j00sean / CVE-2022-44666View external linksLinks
Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute escape, which was not fully fixed as CVE-2022-44666 in the patches released on December, 2022.
☆155Jun 18, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2022-44666
Users that are interested in CVE-2022-44666 are comparing it to the libraries listed below
Sorting:
- LPE exploit for CVE-2023-21768☆506Jul 10, 2023Updated 2 years ago
- ☆322Jan 13, 2023Updated 3 years ago
- ☆347Mar 17, 2023Updated 2 years ago
- CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC☆119Jan 9, 2023Updated 3 years ago
- ☆705Nov 7, 2023Updated 2 years ago
- Windows LPE exploit for CVE-2022-37969☆136Jul 11, 2023Updated 2 years ago
- Repository contains psexec, which will help to exploit the forgotten pipe☆171Nov 5, 2024Updated last year
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 до Server 2019☆69May 5, 2023Updated 2 years ago
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆202Sep 13, 2023Updated 2 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated 11 months ago
- ☆16Mar 26, 2024Updated last year
- ☆95Feb 9, 2023Updated 3 years ago
- POC for CVE-2022-39952☆266Feb 25, 2023Updated 2 years ago
- CVE-2023-21554 Windows MessageQueuing PoC,分析见 https://www.zoemurmure.top/posts/cve_2023_21554/☆57May 18, 2023Updated 2 years ago
- Exploit for CVE-2023-27532 against Veeam Backup & Replication☆115Mar 23, 2023Updated 2 years ago
- ☆161Jun 18, 2023Updated 2 years ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆283Dec 5, 2023Updated 2 years ago
- A CobaltStrike toolkit to write files produced by Beacon to memory instead of disk☆474Jul 6, 2024Updated last year
- POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon☆105Mar 14, 2023Updated 2 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Jun 16, 2022Updated 3 years ago
- RCE exploit for CVE-2023-3519☆229Aug 23, 2023Updated 2 years ago
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Weaponizing to get NT SYSTEM for Privileged Directory Creation Bugs with Windows Error Reporting☆363Dec 19, 2022Updated 3 years ago
- Chrome Android and Windows 0day RCE+SBX.. DPRK☆154Jun 30, 2022Updated 3 years ago
- ☆241Feb 26, 2023Updated 2 years ago
- CVE-2023-0386在ubuntu22.04上的提权☆412Jun 13, 2023Updated 2 years ago
- ☆336Jun 4, 2024Updated last year
- VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)☆232Jun 13, 2023Updated 2 years ago
- One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html☆415Nov 10, 2024Updated last year
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- LPE exploit for CVE-2023-21768☆421Mar 8, 2023Updated 2 years ago
- Chrome Renderer 1day RCE via Type Confusion in Async Stack Trace (v8ctf submission)☆87Jun 3, 2024Updated last year
- Abuse Impersonate Privilege from Service to SYSTEM like other potatoes do☆400Feb 6, 2023Updated 3 years ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆276Feb 2, 2023Updated 3 years ago
- Yapi mock script RCE another version. Webshell way. 另一种 Webshell 方式的 Yapi 命令执行的方法 相比于其他的利用方式 更加微操和可控 影响更小☆66Jul 4, 2024Updated last year
- Bypass Userland EDR hooks by Loading Reflective Ntdll in memory from a remote server based on Windows ReleaseID to avoid opening a handle…☆305Aug 2, 2023Updated 2 years ago
- ☆145Mar 29, 2025Updated 10 months ago
- A tiny Reverse Sock5 Proxy written in C :V☆315Nov 28, 2022Updated 3 years ago