mirror of
https://github.com/0xMarcio/cve.git
synced 2025-11-28 18:48:49 +00:00
3.3 KiB
3.3 KiB
CVE-2024-4956
Description
Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
POC
Reference
Github
- https://github.com/0day404/HV-2024-POC
- https://github.com/12442RF/POC
- https://github.com/AboSteam/POPC
- https://github.com/An00bRektn/shirocrack
- https://github.com/Buff3st-0v3rfl0w/CVE-2024-4956
- https://github.com/Cappricio-Securities/CVE-2024-4956
- https://github.com/DMW11525708/wiki
- https://github.com/GoatSecurity/CVE-2024-4956
- https://github.com/J1ezds/Vulnerability-Wiki-page
- https://github.com/JolyIrsb/CVE-2024-4956
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/Ostorlab/KEV
- https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/CVE
- https://github.com/TypicalModMaker/CVE-2024-4956
- https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956
- https://github.com/WhosGa/MyWiki
- https://github.com/X1r0z/JettyFuzz
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/XiaomingX/cve-2024-4956
- https://github.com/Yuan08o/pocs
- https://github.com/Zenrho/zenrho-cves-research
- https://github.com/admin772/POC
- https://github.com/adminlove520/pocWiki
- https://github.com/adysec/POC
- https://github.com/amalpvatayam67/day04-nexus-4956
- https://github.com/art-of-defence/CVE-2024-4956
- https://github.com/banditzCyber0x/CVE-2024-4956
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/codeb0ss/CVE-2024-4956-PoC
- https://github.com/cyberwithcyril/VulhubPenTestingReport
- https://github.com/eeeeeeeeee-code/POC
- https://github.com/enomothem/PenTestNote
- https://github.com/erickfernandox/CVE-2024-4956
- https://github.com/fin3ss3g0d/CVE-2024-4956
- https://github.com/fin3ss3g0d/Shiro1Extractor
- https://github.com/fin3ss3g0d/Shiro1Tools
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/gmh5225/CVE-2024-4956
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner
- https://github.com/ifconfig-me/Path-Traversal-Scanner
- https://github.com/k3ppf0r/2024-PocLib
- https://github.com/laoa1573/wy876
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/oLy0/Vulnerability
- https://github.com/onewinner/POCS
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/securitycipher/daily-bugbounty-writeups
- https://github.com/tanjiti/sec_profile
- https://github.com/thinhap/CVE-2024-4956-PoC
- https://github.com/verylazytech/CVE-2024-4956
- https://github.com/wjlin0/poc-doc
- https://github.com/wy876/POC
- https://github.com/wy876/wiki
- https://github.com/xungzzz/CVE-2024-4956
- https://github.com/zhanpengliu-tencent/medium-cve