{"id":2417,"date":"2018-08-28T07:17:41","date_gmt":"2018-08-28T01:47:41","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=2417"},"modified":"2018-08-28T07:17:41","modified_gmt":"2018-08-28T01:47:41","slug":"apache-struts-version-3","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/","title":{"rendered":"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts"},"content":{"rendered":"<p>Apache Struts Version 3\u00a0is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE on ApacheStruts, also has the ability to create server shell.<\/p>\n<p>Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications.<\/p>\n<p><strong>Below is a full list of all changes:<\/strong><\/p>\n<ul>\n<li>unclosed instantiation of PrintWriter<\/li>\n<li>Http Sessions forcefully created for all requests using I18nInterceptor with default Storage value.<\/li>\n<li>NotSerializableException &#8211; org.apache.struts2.dispatcher.StrutsRequestWrapper<\/li>\n<li>NotSerializableException: com.opensymphony.xwork2.inject.ContainerImpl$ConstructorInjector when using Executioner interceptor<\/li>\n<li>ClassCastException in JarEntryRevision<\/li>\n<li>Dependency Mapping Exception When Using PrefixBasedActionProxyFactory<\/li>\n<li>The converter() method of com.opensymphony.xwork2.conversion.annotations.TypeConversion is now deprecated. If this method is removed in some next release, it will forbid to describe a converter by the name (id) of a Spring bean.<\/li>\n<li>Conversion by annotation does not work<\/li>\n<li>List of Boolean is not populated in Action class<\/li>\n<li>JSONResult exception in struts2-json-plugin-2.5.14.1.jar<\/li>\n<li>buttons with name=\u201dmethod:METHODNAME\u201d sometimes ignore global-allowed-methods defined in struts.xml<\/li>\n<li>Could not create JarEntryRevision for [zip:C:\/\u2026. unknown protocol c<\/li>\n<li>NPE in I18nInterceptor$SessionLocaleHandler.read<\/li>\n<li>JasperReportResult: NPE When Not Using SQL Connection<\/li>\n<li>support JSR 303 Validation Groups in BeanValidation-Plugin<\/li>\n<li>Debug tag should not display anything when not in dev mode<\/li>\n<li>Allow using of Initializable interface on an implementation level<\/li>\n<li>Allowed methods inheritance<\/li>\n<li>Allow use Jackson XML bindings to serialise \/ deserialise XML<\/li>\n<li>when using an custom array as a filed in struts 2 action form textfiled data from jsp page in not populating into custom array but populating in String array or array list<\/li>\n<li>Upgrade Spring to version 4.3.13<\/li>\n<li>Update Log4j2 to 2.10.0<\/li>\n<\/ul>\n<p><strong><span class=\"td_btn td_btn_sm td_3D_btn\">Also Read<\/span>\u00a0<a href=\"https:\/\/kalilinuxtutorials.com\/remote-desktop-caching-tool\/\" target=\"_blank\" rel=\"noopener\">Remote Desktop Caching : Tool To Recover Old RDP<\/a><\/strong><\/p>\n<h2><strong>Apache Struts SHELL<\/strong><\/h2>\n<p><strong>php<\/strong> <span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">terminado<\/span><\/code><\/strong><\/span><br \/>\n<strong>jsp<\/strong> <span style=\"color: #008000;\"><strong><code><span style=\"color: #008000;\">proceso<\/span><\/code><\/strong><\/span><\/p>\n<h2>CVE ADD<\/h2>\n<p><strong>CVE-2013-2251<\/strong> <code><span style=\"color: #008000;\"><strong>'action:', 'redirect:' and 'redirectAction'<\/strong><\/span><\/code><br \/>\n<strong>CVE-2017-5638<\/strong> <code><strong><span style=\"color: #008000;\">Content-Type<\/span><\/strong><\/code><br \/>\n<strong>CVE-2018-11776<\/strong> <code><strong><span style=\"color: #008000;\">'redirect:' and 'redirectAction'<\/span><\/strong><\/code><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-2418 size-full\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png\" alt=\"\" width=\"1462\" height=\"832\" \/><\/p>\n<p><a href=\"https:\/\/github.com\/s1kr10s\/Apache-Struts-v3\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-999\" src=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png\" alt=\"\" width=\"141\" height=\"40\" \/><\/a><strong>Credit : Apache Software Foundation<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apache Struts Version 3\u00a0is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE on ApacheStruts, also has the ability to create server shell. Apache Struts is a free, open-source, MVC framework for creating elegant, modern Java web applications. Below is a full list of all [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28,36],"tags":[193,196,2737],"class_list":["post-2417","post","type-post","status-publish","format-standard","hentry","category-kali","category-security-hacker","tag-apache","tag-apachestruts","tag-rce-vulnerabilities"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities<\/title>\n<meta name=\"description\" content=\"Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE. %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE. %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-28T01:47:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts\",\"datePublished\":\"2018-08-28T01:47:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\"},\"wordCount\":306,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png\",\"keywords\":[\"Apache\",\"ApacheStruts\",\"RCE vulnerabilities\"],\"articleSection\":[\"Kali Linux\",\"Security Hacker\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\",\"name\":\"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png\",\"datePublished\":\"2018-08-28T01:47:41+00:00\",\"description\":\"Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE. %\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities","description":"Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE. %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/","og_locale":"en_US","og_type":"article","og_title":"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities","og_description":"Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE. %","og_url":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2018-08-28T01:47:41+00:00","og_image":[{"url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities On ApacheStruts","datePublished":"2018-08-28T01:47:41+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/"},"wordCount":306,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png","keywords":["Apache","ApacheStruts","RCE vulnerabilities"],"articleSection":["Kali Linux","Security Hacker"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/","url":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/","name":"Apache Struts Version 3 : Tool To Exploit 3 RCE Vulnerabilities","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage"},"thumbnailUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png","datePublished":"2018-08-28T01:47:41+00:00","description":"Apache Struts Version 3 is a tool to exploit 3 RCE vulnerabilities on ApacheStruts. Script contains the fusion of 3 vulnerabilities of type RCE. %","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/apache-struts-version-3\/#primaryimage","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Apache-Struts-v3.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2423,"url":"https:\/\/kalilinuxtutorials.com\/ducky-exploit\/","url_meta":{"origin":2417,"position":0},"title":"Ducky Exploit &#8211; Arduino Rubber Ducky Framework","author":"R K","date":"August 29, 2018","format":false,"excerpt":"Ducky Exploit is python framework which helps as to code Digispark as Rubber Ducky. This script has been tested on ; Kali Linux 18.2 Ubuntu 18.04 Windows It also works with both Python2 and Python3. Ducky Exploit Utilization git clone https:\/\/github.com\/itsmehacker5\/Ducky-Exploit.git cd Ducky-Exploit\/ python ducky.py Also Read\u00a0Apache Struts Version 3\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Ducky-Exploit.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Ducky-Exploit.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Ducky-Exploit.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Ducky-Exploit.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Ducky-Exploit.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/08\/Ducky-Exploit.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":12009,"url":"https:\/\/kalilinuxtutorials.com\/vulmap\/","url_meta":{"origin":2417,"position":1},"title":"Vulmap : Web Vulnerability Scanning &#038; Verification Tools","author":"R K","date":"December 29, 2020","format":false,"excerpt":"Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions. Relevant testers can use vulmap to detect whether the target has a specific vulnerability, and can use the vulnerability exploitation function\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4578,"url":"https:\/\/kalilinuxtutorials.com\/zeebsploit-web-scanner\/","url_meta":{"origin":2417,"position":2},"title":"ZeebSploit: Web Scanner Exploitation Information Gathering","author":"R K","date":"April 12, 2019","format":false,"excerpt":"ZeebSploit is a tool for hacking, searching for web information and scanning vulnerabilities of a web. Installation & Usage apt-get install gitgit clone https:\/\/github.com\/jaxBCD\/Zeebsploit.gitcd Zeebsploitchmod +x install.\/installpython3 zeebsploit.pytype 'help' for show modulesand follow instruction Also Read - Pocsuite3 : Open-Sourced Remote Vulnerability Testing Framework Modules [Main modules] +----------+-------------------------------+ | Modules\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":36088,"url":"https:\/\/kalilinuxtutorials.com\/understanding-and-utilizing-the-tomcat-cve-2024-50379-proof-of-concept-poc\/","url_meta":{"origin":2417,"position":3},"title":"Understanding And Utilizing The Tomcat &#8211; CVE-2024-50379 Proof-of-Concept (PoC)","author":"Varshini","date":"February 4, 2025","format":false,"excerpt":"The Tomcat-CVE-2024-50379-PoC is a proof-of-concept tool designed to demonstrate the exploitation of a critical vulnerability in Apache Tomcat, identified as CVE-2024-50379. This vulnerability, with a CVSS score of 9.8, arises from a Time-of-check Time-of-use (TOCTOU) race condition during JavaServer Pages (JSP) compilation. Under specific configurations, this flaw can lead to\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Tomcat.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Tomcat.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Tomcat.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Tomcat.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Tomcat.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/Tomcat.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":34435,"url":"https:\/\/kalilinuxtutorials.com\/cve-2024-38077\/","url_meta":{"origin":2417,"position":4},"title":"CVE-2024-38077 : A Zero-Click RCE Threat In Windows Server 2025","author":"Varshini","date":"August 14, 2024","format":false,"excerpt":"Earlier this year, we conducted an in-depth analysis of the Windows Remote Desktop Services. Multiple vulnerabilities were discovered, and all related vulnerabilities (56 cases) have been reported to Microsoft. Among them were several Preauth RCE vulnerabilities (Unauthenticated non-sandboxed 0-click RCE) in the Remote Desktop Licensing Service. These vulnerabilities can be\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEh0_LW6rRyhXnERnfKSClL4GLPGe0Qq1Yfra0DUlJ2_7c1F6m6ZfhHoYuiwm98zWI9kNdEYgGtGYRWRYctVTKcn68YRYtLV1VNVcGp5UGZW91DthcwDHdUuAkgxXOOm_PQAk9A8AJ48KLVBHj5dZNeQqLh0UKGdWFqEtiEZtS3Ub8tmVxKklzEaG8RSDSgI\/s16000\/CVE-2024-38077.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35180,"url":"https:\/\/kalilinuxtutorials.com\/vulnhuntr\/","url_meta":{"origin":2417,"position":5},"title":"Vulnhuntr &#8211; Unleashing LLMs For Advanced Security Vulnerability Detection In Codebases","author":"Varshini","date":"October 21, 2024","format":false,"excerpt":"Vulnhuntr leverages the power of LLMs to automatically create and analyze entire code call chains starting from remote user input and ending at server output for detection of complex, multi-step, security-bypassing vulnerabilities that go far beyond what traditional static code analysis tools are capable of performing. See all the details\u2026","rel":"","context":"In &quot;Vulnerability Analysis&quot;","block_context":{"text":"Vulnerability Analysis","link":"https:\/\/kalilinuxtutorials.com\/category\/vulnerability-analysis-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjiiyDqPaYv2R686VqEgPExGnMwnJ-Lk120V97mRcZaqQCpZXezqmpLtLEkburyOuVDY84XNBwWti5knVKU5jIEl8E1DMoR2Tg4GIVgiZBZYAYmcUIpQIj6EA-jp58diop1bO_GR_U_GL1335pcHc2sBvM8V4FyaHfpftAe9CcaoyvEQMmBMVzjJSNBia5\/s1600\/Vulnhuntr%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjiiyDqPaYv2R686VqEgPExGnMwnJ-Lk120V97mRcZaqQCpZXezqmpLtLEkburyOuVDY84XNBwWti5knVKU5jIEl8E1DMoR2Tg4GIVgiZBZYAYmcUIpQIj6EA-jp58diop1bO_GR_U_GL1335pcHc2sBvM8V4FyaHfpftAe9CcaoyvEQMmBMVzjJSNBia5\/s1600\/Vulnhuntr%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjiiyDqPaYv2R686VqEgPExGnMwnJ-Lk120V97mRcZaqQCpZXezqmpLtLEkburyOuVDY84XNBwWti5knVKU5jIEl8E1DMoR2Tg4GIVgiZBZYAYmcUIpQIj6EA-jp58diop1bO_GR_U_GL1335pcHc2sBvM8V4FyaHfpftAe9CcaoyvEQMmBMVzjJSNBia5\/s1600\/Vulnhuntr%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjiiyDqPaYv2R686VqEgPExGnMwnJ-Lk120V97mRcZaqQCpZXezqmpLtLEkburyOuVDY84XNBwWti5knVKU5jIEl8E1DMoR2Tg4GIVgiZBZYAYmcUIpQIj6EA-jp58diop1bO_GR_U_GL1335pcHc2sBvM8V4FyaHfpftAe9CcaoyvEQMmBMVzjJSNBia5\/s1600\/Vulnhuntr%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjiiyDqPaYv2R686VqEgPExGnMwnJ-Lk120V97mRcZaqQCpZXezqmpLtLEkburyOuVDY84XNBwWti5knVKU5jIEl8E1DMoR2Tg4GIVgiZBZYAYmcUIpQIj6EA-jp58diop1bO_GR_U_GL1335pcHc2sBvM8V4FyaHfpftAe9CcaoyvEQMmBMVzjJSNBia5\/s1600\/Vulnhuntr%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhjiiyDqPaYv2R686VqEgPExGnMwnJ-Lk120V97mRcZaqQCpZXezqmpLtLEkburyOuVDY84XNBwWti5knVKU5jIEl8E1DMoR2Tg4GIVgiZBZYAYmcUIpQIj6EA-jp58diop1bO_GR_U_GL1335pcHc2sBvM8V4FyaHfpftAe9CcaoyvEQMmBMVzjJSNBia5\/s1600\/Vulnhuntr%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=2417"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/2417\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=2417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=2417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=2417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}