Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2019-0604

Description

A remote code execution vulnerability exists in Microsoft SharePoint when the software fails to check the source markup of an application package, aka 'Microsoft SharePoint Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-0594.

POC

Reference

No PoCs from references.

Github

- https://github.com/0xT11/CVE-POC

- https://github.com/20142995/Goby

- https://github.com/20142995/nuclei-templates

- https://github.com/5thphlame/OSCP-NOTES-ACTIVE-DIRECTORY-1

- https://github.com/ANON-D46KPH4TOM/Active-Directory-Exploitation-Cheat-Sheets

- https://github.com/ARPSyndicate/cvemon

- https://github.com/Amar224/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/AshikAhmed007/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/Aslamlatheef/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/CVEDB/PoC-List

- https://github.com/CVEDB/awesome-cve-repo

- https://github.com/CVEDB/top

- https://github.com/Deep-Bagchi/ysoserial.net

- https://github.com/Gh0st0ne/weaponized-0604

- https://github.com/GhostTroops/TOP

- https://github.com/GrapeFruitWolfs/hei

- https://github.com/H0j3n/EzpzSharepoint

- https://github.com/HimmelAward/Goby_POC

- https://github.com/JERRY123S/all-poc

- https://github.com/Jalexander798/JA_Tools-ActiveDirectory-Exploitation

- https://github.com/Mehedi-Babu/active_directory_chtsht

- https://github.com/Micr067/K8tools

- https://github.com/Mohit0/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/NHPT/ysoserial.net

- https://github.com/NyxAzrael/Goby_POC

- https://github.com/Ostorlab/KEV

- https://github.com/Ostorlab/known_exploited_vulnerbilities_detectors

- https://github.com/PWN-Kingdom/Test_Tasks

- https://github.com/QWERTSKIHACK/Active-Directory-Exploitation-Cheat-Sheet.

- https://github.com/Ratlesv/K8tools

- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/SexyBeast233/SecBooks

- https://github.com/ShirokaitoX1412/Chal3_CyRadar

- https://github.com/TGbusWD/K8tools-20191130

- https://github.com/ViniciusClement/OSCP_2025

- https://github.com/Voulnet/desharialize

- https://github.com/Y4er/dotnet-deserialization

- https://github.com/Z0fhack/Goby_POC

- https://github.com/ZTK-009/PowerLadon

- https://github.com/alphaSeclab/sec-daily-2019

- https://github.com/anquanscan/sec-tools

- https://github.com/aymankhder/AD-esploitation-cheatsheet

- https://github.com/boxhg/CVE-2019-0604

- https://github.com/cc8700619/K8

- https://github.com/cetriext/fireeye_cves

- https://github.com/code131415/code131415

- https://github.com/cyb3r-w0lf/nuclei-template-collection

- https://github.com/cyb3rpeace/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/cyberanand1337x/bug-bounty-2022

- https://github.com/davidlebr1/cve-2019-0604-SP2010-netv3.5

- https://github.com/developer3000S/PoC-in-GitHub

- https://github.com/drerx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/elinakrmova/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/hectorgie/PoC-in-GitHub

- https://github.com/hktalent/TOP

- https://github.com/hktalent/ysoserial.net

- https://github.com/irsdl/ysonet

- https://github.com/jbmihoub/all-poc

- https://github.com/k8gege/CVE-2019-0604

- https://github.com/k8gege/PowerLadon

- https://github.com/likekabin/CVE-2019-0604_sharepoint_CVE

- https://github.com/likescam/CVE-2019-0604_sharepoint_CVE

- https://github.com/linhlhq/CVE-2019-0604

- https://github.com/lnick2023/nicenice

- https://github.com/m5050/CVE-2019-0604

- https://github.com/michael101096/cs2020_msels

- https://github.com/mranv/adPentest

- https://github.com/nholuongut/active-directory-exploitation-cheat-sheet

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/only2pencils/Cybersecurity-Current-Event-Report

- https://github.com/puckiestyle/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/puckiestyle/ysoserial.net

- https://github.com/puckiestyle/ysoserial.net-master

- https://github.com/pwntester/ysoserial.net

- https://github.com/qazbnm456/awesome-cve-poc

- https://github.com/qq351188606/k8gege

- https://github.com/r0eXpeR/supplier

- https://github.com/rajbhx/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/retr0-13/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/revoverflow/ysoserial

- https://github.com/rodrigosilvaluz/JUST_WALKING_DOG

- https://github.com/rumputliar/Active-Directory-Exploitation-Cheat-Sheet

- https://github.com/s3mPr1linux/JUST_WALKING_DOG

- https://github.com/secret-arrow/ysoserial.net

- https://github.com/triw0lf/Security-Matters-22

- https://github.com/undefined-name12/Cheat-Sheet-Active-Directory

- https://github.com/weeka10/-hktalent-TOP

- https://github.com/whitfieldsdad/epss

- https://github.com/xbl3/awesome-cve-poc_qazbnm456