ERPScan Public POC for CVE-2018-2636# Install
```
$ pip install --user requests argparse unicodedata
```
# Info
POC for CVE-2018-2636.
# Usage example
```
python eGw.py -H 127.0.0.1 -P 8080 -i
...
[*] Let's get info about server
[!] Your instance is vulnerable to CVE-2018-2636
...
```
# Links
[Oracle Critical Patch Update Advisory January 2018 - CVE-2018-2636](http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html)
[Oracle Micros POS breached again](https://erpscan.com/press-center/blog/oracle-micros-pos-breached/)
[4.0K] /data/pocs/c08c82bd3a2d9651ef9c9aaa6a997ff4287392b3
├── [ 12K] eGw.py
└── [ 512] README.md
0 directories, 2 files