Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-30190 (Exploit Microsoft) | https://github.com/flux10n/CVE-2022-30190 | POC Details |
| 2 | POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina | https://github.com/JMousqueton/PoC-CVE-2022-30190 | POC Details |
| 3 | CVE-2022-30190 | https://github.com/zkl21hoang/msdt-follina-office-rce | POC Details |
| 4 | CVE-2022-30190 Follina POC | https://github.com/onecloudemoji/CVE-2022-30190 | POC Details |
| 5 | None | https://github.com/2867a0/CVE-2022-30190 | POC Details |
| 6 | Microsoft Office Word Rce 复现(CVE-2022-30190) | https://github.com/doocop/CVE-2022-30190 | POC Details |
| 7 | This Repository Talks about the Follina MSDT from Defender Perspective | https://github.com/archanchoudhury/MSDT_CVE-2022-30190 | POC Details |
| 8 | Aka Follina = benign POC. | https://github.com/rickhenderson/cve-2022-30190 | POC Details |
| 9 | Picking up processes that have triggered ASR related to CVE-2022-30190 | https://github.com/DOV3Y/CVE-2022-30190-ASR-Senintel-Process-Pickup | POC Details |
| 10 | CVE-2022-30190- A Zero-Click RCE Vulnerability In MSDT | https://github.com/kdk2933/msdt-CVE-2022-30190 | POC Details |
| 11 | Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190. | https://github.com/sentinelblue/CVE-2022-30190 | POC Details |
| 12 | None | https://github.com/aymankhder/MSDT_CVE-2022-30190-follina- | POC Details |
| 13 | CVE-2022-30190 remediation via removal of ms-msdt from Windows registry | https://github.com/PaddlingCode/cve-2022-30190 | POC Details |
| 14 | Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go | https://github.com/dwisiswant0/gollina | POC Details |
| 15 | None | https://github.com/hscorpion/CVE-2022-30190 | POC Details |
| 16 | Just another PoC for the new MSDT-Exploit | https://github.com/drgreenthumb93/CVE-2022-30190-follina | POC Details |
| 17 | None | https://github.com/mitespsoc/CVE-2022-30190-POC | POC Details |
| 18 | None | https://github.com/Vaisakhkm2625/MSDT-0-Day-CVE-2022-30190-Poc | POC Details |
| 19 | An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft | https://github.com/rouben/CVE-2022-30190-NSIS | POC Details |
| 20 | Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina) | https://github.com/Cosmo121/Follina-Remediation | POC Details |
| 21 | CVE-2022-30190 or "Follina" 0day proof of concept | https://github.com/rayorole/CVE-2022-30190 | POC Details |
| 22 | Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION. | https://github.com/ImproveCybersecurityJaro/2022_PoC-MSDT-Follina-CVE-2022-30190 | POC Details |
| 23 | MS-MSDT Follina CVE-2022-30190 PoC document generator | https://github.com/sudoaza/CVE-2022-30190 | POC Details |
| 24 | MSDT protocol disabler (CVE-2022-30190 patch tool) | https://github.com/gamingwithevets/msdt-disable | POC Details |
| 25 | A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190) | https://github.com/ErrorNoInternet/FollinaScanner | POC Details |
| 26 | None | https://github.com/ITMarcin2211/CVE-2022-30190 | POC Details |
| 27 | Mitigates the "Folina"-ZeroDay (CVE-2022-30190) | https://github.com/derco0n/mitigate-folina | POC Details |
| 28 | CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。 | https://github.com/komomon/CVE-2022-30190-follina-Office-MSDT-Fixed | POC Details |
| 29 | None | https://github.com/gyaansastra/CVE-2022-30190 | POC Details |
| 30 | None | https://github.com/swaiist/CVE-2022-30190-Fix | POC Details |
| 31 | The CVE-2022-30190-follina Workarounds Patch | https://github.com/suenerve/CVE-2022-30190-Follina-Patch | POC Details |
| 32 | PDQ Package I created for CVE-2022-30190 | https://github.com/castlesmadeofsand/ms-msdt-vulnerability-pdq-package | POC Details |
| 33 | Simple Follina poc exploit | https://github.com/WesyHub/CVE-2022-30190---Follina---Poc-Exploit | POC Details |
| 34 | CVE-2022-30190 | MS-MSDT Follina One Click | https://github.com/AchocolatechipPancake/MS-MSDT-Office-RCE-Follina | POC Details |
| 35 | A very simple MSDT "Follina" exploit **patched** | https://github.com/arozx/CVE-2022-30190 | POC Details |
| 36 | All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence. | https://github.com/Noxtal/follina | POC Details |
| 37 | This is to patch CVE-2022-30190. Use at your own risk. | https://github.com/droidrzrlover/CVE-2022-30190 | POC Details |
| 38 | Powershell script to mitigate cve-2022-30190 | https://github.com/hilt86/cve-2022-30190-mitigate | POC Details |
| 39 | Follina POC by John Hammond | https://github.com/SrikeshMaharaj/CVE-2022-30190 | POC Details |
| 40 | None | https://github.com/DerZiad/CVE-2022-30190 | POC Details |
| 41 | None | https://github.com/tej7gandhi/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt | POC Details |
| 42 | None | https://github.com/ItsNee/Follina-CVE-2022-30190-POC | POC Details |
| 43 | Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector | https://github.com/IamVSM/msdt-follina | POC Details |
| 44 | Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse | https://github.com/Rojacur/FollinaPatcherCLI | POC Details |
| 45 | Microsoft Support Diagnostic Tool (CVE-2022-30190) | https://github.com/joshuavanderpoll/CVE-2022-30190 | POC Details |
| 46 | Notes related to CVE-2022-30190 | https://github.com/abhirules27/Follina | POC Details |
| 47 | Server to host/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190) | https://github.com/dsibilio/follina-spring | POC Details |
| 48 | Proof of Concept of CVE-2022-30190 | https://github.com/Malwareman007/Deathnote | POC Details |
| 49 | None | https://github.com/sentrium-security/Follina-Workaround-CVE-2022-30190 | POC Details |
| 50 | Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190) | https://github.com/Hrishikesh7665/Follina_Exploiter_CLI | POC Details |
| 51 | Repository containing the compromised certificate seen in recent CVE-2022-30190 (Follina) attacks. | https://github.com/b401/Clickstudio-compromised-certificate | POC Details |
| 52 | Mitigation for CVE-2022-30190 | https://github.com/k508/CVE-2022-30190 | POC Details |
| 53 | proof of concept to CVE-2022-30190 (follina) | https://github.com/amitniz/follina_cve_2022-30190 | POC Details |
| 54 | this is my simple article about CVE 2022-30190 (Follina) analysis. I use the lab from Letsdefend. | https://github.com/Abdibimantara/CVE-2022-30190-Analysis-With-LetsDefends-Lab | POC Details |
| 55 | These are two Python scripts compiled to easily and quickly apply temporary protection against the CVE-2022-30190 vulnerability (Follina) | https://github.com/SrCroqueta/CVE-2022-30190_Temporary_Fix | POC Details |
| 56 | These are the source codes of the Python scripts to apply the temporary protection against the CVE-2022-30190 vulnerability (Follina) | https://github.com/SrCroqueta/CVE-2022-30190_Temporary_Fix_Source_Code | POC Details |
| 57 | An Unofficial Patch Follina CVE-2022-30190 (patch) by micrisoft Guidelines. | https://github.com/SonicWave21/Follina-CVE-2022-30190-Unofficial-patch | POC Details |
| 58 | CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina | https://github.com/nanaao/PicusSecurity4.Week.Repo | POC Details |
| 59 | Python file scanner created in 2021 scanning for known and potential vulns | https://github.com/XxToxicScriptxX/CVE-2022-30190 | POC Details |
| 60 | None | https://github.com/ernestak/CVE-2022-30190 | POC Details |
| 61 | None | https://github.com/ernestak/Sigma-Rule-for-CVE-2022-30190 | POC Details |
| 62 | Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files | https://github.com/MalwareTech/FollinaExtractor | POC Details |
| 63 | None | https://github.com/notherealhazard/follina-CVE-2022-30190 | POC Details |
| 64 | follina zero day vulnerability to help Microsoft to mitigate the attack | https://github.com/Cerebrovinny/follina-CVE-2022-30190 | POC Details |
| 65 | Educational Follina PoC Tool | https://github.com/ethicalblue/Follina-CVE-2022-30190-Sample | POC Details |
| 66 | Follina (CVE-2022-30190) proof-of-concept | https://github.com/Lucaskrell/go_follina | POC Details |
| 67 | This is exploit of CVE-2022-30190 on PowerPoint. | https://github.com/Gra3s/CVE-2022-30190_EXP_PowerPoint | POC Details |
| 68 | Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190) | https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190- | POC Details |
| 69 | A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defense. | https://github.com/jeffreybxu/five-nights-at-follina-s | POC Details |
| 70 | A proof of concept for CVE-2022-30190 (Follina). | https://github.com/winstxnhdw/CVE-2022-30190 | POC Details |
| 71 | this is a demo attack of FOLLINA exploit , a vulnerability that has been discovered in May 2022 and stood unpatched until June 2022 | https://github.com/Imeneallouche/Follina-attack-CVE-2022-30190- | POC Details |
| 72 | Implementation of CVE-2022-30190 in C | https://github.com/mattjmillner/CVE-Smackdown | POC Details |
| 73 | A Command Line based python tool for exploit Zero-Day vulnerability in MSDT (Microsoft Support Diagnostic Tool) also know as 'Follina' CVE-2022-30190. | https://github.com/0xAbbarhSF/FollinaXploit | POC Details |
| 74 | None | https://github.com/michealadams30/Cve-2022-30190 | POC Details |
| 75 | CVE-2022-30190(follina) | https://github.com/melting0256/Enterprise-Cybersecurity | POC Details |
| 76 | None | https://github.com/yrkuo/CVE-2022-30190 | POC Details |
| 77 | Implementation of FOLLINA-CVE-2022-30190 | https://github.com/ToxicEnvelope/FOLLINA-CVE-2022-30190 | POC Details |
| 78 | An exploitation of CVE-2022-30190 (Follina) | https://github.com/meowhua15/CVE-2022-30190 | POC Details |
| 79 | Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hackers can leverage for remote code execution (RCE) attacks. | https://github.com/aminetitrofine/CVE-2022-30190 | POC Details |
| 80 | None | https://github.com/Muhammad-Ali007/Follina_MSDT_CVE-2022-30190 | POC Details |
| 81 | An automated attack chain based on CVE-2022-30190, 163 email backdoor, and image steganography. | https://github.com/Jump-Wang-111/AmzWord | POC Details |
| 82 | A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190) | https://github.com/shri142/ZipScan | POC Details |
| 83 | CVE-2022-30190 | MS-MSDT Follina One Click | https://github.com/0xflagplz/MS-MSDT-Office-RCE-Follina | POC Details |
| 84 | The script is from https://github.com/JohnHammond/msdt-follina, just make it simple for me to use it and this script aim at generating the payload for more information refer the johnn hammond link | https://github.com/alien-keric/CVE-2022-30190 | POC Details |
| 85 | For learning purpose did a complete analysis on CVE-2022-30190 "Follina" POC | https://github.com/skitkat/CVE-2022-30190-POC | POC Details |
| 86 | Educational Follina PoC Tool | https://github.com/Captain404/Follina-CVE-2022-30190-PoC-sample | POC Details |
| 87 | An exploitation of CVE-2022-30190 (Follina) | https://github.com/hycheng15/CVE-2022-30190 | POC Details |
| 88 | CVE-2022-30190 Proof-Of-Concept | https://github.com/madbaiu/CVE-2022-30190 | POC Details |
| 89 | Follina (CVE-2022-30190) proof-of-concept | https://github.com/Zitchev/go_follina | POC Details |
| 90 | Educational Follina PoC Tool | https://github.com/Nyx2022/Follina-CVE-2022-30190-Sample | POC Details |
| 91 | PoC of CVE-2022-30190 | https://github.com/Potato-9257/CVE-2022-30190_page | POC Details |
| 92 | Project on CVE-2022-30190 exploitation and mitigation strategies | https://github.com/yeep1115/ICT287_CVE-2022-30190_Exploit | POC Details |
| 93 | CVE-2022-30190 | https://github.com/0x7a6b4c/msdt-follina-office-rce | POC Details |
| 94 | These are two Python scripts compiled to easily and quickly apply temporary protection against the CVE-2022-30190 vulnerability (Follina) | https://github.com/JotaQC/CVE-2022-30190_Temporary_Fix | POC Details |
| 95 | These are the source codes of the Python scripts to apply the temporary protection against the CVE-2022-30190 vulnerability (Follina) | https://github.com/JotaQC/CVE-2022-30190_Temporary_Fix_Source_Code | POC Details |
| 96 | Project Repository for Exploitation, Detection and Mitigation of Folina Vulnerability (CVE-2022-30190) | https://github.com/RathoreAbhiii/Folina-Vulnerability-Exploitation-Detection-and-Mitigation | POC Details |
| 97 | Mitigation for CVE-2022-30190 | https://github.com/cyberdashy/CVE-2022-30190 | POC Details |
| 98 | A Command Line based python tool for exploit Zero-Day vulnerability in MSDT (Microsoft Support Diagnostic Tool) also know as 'Follina' CVE-2022-30190. | https://github.com/ar2o3/FollinaXploit | POC Details |
| 99 | Exploration of the Follina (CVE-2022-30190) Microsoft Office vulnerability, including a detailed analysis, proof-of-concept exploitation in a controlled lab, and mitigation strategies. For educational and research purposes only. | https://github.com/seinab-ibrahim/Follina-Vulnerability-CVE-2022-30190-Exploit-Analysis | POC Details |
| 100 | We are presented with a security alert indicating the detection of the Follina (CVE-2022-30190) vulnerability. A malicious Word document triggered msdt.exe execution, suggesting possible remote code execution on the host JonasPRD. Our task is to investigate the alert, confirm exploitation, assess impact, and recommend remediation. | https://github.com/Arkha-Corvus/LetsDefend-SOC173-Follina-0-Day-Detected | POC Details |
| 101 | The script is from https://github.com/JohnHammond/msdt-follina, just make it simple for me to use it and this script aim at generating the payload for more information refer the johnn hammond link | https://github.com/alienkeric/CVE-2022-30190 | POC Details |
| 102 | None | https://github.com/nimesh895/Malware-Analysis-Follina-CVE-2022-30190 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-30127 | 8.3 HIGH | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability |
| CVE-2022-30128 | 8.3 HIGH | Microsoft Edge (Chromium-based) Elevation of Privilege Vulnerability |
| CVE-2022-26905 | 4.3 MEDIUM | Microsoft Edge (Chromium-based) Spoofing Vulnerability |
No comments yet