Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat Connectors | Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of concept showing how to exploit the CVE-2018-11759 | https://github.com/immunIT/CVE-2018-11759 | POC Details |
| 2 | This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer | https://github.com/Jul10l1r4/Identificador-CVE-2018-11759 | POC Details |
| 3 | None | https://github.com/julioliraup/Identificador-CVE-2018-11759 | POC Details |
| 4 | Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 allows specially constructed requests to expose application functionality through the reverse proxy. It is also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2018/CVE-2018-11759.yaml | POC Details |
| 5 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Mod_jk%20%E8%AE%BF%E9%97%AE%E6%8E%A7%E5%88%B6%E6%9D%83%E9%99%90%E7%BB%95%E8%BF%87%20CVE-2018-11759.md | POC Details |
| 6 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/tomcat-cve-2018-11759.yml | POC Details |
No public POC found.
Login to generate AI POCNo comments yet