Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4 | https://github.com/mufeedvh/CVE-2019-8449 | POC Details |
| 2 | User Enumeration Proof Of Concept Exploit for CVE-2019-8449 | https://github.com/r0lh/CVE-2019-8449 | POC Details |
| 3 | Jira before 8.4.0 is susceptible to information disclosure. The /rest/api/latest/groupuserpicker resource can allow an attacker to enumerate usernames, and thereby potentially obtain sensitive information, modify data, and/or execute unauthorized operations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-8449.yaml | POC Details |
| 4 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Atlassian%20Jira%20groupuserpicker%20%E7%94%A8%E6%88%B7%E4%BF%A1%E6%81%AF%E6%9E%9A%E4%B8%BE%E6%BC%8F%E6%B4%9E%20CVE-2019-8449.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet