mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-13 05:54:46 +02:00
34 lines
1.4 KiB
Markdown
34 lines
1.4 KiB
Markdown
### [CVE-2014-7205](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7205)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
Eval injection vulnerability in the internals.batch function in lib/batch.js in the bassmaster plugin before 1.5.2 for the hapi server framework for Node.js allows remote attackers to execute arbitrary Javascript code via unspecified vectors.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://www.exploit-db.com/exploits/40689/
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/AndrewTrube/CVE-2014-7205
|
|
- https://github.com/BLACKHAT-SSG/OSWE-Preparation-
|
|
- https://github.com/MdTauheedAlam/AWAE-OSWE-Notes
|
|
- https://github.com/PwnAwan/OSWE-Preparation-
|
|
- https://github.com/R0B1NL1N/OSWE
|
|
- https://github.com/Xcod3bughunt3r/OSWE
|
|
- https://github.com/alanshaw/nsp-advisories-api
|
|
- https://github.com/kymb0/web_study
|
|
- https://github.com/maximilianmarx/bassmaster-rce
|
|
- https://github.com/mishmashclone/ManhNho-AWAE-OSWE
|
|
- https://github.com/mishmashclone/timip-OSWE
|
|
- https://github.com/shreyaschavhan/oswe-awae-pre-preperation-plan-and-notes
|
|
- https://github.com/tatumroaquin/ssji-webapp
|
|
- https://github.com/tatumroaquin/vwa-ssji
|
|
- https://github.com/timip/OSWE
|
|
- https://github.com/zer0byte/AWAE-OSWP
|
|
|