Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2015-8562 PoC — Joomla! Core 远程代码执行漏洞

Source
Associated Vulnerability
Title:Joomla! Core 远程代码执行漏洞 (CVE-2015-8562)
Description:Joomla! 1.5.x, 2.x, and 3.x before 3.4.6 allow remote attackers to conduct PHP object injection attacks and execute arbitrary PHP code via the HTTP User-Agent header, as exploited in the wild in December 2015.
Description
没有编写完成,以后学习更多知识在回来完善
File Snapshot

[4.0K] /data/pocs/2c30f323860a7c982d95501bc4fac47accb17baa ├── [8.1K] CVE-2015-8562.cpp ├── [1.4K] CVE-2015-8562.sln ├── [6.9K] CVE-2015-8562.vcxproj ├── [1.0K] CVE-2015-8562.vcxproj.filters └── [4.0K] lib ├── [7.6K] base64.cpp └── [1.1K] base64.h 1 directory, 6 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →