Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Oracle Corporation | Web Applications Desktop Integrator | 12.2.3-12.2.11 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2022-21587 POC | https://github.com/hieuminhnv/CVE-2022-21587-POC | POC Details |
| 2 | Oracle E-BS CVE-2022-21587 Exploit | https://github.com/rockmelodies/Oracle-E-BS-CVE-2022-21587-Exploit | POC Details |
| 3 | This script is used for automating exploit for Oracle Ebussiness (EBS) for CVE 2022-21587 ( Unauthenticated File Upload For Remote Code Execution) | https://github.com/sahabrifki/CVE-2022-21587-Oracle-EBS- | POC Details |
| 4 | Oracle E-Business Suite 12.2.3 through 12.2.11 is susceptible to remote code execution via the Oracle Web Applications Desktop Integrator product, Upload component. An attacker with HTTP network access can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-21587.yaml | POC Details |
| 5 | CVE-2022-21587 | https://github.com/B1ack4sh/Blackash-CVE-2022-21587 | POC Details |
| 6 | build cve 2022 | https://github.com/merlyn-1/CVE-2022-21587-Oracle-EBS | POC Details |
| 7 | CVE-2022-21587 | https://github.com/Ashwesker/Blackash-CVE-2022-21587 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet