758982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33758982?v=4",
"html_url": "https:\/\/github.com\/auduongxuan"
},
"html_url": "https:\/\/github.com\/auduongxuan\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-04-14T08:21:10Z",
2022-05-19 14:15:58 +02:00
"updated_at": "2022-05-19T11:24:41Z",
2022-04-14 14:15:53 +02:00
"pushed_at": "2022-04-14T08:23:59Z",
2022-05-19 14:15:58 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2022-05-19 20:18:04 +02:00
"forks_count": 4,
2022-04-14 14:15:53 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-19 20:18:04 +02:00
"forks": 4,
2022-05-19 14:15:58 +02:00
"watchers": 5,
2022-04-19 08:15:11 +02:00
"score": 0
2022-04-21 02:17:07 +02:00
},
2022-05-17 20:15:36 +02:00
{
"id": 481682449,
"name": "cve-2022-26809",
"full_name": "corelight\/cve-2022-26809",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-26809",
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
"fork": false,
"created_at": "2022-04-14T16:58:09Z",
2022-05-24 02:16:33 +02:00
"updated_at": "2022-05-23T18:39:27Z",
2022-05-17 20:15:36 +02:00
"pushed_at": "2022-05-17T15:17:22Z",
2022-05-24 02:16:33 +02:00
"stargazers_count": 7,
"watchers_count": 7,
2022-05-21 08:15:24 +02:00
"forks_count": 3,
2022-05-17 20:15:36 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-21 08:15:24 +02:00
"forks": 3,
2022-05-24 02:16:33 +02:00
"watchers": 7,
2022-04-27 14:18:43 +02:00
"score": 0
},
2022-04-21 02:17:07 +02:00
{
"id": 483810303,
"name": "CVE-2022-26809-RCE",
"full_name": "DESC0N0C1D0\/CVE-2022-26809-RCE",
"owner": {
"login": "DESC0N0C1D0",
"id": 57696252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57696252?v=4",
"html_url": "https:\/\/github.com\/DESC0N0C1D0"
},
"html_url": "https:\/\/github.com\/DESC0N0C1D0\/CVE-2022-26809-RCE",
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
2022-05-21 20:16:52 +02:00
"updated_at": "2022-05-21T14:28:37Z",
2022-04-26 02:15:14 +02:00
"pushed_at": "2022-04-25T20:38:57Z",
2022-05-21 20:16:52 +02:00
"stargazers_count": 12,
"watchers_count": 12,
2022-05-24 14:17:44 +02:00
"forks_count": 10,
2022-04-21 02:17:07 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-24 14:17:44 +02:00
"forks": 10,
2022-05-21 20:16:52 +02:00
"watchers": 12,
2022-04-22 14:17:09 +02:00
"score": 0
},
{
"id": 484389854,
"name": "CVE-2022-26809",
"full_name": "jones199023\/CVE-2022-26809",
"owner": {
"login": "jones199023",
"id": 104200848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104200848?v=4",
"html_url": "https:\/\/github.com\/jones199023"
},
"html_url": "https:\/\/github.com\/jones199023\/CVE-2022-26809",
"description": "Python",
"fork": false,
"created_at": "2022-04-22T10:21:30Z",
"updated_at": "2022-04-22T11:02:28Z",
"pushed_at": "2022-04-22T10:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-04-21 02:17:07 +02:00
"score": 0
2022-04-23 20:15:16 +02:00
},
{
"id": 484792908,
"name": "CVE-2022-26809-RCE",
"full_name": "oppongjohn\/CVE-2022-26809-RCE",
"owner": {
"login": "oppongjohn",
"id": 96750321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96750321?v=4",
"html_url": "https:\/\/github.com\/oppongjohn"
},
"html_url": "https:\/\/github.com\/oppongjohn\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809-RCE",
"fork": false,
"created_at": "2022-04-23T16:01:44Z",
"updated_at": "2022-04-23T16:01:44Z",
"pushed_at": "2022-04-23T16:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 484793824,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "roger109\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "roger109",
"id": 79395035,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79395035?v=4",
"html_url": "https:\/\/github.com\/roger109"
},
"html_url": "https:\/\/github.com\/roger109\/CVE-2022-26809-RCE-POC",
"description": null,
"fork": false,
"created_at": "2022-04-23T16:05:36Z",
"updated_at": "2022-04-23T16:05:36Z",
"pushed_at": "2022-04-23T16:05:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-04-26 02:15:14 +02:00
},
2022-05-13 08:15:45 +02:00
{
"id": 487542806,
"name": "CVE-2022-26809",
"full_name": "yuanLink\/CVE-2022-26809",
"owner": {
"login": "yuanLink",
"id": 16820130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16820130?v=4",
"html_url": "https:\/\/github.com\/yuanLink"
},
"html_url": "https:\/\/github.com\/yuanLink\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-05-01T13:19:10Z",
2022-05-24 20:17:49 +02:00
"updated_at": "2022-05-24T15:43:24Z",
2022-05-22 08:15:11 +02:00
"pushed_at": "2022-05-22T01:33:36Z",
2022-05-24 20:17:49 +02:00
"stargazers_count": 37,
"watchers_count": 37,
2022-05-23 20:15:38 +02:00
"forks_count": 18,
2022-05-13 08:15:45 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-26809"
],
"visibility": "public",
2022-05-23 20:15:38 +02:00
"forks": 18,
2022-05-24 20:17:49 +02:00
"watchers": 37,
2022-05-13 08:15:45 +02:00
"score": 0
},
2022-05-09 20:17:23 +02:00
{
"id": 490368128,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "ExploitPwner\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "ExploitPwner",
"id": 103929208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
"html_url": "https:\/\/github.com\/ExploitPwner"
},
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-26809-RCE-POC",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-09T16:48:30Z",
2022-05-19 14:15:58 +02:00
"updated_at": "2022-05-19T06:42:06Z",
2022-05-17 20:15:36 +02:00
"pushed_at": "2022-05-17T15:53:22Z",
"stargazers_count": 3,
"watchers_count": 3,
2022-05-09 20:17:23 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-05-11 08:15:25 +02:00
"topics": [
"0day",
"exploit-scanner",
"mass-exploit",
"mass-exploiter",
"windows-rce",
"zero-day"
],
2022-05-09 20:17:23 +02:00
"visibility": "public",
"forks": 0,
2022-05-17 20:15:36 +02:00
"watchers": 3,
2022-05-09 20:17:23 +02:00
"score": 0
2022-05-12 02:15:37 +02:00
},
{
"id": 491265476,
"name": "CVE-2022-26809-RCE",
"full_name": "seciurdt\/CVE-2022-26809-RCE",
"owner": {
"login": "seciurdt",
"id": 105104248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4",
"html_url": "https:\/\/github.com\/seciurdt"
},
"html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows ",
"fork": false,
"created_at": "2022-05-11T20:38:55Z",
"updated_at": "2022-05-11T20:41:34Z",
"pushed_at": "2022-05-11T20:41:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-05-12 08:16:12 +02:00
},
{
2022-05-12 14:19:14 +02:00
"id": 491403752,
2022-05-12 08:16:12 +02:00
"name": "CVE-2022-26809",
"full_name": "Calvitz\/CVE-2022-26809",
"owner": {
"login": "Calvitz",
"id": 105359678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105359678?v=4",
"html_url": "https:\/\/github.com\/Calvitz"
},
"html_url": "https:\/\/github.com\/Calvitz\/CVE-2022-26809",
2022-05-12 14:19:14 +02:00
"description": "CVE-2022-26809 exp",
2022-05-12 08:16:12 +02:00
"fork": false,
2022-05-12 14:19:14 +02:00
"created_at": "2022-05-12T07:12:08Z",
2022-05-13 08:15:45 +02:00
"updated_at": "2022-05-13T03:18:44Z",
"pushed_at": "2022-05-13T03:18:41Z",
2022-05-12 14:19:14 +02:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
2022-05-12 08:16:12 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-12 14:19:14 +02:00
"forks": 1,
"watchers": 2,
2022-05-12 08:16:12 +02:00
"score": 0
2022-05-20 20:17:47 +02:00
},
{
"id": 494495424,
"name": "CVE-2022-26809",
"full_name": "XmasSnowISBACK\/CVE-2022-26809",
"owner": {
"login": "XmasSnowISBACK",
"id": 105931778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
},
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-26809",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-20T14:26:38Z",
2022-05-22 20:15:14 +02:00
"updated_at": "2022-05-22T13:47:08Z",
"pushed_at": "2022-05-22T14:08:38Z",
"stargazers_count": 8,
"watchers_count": 8,
2022-05-21 02:15:16 +02:00
"forks_count": 3,
2022-05-20 20:17:47 +02:00
"allow_forking": true,
"is_template": false,
2022-05-21 14:15:14 +02:00
"topics": [
"cve-2022-26809",
"exploit",
"rce",
"smb",
"vulnerability",
"windows"
],
2022-05-20 20:17:47 +02:00
"visibility": "public",
2022-05-21 02:15:16 +02:00
"forks": 3,
2022-05-22 20:15:14 +02:00
"watchers": 8,
2022-05-20 20:17:47 +02:00
"score": 0
},
{
"id": 494512552,
"name": "CVE-2022-26809-MASS",
"full_name": "seciurdt\/CVE-2022-26809-MASS",
"owner": {
"login": "seciurdt",
"id": 105104248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4",
"html_url": "https:\/\/github.com\/seciurdt"
},
"html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-26809-MASS",
"description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows",
"fork": false,
"created_at": "2022-05-20T15:16:30Z",
2022-05-21 02:15:16 +02:00
"updated_at": "2022-05-20T18:50:01Z",
2022-05-20 20:17:47 +02:00
"pushed_at": "2022-05-20T15:16:47Z",
2022-05-21 02:15:16 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2022-05-20 20:17:47 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-21 02:15:16 +02:00
"forks": 1,
"watchers": 1,
2022-05-20 20:17:47 +02:00
"score": 0
2022-04-13 20:15:31 +02:00
}
]