mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-06 02:31:38 +00:00
68 lines
2.8 KiB
Markdown
68 lines
2.8 KiB
Markdown
### [CVE-2016-3088](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3088)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
The Fileserver web application in Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.exploit-db.com/exploits/42283/
|
|
|
|
#### Github
|
|
- https://github.com/0ps/pocassistdb
|
|
- https://github.com/1120362990/vulnerability-list
|
|
- https://github.com/20142995/pocsuite3
|
|
- https://github.com/422926799/haq5201314
|
|
- https://github.com/6point6/vulnerable-docker-launcher
|
|
- https://github.com/7hang/cyber-security-interview
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/ARPSyndicate/kenzer-templates
|
|
- https://github.com/Awrrays/FrameVul
|
|
- https://github.com/EvilAnne/Python_Learn
|
|
- https://github.com/ExpLife0011/awesome-windows-kernel-security-development
|
|
- https://github.com/HimmelAward/Goby_POC
|
|
- https://github.com/Kaizhe/attacker
|
|
- https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088
|
|
- https://github.com/MelanyRoob/Goby
|
|
- https://github.com/MoeTaher/Broker_Writeup
|
|
- https://github.com/NCSU-DANCE-Research-Group/CDL
|
|
- https://github.com/Ondrik8/exploit
|
|
- https://github.com/Ostorlab/KEV
|
|
- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors
|
|
- https://github.com/SexyBeast233/SecBooks
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
|
- https://github.com/TrojanAZhen/Self_Back
|
|
- https://github.com/YutuSec/ActiveMQ_Crack
|
|
- https://github.com/Z0fhack/Goby_POC
|
|
- https://github.com/bakery312/Vulhub-Reproduce
|
|
- https://github.com/bigblackhat/oFx
|
|
- https://github.com/cl4ym0re/CVE-2016-3088
|
|
- https://github.com/cyberaguiar/CVE-2016-3088
|
|
- https://github.com/gobysec/Goby
|
|
- https://github.com/hktalent/bug-bounty
|
|
- https://github.com/jiushill/haq5201314
|
|
- https://github.com/jweny/pocassistdb
|
|
- https://github.com/k8gege/Aggressor
|
|
- https://github.com/k8gege/Ladon
|
|
- https://github.com/k8gege/PowerLadon
|
|
- https://github.com/lnick2023/nicenice
|
|
- https://github.com/openx-org/BLEN
|
|
- https://github.com/pravinsrc/NOTES-windows-kernel-links
|
|
- https://github.com/pudiding/CVE-2016-3088
|
|
- https://github.com/qazbnm456/awesome-cve-poc
|
|
- https://github.com/qiuluo-oss/Tiger
|
|
- https://github.com/retr0-13/Goby
|
|
- https://github.com/sponkmonk/Ladon_english_update
|
|
- https://github.com/t0m4too/t0m4to
|
|
- https://github.com/vonderchild/CVE-2016-3088
|
|
- https://github.com/xbfding/XiaoBai_exploit
|
|
- https://github.com/xbl3/awesome-cve-poc_qazbnm456
|
|
- https://github.com/yichensec/Bug_writer
|
|
- https://github.com/yuag/bgscan
|
|
|