This Metasploit module exploits CVE-2016-0792 a vulnerability in Jenkins versions older than 1.650 and Jenkins LTS versions older than 1.642.2 which is caused by unsafe deserialization in XStream with Groovy in the classpath, which allows remote arbitrary code execution. The issue affects default installations. Authentication is not required to exploit the vulnerability.
52a40982d2eed44b68632a3f6deca119172cfb8a682bb8fd52169cc4b2182bba
Spring Framework versions 3.0.0 to 3.0.5, 2.5.0 to 2.5.6.SEC02, and 2.5.0 to 2.5.7.SR01 suffer from an information disclosure vulnerability.
f0dc757e73d89236f2c88698d4791d1317a31be811db0b76dade2bee53c8a3d7
Whitepaper called Bypassing URL Authentication and Authorization with HTTP Verb Tampering.
89c79276bb60d2a827a2b05125ffbdfb1c71292138a852beeb9e94a711e853bb