All Projects → mufeedvh → CVE-2019-8449

mufeedvh / CVE-2019-8449

Licence: other
CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to CVE-2019-8449

Vfeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+1151.52%)
Mutual labels:  exploits, vulnerability, cve
Exploits
Real world and CTFs exploiting web/binary POCs.
Stars: ✭ 69 (+4.55%)
Mutual labels:  exploit, vulnerability, exploit-code
exploits challenges
Challenges and vulnerabilities exploitation.
Stars: ✭ 60 (-9.09%)
Mutual labels:  exploits, exploiting-vulnerabilities, exploit-code
quick-scripts
A collection of my quick and dirty scripts for vulnerability POC and detections
Stars: ✭ 73 (+10.61%)
Mutual labels:  vulnerability, exploiting-vulnerabilities, exploit-code
Hacker ezines
A collection of electronic hacker magazines carefully curated over the years from multiple sources
Stars: ✭ 72 (+9.09%)
Mutual labels:  exploit, exploits, vulnerability
jtb
Jira Tool Box, for speed up your workflow, easy browsing Jira ticket.
Stars: ✭ 15 (-77.27%)
Mutual labels:  jira, jira-issue, jira-rest-api
vulristics
Extensible framework for analyzing publicly available information about vulnerabilities
Stars: ✭ 46 (-30.3%)
Mutual labels:  exploit, vulnerability, cve
Herpaderping
Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the intentions of a process.
Stars: ✭ 614 (+830.3%)
Mutual labels:  exploit, exploits, vulnerability
Labs
Vulnerability Labs for security analysis
Stars: ✭ 1,002 (+1418.18%)
Mutual labels:  exploit, vulnerability, cve
Cve 2017 0065
Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-77.27%)
Mutual labels:  exploit, vulnerability, cve
cve-2016-1764
Extraction of iMessage Data via XSS
Stars: ✭ 52 (-21.21%)
Mutual labels:  exploit, vulnerability, cve
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+15734.85%)
Mutual labels:  exploit, exploits, vulnerability
exploits
Some of my public exploits
Stars: ✭ 50 (-24.24%)
Mutual labels:  exploit, exploits, vulnerability
vmware guest auth bypass
Proof of concept of VMSA-2017-0012
Stars: ✭ 42 (-36.36%)
Mutual labels:  exploit, vulnerability
SAP vulnerabilities
DoS PoC's for SAP products
Stars: ✭ 47 (-28.79%)
Mutual labels:  exploit, vulnerability
Vehicle-Security-Toolkit
汽车/安卓/固件/代码安全测试工具集
Stars: ✭ 367 (+456.06%)
Mutual labels:  vulnerability, cve
rsGen
rsGen is a Reverse Shell Payload Generator for hacking.
Stars: ✭ 71 (+7.58%)
Mutual labels:  exploit, vulnerability
break-fast-serial
A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
Stars: ✭ 53 (-19.7%)
Mutual labels:  exploit, vulnerability
overflow
A command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (+0%)
Mutual labels:  exploit, vulnerability
dirtycow
radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Stars: ✭ 93 (+40.91%)
Mutual labels:  exploit, cve

CVE-2019-8449

CVE-2019-8449 Exploit for Jira Releases Below v8.3.4

CVSS Score: 5.0
Vulnerability Type(s): Information Disclosure
Authentication: Not Required
Affected Versions: 2.1 - 8.3.4
Publish Date: 2019-09-11
Exploit-DB: https://www.exploit-db.com/exploits/47990

Description

The /rest/api/latest/groupuserpicker resource in Jira before version 8.4.0 allows remote attackers to enumerate usernames via an information disclosure vulnerability.

Usage

python CVE-2019-8449.py

Links

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].