Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Node-jose Library | Node-jose Library | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This repository contains the POC of an exploit for node-jose < 0.11.0 | https://github.com/zi0Black/POC-CVE-2018-0114 | POC Details |
| 2 | None | https://github.com/Logeirs/CVE-2018-0114 | POC Details |
| 3 | POC for CVE-2018-0114 written in Go | https://github.com/adityathebe/POC-CVE-2018-0114 | POC Details |
| 4 | python2.7 script for JWT generation | https://github.com/Eremiel/CVE-2018-0114 | POC Details |
| 5 | None | https://github.com/Starry-lord/CVE-2018-0114 | POC Details |
| 6 | Exploit for Node-jose < 0.11.0 written in Ruby | https://github.com/scumdestroy/CVE-2018-0114 | POC Details |
| 7 | Exploitation of a vulnerability in Cisco's node-jose, a JavaScript library created to manage JWT. | https://github.com/j4k0m/CVE-2018-0114 | POC Details |
| 8 | JWT Exploit | https://github.com/mmeza-developer/CVE-2018-0114 | POC Details |
| 9 | None | https://github.com/CyberSecurityUP/CVE-2018-0114-Exploit | POC Details |
| 10 | Automate JWT Exploit (CVE-2018-0114) | https://github.com/amr9k8/jwt-spoof-tool | POC Details |
| 11 | None | https://github.com/Pandora-research/CVE-2018-0114-Exploit | POC Details |
| 12 | A PoC of CVE-2018-0114 I made for PentesterLab | https://github.com/sealldeveloper/CVE-2018-0114-PoC | POC Details |
| 13 | None | https://github.com/n0m-d/CVE-2018-0114-Go | POC Details |
No public POC found.
Login to generate AI POCNo comments yet