尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat Connectors | Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Proof of concept showing how to exploit the CVE-2018-11759 | https://github.com/immunIT/CVE-2018-11759 | POC详情 |
| 2 | This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer | https://github.com/Jul10l1r4/Identificador-CVE-2018-11759 | POC详情 |
| 3 | None | https://github.com/julioliraup/Identificador-CVE-2018-11759 | POC详情 |
| 4 | Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 allows specially constructed requests to expose application functionality through the reverse proxy. It is also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-11759.yaml | POC详情 |
| 5 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Mod_jk%20%E8%AE%BF%E9%97%AE%E6%8E%A7%E5%88%B6%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%20CVE-2018-11759.md | POC详情 |
| 6 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/tomcat-cve-2018-11759.yml | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论