vah13 / OracleCVELinks
Vulnerabilities which found in Oracle products
☆33Updated 6 years ago
Alternatives and similar repositories for OracleCVE
Users that are interested in OracleCVE are comparing it to the libraries listed below
Sorting:
- ☆63Updated 5 years ago
- ☆34Updated 6 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆32Updated 6 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Updated 11 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- ☆17Updated 6 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- Burp extension☆58Updated 7 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 5 years ago
- A server vulnerable to XXE that can be used to test payloads using the xxer tool.☆26Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- CORS checking☆34Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆41Updated 6 years ago
- Scans tcl for command injection☆36Updated 6 years ago
- Environment for CVE-2019-6340 (Drupal)☆43Updated 2 years ago
- OWASP Skanda - SSRF Exploitation Framework☆38Updated 12 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- Essential tool for finding blind injection attacks.☆50Updated 6 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆50Updated 7 years ago
- Powershell SMBv3 Compression checker☆28Updated 2 years ago
- ☆43Updated 5 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Full TTY reverse shell over SSH☆58Updated 5 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago