65 lines
No EOL
2.4 KiB
JSON
65 lines
No EOL
2.4 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2022-26923_AD-Certificate-Services",
|
|
"full_name": "LudovicPatho/CVE-2022-26923_AD-Certificate-Services",
|
|
"html_url": "https://github.com/LudovicPatho/CVE-2022-26923_AD-Certificate-Services",
|
|
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
|
|
"stargazers_count": 44,
|
|
"forks_count": 14,
|
|
"created_at": "2022-05-14T09:27:06Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-26923-Powershell-POC",
|
|
"full_name": "lsecqt/CVE-2022-26923-Powershell-POC",
|
|
"html_url": "https://github.com/lsecqt/CVE-2022-26923-Powershell-POC",
|
|
"description": "A powershell poc to load and automatically run Certify and Rubeus from memory.",
|
|
"stargazers_count": 17,
|
|
"forks_count": 8,
|
|
"created_at": "2022-08-17T21:13:49Z"
|
|
},
|
|
{
|
|
"name": "TryHackMe-CVE-2022-26923",
|
|
"full_name": "r1skkam/TryHackMe-CVE-2022-26923",
|
|
"html_url": "https://github.com/r1skkam/TryHackMe-CVE-2022-26923",
|
|
"description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services",
|
|
"stargazers_count": 6,
|
|
"forks_count": 3,
|
|
"created_at": "2022-05-12T02:31:50Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-26923",
|
|
"full_name": "Gh-Badr/CVE-2022-26923",
|
|
"html_url": "https://github.com/Gh-Badr/CVE-2022-26923",
|
|
"description": "A proof of concept exploiting CVE-2022-26923.",
|
|
"stargazers_count": 1,
|
|
"forks_count": 2,
|
|
"created_at": "2023-11-28T16:13:36Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-26923",
|
|
"full_name": "Yowise/CVE-2022-26923",
|
|
"html_url": "https://github.com/Yowise/CVE-2022-26923",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-01T17:03:27Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-26927",
|
|
"full_name": "CrackerCat/CVE-2022-26927",
|
|
"html_url": "https://github.com/CrackerCat/CVE-2022-26927",
|
|
"description": "A proof-of-concept font with a write-up attached.",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2022-05-14T05:40:06Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-26923-rayng",
|
|
"full_name": "rayngnpc/CVE-2022-26923-rayng",
|
|
"html_url": "https://github.com/rayngnpc/CVE-2022-26923-rayng",
|
|
"description": "Exploitation for CVE-2022-26923",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-03-04T10:26:41Z"
|
|
}
|
|
] |