Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | WSO2 RCE (CVE-2022-29464) exploit and writeup. | https://github.com/hakivvi/CVE-2022-29464 | POC Details |
| 2 | None | https://github.com/tufanturhan/wso2-rce-cve-2022-29464 | POC Details |
| 3 | Pre-auth RCE bug CVE-2022-29464 | https://github.com/mr-r3bot/WSO2-CVE-2022-29464 | POC Details |
| 4 | cve-2022-29464 批量脚本 | https://github.com/Lidong-io/cve-2022-29464 | POC Details |
| 5 | WSO2 RCE (CVE-2022-29464) | https://github.com/h3v0x/CVE-2022-29464 | POC Details |
| 6 | Repository containing nse script for vulnerability CVE-2022-29464 known as WSO2 RCE. | https://github.com/gpiechnik2/nmap-CVE-2022-29464 | POC Details |
| 7 | None | https://github.com/0xAgun/CVE-2022-29464 | POC Details |
| 8 | 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464. | https://github.com/oppsec/WSOB | POC Details |
| 9 | None | https://github.com/crypticdante/CVE-2022-29464 | POC Details |
| 10 | None | https://github.com/lowkey0808/cve-2022-29464 | POC Details |
| 11 | CVE-2022-29464 POC exploit | https://github.com/superzerosec/CVE-2022-29464 | POC Details |
| 12 | 1 | https://github.com/axin2019/CVE-2022-29464 | POC Details |
| 13 | cve-2022-29464 EXP | https://github.com/LinJacck/CVE-2022-29464 | POC Details |
| 14 | A bots loader for CVE-2022-29464 with multithreading | https://github.com/Inplex-sys/CVE-2022-29464-loader | POC Details |
| 15 | Python script to exploit CVE-2022-29464 (mass mode) | https://github.com/Chocapikk/CVE-2022-29464 | POC Details |
| 16 | CVE-2022-29464 PoC for WSO2 products | https://github.com/jimidk/Better-CVE-2022-29464 | POC Details |
| 17 | Mass Exploit for CVE 2022-29464 on Carbon | https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464 | POC Details |
| 18 | Python script to exploit CVE-2022-29464 (mass mode) | https://github.com/xinghonghaoyue/CVE-2022-29464 | POC Details |
| 19 | CVE-2022-29464 Exploit | https://github.com/Pasch0/WSO2RCE | POC Details |
| 20 | None | https://github.com/r4x0r1337/-CVE-2022-29464 | POC Details |
| 21 | None | https://github.com/amit-pathak009/CVE-2022-29464 | POC Details |
| 22 | None | https://github.com/amit-pathak009/CVE-2022-29464-mass | POC Details |
| 23 | WSO2 Arbitrary File Upload to Remote Command Execution (RCE) | https://github.com/hupe1980/CVE-2022-29464 | POC Details |
| 24 | RCE exploit for WSO2 | https://github.com/gbrsh/CVE-2022-29464 | POC Details |
| 25 | None | https://github.com/Jhonsonwannaa/CVE-2022-29464- | POC Details |
| 26 | None | https://github.com/devengpk/CVE-2022-29464 | POC Details |
| 27 | Perform With Mass Exploits In WSO Management. | https://github.com/ThatNotEasy/CVE-2022-29464 | POC Details |
| 28 | A PoC and Exploit for CVE 2022-29464 | https://github.com/Pushkarup/CVE-2022-29464 | POC Details |
| 29 | SynixCyberCrimeMY CVE Exploiter By SamuraiMelayu1337 & ?/h4zzzzzz.scc | https://github.com/SynixCyberCrimeMy/CVE-2022-29464 | POC Details |
| 30 | WSO2 RCE (CVE-2022-29464) | https://github.com/hev0x/CVE-2022-29464 | POC Details |
| 31 | None | https://github.com/H3xL00m/CVE-2022-29464 | POC Details |
| 32 | None | https://github.com/n3ov4n1sh/CVE-2022-29464 | POC Details |
| 33 | None | https://github.com/c0d3cr4f73r/CVE-2022-29464 | POC Details |
| 34 | CVE-2022-29464 exploit script | https://github.com/cc3305/CVE-2022-29464 | POC Details |
| 35 | None | https://github.com/Sp3c73rSh4d0w/CVE-2022-29464 | POC Details |
| 36 | None | https://github.com/0xwh1pl4sh/CVE-2022-29464 | POC Details |
| 37 | None | https://github.com/N3rdyN3xus/CVE-2022-29464 | POC Details |
| 38 | None | https://github.com/NyxByt3/CVE-2022-29464 | POC Details |
| 39 | None | https://github.com/h3xcr4ck3r/CVE-2022-29464 | POC Details |
| 40 | None | https://github.com/mpvx/CVE-2022-29464 | POC Details |
| 41 | None | https://github.com/n3rdh4x0r/CVE-2022-29464 | POC Details |
| 42 | Python script to exploit CVE-2022-29464 (mass mode) | https://github.com/g0dxing/CVE-2022-29464 | POC Details |
| 43 | None | https://github.com/c1ph3rbyt3/CVE-2022-29464 | POC Details |
| 44 | Mass Exploit for CVE 2022-29464 on Carbon | https://github.com/hxlxmj/Mass-exploit-CVE-2022-29464 | POC Details |
| 45 | 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464. | https://github.com/000pp/WSOB | POC Details |
| 46 | Certain WSO2 products allow unrestricted file upload with resultant remote code execution. This affects WSO2 API Manager 2.2.0 and above through 4.0.0; WSO2 Identity Server 5.2.0 and above through 5.11.0; WSO2 Identity Server Analytics 5.4.0, 5.4.1, 5.5.0, and 5.6.0; WSO2 Identity Server as Key Manager 5.3.0 and above through 5.10.0; and WSO2 Enterprise Integrator 6.2.0 and above through 6.6.0. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-29464.yaml | POC Details |
| 47 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/WSO2%20fileupload%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%20CVE-2022-29464.md | POC Details |
| 48 | None | https://github.com/h3x0v3rl0rd/CVE-2022-29464 | POC Details |
| 49 | A bots loader for CVE-2022-29464 with multithreading | https://github.com/SystemVll/CVE-2022-29464-loader | POC Details |
| 50 | 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464. | https://github.com/0xdsm/WSOB | POC Details |
| 51 | A bots loader for CVE-2022-29464 with multithreading | https://github.com/SystemVll/CVE-2022-29464 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet