Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | pdfkit | 0.0.0 ~ unspecified | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A Shell exploit for CVE-2022-25765 | https://github.com/Atsukoro1/PDFKitExploit | POC Details |
| 2 | pdfkit <0.8.6 command injection shell. The package pdfkit from 0.0.0 are vulnerable to Command Injection where the URL is not properly sanitized. (Tested on ver 0.8.6) - CVE-2022-25765 | https://github.com/PurpleWaveIO/CVE-2022-25765-pdfkit-Exploit-Reverse-Shell | POC Details |
| 3 | PoC for Blind RCE for CVE-2022-25765 (Tested in HTB - Precious Machine) | https://github.com/LordRNA/CVE-2022-25765 | POC Details |
| 4 | CVE-2022-25765 pdfkit <0.8.6 command injection. | https://github.com/shamo0/PDFkit-CMD-Injection | POC Details |
| 5 | Exploit for CVE-2022-25765 command injection in pdfkit < 0.8.6 | https://github.com/nikn0laty/PDFkit-CMD-Injection-CVE-2022-25765 | POC Details |
| 6 | Exploit for CVE-2022–25765 (pdfkit) - Command Injection | https://github.com/UNICORDev/exploit-CVE-2022-25765 | POC Details |
| 7 | CVE-2022-25765 pdfkit 0.8.6 command injection. | https://github.com/lekosbelas/PDFkit-CMD-Injection | POC Details |
| 8 | Exploit for CVE-2022-25765 | https://github.com/lowercasenumbers/CVE-2022-25765 | POC Details |
| 9 | A Shell exploit for CVE-2022-25765 | https://github.com/Wai-Yan-Kyaw/PDFKitExploit | POC Details |
| 10 | None | https://github.com/lst15/pdfkit-cve-2022-25765 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet