Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| HackerOne | jwt-simple node module | <=0.3.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Exploiting the CVE-2016-10555 | https://github.com/thepcn3rd/jwtToken-CVE-2016-10555 | POC Details |
| 2 | Change the algorithm RS256(asymmetric) to HS256(symmetric) - POC (CVE-2016-10555) | https://github.com/CircuitSoul/poc-cve-2016-10555 | POC Details |
| 3 | CVE-2016-10555 PoC code | https://github.com/scent2d/PoC-CVE-2016-10555 | POC Details |
| 4 | 针对JWT渗透开发的漏洞验证/密钥爆破工具,针对CVE-2015-9235/未验证签名攻击/CVE-2016-10555/CVE-2018-0114/CVE-2020-28042的结果生成用于FUZZ,也可使用字典/字符枚举(包括JJWT)的方式进行爆破 | https://github.com/z-bool/Venom-JWT | POC Details |
No public POC found.
Login to generate AI POC| CVE-2016-10549 | Sails 安全漏洞 | |
| CVE-2016-10560 | galenframework-cli 安全漏洞 | |
| CVE-2016-10564 | apk-parser 安全漏洞 | |
| CVE-2016-10565 | operadriver 安全漏洞 | |
| CVE-2016-10569 | embedza 安全漏洞 | |
| CVE-2016-10571 | bkjs-wand 安全漏洞 | |
| CVE-2016-10572 | mongodb-instance 安全漏洞 | |
| CVE-2016-10563 | go-ipfs-deps模块安全漏洞 | |
| CVE-2016-10552 | igniteui 安全漏洞 | |
| CVE-2016-10550 | sequalize SQL注入漏洞 | |
| CVE-2016-10553 | sequalize SQL注入漏洞 | |
| CVE-2016-10548 | reduce-css-calc node模块安全漏洞 | |
| CVE-2016-10547 | Nunjucks 安全漏洞 | |
| CVE-2016-10546 | PouchDB 安全漏洞 | |
| CVE-2016-10544 | uws 安全漏洞 | |
| CVE-2016-10543 | call 安全漏洞 | |
| CVE-2016-10542 | ws 安全漏洞 | |
| CVE-2016-10541 | Thshell-quote 安全漏洞 | |
| CVE-2016-10540 | Minimatch 安全漏洞 | |
| CVE-2016-10539 | negotiator 安全漏洞 |
Showing top 20 of 50 CVEs. View all on vendor page → →
No comments yet