-
Notifications
You must be signed in to change notification settings - Fork 0
/
9
71 lines (71 loc) · 8.58 KB
/
9
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
----------------------------------------------------------------------------------- ---------------------------------
Exploit Title | Path
----------------------------------------------------------------------------------- ---------------------------------
4D WebSTAR 5.3/5.4 [01;31m[KTomcat[m[K Plugin - Remote Buffer Overflow | osx/remote/25626.c
Apache 1.3.x + [01;31m[KTomcat[m[K 4.0.x/4.1.x mod_jk - Chunked Encoding Denial of Service | unix/dos/22068.pl
Apache Commons FileUpload and Apache [01;31m[KTomcat[m[K - Denial of Service | multiple/dos/31615.rb
Apache [01;31m[KTomcat[m[K (Windows) - 'runtime.getRuntime().exec()' Local Privilege Escalation | windows/local/7264.txt
Apache [01;31m[KTomcat[m[K - 'WebDAV' Remote File Disclosure | multiple/remote/4530.pl
Apache [01;31m[KTomcat[m[K - Account Scanner / 'PUT' Request Command Execution | multiple/remote/18619.txt
Apache [01;31m[KTomcat[m[K - AJP 'Ghostcat File Read/Inclusion | multiple/webapps/48143.py
Apache [01;31m[KTomcat[m[K - AJP 'Ghostcat' File Read/Inclusion (Metasploit) | multiple/webapps/49039.rb
Apache [01;31m[KTomcat[m[K - CGIServlet enableCmdLineArguments Remote Code Execution (Metasploi | windows/remote/47073.rb
Apache [01;31m[KTomcat[m[K - Cookie Quote Handling Remote Information Disclosure | multiple/remote/9994.txt
Apache [01;31m[KTomcat[m[K - Form Authentication 'Username' Enumeration | multiple/remote/9995.txt
Apache [01;31m[KTomcat[m[K - WebDAV SSL Remote File Disclosure | linux/remote/4552.pl
Apache [01;31m[KTomcat[m[K / Geronimo 1.0 - 'Sample Script cal2.jsp?time' Cross-Site Scripting | multiple/remote/27095.txt
Apache [01;31m[KTomcat[m[K 3.0 - Directory Traversal | windows/remote/20716.txt
Apache [01;31m[KTomcat[m[K 3.1 - Path Revealing | multiple/remote/20131.txt
Apache [01;31m[KTomcat[m[K 3.2 - 404 Error Page Cross-Site Scripting | multiple/remote/33379.txt
Apache [01;31m[KTomcat[m[K 3.2 - Directory Disclosure | unix/remote/21882.txt
Apache [01;31m[KTomcat[m[K 3.2.1 - 404 Error Page Cross-Site Scripting | multiple/webapps/10292.txt
Apache [01;31m[KTomcat[m[K 3.2.3/3.2.4 - 'RealPath.jsp' Information Disclosuree | multiple/remote/21492.txt
Apache [01;31m[KTomcat[m[K 3.2.3/3.2.4 - 'Source.jsp' Information Disclosure | multiple/remote/21490.txt
Apache [01;31m[KTomcat[m[K 3.2.3/3.2.4 - Example Files Web Root Full Path Disclosure | multiple/remote/21491.txt
Apache [01;31m[KTomcat[m[K 3.x - Null Byte Directory / File Disclosure | linux/remote/22205.txt
Apache [01;31m[KTomcat[m[K 3/4 - 'DefaultServlet' File Disclosure | unix/remote/21853.txt
Apache [01;31m[KTomcat[m[K 3/4 - JSP Engine Denial of Service | linux/dos/21534.jsp
Apache [01;31m[KTomcat[m[K 4.0.3 - Denial of Service 'Device Name' / Cross-Site Scripting | windows/webapps/21605.txt
Apache [01;31m[KTomcat[m[K 4.0.3 - Requests Containing MS-DOS Device Names Information Disclosu | multiple/remote/31551.txt
Apache [01;31m[KTomcat[m[K 4.0.3 - Servlet Mapping Cross-Site Scripting | linux/remote/21604.txt
Apache [01;31m[KTomcat[m[K 4.0.x - Non-HTTP Request Denial of Service | linux/dos/23245.pl
Apache [01;31m[KTomcat[m[K 4.0/4.1 - Servlet Full Path Disclosure | unix/remote/21412.txt
Apache [01;31m[KTomcat[m[K 4.1 - JSP Request Cross-Site Scripting | unix/remote/21734.txt
Apache [01;31m[KTomcat[m[K 5 - Information Disclosure | multiple/remote/28254.txt
Apache [01;31m[KTomcat[m[K 5.5.0 < 5.5.29 / 6.0.0 < 6.0.26 - Information Disclosure | multiple/remote/12343.txt
Apache [01;31m[KTomcat[m[K 5.5.15 - cal2.jsp Cross-Site Scripting | jsp/webapps/30563.txt
Apache [01;31m[KTomcat[m[K 5.5.25 - Cross-Site Request Forgery | multiple/webapps/29435.txt
Apache [01;31m[KTomcat[m[K 5.x/6.0.x - Directory Traversal | linux/remote/29739.txt
Apache [01;31m[KTomcat[m[K 6.0.10 - Documentation Sample Application Multiple Cross-Site Script | multiple/remote/30052.txt
Apache [01;31m[KTomcat[m[K 6.0.13 - Host Manager Servlet Cross-Site Scripting | multiple/remote/30495.html
Apache [01;31m[KTomcat[m[K 6.0.13 - Insecure Cookie Handling Quote Delimiter Session ID Disclos | multiple/remote/30496.txt
Apache [01;31m[KTomcat[m[K 6.0.13 - JSP Example Web Applications Cross-Site Scripting | jsp/webapps/30189.txt
Apache [01;31m[KTomcat[m[K 6.0.15 - Cookie Quote Handling Remote Information Disclosure | multiple/remote/31130.txt
Apache [01;31m[KTomcat[m[K 6.0.16 - 'HttpServletResponse.sendError()' Cross-Site Scripting | multiple/remote/32138.txt
Apache [01;31m[KTomcat[m[K 6.0.16 - 'RequestDispatcher' Information Disclosure | multiple/remote/32137.txt
Apache [01;31m[KTomcat[m[K 6.0.18 - Form Authentication Existing/Non-Existing 'Username' Enumer | multiple/remote/33023.txt
Apache [01;31m[KTomcat[m[K 6/7/8/9 - Information Disclosure | multiple/remote/41783.txt
Apache [01;31m[KTomcat[m[K 7.0.4 - 'sort' / 'orderBy' Cross-Site Scripting | linux/remote/35011.txt
Apache [01;31m[KTomcat[m[K 8/7/6 (Debian-Based Distros) - Local Privilege Escalation | linux/local/40450.txt
Apache [01;31m[KTomcat[m[K 8/7/6 (RedHat Based Distros) - Local Privilege Escalation | linux/local/40488.txt
Apache [01;31m[KTomcat[m[K 9.0.0.M1 - Cross-Site Scripting (XSS) | multiple/webapps/50119.txt
Apache [01;31m[KTomcat[m[K 9.0.0.M1 - Open Redirect | multiple/webapps/50118.txt
Apache [01;31m[KTomcat[m[K < 5.5.17 - Remote Directory Listing | multiple/remote/2061.txt
Apache [01;31m[KTomcat[m[K < 6.0.18 - 'utf8' Directory Traversal | unix/remote/14489.c
Apache [01;31m[KTomcat[m[K < 6.0.18 - 'utf8' Directory Traversal (PoC) | multiple/remote/6229.txt
Apache [01;31m[KTomcat[m[K < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / | jsp/webapps/42966.py
Apache [01;31m[KTomcat[m[K < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / | windows/webapps/42953.txt
Apache [01;31m[KTomcat[m[K Connector jk2-2.0.2 mod_jk2 - Remote Overflow | linux/remote/5386.txt
Apache [01;31m[KTomcat[m[K Connector mod_jk - 'exec-shield' Remote Overflow | linux/remote/4162.c
Apache [01;31m[KTomcat[m[K Manager - Application Deployer (Authenticated) Code Execution (Metas | multiple/remote/16317.rb
Apache [01;31m[KTomcat[m[K Manager - Application Upload (Authenticated) Code Execution (Metaspl | multiple/remote/31433.rb
Apache [01;31m[KTomcat[m[K mod_jk 1.2.20 - Remote Buffer Overflow (Metasploit) | windows/remote/16798.rb
Apache [01;31m[KTomcat[m[K/JBoss EJBInvokerServlet / JMXInvokerServlet (RMI over HTTP) Marshall | php/remote/28713.php
AWStats 6.x - Apache [01;31m[KTomcat[m[K Configuration File Arbitrary Command Execution | cgi/webapps/35035.txt
Jakarta [01;31m[KTomcat[m[K 3.x/4.0 - Error Message Information Disclosure | unix/local/21073.txt
[01;31m[KTomcat[m[K - Remote Code Execution via JSP Upload Bypass (Metasploit) | java/remote/43008.rb
[01;31m[KTomcat[m[K 3.0/3.1 Snoop Servlet - Information Disclosure | multiple/remote/20132.txt
[01;31m[KTomcat[m[K 3.2.1/4.0 / Weblogic Server 5.1 - URL JSP Request Source Code Disclosure | multiple/remote/20719.txt
[01;31m[KTomcat[m[K proprietaryEvaluate 9.0.0.M1 - Sandbox Escape | java/webapps/47892.txt
----------------------------------------------------------------------------------- ---------------------------------
Shellcodes: No Results