Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Adobe | Magento Commerce | unspecified ~ 2.4.3-p1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-24086 about Magento RCE | https://github.com/Mr-xn/CVE-2022-24086 | POC Details |
| 2 | CVE-2022-24086 RCE | https://github.com/nanaao/CVE-2022-24086-RCE | POC Details |
| 3 | None | https://github.com/NHPT/CVE-2022-24086-RCE | POC Details |
| 4 | Verifed Proof of Concept on CVE-2022-24086 | https://github.com/oK0mo/CVE-2022-24086-RCE-PoC | POC Details |
| 5 | None | https://github.com/seymanurmutlu/CVE-2022-24086-CVE-2022-24087 | POC Details |
| 6 | PoC of CVE-2022-24086 | https://github.com/akr3ch/CVE-2022-24086 | POC Details |
| 7 | Proof of concept of CVE-2022-24086 | https://github.com/pescepilota/CVE-2022-24086 | POC Details |
| 8 | CVE-2022-24086 POC example | https://github.com/BurpRoot/CVE-2022-24086 | POC Details |
| 9 | An attacker could place HTML containing executable JavaScript inside element attributes. This markup becomes unescaped, causing arbitrary markup to be injected into the document. | https://github.com/rxerium/CVE-2022-24086 | POC Details |
| 10 | Magento 2 patch for CVE-2022-24086. Fix the RCE vulnerability and related bugs by performing deep template variable escaping. If you cannot upgrade Magento or cannot apply the official patches, try this one. | https://github.com/wubinworks/magento2-template-filter-patch | POC Details |
| 11 | Adobe Commerce versions 2.4.3-p1 (and earlier) and 2.3.7-p2 (and earlier) are affected by an improper input validation vulnerability during the checkout process. Exploitation of this issue does not require user interaction and could result in arbitrary code execution. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-24086.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-23188 | 7.8 HIGH | Adobe Illustrator Buffer Overflow could lead to Arbitrary code execution |
| CVE-2022-23186 | 7.8 HIGH | Adobe Illustrator Out-of-bounds Write could lead to Arbitrary code execution |
| CVE-2022-23203 | 7.8 HIGH | Adobe Photoshop Buffer Overflow could lead to Arbitrary code execution |
| CVE-2022-23202 | 7.0 HIGH | Adobe Creative Cloud Desktop Uncontrolled Search Path Element Arbitrary code execution |
| CVE-2022-23195 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23204 | 5.5 MEDIUM | Adobe Premiere Rush JPEG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerabil |
| CVE-2022-23197 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23199 | 5.5 MEDIUM | Adobe Illustrator NULL Pointer Dereference Application denial-of-service |
| CVE-2022-23198 | 5.5 MEDIUM | Adobe Illustrator NULL Pointer Dereference Application denial-of-service |
| CVE-2022-23196 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23192 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23194 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23191 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23190 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23189 | 5.5 MEDIUM | Adobe Illustrator NULL Pointer Dereference Application denial-of-service |
| CVE-2022-23193 | 5.5 MEDIUM | Adobe Illustrator Out-of-bounds Read could lead to Memory leak |
| CVE-2022-23200 | Adobe After Effects 3GP File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerabili |
No comments yet