### [CVE-2015-7450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7450) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Serialized-object interfaces in certain IBM analytics, business solutions, cognitive, IT infrastructure, and mobile and social products allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the InvokerTransformer class in the Apache Commons Collections library. ### POC #### Reference - https://www.exploit-db.com/exploits/41613/ #### Github - https://github.com/0day666/Vulnerability-verification - https://github.com/0xh4di/PayloadsAllTheThings - https://github.com/20142995/pocsuite - https://github.com/3vikram/Application-Vulnerabilities-Payloads - https://github.com/84KaliPleXon3/Payloads_All_The_Things - https://github.com/ARPSyndicate/cvemon - https://github.com/ARPSyndicate/kenzer-templates - https://github.com/AdeliaNitzsche/Java-Deserialization-Cheat-Sheet - https://github.com/AlexisRippin/java-deserialization-exploits - https://github.com/Awrrays/FrameVul - https://github.com/BrittanyKuhn/javascript-tutorial - https://github.com/Coalfire-Research/java-deserialization-exploits - https://github.com/Delishsploits/PayloadsAndMethodology - https://github.com/GrrrDog/Java-Deserialization-Cheat-Sheet - https://github.com/GuynnR/Payloads - https://github.com/Maarckz/PayloadParaTudo - https://github.com/Muhammd/Awesome-Payloads - https://github.com/Nieuport/PayloadsAllTheThings - https://github.com/Ostorlab/KEV - https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors - https://github.com/PalindromeLabs/Java-Deserialization-CVEs - https://github.com/Pav-ksd-pl/PayloadsAllTheThings - https://github.com/R0B1NL1N/Java_Deserialization_exploits - https://github.com/R0B1NL1N/java-deserialization-exploits - https://github.com/Ra7mo0on/PayloadsAllTheThings - https://github.com/Shadowshusky/java-deserialization-exploits - https://github.com/XPR1M3/Payloads_All_The_Things - https://github.com/Zero094/Vulnerability-verification - https://github.com/andrysec/PayloadsAllVulnerability - https://github.com/anhtu97/PayloadAllEverything - https://github.com/apkadmin/PayLoadsAll - https://github.com/brianhigh/us-cert-bulletins - https://github.com/chanchalpatra/payload - https://github.com/falocab/PayloadsAllTheThings - https://github.com/hellochunqiu/PayloadsAllTheThings - https://github.com/klausware/Java-Deserialization-Cheat-Sheet - https://github.com/koutto/jok3r-pocs - https://github.com/ksw9722/PayloadsAllTheThings - https://github.com/lnick2023/nicenice - https://github.com/mishmashclone/GrrrDog-Java-Deserialization-Cheat-Sheet - https://github.com/mrhacker51/ReverseShellCommands - https://github.com/nevidimk0/PayloadsAllTheThings - https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits - https://github.com/qazbnm456/awesome-cve-poc - https://github.com/ranjan-prp/PayloadsAllTheThings - https://github.com/ravijainpro/payloads_xss - https://github.com/sobinge/--1 - https://github.com/sobinge/PayloadsAllTheThings - https://github.com/sobinge/PayloadsAllThesobinge - https://github.com/sourcery-ai-bot/Deep-Security-Reports - https://github.com/winterwolf32/PayloadsAllTheThings - https://github.com/xbl3/awesome-cve-poc_qazbnm456