Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | ActiveMQ_putshell直接获取webshell | https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088 | POC Details |
| 2 | None | https://github.com/pudiding/CVE-2016-3088 | POC Details |
| 3 | Apache ActiveMQ Remote Code Execution Exploit | https://github.com/cyberaguiar/CVE-2016-3088 | POC Details |
| 4 | None | https://github.com/vonderchild/CVE-2016-3088 | POC Details |
| 5 | Apache ActiveMQ PUT RCE Scan | https://github.com/cl4ym0re/CVE-2016-3088 | POC Details |
| 6 | ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。 | https://github.com/YutuSec/ActiveMQ_Crack | POC Details |
| 7 | Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request via the Fileserver web application. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-3088.yaml | POC Details |
| 8 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2016-3088.md | POC Details |
| 9 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/activemq-cve-2016-3088.yml | POC Details |
| 10 | https://github.com/vulhub/vulhub/blob/master/activemq/CVE-2016-3088/README.md | POC Details | |
| 11 | A Python-based Exploit Script for CVE-2016-3088 | https://github.com/HeArtE4t3r/CVE-2016-3088 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2016-0288 | IBM Security AppScan Enterprise和IBM Security AppScan Standard XML外部实体注入漏洞 | |
| CVE-2016-4500 | Moxa UC-7408 安全漏洞 | |
| CVE-2016-1234 | GNU C Library 基于栈的缓冲区错误漏洞 | |
| CVE-2016-2175 | Apache PDFBox XML外部实体漏洞 | |
| CVE-2016-3075 | GNU C Library基于栈的缓冲区溢出漏洞 | |
| CVE-2016-3094 | Apache Qpid Java Broker 拒绝服务漏洞 | |
| CVE-2016-3697 | Docker runC 安全漏洞 | |
| CVE-2016-4432 | Apache Qpid Java Broker 身份验证绕过漏洞 | |
| CVE-2015-8875 | gdk-pixbuf 整数溢出漏洞 | |
| CVE-2016-1902 | Sensio Labs Symfony 可预测的随机数生成漏洞 | |
| CVE-2016-4423 | Sensio Labs Symfony 拒绝服务漏洞 | |
| CVE-2016-4453 | QEMU 拒绝服务漏洞 | |
| CVE-2016-4454 | QEMU 安全漏洞 | |
| CVE-2016-4810 | 多款Citrix产品安全漏洞 | |
| CVE-2016-4945 | Citrix NetScaler Gateway 跨站脚本漏洞 | |
| CVE-2016-5126 | QEMU 缓冲区错误漏洞 |
No comments yet