CVE-2022-26134
CVE-2022-26134 - Atlassian Confluence unauthenticated OGNL injection vulnerability (RCE). (by Nwqda)
CVE-2022-26134-Exploit-Detection
This repository contains Yara rule and the method that a security investigator may want to use for CVE-2022-26134 threat hunting on their Linux confluence servers. (by th3b3ginn3r)
CVE-2022-26134 | CVE-2022-26134-Exploit-Detection | |
---|---|---|
1 | 1 | |
258 | 1 | |
- | - | |
6.8 | 1.8 | |
almost 2 years ago | almost 2 years ago | |
Python | YARA | |
- | GNU General Public License v3.0 only |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CVE-2022-26134
Posts with mentions or reviews of CVE-2022-26134.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-06-04.
CVE-2022-26134-Exploit-Detection
Posts with mentions or reviews of CVE-2022-26134-Exploit-Detection.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-06-04.
-
CVE-2022-26134 – Confluence Zero Day Remote Code Execution - live threat
General advice - https://github.com/th3b3ginn3r/CVE-2022-26134-Exploit-Detection
What are some alternatives?
When comparing CVE-2022-26134 and CVE-2022-26134-Exploit-Detection you can also consider the following projects:
sigma - Main Sigma Rule Repository
CVE-2022-26134 - [CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass.
tomcat-jmxproxy-rce-exp - Apache Tomcat JMXProxy RCE
through_the_wire - CVE-2022-26134 Proof of Concept
DogWalk-rce-poc - 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)
cve2022-26134exp - cve2022-26134
Serein - 【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。
CVE-2021-40444 - CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
confluence_poster - A script to update a page in Confluence after editing it in a local file
CVE-2022-26134 vs sigma
CVE-2022-26134-Exploit-Detection vs CVE-2022-26134
CVE-2022-26134 vs tomcat-jmxproxy-rce-exp
CVE-2022-26134-Exploit-Detection vs through_the_wire
CVE-2022-26134 vs DogWalk-rce-poc
CVE-2022-26134-Exploit-Detection vs sigma
CVE-2022-26134 vs CVE-2022-26134
CVE-2022-26134-Exploit-Detection vs cve2022-26134exp
CVE-2022-26134 vs Serein
CVE-2022-26134-Exploit-Detection vs Serein
CVE-2022-26134 vs CVE-2021-40444
CVE-2022-26134 vs confluence_poster