{"uuid": "c4fe7fd5-1fa1-4fa0-b91a-2c53b9facb5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-22978", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7849", "content": "#exploit\n1. CVE 2022-22978:\nAuthorization Bypass in RegexRequestMatcher\nhttps://github.com/umakant76705/CVE-2022-22978\n\n2. Modicon M580/M340 Safety Protection bypass and utils\nhttps://github.com/0xedh/schneider_plc_exploit\n\n3. CVE-2022-38108:\nRCE in SolarWinds Network Performance Monitor\nhttps://www.zerodayinitiative.com/blog/2023/2/27/cve-2022-38108-rce-in-solarwinds-network-performance-monitor\n\n4. PHP SplDoublyLinkedList::pop() UAF\nhttps://therealcoiffeur.com/c101010", "creation_timestamp": "2023-03-02T11:02:01.000000Z"}