Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator | https://github.com/duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC | POC Details |
| 2 | The vulnerable recurrence docker environment for CVE-2022-44268 | https://github.com/y1nglamore/CVE-2022-44268-ImageMagick-Vulnerable-Docker-Environment | POC Details |
| 3 | Payload generator and extractor for CVE-2022-44268 written in Python. | https://github.com/agathanon/cve-2022-44268 | POC Details |
| 4 | Detect images that likely exploit CVE-2022-44268 | https://github.com/jnschaeffer/cve-2022-44268-detector | POC Details |
| 5 | An information disclosure vulnerability that could be exploited to read arbitrary files from a server when parsing an image in Image Magic. | https://github.com/Ashifcoder/CVE-2022-44268-automated-poc | POC Details |
| 6 | CVE-2022-44268 PoC | https://github.com/Baikuya/CVE-2022-44268-PoC | POC Details |
| 7 | A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read | https://github.com/voidz0r/CVE-2022-44268 | POC Details |
| 8 | ImageMagick LFI PoC [CVE-2022-44268] | https://github.com/Sybil-Scan/imagemagick-lfi-poc | POC Details |
| 9 | Imagemagick CVE-2022-44268 | https://github.com/Vulnmachines/imagemagick-CVE-2022-44268 | POC Details |
| 10 | CVE-2022-44268 ImageMagick Arbitrary File Read - Proof of Concept exploit | https://github.com/kljunowsky/CVE-2022-44268 | POC Details |
| 11 | None | https://github.com/nfm/heroku-CVE-2022-44268-reproduction | POC Details |
| 12 | None | https://github.com/betillogalvanfbc/POC-CVE-2022-44268 | POC Details |
| 13 | Tools for working with ImageMagick to handle arbitrary file read vulnerabilities. Generate, read, and apply profile information to PNG files using a command-line interface. | https://github.com/adhikara13/CVE-2022-44268-MagiLeak | POC Details |
| 14 | Expoit for CVE-2022-44268 | https://github.com/bhavikmalhotra/CVE-2022-44268-Exploit | POC Details |
| 15 | PoC of Imagemagick's Arbitrary File Read | https://github.com/entr0pie/CVE-2022-44268 | POC Details |
| 16 | None | https://github.com/Pog-Frog/cve-2022-44268 | POC Details |
| 17 | Automating Exploitation of CVE-2022-44268 ImageMagick Arbitrary File Read | https://github.com/narekkay/auto-cve-2022-44268.sh | POC Details |
| 18 | ImageMagick Arbitrary Read Files - CVE-2022-44268 | https://github.com/fanbyprinciple/ImageMagick-lfi-poc | POC Details |
| 19 | CVE-2022-44268_By_Kyokito | https://github.com/chairat095/CVE-2022-44268_By_Kyokito | POC Details |
| 20 | A bash script for easyly exploiting ImageMagick Arbitrary File Read Vulnerability CVE-2022-44268 | https://github.com/atici/Exploit-for-ImageMagick-CVE-2022-44268 | POC Details |
| 21 | None | https://github.com/Vagebondcur/IMAGE-MAGICK-CVE-2022-44268 | POC Details |
| 22 | None | https://github.com/NataliSemi/-CVE-2022-44268 | POC Details |
| 23 | None | https://github.com/CygnusX-26/CVE-2022-44268-fixed-PoC | POC Details |
| 24 | None | https://github.com/PanAdamski/CVE-2022-44268-automated | POC Details |
| 25 | ImageMagick 7.1.0-49 vulnerable to Information Disclosure | https://github.com/FlojBoj/CVE-2022-44268 | POC Details |
| 26 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/ImageMagick%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2022-44268.md | POC Details |
| 27 | https://github.com/vulhub/vulhub/blob/master/imagemagick/CVE-2022-44268/README.md | POC Details | |
| 28 | None | https://github.com/katseyres2/CVE-2022-44268-pilgrimage | POC Details |
| 29 | An exploit automation script that builds upon the work of Voidzone security. | https://github.com/J0ey17/Automate_Exploit_CVE-2022-44268 | POC Details |
| 30 | None | https://github.com/jkobierczynski/cve-2022-44268 | POC Details |
| 31 | None | https://github.com/mouftan/CVE-2022-44268 | POC Details |
| 32 | For HTB practice | https://github.com/k-javaman12/CVE-2022-44268- | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-40196 | 7.8 HIGH | Intel(R) oneAPI DPC++/C++ Compiler 安全漏洞 |
| CVE-2022-25853 | 7.4 HIGH | semver-tags 安全漏洞 |
| CVE-2022-25855 | 7.4 HIGH | npm create-choo-app3 安全漏洞 |
| CVE-2022-38136 | 6.7 MEDIUM | Intel(R) oneAPI DPC++/C++ Compiler 代码问题漏洞 |
| CVE-2022-41342 | 6.0 MEDIUM | Intel oneAPI DPC++/C++ Compiler 缓冲区错误漏洞 |
| CVE-2014-125086 | 5.5 MEDIUM | Gimmie Plugin trigger_login.php sql injection |
| CVE-2017-20177 | 3.5 LOW | WangGuard Plugin WGG User List wangguard-user-info.php wangguard_users_info cross site scr |
| CVE-2022-48166 | WAVLINK WL-WN530HG4 安全漏洞 | |
| CVE-2023-25016 | Couchbase Server 安全漏洞 | |
| CVE-2022-48311 | HP Deskjet 2540 跨站脚本漏洞 | |
| CVE-2023-0615 | Linux kernel 输入验证错误漏洞 | |
| CVE-2023-23333 | Contec SolarView Compact 命令注入漏洞 | |
| CVE-2023-24191 | Online Food Ordering System 跨站脚本漏洞 | |
| CVE-2023-24192 | Online Food Ordering System 跨站脚本漏洞 | |
| CVE-2023-24194 | Online Food Ordering System 跨站脚本漏洞 | |
| CVE-2023-24195 | Online Food Ordering System 跨站脚本漏洞 | |
| CVE-2023-24197 | Online Food Ordering System 跨站脚本漏洞 | |
| CVE-2023-24198 | Raffle Draw System SQL注入漏洞 | |
| CVE-2023-24199 | Raffle Draw System SQL注入漏洞 | |
| CVE-2023-24200 | Raffle Draw System SQL注入漏洞 |
Showing top 20 of 41 CVEs. View all on vendor page → →
No comments yet