mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 19:16:22 +00:00
77 lines
3.5 KiB
Markdown
77 lines
3.5 KiB
Markdown
![]() |
### [CVE-2016-0792](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-0792)
|
||
|

|
||
|

|
||
|

|
||
|
|
||
|
### Description
|
||
|
|
||
|
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
|
||
|
|
||
|
### POC
|
||
|
|
||
|
#### Reference
|
||
|
- https://www.exploit-db.com/exploits/42394/
|
||
|
- https://www.exploit-db.com/exploits/43375/
|
||
|
|
||
|
#### Github
|
||
|
- https://github.com/0day404/vulnerability-poc
|
||
|
- https://github.com/0xh4di/PayloadsAllTheThings
|
||
|
- https://github.com/3vikram/Application-Vulnerabilities-Payloads
|
||
|
- https://github.com/84KaliPleXon3/Payloads_All_The_Things
|
||
|
- https://github.com/ARPSyndicate/cvemon
|
||
|
- https://github.com/AlexisRippin/java-deserialization-exploits
|
||
|
- https://github.com/Aviksaikat/CVE-2016-0792
|
||
|
- https://github.com/CVEDB/PoC-List
|
||
|
- https://github.com/CVEDB/awesome-cve-repo
|
||
|
- https://github.com/CVEDB/top
|
||
|
- https://github.com/Coalfire-Research/java-deserialization-exploits
|
||
|
- https://github.com/Delishsploits/PayloadsAndMethodology
|
||
|
- https://github.com/GhostTroops/TOP
|
||
|
- https://github.com/GuynnR/Payloads
|
||
|
- https://github.com/JERRY123S/all-poc
|
||
|
- https://github.com/KayCHENvip/vulnerability-poc
|
||
|
- https://github.com/Miraitowa70/POC-Notes
|
||
|
- https://github.com/Muhammd/Awesome-Payloads
|
||
|
- https://github.com/Nieuport/PayloadsAllTheThings
|
||
|
- https://github.com/Pav-ksd-pl/PayloadsAllTheThings
|
||
|
- https://github.com/R0B1NL1N/Java_Deserialization_exploits
|
||
|
- https://github.com/R0B1NL1N/java-deserialization-exploits
|
||
|
- https://github.com/Ra7mo0on/PayloadsAllTheThings
|
||
|
- https://github.com/Shadowshusky/java-deserialization-exploits
|
||
|
- https://github.com/TheBeastofwar/JenkinsExploit-GUI
|
||
|
- https://github.com/Threekiii/Awesome-POC
|
||
|
- https://github.com/XPR1M3/Payloads_All_The_Things
|
||
|
- https://github.com/andrysec/PayloadsAllVulnerability
|
||
|
- https://github.com/angelwhu/XStream_unserialization
|
||
|
- https://github.com/anhtu97/PayloadAllEverything
|
||
|
- https://github.com/anquanscan/sec-tools
|
||
|
- https://github.com/apkadmin/PayLoadsAll
|
||
|
- https://github.com/brianwrf/hackUtils
|
||
|
- https://github.com/chanchalpatra/payload
|
||
|
- https://github.com/cyberanand1337x/bug-bounty-2022
|
||
|
- https://github.com/d4n-sec/d4n-sec.github.io
|
||
|
- https://github.com/falocab/PayloadsAllTheThings
|
||
|
- https://github.com/hellochunqiu/PayloadsAllTheThings
|
||
|
- https://github.com/hktalent/Scan4all_Pro
|
||
|
- https://github.com/hktalent/TOP
|
||
|
- https://github.com/jbmihoub/all-poc
|
||
|
- https://github.com/jpiechowka/jenkins-cve-2016-0792
|
||
|
- https://github.com/koutto/jok3r-pocs
|
||
|
- https://github.com/ksw9722/PayloadsAllTheThings
|
||
|
- https://github.com/lnick2023/nicenice
|
||
|
- https://github.com/lp008/Hack-readme
|
||
|
- https://github.com/mrhacker51/ReverseShellCommands
|
||
|
- https://github.com/nevidimk0/PayloadsAllTheThings
|
||
|
- https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits
|
||
|
- https://github.com/qazbnm456/awesome-cve-poc
|
||
|
- https://github.com/ranjan-prp/PayloadsAllTheThings
|
||
|
- https://github.com/ravijainpro/payloads_xss
|
||
|
- https://github.com/sobinge/--1
|
||
|
- https://github.com/sobinge/PayloadsAllTheThings
|
||
|
- https://github.com/sobinge/PayloadsAllThesobinge
|
||
|
- https://github.com/superfish9/pt
|
||
|
- https://github.com/weeka10/-hktalent-TOP
|
||
|
- https://github.com/winterwolf32/PayloadsAllTheThings
|
||
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
||
|
|