PoC-in-GitHub/2022/CVE-2022-26809.json

425 lines
14 KiB
JSON
Raw Normal View History

2022-04-13 20:15:31 +02:00
[
2022-04-22 14:17:09 +02:00
{
"id": 402009648,
"name": "CVE-2022-26809-RCE",
"full_name": "CberryAIRDROP\/CVE-2022-26809-RCE",
"owner": {
"login": "CberryAIRDROP",
"id": 89909217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89909217?v=4",
"html_url": "https:\/\/github.com\/CberryAIRDROP"
},
"html_url": "https:\/\/github.com\/CberryAIRDROP\/CVE-2022-26809-RCE",
"description": null,
"fork": false,
"created_at": "2021-09-01T09:48:31Z",
"updated_at": "2022-04-22T08:19:40Z",
2022-04-24 14:17:23 +02:00
"pushed_at": "2022-04-24T08:49:21Z",
2022-04-22 14:17:09 +02:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
2022-04-13 20:15:31 +02:00
{
2022-04-14 08:17:49 +02:00
"id": 481455739,
2022-04-18 08:16:20 +02:00
"name": "Microsoft-CVE-2022-26809-The-Little-Boy",
"full_name": "sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
2022-04-13 20:15:31 +02:00
"owner": {
2022-04-14 08:17:49 +02:00
"login": "sherlocksecurity",
"id": 52328067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
"html_url": "https:\/\/github.com\/sherlocksecurity"
2022-04-13 20:15:31 +02:00
},
2022-04-18 08:16:20 +02:00
"html_url": "https:\/\/github.com\/sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
2022-04-14 08:17:49 +02:00
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
2022-04-13 20:15:31 +02:00
"fork": false,
2022-04-14 08:17:49 +02:00
"created_at": "2022-04-14T03:41:32Z",
2022-05-24 14:17:44 +02:00
"updated_at": "2022-05-24T06:36:59Z",
2022-04-18 08:16:20 +02:00
"pushed_at": "2022-04-18T03:28:10Z",
2022-05-24 14:17:44 +02:00
"stargazers_count": 19,
"watchers_count": 19,
2022-05-19 14:15:58 +02:00
"forks_count": 1,
2022-04-14 14:15:53 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-19 14:15:58 +02:00
"forks": 1,
2022-05-24 14:17:44 +02:00
"watchers": 19,
2022-04-14 14:15:53 +02:00
"score": 0
},
{
"id": 481521334,
"name": "CVE-2022-26809",
"full_name": "websecnl\/CVE-2022-26809",
"owner": {
"login": "websecnl",
"id": 20278695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4",
"html_url": "https:\/\/github.com\/websecnl"
},
"html_url": "https:\/\/github.com\/websecnl\/CVE-2022-26809",
"description": "Remote Code Execution Exploit in the RPC Library",
"fork": false,
"created_at": "2022-04-14T08:12:24Z",
2022-05-22 14:15:05 +02:00
"updated_at": "2022-05-22T11:32:39Z",
2022-04-19 20:17:43 +02:00
"pushed_at": "2022-04-19T17:04:04Z",
2022-05-22 14:15:05 +02:00
"stargazers_count": 26,
"watchers_count": 26,
2022-05-19 14:15:58 +02:00
"forks_count": 4,
2022-04-13 20:15:31 +02:00
"allow_forking": true,
"is_template": false,
2022-04-14 14:15:53 +02:00
"topics": [
"cve-2022-26809"
],
2022-04-13 20:15:31 +02:00
"visibility": "public",
2022-05-19 14:15:58 +02:00
"forks": 4,
2022-05-22 14:15:05 +02:00
"watchers": 26,
2022-04-13 20:15:31 +02:00
"score": 0
2022-04-14 14:15:53 +02:00
},
{
"id": 481523929,
"name": "CVE-2022-26809",
"full_name": "auduongxuan\/CVE-2022-26809",
"owner": {
"login": "auduongxuan",
"id": 33758982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33758982?v=4",
"html_url": "https:\/\/github.com\/auduongxuan"
},
"html_url": "https:\/\/github.com\/auduongxuan\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-04-14T08:21:10Z",
2022-05-19 14:15:58 +02:00
"updated_at": "2022-05-19T11:24:41Z",
2022-04-14 14:15:53 +02:00
"pushed_at": "2022-04-14T08:23:59Z",
2022-05-19 14:15:58 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2022-05-19 20:18:04 +02:00
"forks_count": 4,
2022-04-14 14:15:53 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-19 20:18:04 +02:00
"forks": 4,
2022-05-19 14:15:58 +02:00
"watchers": 5,
2022-04-19 08:15:11 +02:00
"score": 0
2022-04-21 02:17:07 +02:00
},
2022-05-17 20:15:36 +02:00
{
"id": 481682449,
"name": "cve-2022-26809",
"full_name": "corelight\/cve-2022-26809",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-26809",
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
"fork": false,
"created_at": "2022-04-14T16:58:09Z",
2022-06-02 08:16:46 +02:00
"updated_at": "2022-06-02T02:14:39Z",
2022-05-17 20:15:36 +02:00
"pushed_at": "2022-05-17T15:17:22Z",
2022-06-02 08:16:46 +02:00
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 11,
2022-05-17 20:15:36 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-02 08:16:46 +02:00
"forks": 11,
"watchers": 21,
2022-04-27 14:18:43 +02:00
"score": 0
},
2022-04-21 02:17:07 +02:00
{
"id": 483810303,
"name": "CVE-2022-26809-RCE",
"full_name": "DESC0N0C1D0\/CVE-2022-26809-RCE",
"owner": {
"login": "DESC0N0C1D0",
"id": 57696252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57696252?v=4",
"html_url": "https:\/\/github.com\/DESC0N0C1D0"
},
"html_url": "https:\/\/github.com\/DESC0N0C1D0\/CVE-2022-26809-RCE",
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
2022-05-21 20:16:52 +02:00
"updated_at": "2022-05-21T14:28:37Z",
2022-04-26 02:15:14 +02:00
"pushed_at": "2022-04-25T20:38:57Z",
2022-05-21 20:16:52 +02:00
"stargazers_count": 12,
"watchers_count": 12,
2022-06-13 08:15:58 +02:00
"forks_count": 9,
2022-04-21 02:17:07 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-06-13 08:15:58 +02:00
"forks": 9,
2022-05-21 20:16:52 +02:00
"watchers": 12,
2022-04-22 14:17:09 +02:00
"score": 0
},
{
"id": 484389854,
"name": "CVE-2022-26809",
"full_name": "jones199023\/CVE-2022-26809",
"owner": {
"login": "jones199023",
"id": 104200848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104200848?v=4",
"html_url": "https:\/\/github.com\/jones199023"
},
"html_url": "https:\/\/github.com\/jones199023\/CVE-2022-26809",
"description": "Python",
"fork": false,
"created_at": "2022-04-22T10:21:30Z",
"updated_at": "2022-04-22T11:02:28Z",
"pushed_at": "2022-04-22T10:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2022-04-21 02:17:07 +02:00
"score": 0
2022-04-23 20:15:16 +02:00
},
{
"id": 484792908,
"name": "CVE-2022-26809-RCE",
"full_name": "oppongjohn\/CVE-2022-26809-RCE",
"owner": {
"login": "oppongjohn",
"id": 96750321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96750321?v=4",
"html_url": "https:\/\/github.com\/oppongjohn"
},
"html_url": "https:\/\/github.com\/oppongjohn\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809-RCE",
"fork": false,
"created_at": "2022-04-23T16:01:44Z",
"updated_at": "2022-04-23T16:01:44Z",
"pushed_at": "2022-04-23T16:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 484793824,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "roger109\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "roger109",
"id": 79395035,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79395035?v=4",
"html_url": "https:\/\/github.com\/roger109"
},
"html_url": "https:\/\/github.com\/roger109\/CVE-2022-26809-RCE-POC",
"description": null,
"fork": false,
"created_at": "2022-04-23T16:05:36Z",
"updated_at": "2022-04-23T16:05:36Z",
"pushed_at": "2022-04-23T16:05:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-04-26 02:15:14 +02:00
},
2022-05-13 08:15:45 +02:00
{
"id": 487542806,
"name": "CVE-2022-26809",
"full_name": "yuanLink\/CVE-2022-26809",
"owner": {
"login": "yuanLink",
"id": 16820130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16820130?v=4",
"html_url": "https:\/\/github.com\/yuanLink"
},
"html_url": "https:\/\/github.com\/yuanLink\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-05-01T13:19:10Z",
2022-06-11 20:18:18 +02:00
"updated_at": "2022-06-11T17:46:50Z",
2022-05-25 08:15:34 +02:00
"pushed_at": "2022-05-25T00:57:52Z",
2022-06-11 20:18:18 +02:00
"stargazers_count": 47,
"watchers_count": 47,
2022-06-13 20:16:11 +02:00
"forks_count": 23,
2022-05-13 08:15:45 +02:00
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-26809"
],
"visibility": "public",
2022-06-13 20:16:11 +02:00
"forks": 23,
2022-06-11 20:18:18 +02:00
"watchers": 47,
2022-05-13 08:15:45 +02:00
"score": 0
},
2022-05-09 20:17:23 +02:00
{
"id": 490368128,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "ExploitPwner\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "ExploitPwner",
"id": 103929208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
"html_url": "https:\/\/github.com\/ExploitPwner"
},
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-26809-RCE-POC",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-09T16:48:30Z",
2022-05-19 14:15:58 +02:00
"updated_at": "2022-05-19T06:42:06Z",
2022-05-17 20:15:36 +02:00
"pushed_at": "2022-05-17T15:53:22Z",
"stargazers_count": 3,
"watchers_count": 3,
2022-05-09 20:17:23 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2022-05-11 08:15:25 +02:00
"topics": [
"0day",
"exploit-scanner",
"mass-exploit",
"mass-exploiter",
"windows-rce",
"zero-day"
],
2022-05-09 20:17:23 +02:00
"visibility": "public",
"forks": 0,
2022-05-17 20:15:36 +02:00
"watchers": 3,
2022-05-09 20:17:23 +02:00
"score": 0
2022-05-12 02:15:37 +02:00
},
2022-05-12 08:16:12 +02:00
{
2022-05-12 14:19:14 +02:00
"id": 491403752,
2022-05-12 08:16:12 +02:00
"name": "CVE-2022-26809",
"full_name": "Calvitz\/CVE-2022-26809",
"owner": {
"login": "Calvitz",
"id": 105359678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105359678?v=4",
"html_url": "https:\/\/github.com\/Calvitz"
},
"html_url": "https:\/\/github.com\/Calvitz\/CVE-2022-26809",
2022-05-12 14:19:14 +02:00
"description": "CVE-2022-26809 exp",
2022-05-12 08:16:12 +02:00
"fork": false,
2022-05-12 14:19:14 +02:00
"created_at": "2022-05-12T07:12:08Z",
2022-05-13 08:15:45 +02:00
"updated_at": "2022-05-13T03:18:44Z",
"pushed_at": "2022-05-13T03:18:41Z",
2022-05-12 14:19:14 +02:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
2022-05-12 08:16:12 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-05-12 14:19:14 +02:00
"forks": 1,
"watchers": 2,
2022-05-12 08:16:12 +02:00
"score": 0
2022-05-20 20:17:47 +02:00
},
{
"id": 494495424,
"name": "CVE-2022-26809",
"full_name": "XmasSnowISBACK\/CVE-2022-26809",
"owner": {
"login": "XmasSnowISBACK",
"id": 105931778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
},
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-26809",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-20T14:26:38Z",
2022-05-25 08:15:34 +02:00
"updated_at": "2022-05-25T06:15:51Z",
2022-05-22 20:15:14 +02:00
"pushed_at": "2022-05-22T14:08:38Z",
2022-05-25 08:15:34 +02:00
"stargazers_count": 9,
"watchers_count": 9,
2022-05-21 02:15:16 +02:00
"forks_count": 3,
2022-05-20 20:17:47 +02:00
"allow_forking": true,
"is_template": false,
2022-05-21 14:15:14 +02:00
"topics": [
"cve-2022-26809",
"exploit",
"rce",
"smb",
"vulnerability",
"windows"
],
2022-05-20 20:17:47 +02:00
"visibility": "public",
2022-05-21 02:15:16 +02:00
"forks": 3,
2022-05-25 08:15:34 +02:00
"watchers": 9,
2022-05-20 20:17:47 +02:00
"score": 0
2022-06-08 20:17:15 +02:00
},
{
"id": 501346371,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "scoobydoobi\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "scoobydoobi",
"id": 107139039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107139039?v=4",
"html_url": "https:\/\/github.com\/scoobydoobi"
},
"html_url": "https:\/\/github.com\/scoobydoobi\/CVE-2022-26809-RCE-POC",
"description": "writeup and poc for cve-2022-26809",
"fork": false,
"created_at": "2022-06-08T17:22:21Z",
"updated_at": "2022-06-08T17:46:48Z",
"pushed_at": "2022-06-08T17:56:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2022-06-11 20:18:18 +02:00
},
{
"id": 502354682,
"name": "CVE-2022-26809-RCE",
"full_name": "scoobydoobi\/CVE-2022-26809-RCE",
"owner": {
"login": "scoobydoobi",
"id": 107139039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107139039?v=4",
"html_url": "https:\/\/github.com\/scoobydoobi"
},
"html_url": "https:\/\/github.com\/scoobydoobi\/CVE-2022-26809-RCE",
"description": "writeup and poc for [CVE-2022-26809]",
"fork": false,
"created_at": "2022-06-11T13:22:45Z",
2022-06-13 14:18:08 +02:00
"updated_at": "2022-06-13T07:40:33Z",
2022-06-11 20:18:18 +02:00
"pushed_at": "2022-06-11T13:24:27Z",
2022-06-13 14:18:08 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2022-06-11 20:18:18 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2022-06-13 14:18:08 +02:00
"watchers": 2,
2022-06-11 20:18:18 +02:00
"score": 0
2022-04-13 20:15:31 +02:00
}
]