mirror of
https://github.com/0xMarcio/cve.git
synced 2025-06-01 11:10:36 +00:00
5.9 KiB
5.9 KiB
CVE-2022-22954
Description
VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. A malicious actor with network access can trigger a server-side template injection that may result in remote code execution.
POC
Reference
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0x783kb/Security-operation-book
- https://github.com/0xPugal/One-Liners
- https://github.com/0xPugazh/One-Liners
- https://github.com/0xlittleboy/One-Liner-Scripts
- https://github.com/0xlittleboy/One-Liners
- https://github.com/1SeaMy/CVE-2022-22954
- https://github.com/20142995/Goby
- https://github.com/20142995/sectool
- https://github.com/3SsFuck/CVE-2021-31805-POC
- https://github.com/3SsFuck/CVE-2022-22954-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/ArrestX/--POC
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Chocapikk/CVE-2022-22954
- https://github.com/DrorDvash/CVE-2022-22954_VMware_PoC
- https://github.com/GhostTroops/TOP
- https://github.com/HACK-THE-WORLD/DailyMorningReading
- https://github.com/HimmelAward/Goby_POC
- https://github.com/JERRY123S/all-poc
- https://github.com/Jhonsonwannaa/CVE-2022-22954
- https://github.com/Jun-5heng/CVE-2022-22954
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/MLX15/CVE-2022-22954
- https://github.com/MSeymenD/CVE-2022-22954-Testi
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Mr-xn/Penetration_Testing_POC
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SYRTI/POC_to_review
- https://github.com/Schira4396/VcenterKiller
- https://github.com/StarCrossPortal/scalpel
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Vulnmachines/VMWare_CVE-2022-22954
- https://github.com/W01fh4cker/Serein
- https://github.com/W01fh4cker/VcenterKit
- https://github.com/WhooAmii/POC_to_review
- https://github.com/Z0fhack/Goby_POC
- https://github.com/amit-pathak009/CVE-2022-22954
- https://github.com/amit-pathak009/CVE-2022-22954-PoC
- https://github.com/aniqfakhrul/CVE-2022-22954
- https://github.com/anonymous364872/Rapier_Tool
- https://github.com/apif-review/APIF_tool_2024
- https://github.com/arzuozkan/CVE-2022-22954
- https://github.com/astraztech/vmware4shell
- https://github.com/avboy1337/CVE-2022-22954-VMware-RCE
- https://github.com/axingde/CVE-2022-22954-POC
- https://github.com/b4dboy17/CVE-2022-22954
- https://github.com/badboy-sft/CVE-2022-22954
- https://github.com/bb33bb/CVE-2022-22954-VMware-RCE
- https://github.com/bewhale/CVE-2022-22954
- https://github.com/bhavesh-pardhi/One-Liner
- https://github.com/bigblackhat/oFx
- https://github.com/binganao/vulns-2022
- https://github.com/chaosec2021/CVE-2022-22954-VMware-RCE
- https://github.com/chaosec2021/EXP-POC
- https://github.com/chaosec2021/fscan-POC
- https://github.com/cisagov/Malcolm
- https://github.com/corelight/cve-2022-22954
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/czz1233/fscan
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/djytmdj/Tool_Summary
- https://github.com/emilyastranova/VMware-CVE-2022-22954-Command-Injector
- https://github.com/fatguru/dorks
- https://github.com/fleabane1/CVE-2021-31805-POC
- https://github.com/goldenscale/GS_GithubMirror
- https://github.com/hktalent/Scan4all_Pro
- https://github.com/hktalent/TOP
- https://github.com/jax7sec/CVE-2022-22954
- https://github.com/jbmihoub/all-poc
- https://github.com/k0mi-tg/CVE-POC
- https://github.com/kaanymz/2022-04-06-critical-vmware-fix
- https://github.com/lions2012/Penetration_Testing_POC
- https://github.com/litt1eb0yy/One-Liner-Scripts
- https://github.com/lolminerxmrig/CVE-2022-22954_
- https://github.com/lucksec/VMware-CVE-2022-22954
- https://github.com/mamba-2021/EXP-POC
- https://github.com/mamba-2021/fscan-POC
- https://github.com/manas3c/CVE-POC
- https://github.com/merlinepedra25/AttackWebFrameworkTools-5.0
- https://github.com/mhurts/CVE-2022-22954-POC
- https://github.com/mumu2020629/-CVE-2022-22954-scanner
- https://github.com/nguyenv1nK/CVE-2022-22954
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/onewinner/VulToolsKit
- https://github.com/orwagodfather/CVE-2022-22954
- https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main
- https://github.com/rat857/AtomsPanic
- https://github.com/secfb/CVE-2022-22954
- https://github.com/shengshengli/fscan-POC
- https://github.com/sherlocksecurity/VMware-CVE-2022-22954
- https://github.com/taielab/awesome-hacking-lists
- https://github.com/tanjiti/sec_profile
- https://github.com/trhacknon/CVE-2022-22954
- https://github.com/trhacknon/CVE-2022-22954-PoC
- https://github.com/trhacknon/One-Liners
- https://github.com/trhacknon/Pocingit
- https://github.com/tunelko/CVE-2022-22954-PoC
- https://github.com/tyleraharrison/VMware-CVE-2022-22954-Command-Injector
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/west-wind/Threat-Hunting-With-Splunk
- https://github.com/whoforget/CVE-POC
- https://github.com/xinyisleep/pocscan
- https://github.com/xuetusummer/Penetration_Testing_POC
- https://github.com/youcans896768/APIV_Tool
- https://github.com/youwizard/CVE-POC
- https://github.com/zecool/cve