cve/2016/CVE-2016-3088.md

68 lines
2.8 KiB
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2016-3088](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3088)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
### POC
#### Reference
- https://www.exploit-db.com/exploits/42283/
#### Github
- https://github.com/0ps/pocassistdb
- https://github.com/1120362990/vulnerability-list
- https://github.com/20142995/pocsuite3
- https://github.com/422926799/haq5201314
- https://github.com/6point6/vulnerable-docker-launcher
- https://github.com/7hang/cyber-security-interview
- https://github.com/ARPSyndicate/cvemon
- https://github.com/ARPSyndicate/kenzer-templates
- https://github.com/Awrrays/FrameVul
- https://github.com/EvilAnne/Python_Learn
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
- https://github.com/HimmelAward/Goby_POC
- https://github.com/Kaizhe/attacker
- https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088
- https://github.com/MelanyRoob/Goby
- https://github.com/MoeTaher/Broker_Writeup
- https://github.com/NCSU-DANCE-Research-Group/CDL
- https://github.com/Ondrik8/exploit
- https://github.com/Ostorlab/KEV
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
2024-07-25 21:25:12 +00:00
- https://github.com/TrojanAZhen/Self_Back
2024-05-26 14:27:05 +02:00
- https://github.com/YutuSec/ActiveMQ_Crack
- https://github.com/Z0fhack/Goby_POC
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/bigblackhat/oFx
- https://github.com/cl4ym0re/CVE-2016-3088
- https://github.com/cyberaguiar/CVE-2016-3088
- https://github.com/gobysec/Goby
- https://github.com/hktalent/bug-bounty
- https://github.com/jiushill/haq5201314
- https://github.com/jweny/pocassistdb
2024-06-07 04:52:01 +00:00
- https://github.com/k8gege/Aggressor
2024-05-26 14:27:05 +02:00
- https://github.com/k8gege/Ladon
2024-06-07 04:52:01 +00:00
- https://github.com/k8gege/PowerLadon
2024-05-26 14:27:05 +02:00
- https://github.com/lnick2023/nicenice
- https://github.com/openx-org/BLEN
- https://github.com/pravinsrc/NOTES-windows-kernel-links
- https://github.com/pudiding/CVE-2016-3088
- https://github.com/qazbnm456/awesome-cve-poc
2024-08-24 17:55:21 +00:00
- https://github.com/qiuluo-oss/Tiger
2024-05-26 14:27:05 +02:00
- https://github.com/retr0-13/Goby
- https://github.com/sponkmonk/Ladon_english_update
- https://github.com/t0m4too/t0m4to
- https://github.com/vonderchild/CVE-2016-3088
- https://github.com/xbfding/XiaoBai_exploit
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
- https://github.com/yichensec/Bug_writer
- https://github.com/yuag/bgscan