From ba228d7c5a2cc40a3e4de524806bdc819fa53af1 Mon Sep 17 00:00:00 2001 From: helloexp <21156949+helloexp@users.noreply.github.com> Date: Tue, 1 Mar 2022 14:09:48 +0800 Subject: [PATCH] =?UTF-8?q?=E4=BC=98=E5=8C=96=E7=9B=AE=E5=BD=95?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../JbossAS_v5.x_v6.x_CVE-2017-12149/README2.md | 16 ---------------- 1 file changed, 16 deletions(-) delete mode 100644 JbossAS/JbossAS_v5.x_v6.x_CVE-2017-12149/README2.md diff --git a/JbossAS/JbossAS_v5.x_v6.x_CVE-2017-12149/README2.md b/JbossAS/JbossAS_v5.x_v6.x_CVE-2017-12149/README2.md deleted file mode 100644 index 2740b89..0000000 --- a/JbossAS/JbossAS_v5.x_v6.x_CVE-2017-12149/README2.md +++ /dev/null @@ -1,16 +0,0 @@ -# jboss-_CVE-2017-12149 - -![72DC2C8058A7B3711A5D0446692D4BDA](Downloads/jboss-_CVE-2017-12149-master/jboss-_CVE-2017-12149-master/截图.jpg) - - - -verify_CVE-2017-12149.jar提供命令行模式下验证漏洞,如果漏洞存在返回特征字符串,只需要执行命令: - -```shell -$ java -jar verify_CVE-2017-12149.jar http://xxx:8080 - -#成功返回: -vuln6581362514513155613jboss -``` - -![截图2](Downloads/jboss-_CVE-2017-12149-master/jboss-_CVE-2017-12149-master/截图2.png) \ No newline at end of file