Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| sqlpad | sqlpad/sqlpad | unspecified ~ 6.10.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A proof of concept exploit for SQLPad RCE (CVE-2022-0944). | https://github.com/shhrew/CVE-2022-0944 | POC Details |
| 2 | PoC code written for CVE-2022-0944 to make exploitation easier. Based on information found here: https://huntr.com/bounties/46630727-d923-4444-a421-537ecd63e7fb | https://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation | POC Details |
| 3 | SQLPad - Template injection | https://github.com/FlojBoj/CVE-2022-0944 | POC Details |
| 4 | None | https://github.com/0xRoqeeb/sqlpad-rce-exploit-CVE-2022-0944 | POC Details |
| 5 | None | https://github.com/Robocopsita/CVE-2022-0944_RCE_POC | POC Details |
| 6 | PoC for RCE in SQLPad (CVE-2022-0944) | https://github.com/toneillcodes/poc-cve-2022-0944 | POC Details |
| 7 | PoC for RCE in SQLPad (CVE-2022-0944) | https://github.com/toneillcodes/CVE-2022-0944 | POC Details |
| 8 | CVE-2022-0944 Remote Code Execution Exploit | https://github.com/LipeOzyy/SQLPad-RCE-Exploit-CVE-2022-0944 | POC Details |
| 9 | Refurbish | https://github.com/TanveerS1ngh/SQLPad-6.10.0-Exploit-CVE-2022-0944 | POC Details |
| 10 | Refurbish | https://github.com/0xDTC/SQLPad-6.10.0-Exploit-CVE-2022-0944 | POC Details |
| 11 | None | https://github.com/Artemisxxx37/OverlayFS-PrivEsc-CVE-2022-0944 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet