描述:Proof of Concept for CVE-2022-42889
链接:https://github.com/SeanWrightSec/CVE-2022-42889-PoC
描述:Fortinet Critical Authentication Bypass Vulnerability (CVE-2022-40684) [ Mass Exploit ]
链接:https://github.com/Chocapikk/CVE-2022-40684
描述:POC for CVE-2022-33980 (Apache Commons Configuration RCE vulnerability)
链接:https://github.com/sammwyy/CVE-2022-33980-POC
描述:Vulnerability Disclosure Timeline Closer inspection of the Exploit JPG content reveals the malicious link as well as the URL Download and Execute of the tool used to generate the Exploit JPG from Python encrypted code content which we also implement in couple of our builders.Silent JPG Exploit There are multiple Exploit JPG in Silent JPG Exploit, a package commonly used by web services to process Exploit JPG File. One of the vulnerabilities can lead to remote code execution (RCE) if you process user submitted JPG. The exploit for this vulnerability is being used in the wild.Why Are You Disclosing A Exploit JPG
链接:https://github.com/MSD-Gaming/Jpg-Png-Exploit-Downloader-Fud-Cryter-Malware-Builder-Cve-2022
描述:Mass exploitation tool for CVE-2022-42889 (Apache Commons Text RCE) supports list of ips
链接:https://github.com/pr0n3d/CVE-2022-42889-MASS-RCE
描述:This repository contains potential security patches for the Magento APSB22-48 and CVE-2022-35698 security vulnerability
链接:https://github.com/EmicoEcommerce/Magento-APSB22-48-Security-Patches
描述:None
链接:https://github.com/jessica0f0116/cve_2022_21882-cve_2021_1732
描述:None
链接:https://github.com/jessica0f0116/cve_2022_21882-cve_2021_1732
描述:Exploit of RealVNC VNC Server
链接:https://github.com/alirezac0/CVE-2022-27502
描述:An intentionally vulnerable webapp to get your hands dirty with CVE-2022-42889.
链接:https://github.com/tulhan/commons-text-goat
描述:None
链接:https://github.com/Wh04m1001/CVE-2022-3368