Enhancement: cves/2015/CVE-2015-7450.yaml by mp
parent
287ab79277
commit
479e3c2b6b
|
@ -1,10 +1,10 @@
|
|||
id: CVE-2015-7450
|
||||
|
||||
info:
|
||||
name: IBM WebSphere Java Object Deserialization RCE
|
||||
name: IBM WebSphere Java Object Deserialization - Remote Code Execution
|
||||
author: wdahlenb
|
||||
severity: critical
|
||||
description: Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default)
|
||||
description: "IBM Websphere Application Server 7, 8, and 8.5 have a deserialization vulnerability in the SOAP Connector (port 8880 by default)."
|
||||
reference:
|
||||
- https://github.com/Coalfire-Research/java-deserialization-exploits/blob/main/WebSphere/websphere_rce.py
|
||||
- https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/
|
||||
|
@ -54,3 +54,5 @@ requests:
|
|||
part: interactsh_protocol # Confirms the DNS Interaction
|
||||
words:
|
||||
- "dns"
|
||||
|
||||
# Enhanced by mp on 2022/05/10
|
||||
|
|
Loading…
Reference in New Issue