Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Atlassian | Confluence Data Center | next of 1.3.0 ~ unspecified | - | |
| Atlassian | Confluence Server | next of 1.3.0 ~ unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | 【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。 | https://github.com/W01fh4cker/Serein | POC Details |
| 2 | Information and scripts for the confluence CVE-2022-26134 | https://github.com/offlinehoster/CVE-2022-26134 | POC Details |
| 3 | 0-DAY: Unauthenticated Remote Code Execution in Atlassian Confluence (CVE-2022-26134). | https://github.com/CyberDonkyx0/CVE-2022-26134 | POC Details |
| 4 | This repository contains Yara rule and the method that a security investigator may want to use for CVE-2022-26134 threat hunting on their Linux confluence servers. | https://github.com/th3b3ginn3r/CVE-2022-26134-Exploit-Detection | POC Details |
| 5 | CVE-2022-26134 Proof of Concept | https://github.com/jbaines-r7/through_the_wire | POC Details |
| 6 | CVE-2022-26134 - Confluence Pre-Auth RCE | OGNL injection | https://github.com/crowsec-edtech/CVE-2022-26134 | POC Details |
| 7 | None | https://github.com/kyxiaxiang/CVE-2022-26134 | POC Details |
| 8 | (CVE-2022-26134)an unauthenticated and remote OGNL injection vulnerability resulting in code execution in the context of the Confluence server | https://github.com/Brucetg/CVE-2022-26134 | POC Details |
| 9 | Confluence Server and Data Center - CVE-2022-26134 - Critical severity unauthenticated remote code execution vulnerability PoC | https://github.com/shamo0/CVE-2022-26134 | POC Details |
| 10 | [CVE-2022-26134]Confluence OGNL expression injected RCE with sandbox bypass. | https://github.com/SNCKER/CVE-2022-26134 | POC Details |
| 11 | None | https://github.com/Sakura-nee/CVE-2022-26134 | POC Details |
| 12 | None | https://github.com/Vulnmachines/Confluence-CVE-2022-26134 | POC Details |
| 13 | Atlassian confluence poc | https://github.com/axingde/CVE-2022-26134 | POC Details |
| 14 | CVE-2022-26134 | https://github.com/1rm/Confluence-CVE-2022-26134 | POC Details |
| 15 | None | https://github.com/0xAgun/CVE-2022-26134 | POC Details |
| 16 | None | https://github.com/abhishekmorla/CVE-2022-26134 | POC Details |
| 17 | Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134) | https://github.com/h3v0x/CVE-2022-26134 | POC Details |
| 18 | This repository talks about Zero-Day Exploitation of Atlassian Confluence, it's defense and analysis point of view from a SecOps or Blue Team perspective | https://github.com/archanchoudhury/Confluence-CVE-2022-26134 | POC Details |
| 19 | Simple Honeypot for Atlassian Confluence (CVE-2022-26134) | https://github.com/SIFalcon/confluencePot | POC Details |
| 20 | None | https://github.com/PsykoDev/CVE-2022-26134 | POC Details |
| 21 | None | https://github.com/vesperp/CVE-2022-26134-Confluence | POC Details |
| 22 | Atlassian Confluence 远程代码执行漏洞(CVE-2022-26134) | https://github.com/li8u99/CVE-2022-26134 | POC Details |
| 23 | Implementation of CVE-2022-26134 | https://github.com/reubensammut/cve-2022-26134 | POC Details |
| 24 | None | https://github.com/BeichenDream/CVE-2022-26134-Godzilla-MEMSHELL | POC Details |
| 25 | CVE-2022-26134 Confluence OGNL Injection POC | https://github.com/alcaparra/CVE-2022-26134 | POC Details |
| 26 | Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection | https://github.com/whokilleddb/CVE-2022-26134-Confluence-RCE | POC Details |
| 27 | Atlassian Confluence- Unauthenticated OGNL injection vulnerability (RCE) | https://github.com/Habib0x0/CVE-2022-26134 | POC Details |
| 28 | None | https://github.com/Y000o/Confluence-CVE-2022-26134 | POC Details |
| 29 | Atlassian confluence unauthenticated ONGL injection remote code execution scanner (CVE-2022-26134). | https://github.com/redhuntlabs/ConfluentPwn | POC Details |
| 30 | CVE-2022-26134 | https://github.com/cai-niao98/CVE-2022-26134 | POC Details |
| 31 | CVE-2022-26134, an OGNL injection vulnerability exists that would allow an unauthenticated attacker to execute arbitrary code on a Confluence Server or Data Center instance. This is CVE-2022-26134 expoitation script | https://github.com/sunny-kathuria/exploit_CVE-2022-26134 | POC Details |
| 32 | [CVE-2022-26134] Attlasian Confluence RCE | https://github.com/KeepWannabe/BotCon | POC Details |
| 33 | CVE-2022-26134 - Pre-Auth Remote Code Execution via OGNL Injection | https://github.com/Chocapikk/CVE-2022-26134 | POC Details |
| 34 | 「💥」CVE-2022-26134 - Confluence Pre-Auth RCE | https://github.com/AmoloHT/CVE-2022-26134 | POC Details |
| 35 | [PoC] Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE) | https://github.com/kh4sh3i/CVE-2022-26134 | POC Details |
| 36 | Atlassian Confluence OGNL Injection Remote Code Execution (RCE) Vulnerability (CVE-2022-26134) | https://github.com/ColdFusionX/CVE-2022-26134 | POC Details |
| 37 | PoC for exploiting CVE-2022-26134 on Confluence | https://github.com/Luchoane/CVE-2022-26134_conFLU | POC Details |
| 38 | Atlassian, CVE-2022-26134 An interactive lab showcasing the Confluence Server and Data Center un-authenticated RCE vulnerability. | https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134 | POC Details |
| 39 | Atlassian Confluence (CVE-2022-26134) - Unauthenticated Remote code execution (RCE) | https://github.com/nxtexploit/CVE-2022-26134 | POC Details |
| 40 | Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE). | https://github.com/Debajyoti0-0/CVE-2022-26134 | POC Details |
| 41 | None | https://github.com/f4yd4-s3c/cve-2022-26134 | POC Details |
| 42 | confluence rce | https://github.com/coskper-papa/CVE-2022-26134 | POC Details |
| 43 | This is a python script that can be used with Shodan CLI to mass hunting Confluence Servers vulnerable to CVE-2022-26134 | https://github.com/p4b3l1t0/confusploit | POC Details |
| 44 | CVE-2022-26134-PoC | https://github.com/twoning/CVE-2022-26134-PoC | POC Details |
| 45 | Just simple PoC for the Atlassian Jira exploit. Provides code execution for unauthorised user on a server. | https://github.com/iveresk/cve-2022-26134 | POC Details |
| 46 | 远程攻击者在Confluence未经身份验证的情况下,可构造OGNL表达式进行注入,实现在Confluence Server或Data Center上执行任意代码,在现有脚本上修改了poc,方便getshell。 | https://github.com/keven1z/CVE-2022-26134 | POC Details |
| 47 | CVE-2022-26134-Console | https://github.com/shiftsansan/CVE-2022-26134-Console | POC Details |
| 48 | CVE-2022-26134 web payload | https://github.com/1337in/CVE-2022-26134web | POC Details |
| 49 | Detecting CVE-2022-26134 using Nuclei | https://github.com/skhalsa-sigsci/CVE-2022-26134-LAB | POC Details |
| 50 | None | https://github.com/yigexioabai/CVE-2022-26134-cve1 | POC Details |
| 51 | 在受影响的Confluence Server 和Data Center 版本中,存在一个OGNL 注入漏洞,该漏洞允许未经身份验证的攻击者在Confluence Server 或Data Center 服务器上执行任意代码。 | https://github.com/kailing0220/CVE-2022-26134 | POC Details |
| 52 | 批量检测CVE-2022-26134 RCE漏洞 | https://github.com/xanszZZ/ATLASSIAN-Confluence_rce | POC Details |
| 53 | Confluence Server and Data Center存在一个远程代码执行漏洞,未经身份验证的攻击者可以利用该漏洞向目标服务器注入恶意ONGL表达式,进而在目标服务器上执行任意代码。 | https://github.com/kelemaoya/CVE-2022-26134 | POC Details |
| 54 | cve-2022-26134 | https://github.com/CJ-0107/cve-2022-26134 | POC Details |
| 55 | CVE-2022-26134 | https://github.com/latings/CVE-2022-26134 | POC Details |
| 56 | CVE-2022-26134poc | https://github.com/yyqxi/CVE-2022-26134 | POC Details |
| 57 | None | https://github.com/b4dboy17/CVE-2022-26134 | POC Details |
| 58 | CVE-2022-26134 GO POC 练习 | https://github.com/wjlin0/CVE-2022-26134 | POC Details |
| 59 | None | https://github.com/cbk914/CVE-2022-26134_check | POC Details |
| 60 | None | https://github.com/MaskCyberSecurityTeam/CVE-2022-26134_Behinder_MemShell | POC Details |
| 61 | Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134) | https://github.com/Muhammad-Ali007/Atlassian_CVE-2022-26134 | POC Details |
| 62 | A PoC for CVE-2022-26134 for Educational Purposes and Security Research | https://github.com/acfirthh/CVE-2022-26134 | POC Details |
| 63 | None | https://github.com/yTxZx/CVE-2022-26134 | POC Details |
| 64 | Confluence Pre-Auth Remote Code Execution via OGNL Injection (CVE-2022-26134) | https://github.com/hev0x/CVE-2022-26134 | POC Details |
| 65 | None | https://github.com/DARKSTUFF-LAB/-CVE-2022-26134 | POC Details |
| 66 | None | https://github.com/CatAnnaDev/CVE-2022-26134 | POC Details |
| 67 | None | https://github.com/404fu/CVE-2022-26134-POC | POC Details |
| 68 | confluence rce (CVE-2021-26084, CVE-2022-26134, CVE-2023-22527) | https://github.com/BBD-YZZ/Confluence-RCE | POC Details |
| 69 | CVE-2022-26134 exploit script | https://github.com/cc3305/CVE-2022-26134 | POC Details |
| 70 | This repository contains Yara rule and the method that a security investigator may want to use for CVE-2022-26134 threat hunting on their Linux confluence servers. | https://github.com/ma1am/CVE-2022-26134-Exploit-Detection | POC Details |
| 71 | None | https://github.com/xsxtw/CVE-2022-26134 | POC Details |
| 72 | None | https://github.com/Agentgilspy/CVE-2022-26134 | POC Details |
| 73 | None | https://github.com/XiaomingX/CVE-2022-26134-poc | POC Details |
| 74 | None | https://github.com/XiaomingX/cve-2022-26134-poc | POC Details |
| 75 | Active Exploitation of Atlassian’s Questions for Confluence App CVE-2022-26134 | https://github.com/Khalidhaimur/CVE-2022-26134 | POC Details |
| 76 | cve-2022-26134 atlassia Confluence Data Center2016 server OGNL %[...} | https://github.com/mr-won/cve-2022-26134 | POC Details |
| 77 | Confluence Server and Data Center is susceptible to an unauthenticated remote code execution vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-26134.yaml | POC Details |
| 78 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Confluence%20OGNL%E8%A1%A8%E8%BE%BE%E5%BC%8F%E6%B3%A8%E5%85%A5%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-26134.md | POC Details |
| 79 | https://github.com/vulhub/vulhub/blob/master/confluence/CVE-2022-26134/README.md | POC Details | |
| 80 | cve-2022-26134 atlassia Confluence Data Center2016 server OGNL %[...} | https://github.com/user20252228/cve-2022-26134 | POC Details |
| 81 | None | https://github.com/Gilospy/CVE-2022-26134 | POC Details |
| 82 | cve-2022-26134 atlassia Confluence Data Center2016 server OGNL %[...} | https://github.com/tpdlshdmlrkfmcla/cve-2022-26134 | POC Details |
| 83 | Atlassian's Confluence Server and Data Center editions (Vulnerable Version > 7.18.1) | https://github.com/thetowsif/CVE-2022-26134 | POC Details |
| 84 | CVE-2022-26134 - Confluence Pre-Auth Remote Code Execution [RCE] | https://github.com/Yuri08loveElaina/CVE-2022-26134 | POC Details |
| 85 | None | https://github.com/MAHABUB122003/Atlassian-CVE-2022-26134 | POC Details |
| 86 | CVE-2022-26134 is a Go-based exploitation framework targeting a critical OGNL injection vulnerability in Atlassian Confluence Server/Data Center. | https://github.com/Hghost0x00/CVE-2022-26134-GO | POC Details |
| 87 | Atlassian Confluence RCE Exploitation Framework | https://github.com/Anon2Fear/CVE-2022-26134 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet