Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2016-4437-Shiro反序列化爆破模块和key,命令执行,反弹shell的脚本 | https://github.com/bkfish/Awesome_shiro | POC Details |
| 2 | None | https://github.com/m3terpreter/CVE-2016-4437 | POC Details |
| 3 | 一个针对shiro反序列化漏洞(CVE-2016-4437)的快速利用工具/A simple tool targeted at shiro framework attacks with ysoserial. | https://github.com/4nth0ny1130/shisoserial | POC Details |
| 4 | Python POC to Exploit CVE-2016-4437 Apache Shiro Deserialization Vulnerability Due to Hardcode Encryption Key | https://github.com/pizza-power/CVE-2016-4437 | POC Details |
| 5 | 1.验证CVE-2016-4437、2.解析rememberMe的文件和CBC加密的IV偏移 | https://github.com/xk-mt/CVE-2016-4437 | POC Details |
| 6 | Apache Shiro before 1.2.5, when a cipher key has not been configured for the "remember me" feature, allows remote attackers to execute arbitrary code or bypass intended access restrictions via an unspecified request parameter. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-4437.yaml | POC Details |
| 7 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Shiro%201.2.4%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%20CVE-2016-4437.md | POC Details |
| 8 | https://github.com/vulhub/vulhub/blob/master/shiro/CVE-2016-4437/README.md | POC Details | |
| 9 | 这是基于cve-2016-4437简单的漏洞复现代码 | https://github.com/35789-gh/cve-2016-4437 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet