Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/tucommenceapousser/CVE-2024-27198 | POC Details |
| 2 | Exploit for CVE-2024-27198 - TeamCity Server | https://github.com/yoryio/CVE-2024-27198 | POC Details |
| 3 | CVE-2024-27198 - Authentication Bypass Using an Alternate Path vulnerability in JetBrains TeamCity Server | https://github.com/labesterOct/CVE-2024-27198 | POC Details |
| 4 | Proof of Concept for Authentication Bypass in JetBrains TeamCity Pre-2023.11.4 | https://github.com/Chocapikk/CVE-2024-27198 | POC Details |
| 5 | CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4 | https://github.com/W01fh4cker/CVE-2024-27198-RCE | POC Details |
| 6 | A PoC for CVE-2024-27198 written in golang | https://github.com/rampantspark/CVE-2024-27198 | POC Details |
| 7 | None | https://github.com/passwa11/CVE-2024-27198-RCE | POC Details |
| 8 | None | https://github.com/CharonDefalt/CVE-2024-27198-RCE | POC Details |
| 9 | A PoC exploit for CVE-2024-27198 - JetBrains TeamCity Authentication Bypass | https://github.com/K3ysTr0K3R/CVE-2024-27198-EXPLOIT | POC Details |
| 10 | Em fevereiro de 2024, foi identificado duas novas vulnerabilidades que afetam o servidor JetBrains TeamCity (CVE-2024-27198 e CVE-2024-27199) | https://github.com/Shimon03/Explora-o-RCE-n-o-autenticado-JetBrains-TeamCity-CVE-2024-27198- | POC Details |
| 11 | CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information | https://github.com/Stuub/RCity-CVE-2024-27198 | POC Details |
| 12 | None | https://github.com/HPT-Intern-Task-Submission/CVE-2024-27198 | POC Details |
| 13 | CVE-2024-27198 & CVE-2024-27199 PoC - RCE, Admin Account Creation, Enum Users, Server Information #RCE #python3 | https://github.com/Pypi-Project/RCity-CVE-2024-27198 | POC Details |
| 14 | PoC about CVE-2024-27198 | https://github.com/jrbH4CK/CVE-2024-27198 | POC Details |
| 15 | is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198) | https://github.com/geniuszlyy/CVE-2024-27198 | POC Details |
| 16 | a proof of concept of the CVE-2024-27198 which infect jetbrains teamCity | https://github.com/Cythonic1/CVE-2024-27198_POC | POC Details |
| 17 | is a PoC tool that targets a vulnerability in the TeamCity server (CVE-2024-27198) | https://github.com/geniuszly/CVE-2024-27198 | POC Details |
| 18 | In this project, I exploited the CVE-2024-27198-RCE vulnerability to perform a remote code execution (RCE) attack on a vulnerable TeamCity server. | https://github.com/ArtemCyberLab/Project-Exploiting-CVE-2024-27198-RCE-Vulnerability | POC Details |
| 19 | In JetBrains TeamCity before 2023.11.4 authentication bypass allowing to perform admin actions was possible | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-27198.yaml | POC Details |
| 20 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/JetBrains%20TeamCity%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20%20CVE-2024-27198.md | POC Details |
| 21 | proof-of-concept mass scanner targeting JetBrains TeamCity instances affected by CVE-2024-27198 | https://github.com/EynaExp/CVE-2024-27198-POC | POC Details |
| 22 | https://github.com/vulhub/vulhub/blob/master/teamcity/CVE-2024-27198/README.md | POC Details | |
| 23 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/JetBrains%20TeamCity%20%E8%BA%AB%E4%BB%BD%E9%AA%8C%E8%AF%81%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2024-27198.md | POC Details |
No public POC found.
Login to generate AI POCNo comments yet