2019-12-08 14:19:20 +01:00
[
2020-08-22 11:10:29 +02:00
{
"id" : 115195951 ,
"name" : "CVE-2017-10271" ,
"full_name" : "1337g\/CVE-2017-10271" ,
"owner" : {
"login" : "1337g" ,
"id" : 32504404 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4" ,
"html_url" : "https:\/\/github.com\/1337g"
} ,
"html_url" : "https:\/\/github.com\/1337g\/CVE-2017-10271" ,
"description" : "CVE-2017-10271 WEBLOGIC RCE (TESTED)" ,
"fork" : false ,
"created_at" : "2017-12-23T13:04:23Z" ,
2020-09-01 23:09:37 +02:00
"updated_at" : "2020-09-01T16:02:59Z" ,
2020-08-22 11:10:29 +02:00
"pushed_at" : "2017-12-23T13:12:06Z" ,
2020-09-01 23:09:37 +02:00
"stargazers_count" : 38 ,
"watchers_count" : 38 ,
2020-08-22 11:10:29 +02:00
"forks_count" : 26 ,
"forks" : 26 ,
2020-09-01 23:09:37 +02:00
"watchers" : 38 ,
2020-08-22 11:10:29 +02:00
"score" : 0
} ,
{
"id" : 115311346 ,
"name" : "CVE-2017-10271" ,
"full_name" : "s3xy\/CVE-2017-10271" ,
"owner" : {
"login" : "s3xy" ,
"id" : 34327996 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/34327996?v=4" ,
"html_url" : "https:\/\/github.com\/s3xy"
} ,
"html_url" : "https:\/\/github.com\/s3xy\/CVE-2017-10271" ,
"description" : "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server." ,
"fork" : false ,
"created_at" : "2017-12-25T06:11:54Z" ,
"updated_at" : "2019-10-16T11:06:14Z" ,
"pushed_at" : "2017-12-25T06:21:23Z" ,
"stargazers_count" : 23 ,
"watchers_count" : 23 ,
"forks_count" : 8 ,
"forks" : 8 ,
"watchers" : 23 ,
"score" : 0
} ,
{
"id" : 115339400 ,
"name" : "PoCs-Weblogic_2017_10271" ,
"full_name" : "ZH3FENG\/PoCs-Weblogic_2017_10271" ,
"owner" : {
"login" : "ZH3FENG" ,
"id" : 20502660 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/20502660?v=4" ,
"html_url" : "https:\/\/github.com\/ZH3FENG"
} ,
"html_url" : "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271" ,
"description" : "Simplified PoC for Weblogic-CVE-2017-10271" ,
"fork" : false ,
"created_at" : "2017-12-25T13:18:45Z" ,
"updated_at" : "2019-03-19T07:31:45Z" ,
"pushed_at" : "2017-12-25T13:23:32Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
"id" : 115571903 ,
"name" : "CVE-2017-10271" ,
"full_name" : "c0mmand3rOpSec\/CVE-2017-10271" ,
"owner" : {
"login" : "c0mmand3rOpSec" ,
"id" : 17217255 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/17217255?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/c0mmand3rOpSec"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271" ,
"description" : "WebLogic Exploit" ,
"fork" : false ,
"created_at" : "2017-12-28T01:30:50Z" ,
2020-11-07 10:09:13 +01:00
"updated_at" : "2020-11-07T09:05:16Z" ,
2019-12-08 14:19:20 +01:00
"pushed_at" : "2018-07-13T18:56:53Z" ,
2020-11-07 10:09:13 +01:00
"stargazers_count" : 128 ,
"watchers_count" : 128 ,
2020-10-24 23:08:20 +02:00
"forks_count" : 46 ,
"forks" : 46 ,
2020-11-07 10:09:13 +01:00
"watchers" : 128 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2020-08-15 11:08:11 +02:00
{
"id" : 115596796 ,
"name" : "CVE-2017-10271" ,
"full_name" : "Luffin\/CVE-2017-10271" ,
"owner" : {
"login" : "Luffin" ,
"id" : 13807870 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/13807870?v=4" ,
"html_url" : "https:\/\/github.com\/Luffin"
} ,
"html_url" : "https:\/\/github.com\/Luffin\/CVE-2017-10271" ,
"description" : "CVE-2017-10271 POC" ,
"fork" : false ,
"created_at" : "2017-12-28T07:19:13Z" ,
"updated_at" : "2020-08-10T02:31:05Z" ,
"pushed_at" : "2018-01-10T02:34:56Z" ,
"stargazers_count" : 29 ,
"watchers_count" : 29 ,
"forks_count" : 14 ,
"forks" : 14 ,
"watchers" : 29 ,
"score" : 0
} ,
2020-08-22 11:10:29 +02:00
{
"id" : 116099094 ,
"name" : "weblogic_wls_wsat_rce" ,
"full_name" : "cjjduck\/weblogic_wls_wsat_rce" ,
"owner" : {
"login" : "cjjduck" ,
"id" : 23519154 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/23519154?v=4" ,
"html_url" : "https:\/\/github.com\/cjjduck"
} ,
"html_url" : "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce" ,
"description" : "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l" ,
"fork" : false ,
"created_at" : "2018-01-03T06:14:28Z" ,
2020-10-09 05:10:42 +02:00
"updated_at" : "2020-10-09T02:33:00Z" ,
2020-08-22 11:10:29 +02:00
"pushed_at" : "2018-01-03T00:42:57Z" ,
2020-10-09 05:10:42 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2020-09-28 17:10:05 +02:00
"forks_count" : 39 ,
"forks" : 39 ,
2020-10-09 05:10:42 +02:00
"watchers" : 3 ,
2020-08-22 11:10:29 +02:00
"score" : 0
} ,
2020-08-15 11:08:11 +02:00
{
"id" : 116430643 ,
"name" : "CVE-2017-10271" ,
"full_name" : "kkirsche\/CVE-2017-10271" ,
"owner" : {
"login" : "kkirsche" ,
"id" : 947110 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4" ,
"html_url" : "https:\/\/github.com\/kkirsche"
} ,
"html_url" : "https:\/\/github.com\/kkirsche\/CVE-2017-10271" ,
"description" : "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)" ,
"fork" : false ,
"created_at" : "2018-01-05T21:57:03Z" ,
2020-10-30 10:09:11 +01:00
"updated_at" : "2020-10-30T08:09:04Z" ,
2020-08-15 11:08:11 +02:00
"pushed_at" : "2018-01-26T14:28:58Z" ,
2020-10-30 10:09:11 +01:00
"stargazers_count" : 118 ,
"watchers_count" : 118 ,
"forks_count" : 43 ,
"forks" : 43 ,
"watchers" : 118 ,
2020-08-15 11:08:11 +02:00
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
"id" : 117624791 ,
"name" : "CVE-2017-10271" ,
"full_name" : "pssss\/CVE-2017-10271" ,
"owner" : {
"login" : "pssss" ,
"id" : 14834109 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/14834109?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/pssss"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/pssss\/CVE-2017-10271" ,
"description" : "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁" ,
"fork" : false ,
"created_at" : "2018-01-16T03:10:48Z" ,
2020-01-20 10:07:34 +01:00
"updated_at" : "2020-01-20T06:37:58Z" ,
"pushed_at" : "2020-01-20T06:37:56Z" ,
2019-12-08 14:19:20 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2020-09-17 17:08:49 +02:00
"forks_count" : 3 ,
"forks" : 3 ,
2019-12-08 14:19:20 +01:00
"watchers" : 3 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2019-12-27 06:17:04 +01:00
{
"id" : 117926261 ,
"name" : "cve-2017-10271-poc" ,
"full_name" : "SuperHacker-liuan\/cve-2017-10271-poc" ,
"owner" : {
"login" : "SuperHacker-liuan" ,
"id" : 30787037 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/30787037?v=4" ,
"html_url" : "https:\/\/github.com\/SuperHacker-liuan"
} ,
"html_url" : "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc" ,
"description" : "cve-2017-10271 POC" ,
"fork" : false ,
"created_at" : "2018-01-18T03:21:15Z" ,
2020-01-06 10:30:02 +01:00
"updated_at" : "2020-01-06T03:15:27Z" ,
2019-12-27 06:17:04 +01:00
"pushed_at" : "2018-02-02T07:47:30Z" ,
2020-01-06 10:30:02 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2019-12-27 06:17:04 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-01-06 10:30:02 +01:00
"watchers" : 5 ,
2019-12-27 06:17:04 +01:00
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 118044092 ,
"name" : "CVE-2017-10271" ,
"full_name" : "bmcculley\/CVE-2017-10271" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "bmcculley" ,
"id" : 6238704 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/6238704?v=4" ,
"html_url" : "https:\/\/github.com\/bmcculley"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/bmcculley\/CVE-2017-10271" ,
"description" : "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2018-01-18T22:07:33Z" ,
"updated_at" : "2019-10-26T15:31:53Z" ,
"pushed_at" : "2019-10-26T15:31:55Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2020-09-24 17:09:27 +02:00
"id" : 118144871 ,
2019-12-12 06:14:27 +01:00
"name" : "Oracle-WebLogic-CVE-2017-10271" ,
2020-09-24 17:09:27 +02:00
"full_name" : "peterpeter228\/Oracle-WebLogic-CVE-2017-10271" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2020-09-24 17:09:27 +02:00
"login" : "peterpeter228" ,
"id" : 22089258 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/22089258?v=4" ,
"html_url" : "https:\/\/github.com\/peterpeter228"
2019-12-08 14:19:20 +01:00
} ,
2020-09-24 17:09:27 +02:00
"html_url" : "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271" ,
"description" : "WebLogic wls-wsat RCE CVE-2017-10271" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2020-09-24 17:09:27 +02:00
"created_at" : "2018-01-19T15:50:08Z" ,
"updated_at" : "2020-09-24T10:47:12Z" ,
"pushed_at" : "2018-01-19T11:29:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 120462394 ,
2019-12-08 14:19:20 +01:00
"name" : "CVE-2017-10271" ,
2019-12-12 06:14:27 +01:00
"full_name" : "Sch01ar\/CVE-2017-10271" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "Sch01ar" ,
"id" : 28928231 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/28928231?v=4" ,
"html_url" : "https:\/\/github.com\/Sch01ar"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/Sch01ar\/CVE-2017-10271" ,
"description" : null ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2018-02-06T13:38:40Z" ,
"updated_at" : "2018-02-06T13:59:34Z" ,
"pushed_at" : "2018-02-08T09:21:18Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
{
"id" : 120571410 ,
"name" : "weblogic_honeypot" ,
"full_name" : "Cymmetria\/weblogic_honeypot" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "Cymmetria" ,
"id" : 19413345 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/19413345?v=4" ,
"html_url" : "https:\/\/github.com\/Cymmetria"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/Cymmetria\/weblogic_honeypot" ,
"description" : "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability." ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2018-02-07T06:11:23Z" ,
2020-10-27 10:09:08 +01:00
"updated_at" : "2020-10-27T03:58:14Z" ,
2020-04-25 23:07:36 +02:00
"pushed_at" : "2020-04-25T20:55:29Z" ,
2020-10-27 10:09:08 +01:00
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
2020-04-26 23:08:48 +02:00
"forks_count" : 6 ,
"forks" : 6 ,
2020-10-27 10:09:08 +01:00
"watchers" : 17 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2019-12-27 06:17:04 +01:00
{
"id" : 123384221 ,
"name" : "weblogic_wls_rce_poc-exp" ,
"full_name" : "JackyTsuuuy\/weblogic_wls_rce_poc-exp" ,
"owner" : {
"login" : "JackyTsuuuy" ,
"id" : 9449527 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/9449527?v=4" ,
"html_url" : "https:\/\/github.com\/JackyTsuuuy"
} ,
"html_url" : "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp" ,
"description" : "cve-2017-10271" ,
"fork" : false ,
"created_at" : "2018-03-01T04:57:09Z" ,
2020-07-31 23:09:21 +02:00
"updated_at" : "2020-07-31T16:12:20Z" ,
2019-12-27 06:17:04 +01:00
"pushed_at" : "2018-03-01T05:08:29Z" ,
2020-07-31 23:09:21 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2019-12-27 06:17:04 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-07-31 23:09:21 +02:00
"watchers" : 1 ,
2019-12-27 06:17:04 +01:00
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 125456636 ,
"name" : "Oracle-WebLogic-WLS-WSAT" ,
"full_name" : "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "s0wr0b1ndef" ,
"id" : 37288034 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4" ,
"html_url" : "https:\/\/github.com\/s0wr0b1ndef"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT" ,
"description" : "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2018-03-16T03:09:29Z" ,
"updated_at" : "2018-08-05T19:23:02Z" ,
"pushed_at" : "2018-03-16T03:14:12Z" ,
2019-12-08 14:19:20 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
"id" : 139956588 ,
"name" : "Oracle-WebLogic-CVE-2017-10271-master" ,
"full_name" : "lonehand\/Oracle-WebLogic-CVE-2017-10271-master" ,
"owner" : {
"login" : "lonehand" ,
"id" : 20275278 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/20275278?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/lonehand"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master" ,
"description" : null ,
"fork" : false ,
"created_at" : "2018-07-06T08:32:28Z" ,
"updated_at" : "2019-06-27T03:08:05Z" ,
"pushed_at" : "2018-07-06T08:42:40Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-11-04 10:09:17 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2019-12-08 14:19:20 +01:00
"watchers" : 1 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 148616806 ,
"name" : "javaserializetools" ,
"full_name" : "shack2\/javaserializetools" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "shack2" ,
"id" : 26374431 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/26374431?v=4" ,
"html_url" : "https:\/\/github.com\/shack2"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/shack2\/javaserializetools" ,
"description" : "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具, 采用JDK 1.8+NetBeans8.2开发, 软件运行必须安装JDK 1.8或者以上版本。 支持: weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2018-09-13T09:44:18Z" ,
2020-11-13 10:09:23 +01:00
"updated_at" : "2020-11-13T09:03:04Z" ,
2020-10-01 23:08:45 +02:00
"pushed_at" : "2020-10-01T20:20:41Z" ,
2020-11-13 10:09:23 +01:00
"stargazers_count" : 238 ,
"watchers_count" : 238 ,
2020-11-10 22:09:02 +01:00
"forks_count" : 86 ,
"forks" : 86 ,
2020-11-13 10:09:23 +01:00
"watchers" : 238 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 160370962 ,
"name" : "CVE-2017-10271" ,
"full_name" : "nhwuxiaojun\/CVE-2017-10271" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "nhwuxiaojun" ,
"id" : 15905850 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/15905850?v=4" ,
"html_url" : "https:\/\/github.com\/nhwuxiaojun"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271" ,
"description" : "Weblogic(CVE-2017-10271)" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2018-12-04T14:34:10Z" ,
2020-06-10 05:07:50 +02:00
"updated_at" : "2020-06-10T02:53:11Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2018-12-04T14:45:40Z" ,
2020-04-03 11:11:08 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2019-12-12 06:14:27 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-04-03 11:11:08 +02:00
"watchers" : 2 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 161570094 ,
"name" : "JavaDeserialization" ,
"full_name" : "ETOCheney\/JavaDeserialization" ,
"owner" : {
"login" : "ETOCheney" ,
"id" : 28469578 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/28469578?v=4" ,
"html_url" : "https:\/\/github.com\/ETOCheney"
} ,
"html_url" : "https:\/\/github.com\/ETOCheney\/JavaDeserialization" ,
"description" : "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器" ,
"fork" : false ,
"created_at" : "2018-12-13T02:00:23Z" ,
2020-10-28 16:09:09 +01:00
"updated_at" : "2020-10-28T10:00:45Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2018-12-13T14:05:28Z" ,
2020-10-28 16:09:09 +01:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2019-12-12 06:14:27 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-10-28 16:09:09 +01:00
"watchers" : 7 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2019-12-30 04:30:01 +01:00
{
"id" : 165317811 ,
"name" : "cve-2017-10271" ,
"full_name" : "cved-sources\/cve-2017-10271" ,
"owner" : {
"login" : "cved-sources" ,
"id" : 46423677 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4" ,
"html_url" : "https:\/\/github.com\/cved-sources"
} ,
"html_url" : "https:\/\/github.com\/cved-sources\/cve-2017-10271" ,
"description" : "cve-2017-10271" ,
"fork" : false ,
"created_at" : "2019-01-11T22:11:16Z" ,
"updated_at" : "2019-01-11T22:11:38Z" ,
"pushed_at" : "2019-01-11T22:11:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
"id" : 175729381 ,
"name" : "Oracle-WebLogic-CVE-2017-10271" ,
"full_name" : "XHSecurity\/Oracle-WebLogic-CVE-2017-10271" ,
"owner" : {
"login" : "XHSecurity" ,
"id" : 48574583 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/48574583?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/XHSecurity"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271" ,
"description" : "Oracle-WebLogic-CVE-2017-10271" ,
"fork" : false ,
"created_at" : "2019-03-15T01:50:01Z" ,
"updated_at" : "2019-03-15T01:51:35Z" ,
"pushed_at" : "2019-03-15T01:51:34Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-11-04 10:09:17 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2019-12-08 14:19:20 +01:00
"watchers" : 0 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 176763123 ,
"name" : "Weblogic_Wsat_RCE" ,
2020-05-08 23:08:45 +02:00
"full_name" : "kbsec\/Weblogic_Wsat_RCE" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2020-05-08 23:08:45 +02:00
"login" : "kbsec" ,
2019-12-12 06:14:27 +01:00
"id" : 11823496 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/11823496?v=4" ,
2020-05-08 23:08:45 +02:00
"html_url" : "https:\/\/github.com\/kbsec"
2019-12-08 14:19:20 +01:00
} ,
2020-05-08 23:08:45 +02:00
"html_url" : "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE" ,
2019-12-12 06:14:27 +01:00
"description" : "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. " ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-03-20T15:26:55Z" ,
2019-12-19 16:30:01 +01:00
"updated_at" : "2019-12-19T13:44:39Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-03-27T17:47:52Z" ,
2019-12-19 16:30:01 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2019-12-12 06:14:27 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2019-12-19 16:30:01 +01:00
"watchers" : 3 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 183346706 ,
"name" : "CNVD-C-2019-48814-CNNVD-201904-961" ,
"full_name" : "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961" ,
"owner" : {
"login" : "SkyBlueEternal" ,
"id" : 46418185 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4" ,
"html_url" : "https:\/\/github.com\/SkyBlueEternal"
} ,
"html_url" : "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961" ,
"description" : "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC" ,
"fork" : false ,
"created_at" : "2019-04-25T03:07:53Z" ,
2020-09-19 23:10:13 +02:00
"updated_at" : "2020-09-19T16:04:20Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-04-29T02:06:00Z" ,
2020-09-19 23:10:13 +02:00
"stargazers_count" : 103 ,
"watchers_count" : 103 ,
2020-11-02 10:09:15 +01:00
"forks_count" : 37 ,
"forks" : 37 ,
2020-09-19 23:10:13 +02:00
"watchers" : 103 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 183428186 ,
"name" : "WebLogic_CNVD_C_2019_48814" ,
"full_name" : "Yuusuke4\/WebLogic_CNVD_C_2019_48814" ,
"owner" : {
"login" : "Yuusuke4" ,
"id" : 26989867 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/26989867?v=4" ,
"html_url" : "https:\/\/github.com\/Yuusuke4"
} ,
"html_url" : "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814" ,
"description" : "WebLogic CNVD-C-2019_48814 CVE-2017-10271" ,
"fork" : false ,
"created_at" : "2019-04-25T12:18:16Z" ,
"updated_at" : "2019-04-25T12:33:00Z" ,
"pushed_at" : "2019-04-25T12:10:18Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2019-12-08 14:19:20 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2019-12-12 06:14:27 +01:00
"watchers" : 1 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 183430704 ,
"name" : "WebLogic_CNVD_C2019_48814" ,
"full_name" : "7kbstorm\/WebLogic_CNVD_C2019_48814" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "7kbstorm" ,
"id" : 38887063 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/38887063?v=4" ,
"html_url" : "https:\/\/github.com\/7kbstorm"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814" ,
"description" : "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-04-25T12:33:31Z" ,
2020-10-29 04:09:01 +01:00
"updated_at" : "2020-10-29T01:57:54Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-04-25T12:44:02Z" ,
2020-10-29 04:09:01 +01:00
"stargazers_count" : 112 ,
"watchers_count" : 112 ,
2020-11-05 10:09:34 +01:00
"forks_count" : 52 ,
"forks" : 52 ,
2020-10-29 04:09:01 +01:00
"watchers" : 112 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 219752851 ,
"name" : "-CVE-2017-10271-" ,
"full_name" : "ianxtianxt\/-CVE-2017-10271-" ,
"owner" : {
"login" : "ianxtianxt" ,
"id" : 45796484 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4" ,
"html_url" : "https:\/\/github.com\/ianxtianxt"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-" ,
"description" : " (CVE-2017-10271)Java反序列化漏洞" ,
"fork" : false ,
"created_at" : "2019-11-05T13:33:56Z" ,
2020-07-03 11:07:50 +02:00
"updated_at" : "2020-07-03T04:06:16Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-11-05T13:35:14Z" ,
2020-07-03 11:07:50 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 2 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2020-04-06 05:07:47 +02:00
} ,
{
"id" : 253372582 ,
"name" : "CVE-2017-10271" ,
"full_name" : "testwc\/CVE-2017-10271" ,
"owner" : {
"login" : "testwc" ,
"id" : 7675910 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/7675910?v=4" ,
"html_url" : "https:\/\/github.com\/testwc"
} ,
"html_url" : "https:\/\/github.com\/testwc\/CVE-2017-10271" ,
"description" : "CVE-2017-10271" ,
"fork" : false ,
"created_at" : "2020-04-06T02:01:20Z" ,
2020-05-08 11:07:27 +02:00
"updated_at" : "2020-05-08T06:52:50Z" ,
"pushed_at" : "2020-05-08T06:52:48Z" ,
2020-04-06 05:07:47 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]