x-f1v3 / CVE-2019-3396Links
Confluence Widget Connector path traversal (CVE-2019-3396)
☆22Updated 6 years ago
Alternatives and similar repositories for CVE-2019-3396
Users that are interested in CVE-2019-3396 are comparing it to the libraries listed below
Sorting:
- Webmin Remote Code Execution (authenticated)☆33Updated 6 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- ☆17Updated 7 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 8 years ago
- A simple scanner to find and brute force tomcat manager logins☆27Updated 6 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Updated 6 years ago
- CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4☆67Updated 5 years ago
- New Found 0-days!☆36Updated 6 years ago
- Learn how to get a reverse shell from JIRA application server☆24Updated 7 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Updated 6 years ago
- Python implementation of RSA reverse shell.☆11Updated 9 years ago
- ☆34Updated 6 years ago
- CVE-2018-6546-Exploit☆41Updated 7 years ago
- CVE-2019-10392 RCE Jackson with Git Client Plugin 2.8.2 (Authenticated)☆21Updated 6 years ago
- Python script to exploit CVE-2015-4852.☆31Updated 9 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Updated 2 years ago
- Python script to exploit confluence path traversal vulnerability cve-2019-3398☆15Updated 6 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Updated 8 years ago
- CVE-2017-10366: Oracle PeopleSoft 8.54, 8.55, 8.56 Java deserialization exploit☆25Updated 7 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Updated 4 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 8 years ago
- ☆63Updated 6 years ago
- ☆16Updated 6 years ago
- miscellaneous security research stuff☆37Updated 6 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- A weaponized version of CVE-2018-9206☆62Updated 7 years ago