Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | ActiveMQ_putshell直接获取webshell | https://github.com/Ma1Dong/ActiveMQ_putshell-CVE-2016-3088 | POC Details |
| 2 | None | https://github.com/pudiding/CVE-2016-3088 | POC Details |
| 3 | Apache ActiveMQ Remote Code Execution Exploit | https://github.com/cyberaguiar/CVE-2016-3088 | POC Details |
| 4 | None | https://github.com/vonderchild/CVE-2016-3088 | POC Details |
| 5 | Apache ActiveMQ PUT RCE Scan | https://github.com/cl4ym0re/CVE-2016-3088 | POC Details |
| 6 | ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。 | https://github.com/YutuSec/ActiveMQ_Crack | POC Details |
| 7 | Apache ActiveMQ 5.x before 5.14.0 allows remote attackers to upload and execute arbitrary files via an HTTP PUT followed by an HTTP MOVE request via the Fileserver web application. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-3088.yaml | POC Details |
| 8 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20ActiveMQ%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%86%99%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2016-3088.md | POC Details |
| 9 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/activemq-cve-2016-3088.yml | POC Details |
| 10 | https://github.com/vulhub/vulhub/blob/master/activemq/CVE-2016-3088/README.md | POC Details | |
| 11 | A Python-based Exploit Script for CVE-2016-3088 | https://github.com/HeArtE4t3r/CVE-2016-3088 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet