Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Get root on macOS 13.0.1 with CVE-2022-46689 (macOS equivalent of the Dirty Cow bug), using the testcase extracted from Apple's XNU source. | https://github.com/zhuowei/MacDirtyCowDemo | POC Details |
| 2 | CVE-2022-46689 | https://github.com/straight-tamago/NoCameraSound | POC Details |
| 3 | Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. | https://github.com/ginsudev/WDBFontOverwrite | POC Details |
| 4 | File Manager for CVE-2022-46689 | https://github.com/mineek/FileManager | POC Details |
| 5 | CVE-2022-46689 | https://github.com/straight-tamago/NoHomeBar | POC Details |
| 6 | CVE-2022-46689 | https://github.com/straight-tamago/DockTransparent | POC Details |
| 7 | poc of CVE-2022-46689 written purely in swift | https://github.com/staturnzz/sw1tch | POC Details |
| 8 | CVE-2022-46689 | https://github.com/straight-tamago/FileSwitcherX | POC Details |
| 9 | iOS customization app powered by CVE-2022-46689 | https://github.com/BomberFish/Mandela-Legacy | POC Details |
| 10 | Simple iOS bootlooper using CVE-2022-46689. | https://github.com/BomberFish/JailedCement | POC Details |
| 11 | iOS customization app powered by CVE-2022-46689. No jailbreak required. | https://github.com/BomberFish/Mandela-Classic | POC Details |
| 12 | Example of CVE-2022-46689 aka MacDirtyCow. | https://github.com/enty8080/MacDirtyCow | POC Details |
| 13 | I do some tweaking for iOS from 16.0 to 16.1.2 based on MacDirtyCow (CVE-2022-46689) exploit. | https://github.com/tdquang266/MDC | POC Details |
| 14 | poc of CVE-2022-46689 written purely in swift | https://github.com/69camau/sw1tch | POC Details |
| 15 | CVE-2022-46689 POC | https://github.com/ahkecha/McDirty | POC Details |
| 16 | Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. | https://github.com/Code2Crusader/46689 | POC Details |
| 17 | Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. | https://github.com/daviszhto/overwrite | POC Details |
| 18 | Proof-of-concept app to overwrite fonts on iOS using CVE-2022-46689. | https://github.com/LumberjackStorys/CVE | POC Details |
| 19 | iOS customization app powered by CVE-2022-46689 | https://github.com/bomberfish/Mandela-Legacy | POC Details |
| 20 | Simple iOS bootlooper using CVE-2022-46689. | https://github.com/bomberfish/JailedCement | POC Details |
| 21 | iOS customization app powered by CVE-2022-46689. No jailbreak required. | https://github.com/bomberfish/Mandela-Classic | POC Details |
| 22 | Simple iOS bootlooper using CVE-2022-46689. Desguised as onlyfans | https://github.com/iswaxan/JailedCement | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-42867 | Apple iOS 和 macOS 资源管理错误漏洞 | |
| CVE-2022-46692 | Apple iOS 和 macOS 安全漏洞 | |
| CVE-2022-46694 | Apple iOS 和 macOS 缓冲区错误漏洞 | |
| CVE-2022-46698 | Apple iOS 和 macOS安全漏洞 | |
| CVE-2022-46699 | Apple iOS 缓冲区错误漏洞 | |
| CVE-2022-46700 | Apple iOS 和 macOS 缓冲区错误漏洞 | |
| CVE-2022-46701 | Apple iOS 输入验证错误漏洞 | |
| CVE-2022-46702 | Apple iOS和macOS 安全漏洞 | |
| CVE-2022-46697 | Apple iOS 和 macOS 缓冲区错误漏洞 | |
| CVE-2022-46690 | Apple iOS 和 macOS 缓冲区错误漏洞 | |
| CVE-2022-46691 | Apple iOS 和 macOS 缓冲区错误漏洞 | |
| CVE-2022-42866 | Apple iOS 安全漏洞 | |
| CVE-2022-42865 | Apple iOS 安全漏洞 | |
| CVE-2022-42864 | Apple iOS 竞争条件问题漏洞 | |
| CVE-2022-42863 | Apple iOS 缓冲区错误漏洞 | |
| CVE-2022-42862 | Apple iOS 安全漏洞 | |
| CVE-2022-42861 | Apple iOS 安全漏洞 | |
| CVE-2022-42859 | Apple iOS 和 macOS安全漏洞 | |
| CVE-2022-42856 | Apple iOS 安全漏洞 | |
| CVE-2022-42855 | Apple iOS 和 macOS安全漏洞 |
Showing top 20 of 49 CVEs. View all on vendor page → →
No comments yet