尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| sqlpad | sqlpad/sqlpad | unspecified ~ 6.10.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | A proof of concept exploit for SQLPad RCE (CVE-2022-0944). | https://github.com/shhrew/CVE-2022-0944 | POC详情 |
| 2 | PoC code written for CVE-2022-0944 to make exploitation easier. Based on information found here: https://huntr.com/bounties/46630727-d923-4444-a421-537ecd63e7fb | https://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation | POC详情 |
| 3 | SQLPad - Template injection | https://github.com/FlojBoj/CVE-2022-0944 | POC详情 |
| 4 | None | https://github.com/0xRoqeeb/sqlpad-rce-exploit-CVE-2022-0944 | POC详情 |
| 5 | None | https://github.com/Robocopsita/CVE-2022-0944_RCE_POC | POC详情 |
| 6 | PoC for RCE in SQLPad (CVE-2022-0944) | https://github.com/toneillcodes/poc-cve-2022-0944 | POC详情 |
| 7 | PoC for RCE in SQLPad (CVE-2022-0944) | https://github.com/toneillcodes/CVE-2022-0944 | POC详情 |
| 8 | CVE-2022-0944 Remote Code Execution Exploit | https://github.com/LipeOzyy/SQLPad-RCE-Exploit-CVE-2022-0944 | POC详情 |
| 9 | Refurbish | https://github.com/TanveerS1ngh/SQLPad-6.10.0-Exploit-CVE-2022-0944 | POC详情 |
| 10 | Refurbish | https://github.com/0xDTC/SQLPad-6.10.0-Exploit-CVE-2022-0944 | POC详情 |
| 11 | None | https://github.com/Artemisxxx37/OverlayFS-PrivEsc-CVE-2022-0944 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论