PoC-in-GitHub/2022/CVE-2022-26809.json
2022-05-15 03:15:54 +09:00

397 lines
No EOL
13 KiB
JSON

[
{
"id": 402009648,
"name": "CVE-2022-26809-RCE",
"full_name": "CberryAIRDROP\/CVE-2022-26809-RCE",
"owner": {
"login": "CberryAIRDROP",
"id": 89909217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89909217?v=4",
"html_url": "https:\/\/github.com\/CberryAIRDROP"
},
"html_url": "https:\/\/github.com\/CberryAIRDROP\/CVE-2022-26809-RCE",
"description": null,
"fork": false,
"created_at": "2021-09-01T09:48:31Z",
"updated_at": "2022-04-22T08:19:40Z",
"pushed_at": "2022-04-24T08:49:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 481455739,
"name": "Microsoft-CVE-2022-26809-The-Little-Boy",
"full_name": "sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
"owner": {
"login": "sherlocksecurity",
"id": 52328067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
"html_url": "https:\/\/github.com\/sherlocksecurity"
},
"html_url": "https:\/\/github.com\/sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
"fork": false,
"created_at": "2022-04-14T03:41:32Z",
"updated_at": "2022-05-12T06:25:06Z",
"pushed_at": "2022-04-18T03:28:10Z",
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 17,
"score": 0
},
{
"id": 481521334,
"name": "CVE-2022-26809",
"full_name": "websecnl\/CVE-2022-26809",
"owner": {
"login": "websecnl",
"id": 20278695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4",
"html_url": "https:\/\/github.com\/websecnl"
},
"html_url": "https:\/\/github.com\/websecnl\/CVE-2022-26809",
"description": "Remote Code Execution Exploit in the RPC Library",
"fork": false,
"created_at": "2022-04-14T08:12:24Z",
"updated_at": "2022-05-13T01:24:13Z",
"pushed_at": "2022-04-19T17:04:04Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-26809"
],
"visibility": "public",
"forks": 3,
"watchers": 23,
"score": 0
},
{
"id": 481523929,
"name": "CVE-2022-26809",
"full_name": "auduongxuan\/CVE-2022-26809",
"owner": {
"login": "auduongxuan",
"id": 33758982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33758982?v=4",
"html_url": "https:\/\/github.com\/auduongxuan"
},
"html_url": "https:\/\/github.com\/auduongxuan\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-04-14T08:21:10Z",
"updated_at": "2022-04-27T13:33:04Z",
"pushed_at": "2022-04-14T08:23:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 483620315,
"name": "CVE-2022-26809",
"full_name": "nanaao\/CVE-2022-26809",
"owner": {
"login": "nanaao",
"id": 77666853,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
"html_url": "https:\/\/github.com\/nanaao"
},
"html_url": "https:\/\/github.com\/nanaao\/CVE-2022-26809",
"description": "A proof of concept of the CVE-2022-26809-RCE vulnerability.",
"fork": false,
"created_at": "2022-04-20T11:08:29Z",
"updated_at": "2022-04-27T12:07:44Z",
"pushed_at": "2022-04-18T05:57:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 483810303,
"name": "CVE-2022-26809-RCE",
"full_name": "DESC0N0C1D0\/CVE-2022-26809-RCE",
"owner": {
"login": "DESC0N0C1D0",
"id": 57696252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57696252?v=4",
"html_url": "https:\/\/github.com\/DESC0N0C1D0"
},
"html_url": "https:\/\/github.com\/DESC0N0C1D0\/CVE-2022-26809-RCE",
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
"updated_at": "2022-05-14T14:48:28Z",
"pushed_at": "2022-04-25T20:38:57Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 11,
"score": 0
},
{
"id": 484389854,
"name": "CVE-2022-26809",
"full_name": "jones199023\/CVE-2022-26809",
"owner": {
"login": "jones199023",
"id": 104200848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104200848?v=4",
"html_url": "https:\/\/github.com\/jones199023"
},
"html_url": "https:\/\/github.com\/jones199023\/CVE-2022-26809",
"description": "Python",
"fork": false,
"created_at": "2022-04-22T10:21:30Z",
"updated_at": "2022-04-22T11:02:28Z",
"pushed_at": "2022-04-22T10:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 484792908,
"name": "CVE-2022-26809-RCE",
"full_name": "oppongjohn\/CVE-2022-26809-RCE",
"owner": {
"login": "oppongjohn",
"id": 96750321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96750321?v=4",
"html_url": "https:\/\/github.com\/oppongjohn"
},
"html_url": "https:\/\/github.com\/oppongjohn\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809-RCE",
"fork": false,
"created_at": "2022-04-23T16:01:44Z",
"updated_at": "2022-04-23T16:01:44Z",
"pushed_at": "2022-04-23T16:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 484793824,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "roger109\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "roger109",
"id": 79395035,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79395035?v=4",
"html_url": "https:\/\/github.com\/roger109"
},
"html_url": "https:\/\/github.com\/roger109\/CVE-2022-26809-RCE-POC",
"description": null,
"fork": false,
"created_at": "2022-04-23T16:05:36Z",
"updated_at": "2022-04-23T16:05:36Z",
"pushed_at": "2022-04-23T16:05:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 485492212,
"name": "CVE-2022-26809-RCE",
"full_name": "XmasSnowREAL\/CVE-2022-26809-RCE",
"owner": {
"login": "XmasSnowREAL",
"id": 104387831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104387831?v=4",
"html_url": "https:\/\/github.com\/XmasSnowREAL"
},
"html_url": "https:\/\/github.com\/XmasSnowREAL\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime",
"fork": false,
"created_at": "2022-04-25T18:40:24Z",
"updated_at": "2022-05-13T19:31:15Z",
"pushed_at": "2022-05-14T06:01:19Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-26809",
"exploit",
"rce",
"remote-code-execution",
"smb"
],
"visibility": "public",
"forks": 1,
"watchers": 29,
"score": 0
},
{
"id": 487542806,
"name": "CVE-2022-26809",
"full_name": "yuanLink\/CVE-2022-26809",
"owner": {
"login": "yuanLink",
"id": 16820130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16820130?v=4",
"html_url": "https:\/\/github.com\/yuanLink"
},
"html_url": "https:\/\/github.com\/yuanLink\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-05-01T13:19:10Z",
"updated_at": "2022-05-14T08:09:39Z",
"pushed_at": "2022-05-14T03:56:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-26809"
],
"visibility": "public",
"forks": 6,
"watchers": 11,
"score": 0
},
{
"id": 490368128,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "ExploitPwner\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "ExploitPwner",
"id": 103929208,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4",
"html_url": "https:\/\/github.com\/ExploitPwner"
},
"html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-26809-RCE-POC",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-09T16:48:30Z",
"updated_at": "2022-05-11T01:30:14Z",
"pushed_at": "2022-05-09T16:58:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"0day",
"exploit-scanner",
"mass-exploit",
"mass-exploiter",
"windows-rce",
"zero-day"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 491265476,
"name": "CVE-2022-26809-RCE",
"full_name": "seciurdt\/CVE-2022-26809-RCE",
"owner": {
"login": "seciurdt",
"id": 105104248,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4",
"html_url": "https:\/\/github.com\/seciurdt"
},
"html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows ",
"fork": false,
"created_at": "2022-05-11T20:38:55Z",
"updated_at": "2022-05-11T20:41:34Z",
"pushed_at": "2022-05-11T20:41:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491403752,
"name": "CVE-2022-26809",
"full_name": "Calvitz\/CVE-2022-26809",
"owner": {
"login": "Calvitz",
"id": 105359678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105359678?v=4",
"html_url": "https:\/\/github.com\/Calvitz"
},
"html_url": "https:\/\/github.com\/Calvitz\/CVE-2022-26809",
"description": "CVE-2022-26809 exp",
"fork": false,
"created_at": "2022-05-12T07:12:08Z",
"updated_at": "2022-05-13T03:18:44Z",
"pushed_at": "2022-05-13T03:18:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]