尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Oracle Corporation | Web Applications Desktop Integrator | 12.2.3-12.2.11 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2022-21587 POC | https://github.com/hieuminhnv/CVE-2022-21587-POC | POC详情 |
| 2 | Oracle E-BS CVE-2022-21587 Exploit | https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit | POC详情 |
| 3 | This script is used for automating exploit for Oracle Ebussiness (EBS) for CVE 2022-21587 ( Unauthenticated File Upload For Remote Code Execution) | https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS- | POC详情 |
| 4 | Oracle E-Business Suite 12.2.3 through 12.2.11 is susceptible to remote code execution via the Oracle Web Applications Desktop Integrator product, Upload component. An attacker with HTTP network access can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-21587.yaml | POC详情 |
| 5 | CVE-2022-21587 | https://github.com/B1ack4sh/Blackash-CVE-2022-21587 | POC详情 |
| 6 | build cve 2022 | https://github.com/merlyn-1/CVE-2022-21587-Oracle-EBS | POC详情 |
| 7 | CVE-2022-21587 | https://github.com/Ashwesker/Blackash-CVE-2022-21587 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论