Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache CouchDB | Apache CouchDB ~ 3.2.1 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache CouchDB 3.2.1 - Remote Code Execution (RCE) | https://github.com/sadshade/CVE-2022-24706-CouchDB-Exploit | POC Details |
| 2 | I wrote a blog post about Apache CouchDB CVE-2022-24706 RCE Exploits | https://github.com/ahmetsabrimert/Apache-CouchDB-CVE-2022-24706-RCE-Exploits-Blog-post- | POC Details |
| 3 | CVE-2022-24706 POC exploit | https://github.com/superzerosec/CVE-2022-24706 | POC Details |
| 4 | Apache CouchDB 3.2.1 - Remote Code Execution (RCE) Checker | https://github.com/becrevex/CVE-2022-24706 | POC Details |
| 5 | In Apache CouchDB prior to 3.2.2, an attacker can access an improperly secured default installation without authenticating and gain admin privileges. | https://github.com/projectdiscovery/nuclei-templates/blob/main/network/cves/2022/CVE-2022-24706.yaml | POC Details |
| 6 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%95%B0%E6%8D%AE%E5%BA%93%E6%BC%8F%E6%B4%9E/Apache%20CouchDB%20epmd%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-24706.md | POC Details |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%95%B0%E6%8D%AE%E5%BA%93%E6%BC%8F%E6%B4%9E/Apache%20CouchDB%20%E5%88%86%E5%B8%83%E5%BC%8F%E5%8D%8F%E8%AE%AE%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%20CVE-2022-24706.md | POC Details |
| 8 | https://github.com/vulhub/vulhub/blob/master/couchdb/CVE-2022-24706/README.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet