尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Sonatype | Nexus Repository | 3.0.0 ~ 3.68.0 | cpe:2.3:a:sonatype:nexus_repository_manager:3.0.0:*:*:*:*:*:*:* |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Nexus Repository Manager 3 Unauthenticated Path Traversal | https://github.com/banditzCyber0x/CVE-2024-4956 | POC详情 |
| 2 | CVE-2024-4956 Nuclei Template | https://github.com/xungzzz/CVE-2024-4956 | POC详情 |
| 3 | Unauthenticated Path Traversal in Nexus Repository 3 | https://github.com/gmh5225/CVE-2024-4956 | POC详情 |
| 4 | [CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner | https://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner | POC详情 |
| 5 | None | https://github.com/thinhap/CVE-2024-4956-PoC | POC详情 |
| 6 | None | https://github.com/eoslvs/CVE-2024-4956 | POC详情 |
| 7 | CVE-2024-4956 : Nexus Repository Manager 3 poc exploit | https://github.com/GoatSecurity/CVE-2024-4956 | POC详情 |
| 8 | Proof-Of-Concept (POC) for CVE-2024-4956 | https://github.com/TypicalModMaker/CVE-2024-4956 | POC详情 |
| 9 | Exploit for CVE-2024-4956 affecting all previous Sonatype Nexus Repository 3.x OSS/Pro versions up to and including 3.68.0 | https://github.com/Praison001/CVE-2024-4956-Sonatype-Nexus-Repository-Manager | POC详情 |
| 10 | Sonatype Nexus Repository Manager 3 (LFI) | https://github.com/Cappricio-Securities/CVE-2024-4956 | POC详情 |
| 11 | CVE-2024-4956 Python exploitation utility | https://github.com/fin3ss3g0d/CVE-2024-4956 | POC详情 |
| 12 | Unauthenticated Path Traversal in Nexus Repository 3 | https://github.com/erickfernandox/CVE-2024-4956 | POC详情 |
| 13 | POC - CVE-2024–4956 - Nexus Repository Manager 3 Unauthenticated Path Traversal | https://github.com/verylazytech/CVE-2024-4956 | POC详情 |
| 14 | None | https://github.com/yagyuufellinluvv/CVE-2024-4956 | POC详情 |
| 15 | None | https://github.com/JolyIrsb/CVE-2024-4956 | POC详情 |
| 16 | None | https://github.com/UMASANKAR-MG/Path-Traversal-CVE-2024-4956 | POC详情 |
| 17 | Simple hash cracker for Apache Shiro hashes written in Golang. Useful for exploiting CVE-2024-4956. | https://github.com/An00bRektn/shirocrack | POC详情 |
| 18 | CVE-2024-4956 Python exploitation utility | https://github.com/XiaomingX/cve-2024-4956 | POC详情 |
| 19 | Detection and exploitation scripts for CVE-2024-4956 | https://github.com/art-of-defence/CVE-2024-4956 | POC详情 |
| 20 | Path Traversal in Sonatype Nexus Repository 3 allows an unauthenticated attacker to read system files. Fixed in version 3.68.1. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-4956.yaml | POC详情 |
| 21 | None | https://github.com/Threekiii/Awesome-POC/blob/master/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/Nexus%20Repository%20Manager%203%20%E6%9C%AA%E6%8E%88%E6%9D%83%E7%9B%AE%E5%BD%95%E7%A9%BF%E8%B6%8A%E6%BC%8F%E6%B4%9E%20CVE-2024-4956.md | POC详情 |
| 22 | https://github.com/vulhub/vulhub/blob/master/nexus/CVE-2024-4956/README.md | POC详情 | |
| 23 | Quick and easy exploitation of CVE-2024-4956 for LFI. | https://github.com/Buff3st-0v3rfl0w/CVE-2024-4956 | POC详情 |
| 24 | Nexus Repository 3 Path Traversal (CVE-2024-4956) | https://github.com/amalpvatayam67/day04-nexus-4956 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论