PoC-in-GitHub/2022/CVE-2022-26809.json
2022-09-17 21:16:55 +09:00

461 lines
No EOL
16 KiB
JSON

[
{
"id": 402009648,
"name": "CVE-2022-26809-RCE",
"full_name": "CberryAIRDROP\/CVE-2022-26809-RCE",
"owner": {
"login": "CberryAIRDROP",
"id": 89909217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89909217?v=4",
"html_url": "https:\/\/github.com\/CberryAIRDROP"
},
"html_url": "https:\/\/github.com\/CberryAIRDROP\/CVE-2022-26809-RCE",
"description": null,
"fork": false,
"created_at": "2021-09-01T09:48:31Z",
"updated_at": "2022-04-22T08:19:40Z",
"pushed_at": "2022-04-24T08:49:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 481455739,
"name": "Microsoft-CVE-2022-26809-The-Little-Boy",
"full_name": "sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
"owner": {
"login": "sherlocksecurity",
"id": 52328067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
"html_url": "https:\/\/github.com\/sherlocksecurity"
},
"html_url": "https:\/\/github.com\/sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy",
"description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ",
"fork": false,
"created_at": "2022-04-14T03:41:32Z",
"updated_at": "2022-05-24T06:36:59Z",
"pushed_at": "2022-04-18T03:28:10Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 19,
"score": 0
},
{
"id": 481521334,
"name": "CVE-2022-26809",
"full_name": "websecnl\/CVE-2022-26809",
"owner": {
"login": "websecnl",
"id": 20278695,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4",
"html_url": "https:\/\/github.com\/websecnl"
},
"html_url": "https:\/\/github.com\/websecnl\/CVE-2022-26809",
"description": "Remote Code Execution Exploit in the RPC Library",
"fork": false,
"created_at": "2022-04-14T08:12:24Z",
"updated_at": "2022-08-31T03:16:22Z",
"pushed_at": "2022-04-19T17:04:04Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-26809"
],
"visibility": "public",
"forks": 4,
"watchers": 26,
"score": 0
},
{
"id": 481523929,
"name": "CVE-2022-26809",
"full_name": "auduongxuan\/CVE-2022-26809",
"owner": {
"login": "auduongxuan",
"id": 33758982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33758982?v=4",
"html_url": "https:\/\/github.com\/auduongxuan"
},
"html_url": "https:\/\/github.com\/auduongxuan\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-04-14T08:21:10Z",
"updated_at": "2022-07-12T14:01:45Z",
"pushed_at": "2022-04-14T08:23:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0
},
{
"id": 481682449,
"name": "cve-2022-26809",
"full_name": "corelight\/cve-2022-26809",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-26809",
"description": "Detects attempts and successful exploitation of CVE-2022-26809",
"fork": false,
"created_at": "2022-04-14T16:58:09Z",
"updated_at": "2022-09-05T14:17:21Z",
"pushed_at": "2022-05-17T15:17:22Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 26,
"score": 0
},
{
"id": 483810303,
"name": "CVE-2022-26809-RCE",
"full_name": "UNDESC0N0CID0\/CVE-2022-26809-RCE",
"owner": {
"login": "UNDESC0N0CID0",
"id": 57696252,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57696252?v=4",
"html_url": "https:\/\/github.com\/UNDESC0N0CID0"
},
"html_url": "https:\/\/github.com\/UNDESC0N0CID0\/CVE-2022-26809-RCE",
"description": "This repository contains a PoC for remote code execution CVE-2022-26809",
"fork": false,
"created_at": "2022-04-20T20:54:26Z",
"updated_at": "2022-07-28T16:19:25Z",
"pushed_at": "2022-04-25T20:38:57Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 15,
"score": 0
},
{
"id": 484389854,
"name": "CVE-2022-26809",
"full_name": "jones199023\/CVE-2022-26809",
"owner": {
"login": "jones199023",
"id": 104200848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104200848?v=4",
"html_url": "https:\/\/github.com\/jones199023"
},
"html_url": "https:\/\/github.com\/jones199023\/CVE-2022-26809",
"description": "Python",
"fork": false,
"created_at": "2022-04-22T10:21:30Z",
"updated_at": "2022-04-22T11:02:28Z",
"pushed_at": "2022-04-22T10:49:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 484792908,
"name": "CVE-2022-26809-RCE",
"full_name": "oppongjohn\/CVE-2022-26809-RCE",
"owner": {
"login": "oppongjohn",
"id": 96750321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96750321?v=4",
"html_url": "https:\/\/github.com\/oppongjohn"
},
"html_url": "https:\/\/github.com\/oppongjohn\/CVE-2022-26809-RCE",
"description": "CVE-2022-26809-RCE",
"fork": false,
"created_at": "2022-04-23T16:01:44Z",
"updated_at": "2022-04-23T16:01:44Z",
"pushed_at": "2022-04-23T16:01:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 484793824,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "roger109\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "roger109",
"id": 79395035,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79395035?v=4",
"html_url": "https:\/\/github.com\/roger109"
},
"html_url": "https:\/\/github.com\/roger109\/CVE-2022-26809-RCE-POC",
"description": null,
"fork": false,
"created_at": "2022-04-23T16:05:36Z",
"updated_at": "2022-04-23T16:05:36Z",
"pushed_at": "2022-04-23T16:05:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 487542806,
"name": "CVE-2022-26809",
"full_name": "yuanLink\/CVE-2022-26809",
"owner": {
"login": "yuanLink",
"id": 16820130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16820130?v=4",
"html_url": "https:\/\/github.com\/yuanLink"
},
"html_url": "https:\/\/github.com\/yuanLink\/CVE-2022-26809",
"description": null,
"fork": false,
"created_at": "2022-05-01T13:19:10Z",
"updated_at": "2022-09-07T05:52:59Z",
"pushed_at": "2022-05-25T00:57:52Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-26809"
],
"visibility": "public",
"forks": 24,
"watchers": 55,
"score": 0
},
{
"id": 488862486,
"name": "CVE-2022-26809",
"full_name": "crypt0r00t\/CVE-2022-26809",
"owner": {
"login": "crypt0r00t",
"id": 104968786,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104968786?v=4",
"html_url": "https:\/\/github.com\/crypt0r00t"
},
"html_url": "https:\/\/github.com\/crypt0r00t\/CVE-2022-26809",
"description": "final exploit!",
"fork": false,
"created_at": "2022-05-05T06:51:05Z",
"updated_at": "2022-08-21T15:16:49Z",
"pushed_at": "2022-05-05T07:16:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491403752,
"name": "CVE-2022-26809",
"full_name": "Calvitz\/CVE-2022-26809",
"owner": {
"login": "Calvitz",
"id": 105359678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105359678?v=4",
"html_url": "https:\/\/github.com\/Calvitz"
},
"html_url": "https:\/\/github.com\/Calvitz\/CVE-2022-26809",
"description": "CVE-2022-26809 exp",
"fork": false,
"created_at": "2022-05-12T07:12:08Z",
"updated_at": "2022-06-26T03:24:36Z",
"pushed_at": "2022-06-26T03:22:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 494495424,
"name": "CVE-2022-26809",
"full_name": "XmasSnowISBACK\/CVE-2022-26809",
"owner": {
"login": "XmasSnowISBACK",
"id": 105931778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
},
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-26809",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-20T14:26:38Z",
"updated_at": "2022-09-17T07:32:48Z",
"pushed_at": "2022-09-16T08:27:42Z",
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-26809",
"exploit",
"rce",
"smb",
"vulnerability",
"windows"
],
"visibility": "public",
"forks": 11,
"watchers": 32,
"score": 0
},
{
"id": 502920966,
"name": "PoC-CVE-2022-26809",
"full_name": "s1ckb017\/PoC-CVE-2022-26809",
"owner": {
"login": "s1ckb017",
"id": 1282305,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1282305?v=4",
"html_url": "https:\/\/github.com\/s1ckb017"
},
"html_url": "https:\/\/github.com\/s1ckb017\/PoC-CVE-2022-26809",
"description": "PoC for CVE-2022-26809, analisys and considerations are shown in the github.io.",
"fork": false,
"created_at": "2022-06-13T11:08:33Z",
"updated_at": "2022-09-12T22:08:38Z",
"pushed_at": "2022-06-18T13:53:53Z",
"stargazers_count": 85,
"watchers_count": 85,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 85,
"score": 0
},
{
"id": 515477556,
"name": "CVE-2022-26809-RCE-POC",
"full_name": "cybersecurityresearcher\/CVE-2022-26809-RCE-POC",
"owner": {
"login": "cybersecurityresearcher",
"id": 108762250,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108762250?v=4",
"html_url": "https:\/\/github.com\/cybersecurityresearcher"
},
"html_url": "https:\/\/github.com\/cybersecurityresearcher\/CVE-2022-26809-RCE-POC",
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-07-19T07:18:45Z",
"updated_at": "2022-07-28T03:23:43Z",
"pushed_at": "2022-07-19T07:19:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 518520520,
"name": "FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp",
"full_name": "fuckjsonp\/FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp",
"owner": {
"login": "fuckjsonp",
"id": 110118141,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110118141?v=4",
"html_url": "https:\/\/github.com\/fuckjsonp"
},
"html_url": "https:\/\/github.com\/fuckjsonp\/FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp",
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2022-09-16T09:16:55Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 305,
"watchers_count": 305,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 305,
"score": 0
}
]