Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | All versions of the Joomla! below 3.4.6 are known to be vulnerable. But exploitation is possible with PHP versions below 5.5.29, 5.6.13 and below 5.5. | https://github.com/ZaleHack/joomla_rce_CVE-2015-8562 | POC Details |
| 2 | A proof of concept for Joomla's CVE-2015-8562 vulnerability | https://github.com/RobinHoutevelts/Joomla-CVE-2015-8562-PHP-POC | POC Details |
| 3 | CVE-2015-8562 Exploit in bash | https://github.com/atcasanova/cve-2015-8562-exploit | POC Details |
| 4 | None | https://github.com/thejackerz/scanner-exploit-joomla-CVE-2015-8562 | POC Details |
| 5 | Joomla 1.5 - 3.4.5 Object Injection RCE X-Forwarded-For header | https://github.com/paralelo14/CVE-2015-8562 | POC Details |
| 6 | A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE) | https://github.com/VoidSec/Joomla_CVE-2015-8562 | POC Details |
| 7 | Adapted CVE-2015-8562 payload | https://github.com/xnorkl/Joomla_Payload | POC Details |
| 8 | 没有编写完成,以后学习更多知识在回来完善 | https://github.com/guanjivip/CVE-2015-8562 | POC Details |
| 9 | Docker-compose to set up a test environment for exploiting CVE-2015-8562 | https://github.com/lorenzodegiorgi/setup-cve-2015-8562 | POC Details |
| 10 | None | https://github.com/Caihuar/Joomla-cve-2015-8562 | POC Details |
| 11 | Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015 | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2015/CVE-2015-8562.yaml | POC Details |
| 12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/CMS%E6%BC%8F%E6%B4%9E/Joomla%203.4.5%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2015-8562.md | POC Details |
| 13 | https://github.com/vulhub/vulhub/blob/master/joomla/CVE-2015-8562/README.md | POC Details | |
| 14 | Modified PoC exploit demonstrating remote code execution via object injection vulnerability in Joomla! 1.5.0 through 3.4.5 (CVE-2015-8562). | https://github.com/Anonydra/joomla-1.5-3.4.5-rce | POC Details |
No public POC found.
Login to generate AI POC| CVE-2015-5304 | Red Hat JBoss Enterprise Application Platform 拒绝服务漏洞 | |
| CVE-2015-7221 | Mozilla Firefox 缓冲区溢出漏洞 | |
| CVE-2015-7222 | Mozilla Firefox和Firefox ESR libstagefright 整数溢出漏洞 | |
| CVE-2015-7223 | Mozilla Firefox WebExtension APIs 安全漏洞 | |
| CVE-2015-6425 | Cisco Unified Communications Manager Identity Management子系统资源管理错误漏洞 | |
| CVE-2015-8000 | ISC BIND named 拒绝服务漏洞 | |
| CVE-2015-8461 | ISC BIND named 竞争条件漏洞 | |
| CVE-2015-8577 | McAfee VirusScan Enterprise Buffer Overflow Protection功能安全漏洞 | |
| CVE-2015-8578 | AVG Internet Security 安全漏洞 | |
| CVE-2015-8579 | Kaspersky Total Security 安全漏洞 | |
| CVE-2015-7220 | Mozilla Firefox 缓冲区溢出漏洞 | |
| CVE-2015-8357 | Bitrix bitrix.xscan模块目录遍历漏洞 | |
| CVE-2015-8358 | Bitrix bitrix.mpbuilder模块目录遍历漏洞 | |
| CVE-2015-8476 | PHPMailer‘class.phpmailer.php’CRLF注入漏洞 | |
| CVE-2015-8563 | Joomla! com_templates组件跨站请求伪造漏洞 | |
| CVE-2015-8564 | Joomla! 目录遍历漏洞 | |
| CVE-2015-8565 | Joomla! 目录遍历漏洞 | |
| CVE-2015-8566 | Joomla! Framework Session程序包远程代码执行漏洞 | |
| CVE-2015-8580 | Foxit Reader和Foxit PhantomPDF 释放后重用漏洞 | |
| CVE-2015-7211 | Mozilla Firefox 输入验证漏洞 |
Showing top 20 of 38 CVEs. View all on vendor page → →
No comments yet