Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Unauthenticated RCE in Open Web Analytics (OWA) <1.7.4 | https://github.com/JacobEbben/CVE-2022-24637 | POC Details |
| 2 | Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3 | https://github.com/Lay0us1/CVE-2022-24637 | POC Details |
| 3 | Unauthicated RCE for open-web-analytics(1.7.3) | https://github.com/garySec/CVE-2022-24637 | POC Details |
| 4 | Open Web Analytics (OWA) - Unauthenticated Remote Code Execution | https://github.com/hupe1980/CVE-2022-24637 | POC Details |
| 5 | FIxed exploit for CVE-2022-24637 (original xplt: https://www.exploit-db.com/exploits/51026) | https://github.com/icebreack/CVE-2022-24637 | POC Details |
| 6 | Open Web Analytics 1.7.3 - Remote Code Execution | https://github.com/Pflegusch/CVE-2022-24637 | POC Details |
| 7 | Unauthenticated RCE in Open Web Analytics version <1.7.4 | https://github.com/0xM4hm0ud/CVE-2022-24637 | POC Details |
| 8 | CVE-2022-24637 | https://github.com/c0derpwner/HTB-pwned | POC Details |
| 9 | Open Web Analytics 1.7.3 - Remote Code Execution Exploit v2 | https://github.com/0xRyuk/CVE-2022-24637 | POC Details |
| 10 | Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3 | https://github.com/Lay0us/CVE-2022-24637 | POC Details |
| 11 | Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-24637.yaml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet