mirror of
https://github.com/0xMarcio/cve.git
synced 2025-05-07 03:02:30 +00:00
3.5 KiB
3.5 KiB
CVE-2016-0792
Description
Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.
POC
Reference
Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0xh4di/PayloadsAllTheThings
- https://github.com/3vikram/Application-Vulnerabilities-Payloads
- https://github.com/84KaliPleXon3/Payloads_All_The_Things
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AlexisRippin/java-deserialization-exploits
- https://github.com/Aviksaikat/CVE-2016-0792
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Coalfire-Research/java-deserialization-exploits
- https://github.com/Delishsploits/PayloadsAndMethodology
- https://github.com/GhostTroops/TOP
- https://github.com/GuynnR/Payloads
- https://github.com/JERRY123S/all-poc
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Muhammd/Awesome-Payloads
- https://github.com/Nieuport/PayloadsAllTheThings
- https://github.com/Pav-ksd-pl/PayloadsAllTheThings
- https://github.com/R0B1NL1N/Java_Deserialization_exploits
- https://github.com/R0B1NL1N/java-deserialization-exploits
- https://github.com/Ra7mo0on/PayloadsAllTheThings
- https://github.com/Shadowshusky/java-deserialization-exploits
- https://github.com/TheBeastofwar/JenkinsExploit-GUI
- https://github.com/Threekiii/Awesome-POC
- https://github.com/XPR1M3/Payloads_All_The_Things
- https://github.com/andrysec/PayloadsAllVulnerability
- https://github.com/angelwhu/XStream_unserialization
- https://github.com/anhtu97/PayloadAllEverything
- https://github.com/anquanscan/sec-tools
- https://github.com/apkadmin/PayLoadsAll
- https://github.com/brianwrf/hackUtils
- https://github.com/chanchalpatra/payload
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/falocab/PayloadsAllTheThings
- https://github.com/hellochunqiu/PayloadsAllTheThings
- https://github.com/hktalent/Scan4all_Pro
- https://github.com/hktalent/TOP
- https://github.com/jbmihoub/all-poc
- https://github.com/jpiechowka/jenkins-cve-2016-0792
- https://github.com/koutto/jok3r-pocs
- https://github.com/ksw9722/PayloadsAllTheThings
- https://github.com/lnick2023/nicenice
- https://github.com/lp008/Hack-readme
- https://github.com/mrhacker51/ReverseShellCommands
- https://github.com/nevidimk0/PayloadsAllTheThings
- https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/ranjan-prp/PayloadsAllTheThings
- https://github.com/ravijainpro/payloads_xss
- https://github.com/sobinge/--1
- https://github.com/sobinge/PayloadsAllTheThings
- https://github.com/sobinge/PayloadsAllThesobinge
- https://github.com/superfish9/pt
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/winterwolf32/PayloadsAllTheThings
- https://github.com/xbl3/awesome-cve-poc_qazbnm456