Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | The poc for CVE-2022-26809 RCE via RPC will be updated here. | https://github.com/sherlocksecurity/Microsoft-CVE-2022-26809-The-Little-Boy | POC Details |
| 2 | Remote Code Execution Exploit in the RPC Library | https://github.com/websecnl/CVE-2022-26809 | POC Details |
| 3 | None | https://github.com/auduongxuan/CVE-2022-26809 | POC Details |
| 4 | Detects attempts and successful exploitation of CVE-2022-26809 | https://github.com/corelight/cve-2022-26809 | POC Details |
| 5 | This repository contains a PoC for remote code execution CVE-2022-26809 | https://github.com/UNDESC0N0CID0/CVE-2022-26809-RCE | POC Details |
| 6 | CVE-2022-26809-RCE | https://github.com/oppongjohn/CVE-2022-26809-RCE | POC Details |
| 7 | None | https://github.com/yuanLink/CVE-2022-26809 | POC Details |
| 8 | PoC for CVE-2022-26809, analisys and considerations are shown in the github.io. | https://github.com/s1ckb017/PoC-CVE-2022-26809 | POC Details |
| 9 | 警惕 一种针对红队的新型溯源手段! | https://github.com/fuckjsonp/FuckJsonp-RCE-CVE-2022-26809-SQL-XSS-FuckJsonp | POC Details |
| 10 | None | https://github.com/michealadams30/Cve-2022-26809 | POC Details |
| 11 | This repository contains a PoC for remote code execution CVE-2022-26809 | https://github.com/quijadajose/CVE-2022-26809-RCE | POC Details |
| 12 | This repository contains a PoC for remote code execution CVE-2022-26809 | https://github.com/Lay0us/CVE-2022-26809-RCE | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-24497 | 9.8 CRITICAL | Windows Network File System Remote Code Execution Vulnerability |
| CVE-2022-24491 | 9.8 CRITICAL | Windows Network File System Remote Code Execution Vulnerability |
| CVE-2022-24492 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2022-24541 | 8.8 HIGH | Windows Server Service Remote Code Execution Vulnerability |
| CVE-2022-24528 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2022-24500 | 8.8 HIGH | Windows SMB Remote Code Execution Vulnerability |
| CVE-2022-24487 | 8.8 HIGH | Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerabi |
| CVE-2022-23259 | 8.8 HIGH | Microsoft Dynamics 365 On-Premises Remote Code Execution Vulnerability |
| CVE-2022-23257 | 8.8 HIGH | Windows Hyper-V Remote Code Execution Vulnerability |
| CVE-2022-26919 | 8.1 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-24490 | 8.1 HIGH | Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability |
| CVE-2022-24545 | 8.1 HIGH | Windows Kerberos Remote Code Execution Vulnerability |
| CVE-2022-24539 | 8.1 HIGH | Windows Hyper-V Shared Virtual Hard Disks Information Disclosure Vulnerability |
| CVE-2022-24472 | 8.0 HIGH | Microsoft SharePoint Server Spoofing Vulnerability |
| CVE-2022-24533 | 8.0 HIGH | Remote Desktop Protocol Remote Code Execution Vulnerability |
| CVE-2022-26790 | 7.8 HIGH | Windows Print Spooler Elevation of Privilege Vulnerability |
| CVE-2022-26788 | 7.8 HIGH | PowerShell Elevation of Privilege Vulnerability |
| CVE-2022-24543 | 7.8 HIGH | Windows Upgrade Assistant Remote Code Execution Vulnerability |
| CVE-2022-26789 | 7.8 HIGH | Windows Print Spooler Elevation of Privilege Vulnerability |
| CVE-2022-26791 | 7.8 HIGH | Windows Print Spooler Elevation of Privilege Vulnerability |
Showing top 20 of 117 CVEs. View all on vendor page → →
No comments yet