Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated RCE in Open Web Analytics (OWA) <1.7.4 | https://github.com/JacobEbben/CVE-2022-24637 | POC Details |
| 2 | Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3 | https://github.com/Lay0us1/CVE-2022-24637 | POC Details |
| 3 | Unauthicated RCE for open-web-analytics(1.7.3) | https://github.com/garySec/CVE-2022-24637 | POC Details |
| 4 | Open Web Analytics (OWA) - Unauthenticated Remote Code Execution | https://github.com/hupe1980/CVE-2022-24637 | POC Details |
| 5 | FIxed exploit for CVE-2022-24637 (original xplt: https://www.exploit-db.com/exploits/51026) | https://github.com/icebreack/CVE-2022-24637 | POC Details |
| 6 | Open Web Analytics 1.7.3 - Remote Code Execution | https://github.com/Pflegusch/CVE-2022-24637 | POC Details |
| 7 | Unauthenticated RCE in Open Web Analytics version <1.7.4 | https://github.com/0xM4hm0ud/CVE-2022-24637 | POC Details |
| 8 | CVE-2022-24637 | https://github.com/c0derpwner/HTB-pwned | POC Details |
| 9 | Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2 | https://github.com/0xRyuk/CVE-2022-24637 | POC Details |
| 10 | Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3 | https://github.com/Lay0us/CVE-2022-24637 | POC Details |
| 11 | Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-24637.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-25451 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-26266 | Piwigo SQL注入漏洞 | |
| CVE-2022-25389 | DCN Firewall DCME-520 安全漏洞 | |
| CVE-2022-25581 | Classcms 代码问题漏洞 | |
| CVE-2022-25578 | Taocms 代码注入漏洞 | |
| CVE-2022-25390 | DCN Firewall DCME-520 安全漏洞 | |
| CVE-2022-26265 | Contao 操作系统命令注入漏洞 | |
| CVE-2022-25454 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25453 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25452 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25455 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25450 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25449 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25448 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25447 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25446 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25445 | Tenda AC6 缓冲区错误漏洞 | |
| CVE-2022-25441 | Tenda AC9 操作系统命令注入漏洞 | |
| CVE-2022-25440 | Tenda AC9 缓冲区错误漏洞 | |
| CVE-2022-25439 | Tenda AC9 缓冲区错误漏洞 |
Showing top 20 of 57 CVEs. View all on vendor page → →
No comments yet