This repository is a comprehensive collection of Java-related vulnerabilities and their corresponding exploit scripts. It serves as a resource for security researchers, penetration testers, and developers to understand and mitigate common security issues in Java applications.
Each vulnerability is organized into its own directory, named after its CVE identifier (when available). The structure is as follows:
├── CVE-YYYY-XXXX/
│ ├── README.md
│ ├── exploit.py
│ ├── vulnerable/
│ ├── ...
- CVE-2024-4956: Nexus Repository Manager Directory Traversal Vulnerability
(Add more vulnerabilities as they are included in the repository)
The exploits and information in this repository are for educational and research purposes only. Always obtain proper authorization before testing on systems you do not own or have explicit permission to test.
We welcome contributions to this repository. If you'd like to add a new vulnerability or improve existing content, please follow these steps:
- Fork the repository
- Create a new branch for your changes
- Add your vulnerability in a new directory following the existing structure
- Create a pull request with a clear description of your changes
This project is licensed under the MIT License - see the LICENSE file for details.