mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-16 20:27:21 +00:00
2.0 KiB
2.0 KiB
CVE-2010-1622
Description
SpringSource Spring Framework 2.5.x before 2.5.6.SEC02, 2.5.7 before 2.5.7.SR01, and 3.0.x before 3.0.3 allows remote attackers to execute arbitrary code via an HTTP request containing class.classLoader.URLs[0]=jar: followed by a URL of a crafted .jar file.
POC
Reference
Github
- https://github.com/1nhann/spring2010
- https://github.com/ARPSyndicate/cvemon
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/DDuarte/springshell-rce-poc
- https://github.com/E-bounce/cve-2010-1622_learning_environment
- https://github.com/Enokiy/spring-RCE-CVE-2022-22965
- https://github.com/GBMluke/Web
- https://github.com/GuayoyoCyber/CVE-2022-22965
- https://github.com/HandsomeCat00/Spring-CVE-2010-1622
- https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell
- https://github.com/Snip3R69/spring-shell-vuln
- https://github.com/Y4tacker/JavaSec
- https://github.com/cxzero/CVE-2022-22965-spring4shell
- https://github.com/gitrobtest/Java-Security
- https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit
- https://github.com/j4k0m/spring4shell-secdojo
- https://github.com/kyereafrane/Malware_attack_response.
- https://github.com/mikaelkall/Spring4Shell
- https://github.com/pen4uin/awesome-vulnerability-research
- https://github.com/pen4uin/vulnerability-research
- https://github.com/pen4uin/vulnerability-research-list
- https://github.com/seal-community/patches
- https://github.com/strainerart/Spring4Shell
- https://github.com/superfish9/pt
- https://github.com/tweedge/springcore-0day-en