{"vulnerability": "CVE-2022-0944", "sightings": [{"uuid": "3372f2d4-fc8c-4563-9eae-fdbe3b792eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8504", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aSQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])\nURL\uff1ahttps://github.com/FlojBoj/CVE-2022-0944\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-09-10T14:24:43.000000Z"}, {"uuid": "ba06df29-d3f0-4f00-b877-ca969d5a19f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "seen", "source": "MISP/1c5c38d6-3401-41ac-be0e-4cf361fa6f51", "content": "", "creation_timestamp": "2025-09-25T00:36:28.000000Z"}, {"uuid": "5b381ec9-ce4a-43b9-baa2-79463172473f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8485", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aA proof of concept exploit for SQLPad RCE (CVE-2022-0944).\nURL\uff1ahttps://github.com/shhrew/CVE-2022-0944\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-09-08T23:40:08.000000Z"}, {"uuid": "600661fd-829a-4dba-ab97-ee0029767fb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8733", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aPoC for RCE in SQLPad (CVE-2022-0944)\nURL\uff1ahttps://github.com/toneillcodes/CVE-2022-0944\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-10-14T10:44:15.000000Z"}, {"uuid": "9feaf95d-cccf-432b-acf3-9e5137277068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/3638", "content": "#exploit\n1. CVE-2022-0944:\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388", "creation_timestamp": "2024-09-13T16:19:31.000000Z"}, {"uuid": "ab872449-3756-4f9a-a10a-5b2e98284f9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "Telegram/_racX9bGrH5n47oZmASKfxb2KPfn5-tmw2Q44nFYPPaNRw", "content": "", "creation_timestamp": "2024-09-11T06:27:38.000000Z"}, {"uuid": "e17ab47c-31cc-4f37-b512-47063d48d969", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1953", "content": "https://github.com/FlojBoj/CVE-2022-0944\n\nSQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])\n#github #exploit", "creation_timestamp": "2024-09-10T17:52:19.000000Z"}, {"uuid": "9d232126-4567-428d-a48c-7a3f1c119478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18561", "content": "https://github.com/FlojBoj/CVE-2022-0944\n\nSQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])\n#github #exploit", "creation_timestamp": "2024-09-11T17:49:54.000000Z"}, {"uuid": "2eb1cf82-59df-47eb-9284-ad377794a228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/337", "content": "#exploit\n1. CVE-2022-0944:\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388", "creation_timestamp": "2024-09-11T16:13:00.000000Z"}, {"uuid": "8a2c3db1-7578-4659-b0ed-83e7134c90b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/758", "content": "#exploit\n1. CVE-2022-0944:\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388", "creation_timestamp": "2024-09-13T16:19:32.000000Z"}, {"uuid": "4042adb4-ed1b-4da3-a8bb-07047a1a15bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/871", "content": "Tools - Hackers Factory \n\nLeading free and open-source face recognition system.\n\nhttps://github.com/exadel-inc/CompreFace\n\nOkta Verify and Okta FastPass Abuse Tool.\n\nhttps://github.com/CCob/okta-terrify\n\nA list of open-source aviation projects and data.\n\nhttps://github.com/lucianosrp/open-source-aviation\n\nDisconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines.\n\nhttps://github.com/CCob/DGPOEdit\n\nDump cookies and credentials directly from Chrome/Edge process memory.\n\nhttps://github.com/Meckazin/ChromeKatz\n\n#Exploit\n\n1. CVE-2022-0944:\n\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\n\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388\n\nCVE-2024-28000 Exploit for litespeed-cache =&lt;6.3 allows Privilege Escalation with creation of administrator account.\n\nhttps://github.com/JohnDoeAnonITA/CVE-2024-28000\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-13T05:19:51.000000Z"}, {"uuid": "7803cc87-b735-4dd8-be28-c62e5f009e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8745", "content": "Tools - Hackers Factory \n\nLeading free and open-source face recognition system.\n\nhttps://github.com/exadel-inc/CompreFace\n\nOkta Verify and Okta FastPass Abuse Tool.\n\nhttps://github.com/CCob/okta-terrify\n\nA list of open-source aviation projects and data.\n\nhttps://github.com/lucianosrp/open-source-aviation\n\nDisconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines.\n\nhttps://github.com/CCob/DGPOEdit\n\nDump cookies and credentials directly from Chrome/Edge process memory.\n\nhttps://github.com/Meckazin/ChromeKatz\n\n#Exploit\n\n1. CVE-2022-0944:\n\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\n\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388\n\nCVE-2024-28000 Exploit for litespeed-cache =&lt;6.3 allows Privilege Escalation with creation of administrator account.\n\nhttps://github.com/JohnDoeAnonITA/CVE-2024-28000\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-13T05:19:56.000000Z"}, {"uuid": "34148a6b-bfb4-467b-90e3-c2d3895280ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23768", "content": "Tools - Hackers Factory \n\nLeading free and open-source face recognition system.\n\nhttps://github.com/exadel-inc/CompreFace\n\nOkta Verify and Okta FastPass Abuse Tool.\n\nhttps://github.com/CCob/okta-terrify\n\nA list of open-source aviation projects and data.\n\nhttps://github.com/lucianosrp/open-source-aviation\n\nDisconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines.\n\nhttps://github.com/CCob/DGPOEdit\n\nDump cookies and credentials directly from Chrome/Edge process memory.\n\nhttps://github.com/Meckazin/ChromeKatz\n\n#Exploit\n\n1. CVE-2022-0944:\n\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\n\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388\n\nCVE-2024-28000 Exploit for litespeed-cache =&lt;6.3 allows Privilege Escalation with creation of administrator account.\n\nhttps://github.com/JohnDoeAnonITA/CVE-2024-28000\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-13T05:20:59.000000Z"}, {"uuid": "10f8c2e0-9fb7-440b-9873-83c98a7e1f76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7409", "content": "Tools - Hackers Factory \n\nLeading free and open-source face recognition system.\n\nhttps://github.com/exadel-inc/CompreFace\n\nOkta Verify and Okta FastPass Abuse Tool.\n\nhttps://github.com/CCob/okta-terrify\n\nA list of open-source aviation projects and data.\n\nhttps://github.com/lucianosrp/open-source-aviation\n\nDisconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines.\n\nhttps://github.com/CCob/DGPOEdit\n\nDump cookies and credentials directly from Chrome/Edge process memory.\n\nhttps://github.com/Meckazin/ChromeKatz\n\n#Exploit\n\n1. CVE-2022-0944:\n\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\n\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388\n\nCVE-2024-28000 Exploit for litespeed-cache =&lt;6.3 allows Privilege Escalation with creation of administrator account.\n\nhttps://github.com/JohnDoeAnonITA/CVE-2024-28000\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-13T05:19:56.000000Z"}, {"uuid": "505f83ec-48b2-492f-a3ed-65ba1df1e063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3721", "content": "Tools - Hackers Factory \n\nLeading free and open-source face recognition system.\n\nhttps://github.com/exadel-inc/CompreFace\n\nOkta Verify and Okta FastPass Abuse Tool.\n\nhttps://github.com/CCob/okta-terrify\n\nA list of open-source aviation projects and data.\n\nhttps://github.com/lucianosrp/open-source-aviation\n\nDisconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines.\n\nhttps://github.com/CCob/DGPOEdit\n\nDump cookies and credentials directly from Chrome/Edge process memory.\n\nhttps://github.com/Meckazin/ChromeKatz\n\n#Exploit\n\n1. CVE-2022-0944:\n\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\n\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388\n\nCVE-2024-28000 Exploit for litespeed-cache =&lt;6.3 allows Privilege Escalation with creation of administrator account.\n\nhttps://github.com/JohnDoeAnonITA/CVE-2024-28000\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-13T05:20:05.000000Z"}, {"uuid": "5f8f51c9-a27a-4de1-9e55-52f12b02068a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/Root_Exploit/713", "content": "CVE-2022-0944 - GitHub sqlpad/sqlpad Template Injection/RCE\n\nGithub\n\n#Cve #Exploit\n\nJoin RootExploit \ud83d\udc8e", "creation_timestamp": "2024-09-12T09:04:50.000000Z"}, {"uuid": "7190bd16-3596-42ee-a905-613da4aabe9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "seen", "source": "https://t.me/cibsecurity/38910", "content": "\u203c CVE-2022-0944 \u203c\n\nTemplate injection in connection test endpoint leads to RCE in GitHub repository sqlpad/sqlpad prior to 6.10.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-15T06:18:45.000000Z"}, {"uuid": "38c595f3-34f7-463c-a399-530c05330f4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/280", "content": "Tools - Hackers Factory \n\nLeading free and open-source face recognition system.\n\nhttps://github.com/exadel-inc/CompreFace\n\nOkta Verify and Okta FastPass Abuse Tool.\n\nhttps://github.com/CCob/okta-terrify\n\nA list of open-source aviation projects and data.\n\nhttps://github.com/lucianosrp/open-source-aviation\n\nDisconnected GPO Editor - A Group Policy Manager launcher to allow editing of domain GPOs from non-domain joined machines.\n\nhttps://github.com/CCob/DGPOEdit\n\nDump cookies and credentials directly from Chrome/Edge process memory.\n\nhttps://github.com/Meckazin/ChromeKatz\n\n#Exploit\n\n1. CVE-2022-0944:\n\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\n\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388\n\nCVE-2024-28000 Exploit for litespeed-cache =&lt;6.3 allows Privilege Escalation with creation of administrator account.\n\nhttps://github.com/JohnDoeAnonITA/CVE-2024-28000\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-13T05:21:00.000000Z"}, {"uuid": "068bc312-531d-4543-969e-c01c6b1b6c5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3147", "content": "https://github.com/FlojBoj/CVE-2022-0944\n\nSQLPad - Template injection (POC exploit for SQLPad RCE [CVE-2022-0944])\n#github #exploit", "creation_timestamp": "2024-09-10T17:48:47.000000Z"}, {"uuid": "e03429a8-c52a-41f1-a507-974634161034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11112", "content": "#exploit\n1. CVE-2022-0944:\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388", "creation_timestamp": "2024-09-11T11:01:09.000000Z"}, {"uuid": "16435b3d-08bb-4595-bbf8-8e0fc69dc80d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-0944", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/4399", "content": "#exploit\n1. CVE-2022-0944:\nGitHub sqlpad/sqlpad Template Injection/RCE\nhttps://github.com/Philip-Otter/CVE-2022-0944_RCE_Automation\n\n2. CVE-2024-21388:\nMicrosoft Edge EoP\nhttps://github.com/d0rb/CVE-2024-21388", "creation_timestamp": "2024-09-11T06:40:55.000000Z"}]}