mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-29 01:31:01 +00:00
34 lines
1.4 KiB
Markdown
34 lines
1.4 KiB
Markdown
![]() |
### [CVE-2019-5475](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5475)
|
||
|

|
||
|

|
||
|
&color=brighgreen)
|
||
|
|
||
|
### Description
|
||
|
|
||
|
The Nexus Yum Repository Plugin in v2 is vulnerable to Remote Code Execution when instances using CommandLineExecutor.java are supplied vulnerable data, such as the Yum Configuration Capability.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://hackerone.com/reports/654888
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0xT11/CVE-POC
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/CLincat/vulcat
|
||
|
- https://github.com/EXP-Docs/CVE-2019-15588
|
||
|
- https://github.com/EXP-Docs/CVE-2019-5475
|
||
|
- https://github.com/HimmelAward/Goby_POC
|
||
|
- https://github.com/SexyBeast233/SecBooks
|
||
|
- https://github.com/TesterCC/exp_poc_library
|
||
|
- https://github.com/Z0fhack/Goby_POC
|
||
|
- https://github.com/developer3000S/PoC-in-GitHub
|
||
|
- https://github.com/hectorgie/PoC-in-GitHub
|
||
|
- https://github.com/jaychouzzk/CVE-2019-5475-Nexus-Repository-Manager-
|
||
|
- https://github.com/lyy289065406/CVE-2019-15588
|
||
|
- https://github.com/lyy289065406/CVE-2019-5475
|
||
|
- https://github.com/lyy289065406/lyy289065406
|
||
|
- https://github.com/nomi-sec/PoC-in-GitHub
|
||
|
- https://github.com/rabbitmask/CVE-2019-5475-EXP
|
||
|
|