Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/cosad3s/CVE-2022-35914-poc | POC Details |
| 2 | None | https://github.com/Lzer0Kx01/CVE-2022-35914 | POC Details |
| 3 | None | https://github.com/6E6L6F/CVE-2022-35914 | POC Details |
| 4 | Unauthenticated RCE in GLPI 10.0.2 | https://github.com/0xGabe/CVE-2022-35914 | POC Details |
| 5 | Script in Ruby for the CVE-2022-35914 - RCE in GLPI | https://github.com/Johnermac/CVE-2022-35914 | POC Details |
| 6 | PoC exploit for GLPI - Command injection using a third-party library script | https://github.com/allendemoura/CVE-2022-35914 | POC Details |
| 7 | 𓃌 - htmlLawed 1.2.5 Remote code Execution | https://github.com/0romos/CVE-2022-35914 | POC Details |
| 8 | Modified for GLPI Offsec Lab: call_user_func, array_map, passthru | https://github.com/noxlumens/CVE-2022-35914_poc | POC Details |
| 9 | PoC exploit for GLPI - Command injection using a third-party library script | https://github.com/senderend/CVE-2022-35914 | POC Details |
| 10 | None | https://github.com/btar1gan/exploit_CVE-2022-35914 | POC Details |
| 11 | GLPI through 10.0.2 is susceptible to remote command execution injection in /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-35914.yaml | POC Details |
| 12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/GLPI%20htmLawedTest.php%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-35914.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet