Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services | https://github.com/r1skkam/TryHackMe-CVE-2022-26923 | POC Details |
| 2 | The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed. | https://github.com/LudovicPatho/CVE-2022-26923_AD-Certificate-Services | POC Details |
| 3 | A powershell poc to load and automatically run Certify and Rubeus from memory. | https://github.com/lsecqt/CVE-2022-26923-Powershell-POC | POC Details |
| 4 | 检测域内常见一把梭漏洞,包括:NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare | https://github.com/evilashz/PIGADVulnScanner | POC Details |
| 5 | A proof of concept exploiting CVE-2022-26923. | https://github.com/Gh-Badr/CVE-2022-26923 | POC Details |
| 6 | None | https://github.com/Yowise/CVE-2022-26923 | POC Details |
| 7 | Exploitation for CVE-2022-26923 | https://github.com/rayngnpc/CVE-2022-26923-rayng | POC Details |
| 8 | Exploitation de CVE-2022-26923 | https://github.com/Eliasdekiniweek/CVE-2022-26923 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-26937 | 9.8 CRITICAL | Windows Network File System Remote Code Execution Vulnerability |
| CVE-2022-22012 | 9.8 CRITICAL | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-29130 | 9.8 CRITICAL | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-29108 | 8.8 HIGH | Microsoft SharePoint Server Remote Code Execution Vulnerability |
| CVE-2022-22019 | 8.8 HIGH | Remote Procedure Call Runtime Remote Code Execution Vulnerability |
| CVE-2022-29139 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-22017 | 8.8 HIGH | Remote Desktop Client Remote Code Execution Vulnerability |
| CVE-2022-22014 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-22013 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-30129 | 8.8 HIGH | Visual Studio Code Remote Code Execution Vulnerability |
| CVE-2022-29141 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-26927 | 8.8 HIGH | Windows Graphics Component Remote Code Execution Vulnerability |
| CVE-2022-29133 | 8.8 HIGH | Windows Kernel Elevation of Privilege Vulnerability |
| CVE-2022-29131 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-29129 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-29128 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-29137 | 8.8 HIGH | Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability |
| CVE-2022-21978 | 8.2 HIGH | Microsoft Exchange Server Elevation of Privilege Vulnerability |
| CVE-2022-26932 | 8.2 HIGH | Storage Spaces Direct Elevation of Privilege Vulnerability |
| CVE-2022-21972 | 8.1 HIGH | Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability |
Showing top 20 of 73 CVEs. View all on vendor page → →
No comments yet