Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/cosad3s/CVE-2022-35914-poc | POC Details |
| 2 | None | https://github.com/Lzer0Kx01/CVE-2022-35914 | POC Details |
| 3 | None | https://github.com/6E6L6F/CVE-2022-35914 | POC Details |
| 4 | Unauthenticated RCE in GLPI 10.0.2 | https://github.com/0xGabe/CVE-2022-35914 | POC Details |
| 5 | Script in Ruby for the CVE-2022-35914 - RCE in GLPI | https://github.com/Johnermac/CVE-2022-35914 | POC Details |
| 6 | PoC exploit for GLPI - Command injection using a third-party library script | https://github.com/allendemoura/CVE-2022-35914 | POC Details |
| 7 | 𓃌 - htmlLawed 1.2.5 Remote code Execution | https://github.com/0romos/CVE-2022-35914 | POC Details |
| 8 | Modified for GLPI Offsec Lab: call_user_func, array_map, passthru | https://github.com/noxlumens/CVE-2022-35914_poc | POC Details |
| 9 | PoC exploit for GLPI - Command injection using a third-party library script | https://github.com/senderend/CVE-2022-35914 | POC Details |
| 10 | None | https://github.com/btar1gan/exploit_CVE-2022-35914 | POC Details |
| 11 | GLPI through 10.0.2 is susceptible to remote command execution injection in /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-35914.yaml | POC Details |
| 12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GLPI%20htmLawedTest.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-35914.md | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-38339 | 9.6 CRITICAL | Safe Software FME Server 跨站脚本漏洞 |
| CVE-2022-38351 | 8.8 HIGH | Suprema BioStar 2安全漏洞 |
| CVE-2022-40808 | Democritus Project 安全漏洞 | |
| CVE-2022-40809 | Democritus Project 安全漏洞 | |
| CVE-2022-40429 | Democritus Project 安全漏洞 | |
| CVE-2022-40069 | Tenda AC21 缓冲区错误漏洞 | |
| CVE-2022-40431 | Democritus Project 代码问题漏洞 | |
| CVE-2022-29908 | Fabasoft Cloud Enterprise Client 信任管理问题漏洞 | |
| CVE-2022-40426 | Democritus Project 安全漏洞 | |
| CVE-2022-40428 | Democritus Project 安全漏洞 | |
| CVE-2022-40430 | Democritus Project 安全漏洞 | |
| CVE-2022-40425 | Democritus Project 安全漏洞 | |
| CVE-2022-40810 | Democritus Project 安全漏洞 | |
| CVE-2022-40807 | Democritus Project 安全漏洞 | |
| CVE-2022-40427 | Democritus Project 安全漏洞 | |
| CVE-2022-40806 | Democritus Project 安全漏洞 | |
| CVE-2022-40811 | Democritus Project 安全漏洞 | |
| CVE-2022-40805 | Democritus Project 安全漏洞 | |
| CVE-2022-40424 | Democritus Project 安全漏洞 | |
| CVE-2022-40067 | Tenda AC21 缓冲区错误漏洞 |
Showing top 20 of 77 CVEs. View all on vendor page → →
No comments yet