Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2019-15107 Webmin RCE (unauthorized) | https://github.com/jas502n/CVE-2019-15107 | POC Details |
| 2 | Dockerfiles for CVE-2019-15107(webmin RCE) recurrence including v1.890 and v1.920 with Exp for each version. | https://github.com/HACHp1/webmin_docker_and_exp | POC Details |
| 3 | Implementation of CVE-2019-15107 exploit in python | https://github.com/ketlerd/CVE-2019-15107 | POC Details |
| 4 | CVE-2019-15107 webmin python3 | https://github.com/AdministratorGithub/CVE-2019-15107 | POC Details |
| 5 | Built a custom Virtual Machine, running Ubuntu 18.04.1 and Webmin 1.810. Using CVE-2019-15107 to exploit a backdoor in the Linux machine | https://github.com/Rayferrufino/Make-and-Break | POC Details |
| 6 | Remote Code Execution Vulnerability in Webmin | https://github.com/AleWong/WebminRCE-EXP-CVE-2019-15107- | POC Details |
| 7 | None | https://github.com/ianxtianxt/CVE-2019-15107 | POC Details |
| 8 | poc exploit for webmin backdoor (CVE-2019-15107 and CVE-2019-15231) | https://github.com/hannob/webminex | POC Details |
| 9 | webmin_CVE-2019-15107 | https://github.com/ChakoMoonFish/webmin_CVE-2019-15107 | POC Details |
| 10 | None | https://github.com/cdedmondson/Modified-CVE-2019-15107 | POC Details |
| 11 | Webmin <=1.920 RCE | https://github.com/ruthvikvegunta/CVE-2019-15107 | POC Details |
| 12 | CVE-2019-15107 exploit | https://github.com/n0obit4/Webmin_1.890-POC | POC Details |
| 13 | CVE-2019–15107 - Unauthenticated RCE Webmin <=1.920 | https://github.com/squid22/Webmin_CVE-2019-15107 | POC Details |
| 14 | None | https://github.com/MuirlandOracle/CVE-2019-15107 | POC Details |
| 15 | None | https://github.com/diegojuan/CVE-2019-15107 | POC Details |
| 16 | CVE-2019-15107 Webmin Exploit in C | https://github.com/whokilleddb/CVE-2019-15107 | POC Details |
| 17 | None | https://github.com/puckiestyle/CVE-2019-15107 | POC Details |
| 18 | Something I wrote for CVE-2019-15107, a Webmin backdoor | https://github.com/darrenmartyn/CVE-2019-15107 | POC Details |
| 19 | Exploit para CVE-2019-15107 (Webmin 1.890-1.920) sin credenciales RCE escrito en PYTHON. | https://github.com/hacknotes/CVE-2019-15107-Exploit | POC Details |
| 20 | None | https://github.com/Tuz-Wwsd/CVE-2019-15107_detection | POC Details |
| 21 | CVE-2019-15107 Webmin 1.920 RCE | https://github.com/hadrian3689/webmin_1.920 | POC Details |
| 22 | CVE-2019-15107 | https://github.com/f0rkr/CVE-2019-15107 | POC Details |
| 23 | unauthorized RcE exploit for webnin < 1.920 | https://github.com/psw01/CVE-2019-15107_webminRCE | POC Details |
| 24 | Python3 code to exploit CVE-2019-15107 and CVE-2019-15231 | https://github.com/lolminerxmrig/CVE-2019-15107 | POC Details |
| 25 | WebMin Versions <= 1.920 [CVE-2019-15107] RCE PoC | https://github.com/TheAlpha19/MiniExploit | POC Details |
| 26 | CVE-2019-15107 图形化测试程序 | https://github.com/wenruoya/CVE-2019-15107 | POC Details |
| 27 | webmin <=1.920 - RCE via command injection vulnerability | https://github.com/g1vi/CVE-2019-15107 | POC Details |
| 28 | A PoC exploit for CVE-2019-1510 - Webmin Command Injection. | https://github.com/K3ysTr0K3R/CVE-2019-15107-EXPLOIT | POC Details |
| 29 | school project | https://github.com/gozn/detect-CVE-2019-15107-by-pyshark | POC Details |
| 30 | None | https://github.com/h4ck0rman/CVE-2019-15107 | POC Details |
| 31 | None | https://github.com/olingo99/CVE-2019-15107 | POC Details |
| 32 | Exploit for Webmin servers versions 1.890 through 1.920. | https://github.com/aamfrk/Webmin-CVE-2019-15107 | POC Details |
| 33 | RCE for Webmin CVE-2019-15107 | https://github.com/0x4r2/Webmin-CVE-2019-15107 | POC Details |
| 34 | CVE-2019-15107 Webmin unauthenticated RCE | https://github.com/NasrallahBaadi/CVE-2019-15107 | POC Details |
| 35 | CVE-2019-15107 webmin 취약점에 대해서 직접 서버를 구축하고 공격 결과를 남긴 정보입니다. | https://github.com/grayorwhite/CVE-2019-15107 | POC Details |
| 36 | None | https://github.com/CyberTuz/CVE-2019-15107_detection | POC Details |
| 37 | webmin or minisever RCE | https://github.com/MasterCode112/CVE-2019-15107 | POC Details |
| 38 | Webmin-RCE-PoC-CVE-2019-15107 is a Python-based scanner that detects vulnerable Webmin (1.890 - 1.920) servers affected by CVE-2019-15107, an unauthenticated remote code execution (RCE) vulnerability in the /password_change.cgi endpoint. | https://github.com/Mattb709/CVE-2019-15107-Scanner | POC Details |
| 39 | A Python proof-of-concept exploit for CVE-2019-15107 - an unauthenticated remote code execution vulnerability in Webmin versions 1.890 through 1.920. | https://github.com/Mattb709/CVE-2019-15107-Webmin-RCE-PoC | POC Details |
| 40 | Webmin <=1.920. is vulnerable to an unauthenticated remote command execution via the parameter 'old' in password_change.cgi. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-15107.yaml | POC Details |
| 41 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Webmin%20password_change.cgi%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-15107.md | POC Details |
| 42 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Webmin%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-15107.md | POC Details |
| 43 | Webmin 远程命令执行漏洞(CVE-2019-15107) | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/webmin-cve-2019-15107-rce.yml | POC Details |
| 44 | https://github.com/vulhub/vulhub/blob/master/webmin/CVE-2019-15107/README.md | POC Details | |
| 45 | webmin_CVE-2019-15107 | https://github.com/ch4ko/webmin_CVE-2019-15107 | POC Details |
| 46 | None | https://github.com/m4lk3rnel/CVE-2019-15107 | POC Details |
| 47 | None | https://github.com/EdouardosStav/CVE-2019-15107-RCE-WebMin | POC Details |
| 48 | exploit for CVE-2019-15107 | https://github.com/bayazid-bit/CVE-2019-15107 | POC Details |
| 49 | Research Objective: To conduct a comprehensive analysis and successful exploitation of a Remote Code Execution (RCE) vulnerability in Webmin version 1.890 (CVE-2019-15107), ultimately gaining full control over the target system. | https://github.com/ArtemCyberLab/Project-Exploitation-of-Webmin-Authentication-Vulnerability | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-18544 | WordPress invite-anyone插件跨站请求伪造漏洞 | |
| CVE-2014-10376 | WordPress i-recommend-this插件SQL注入漏洞 | |
| CVE-2015-9324 | WordPress easy-digital-downloads插件SQL注入漏洞 | |
| CVE-2019-15116 | WordPress easy-digital-downloads插件跨站脚本漏洞 | |
| CVE-2015-9323 | WordPress 404-to-301插件SQL注入漏洞 | |
| CVE-2019-15115 | WordPress peters-login-redirect插件跨站请求伪造漏洞 | |
| CVE-2017-18547 | WordPress nelio-ab-testing插件跨站请求伪造漏洞 | |
| CVE-2018-20974 | WordPress js-jobs插件跨站请求伪造漏洞 | |
| CVE-2017-18546 | WordPress jayj-quicktag插件跨站请求伪造漏洞 | |
| CVE-2017-18545 | WordPress invite-anyone插件输入验证错误漏洞 | |
| CVE-2019-15120 | Kunena extension for Joomla! 跨站脚本漏洞 | |
| CVE-2017-18543 | WordPress invite-anyone插件访问控制错误漏洞 | |
| CVE-2019-15114 | WordPress formcraft-form-builder插件跨站请求伪造漏洞 | |
| CVE-2015-9322 | WordPress erident-custom-login-and-dashboard插件跨站请求伪造漏洞 | |
| CVE-2019-15113 | WordPress companion-sitemap-generator插件跨站请求伪造漏洞 | |
| CVE-2018-20973 | WordPress companion-auto-update插件输入验证错误漏洞 | |
| CVE-2018-20972 | WordPress companion-auto-update插件跨站请求伪造漏洞 | |
| CVE-2018-20971 | WordPress church-admin插件跨站请求伪造漏洞 | |
| CVE-2017-18542 | WordPress zendesk-help-center插件跨站脚本漏洞 | |
| CVE-2017-18541 | WordPress xo-security插件跨站脚本漏洞 |
Showing top 20 of 40 CVEs. View all on vendor page → →
No comments yet