1 |
Nexus Repository Manager 3 Unauthenticated Path Traversal |
https://github.com/banditzCyber0x/CVE-2024-4956 |
POC详情
|
2 |
CVE-2024-4956 Nuclei Template |
https://github.com/xungzzz/CVE-2024-4956 |
POC详情
|
3 |
Unauthenticated Path Traversal in Nexus Repository 3 |
https://github.com/gmh5225/CVE-2024-4956 |
POC详情
|
4 |
[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner |
https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner |
POC详情
|
5 |
None |
https://github.com/thinhap/CVE-2024-4956-PoC |
POC详情
|
6 |
None |
https://github.com/eoslvs/CVE-2024-4956 |
POC详情
|
7 |
CVE-2024-4956 : Nexus Repository Manager 3 poc exploit |
https://github.com/GoatSecurity/CVE-2024-4956 |
POC详情
|
8 |
Proof-Of-Concept (POC) for CVE-2024-4956 |
https://github.com/TypicalModMaker/CVE-2024-4956 |
POC详情
|
9 |
Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0 |
https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager |
POC详情
|
10 |
Sonatype Nexus Repository Manager 3 (LFI) |
https://github.com/Cappricio-Securities/CVE-2024-4956 |
POC详情
|
11 |
CVE-2024-4956 Python exploitation utility |
https://github.com/fin3ss3g0d/CVE-2024-4956 |
POC详情
|
12 |
Unauthenticated Path Traversal in Nexus Repository 3 |
https://github.com/erickfernandox/CVE-2024-4956 |
POC详情
|
13 |
POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal |
https://github.com/verylazytech/CVE-2024-4956 |
POC详情
|
14 |
None |
https://github.com/yagyuufellinluvv/CVE-2024-4956 |
POC详情
|
15 |
None |
https://github.com/JolyIrsb/CVE-2024-4956 |
POC详情
|
16 |
None |
https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956 |
POC详情
|
17 |
Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956. |
https://github.com/An00bRektn/shirocrack |
POC详情
|
18 |
CVE-2024-4956 Python exploitation utility |
https://github.com/XiaomingX/cve-2024-4956 |
POC详情
|
19 |
Detection and exploitation scripts for CVE-2024-4956 |
https://github.com/art-of-defence/CVE-2024-4956 |
POC详情
|
20 |
Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1.
|
https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4956.yaml |
POC详情
|
21 |
None |
https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Nexus%20Repository%20Manager%203%20%E6%9C%AA%E6%8E%88%E6%9D%83%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2024-4956.md |
POC详情
|
22 |
|
https://github.com/vulhub/vulhub/blob/master/nexus/CVE-2024-4956/README.md |
POC详情
|