ClickCyber / cve-2022-42889
cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10.
☆39Updated 2 years ago
Alternatives and similar repositories for cve-2022-42889:
Users that are interested in cve-2022-42889 are comparing it to the libraries listed below
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆44Updated 2 years ago
- The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment …☆44Updated 2 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Microsoft Exchange password spray tool with proxy support.☆40Updated 3 years ago
- Scanner for CVE-2023-46805 - Ivanti Connect Secure☆10Updated 9 months ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆111Updated 2 years ago
- Exploits targeting vBulletin.☆76Updated 2 years ago
- The purpose of this repo is to share my research