2020-10-29 04:09:01 +01:00
[
2020-12-30 22:09:58 +01:00
{
"id" : 252131233 ,
"name" : "exphub" ,
"full_name" : "zhzyker\/exphub" ,
"owner" : {
"login" : "zhzyker" ,
"id" : 32918050 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4" ,
2020-12-30 22:09:58 +01:00
"html_url" : "https:\/\/github.com\/zhzyker"
} ,
"html_url" : "https:\/\/github.com\/zhzyker\/exphub" ,
"description" : "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本, 最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340" ,
"fork" : false ,
"created_at" : "2020-04-01T09:33:35Z" ,
2021-04-27 23:11:10 +02:00
"updated_at" : "2021-04-27T15:27:35Z" ,
2021-04-04 17:10:08 +02:00
"pushed_at" : "2021-04-04T09:13:57Z" ,
2021-04-27 23:11:10 +02:00
"stargazers_count" : 2538 ,
"watchers_count" : 2538 ,
2021-04-27 11:11:33 +02:00
"forks_count" : 737 ,
"forks" : 737 ,
2021-04-27 23:11:10 +02:00
"watchers" : 2538 ,
2021-04-08 05:11:17 +02:00
"score" : 0
} ,
{
"id" : 307998445 ,
"name" : "CVE-2020-14882" ,
"full_name" : "jas502n\/CVE-2020-14882" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2020-14882" ,
"description" : "CVE-2020– 14882、CVE-2020– 14883" ,
"fork" : false ,
"created_at" : "2020-10-28T11:43:37Z" ,
2021-04-15 11:11:18 +02:00
"updated_at" : "2021-04-15T06:57:22Z" ,
2021-04-08 05:11:17 +02:00
"pushed_at" : "2020-11-16T04:23:09Z" ,
2021-04-15 11:11:18 +02:00
"stargazers_count" : 223 ,
"watchers_count" : 223 ,
2021-04-16 17:11:07 +02:00
"forks_count" : 45 ,
"forks" : 45 ,
2021-04-15 11:11:18 +02:00
"watchers" : 223 ,
2020-12-30 22:09:58 +01:00
"score" : 0
} ,
2021-04-09 05:11:13 +02:00
{
"id" : 308145197 ,
"name" : "CVE-2020-14882" ,
"full_name" : "s1kr10s\/CVE-2020-14882" ,
"owner" : {
"login" : "s1kr10s" ,
"id" : 5374475 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5374475?v=4" ,
"html_url" : "https:\/\/github.com\/s1kr10s"
} ,
"html_url" : "https:\/\/github.com\/s1kr10s\/CVE-2020-14882" ,
"description" : "CVE-2020– 14882 by Jang" ,
"fork" : false ,
"created_at" : "2020-10-28T21:28:12Z" ,
"updated_at" : "2021-03-18T23:50:58Z" ,
"pushed_at" : "2020-10-29T03:57:09Z" ,
"stargazers_count" : 28 ,
"watchers_count" : 28 ,
"forks_count" : 19 ,
"forks" : 19 ,
"watchers" : 28 ,
"score" : 0
} ,
2020-10-29 04:09:01 +01:00
{
"id" : 308184758 ,
2020-11-26 04:09:16 +01:00
"name" : "-Patched-McMaster-University-Blind-Command-Injection" ,
"full_name" : "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection" ,
2020-10-29 04:09:01 +01:00
"owner" : {
"login" : "Umarovm" ,
"id" : 25722145 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25722145?v=4" ,
2020-10-29 04:09:01 +01:00
"html_url" : "https:\/\/github.com\/Umarovm"
} ,
2020-11-26 04:09:16 +01:00
"html_url" : "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection" ,
2020-10-31 04:08:58 +01:00
"description" : "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca." ,
2020-10-29 04:09:01 +01:00
"fork" : false ,
"created_at" : "2020-10-29T01:28:41Z" ,
2020-12-04 04:09:26 +01:00
"updated_at" : "2020-12-04T02:16:03Z" ,
"pushed_at" : "2020-12-04T02:16:01Z" ,
2020-10-29 04:09:01 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-29 10:08:56 +01:00
} ,
2021-04-09 05:11:13 +02:00
{
"id" : 308238126 ,
"name" : "CVE-2020-14882" ,
"full_name" : "RedTeamWing\/CVE-2020-14882" ,
"owner" : {
"login" : "RedTeamWing" ,
"id" : 25416365 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4" ,
"html_url" : "https:\/\/github.com\/RedTeamWing"
} ,
"html_url" : "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882" ,
"description" : "CVE-2020-14882 Weblogic-Exp" ,
"fork" : false ,
"created_at" : "2020-10-29T06:30:30Z" ,
"updated_at" : "2021-03-14T05:03:17Z" ,
"pushed_at" : "2020-10-29T06:36:01Z" ,
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
"forks_count" : 8 ,
"forks" : 8 ,
"watchers" : 13 ,
"score" : 0
} ,
{
"id" : 308343789 ,
"name" : "cve-2020-14882" ,
"full_name" : "0thm4n3\/cve-2020-14882" ,
"owner" : {
"login" : "0thm4n3" ,
"id" : 12746014 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12746014?v=4" ,
"html_url" : "https:\/\/github.com\/0thm4n3"
} ,
"html_url" : "https:\/\/github.com\/0thm4n3\/cve-2020-14882" ,
"description" : "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882" ,
"fork" : false ,
"created_at" : "2020-10-29T13:53:31Z" ,
"updated_at" : "2021-03-18T23:46:12Z" ,
"pushed_at" : "2020-10-31T13:03:26Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 308374913 ,
"name" : "cve-2020-14882" ,
"full_name" : "wsfengfan\/cve-2020-14882" ,
"owner" : {
"login" : "wsfengfan" ,
"id" : 33821840 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4" ,
"html_url" : "https:\/\/github.com\/wsfengfan"
} ,
"html_url" : "https:\/\/github.com\/wsfengfan\/cve-2020-14882" ,
"description" : "CVE-2020-14882 EXP 回显" ,
"fork" : false ,
"created_at" : "2020-10-29T15:44:23Z" ,
"updated_at" : "2020-12-06T17:09:24Z" ,
"pushed_at" : "2020-11-09T09:55:10Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 308605927 ,
"name" : "CVE-2020-14882" ,
"full_name" : "alexfrancow\/CVE-2020-14882" ,
"owner" : {
"login" : "alexfrancow" ,
"id" : 23419929 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/23419929?v=4" ,
"html_url" : "https:\/\/github.com\/alexfrancow"
} ,
"html_url" : "https:\/\/github.com\/alexfrancow\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-10-30T11:07:11Z" ,
"updated_at" : "2020-10-31T15:57:21Z" ,
"pushed_at" : "2020-10-31T15:57:19Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-04-08 05:11:17 +02:00
{
"id" : 308782228 ,
"name" : "CVE-2020-14882_POC" ,
"full_name" : "GGyao\/CVE-2020-14882_POC" ,
"owner" : {
"login" : "GGyao" ,
"id" : 38530938 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4" ,
"html_url" : "https:\/\/github.com\/GGyao"
} ,
"html_url" : "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC" ,
"description" : "CVE-2020-14882批量验证工具。" ,
"fork" : false ,
"created_at" : "2020-10-31T01:43:54Z" ,
"updated_at" : "2021-03-18T23:37:34Z" ,
"pushed_at" : "2020-12-01T05:05:24Z" ,
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 12 ,
"score" : 0
} ,
2021-04-09 05:11:13 +02:00
{
"id" : 309098912 ,
"name" : "Weblogic_Unauthorized-bypass-RCE" ,
"full_name" : "ludy-dev\/Weblogic_Unauthorized-bypass-RCE" ,
"owner" : {
"login" : "ludy-dev" ,
"id" : 70466565 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4" ,
"html_url" : "https:\/\/github.com\/ludy-dev"
} ,
"html_url" : "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE" ,
"description" : "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script" ,
"fork" : false ,
"created_at" : "2020-11-01T13:12:27Z" ,
"updated_at" : "2021-03-18T23:50:26Z" ,
"pushed_at" : "2020-11-01T13:56:48Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0
} ,
2021-04-08 05:11:17 +02:00
{
"id" : 309655403 ,
"name" : "CVE-2020-14882_ALL" ,
"full_name" : "GGyao\/CVE-2020-14882_ALL" ,
"owner" : {
"login" : "GGyao" ,
"id" : 38530938 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4" ,
"html_url" : "https:\/\/github.com\/GGyao"
} ,
"html_url" : "https:\/\/github.com\/GGyao\/CVE-2020-14882_ALL" ,
"description" : "CVE-2020-14882_ALL综合利用工具, 支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。" ,
"fork" : false ,
"created_at" : "2020-11-03T10:49:35Z" ,
2021-04-21 05:12:33 +02:00
"updated_at" : "2021-04-21T02:48:48Z" ,
2021-04-08 05:11:17 +02:00
"pushed_at" : "2020-12-01T05:08:41Z" ,
2021-04-21 05:12:33 +02:00
"stargazers_count" : 86 ,
"watchers_count" : 86 ,
2021-04-08 05:11:17 +02:00
"forks_count" : 22 ,
"forks" : 22 ,
2021-04-21 05:12:33 +02:00
"watchers" : 86 ,
2021-04-08 05:11:17 +02:00
"score" : 0
} ,
2021-04-09 05:11:13 +02:00
{
"id" : 309666360 ,
"name" : "CVE-2020-14882-checker" ,
"full_name" : "ovProphet\/CVE-2020-14882-checker" ,
"owner" : {
"login" : "ovProphet" ,
"id" : 12277617 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12277617?v=4" ,
"html_url" : "https:\/\/github.com\/ovProphet"
} ,
"html_url" : "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker" ,
"description" : "CVE-2020-14882 detection script" ,
"fork" : false ,
"created_at" : "2020-11-03T11:34:38Z" ,
"updated_at" : "2021-03-18T23:48:22Z" ,
"pushed_at" : "2020-11-03T11:34:47Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 309868259 ,
"name" : "CVE-2020-14882" ,
"full_name" : "NS-Sp4ce\/CVE-2020-14882" ,
"owner" : {
"login" : "NS-Sp4ce" ,
"id" : 33349032 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4" ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce"
} ,
"html_url" : "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882" ,
"description" : "CVE-2020-14882\/14883\/14750" ,
"fork" : false ,
"created_at" : "2020-11-04T03:09:13Z" ,
2021-04-09 11:11:20 +02:00
"updated_at" : "2021-04-09T09:00:45Z" ,
2021-04-09 05:11:13 +02:00
"pushed_at" : "2020-11-04T03:15:33Z" ,
2021-04-09 11:11:20 +02:00
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
2021-04-09 05:11:13 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-04-09 11:11:20 +02:00
"watchers" : 12 ,
2021-04-09 05:11:13 +02:00
"score" : 0
} ,
{
"id" : 310303375 ,
"name" : "cve-2020-14882" ,
"full_name" : "mmioimm\/cve-2020-14882" ,
"owner" : {
"login" : "mmioimm" ,
"id" : 19258899 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19258899?v=4" ,
"html_url" : "https:\/\/github.com\/mmioimm"
} ,
"html_url" : "https:\/\/github.com\/mmioimm\/cve-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-05T13:12:28Z" ,
"updated_at" : "2021-01-29T03:18:00Z" ,
"pushed_at" : "2020-11-05T13:14:57Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0
} ,
2021-04-08 05:11:17 +02:00
{
"id" : 311265070 ,
"name" : "CVE-2020-14882" ,
"full_name" : "QmF0c3UK\/CVE-2020-14882" ,
"owner" : {
"login" : "QmF0c3UK" ,
"id" : 29447678 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4" ,
"html_url" : "https:\/\/github.com\/QmF0c3UK"
} ,
"html_url" : "https:\/\/github.com\/QmF0c3UK\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-09T08:03:44Z" ,
"updated_at" : "2021-02-25T04:22:24Z" ,
"pushed_at" : "2020-11-12T06:23:23Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2021-04-13 05:11:06 +02:00
"forks_count" : 4 ,
"forks" : 4 ,
2021-04-08 05:11:17 +02:00
"watchers" : 7 ,
"score" : 0
} ,
{
"id" : 311340226 ,
"name" : "CVE-2020-14882" ,
"full_name" : "murataydemir\/CVE-2020-14882" ,
"owner" : {
"login" : "murataydemir" ,
"id" : 16391655 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4" ,
"html_url" : "https:\/\/github.com\/murataydemir"
} ,
"html_url" : "https:\/\/github.com\/murataydemir\/CVE-2020-14882" ,
"description" : "[CVE-2020-14882] Oracle WebLogic Server Authentication Bypass" ,
"fork" : false ,
"created_at" : "2020-11-09T13:02:43Z" ,
"updated_at" : "2021-01-24T17:06:42Z" ,
"pushed_at" : "2020-11-09T16:35:39Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 311887487 ,
"name" : "CVE-2020-14882-GUI-Test" ,
"full_name" : "AirEvan\/CVE-2020-14882-GUI-Test" ,
"owner" : {
"login" : "AirEvan" ,
"id" : 26640179 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4" ,
"html_url" : "https:\/\/github.com\/AirEvan"
} ,
"html_url" : "https:\/\/github.com\/AirEvan\/CVE-2020-14882-GUI-Test" ,
"description" : "基于qt的图形化CVE-2020-14882漏洞回显测试工具." ,
"fork" : false ,
"created_at" : "2020-11-11T06:52:32Z" ,
"updated_at" : "2020-11-11T07:22:06Z" ,
"pushed_at" : "2020-11-11T07:19:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2020-11-13 04:09:19 +01:00
{
"id" : 312193698 ,
"name" : "CVE-2020-14882-weblogicRCE" ,
"full_name" : "corelight\/CVE-2020-14882-weblogicRCE" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
2020-11-13 04:09:19 +01:00
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE" ,
"description" : "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750" ,
"fork" : false ,
"created_at" : "2020-11-12T06:59:54Z" ,
2021-03-29 11:10:55 +02:00
"updated_at" : "2021-03-29T05:53:59Z" ,
2020-12-03 04:09:26 +01:00
"pushed_at" : "2020-12-02T21:43:52Z" ,
2021-03-29 11:10:55 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-12-23 16:09:37 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2021-03-29 11:10:55 +02:00
"watchers" : 1 ,
2020-11-13 04:09:19 +01:00
"score" : 0
2020-11-13 10:09:23 +01:00
} ,
2021-04-08 05:11:17 +02:00
{
"id" : 312256179 ,
"name" : "CVE-2020-14882" ,
"full_name" : "x51\/CVE-2020-14882" ,
"owner" : {
"login" : "x51" ,
"id" : 45651912 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45651912?v=4" ,
"html_url" : "https:\/\/github.com\/x51"
} ,
"html_url" : "https:\/\/github.com\/x51\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-12T11:27:39Z" ,
2021-04-15 23:11:08 +02:00
"updated_at" : "2021-04-15T19:22:00Z" ,
2021-04-08 05:11:17 +02:00
"pushed_at" : "2020-11-13T03:35:44Z" ,
2021-04-15 23:11:08 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-04-08 05:11:17 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-04-15 23:11:08 +02:00
"watchers" : 3 ,
2021-04-08 05:11:17 +02:00
"score" : 0
} ,
{
"id" : 313643357 ,
"name" : "CVE-2020-14882" ,
"full_name" : "BabyTeam1024\/CVE-2020-14882" ,
"owner" : {
"login" : "BabyTeam1024" ,
"id" : 74447452 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4" ,
"html_url" : "https:\/\/github.com\/BabyTeam1024"
} ,
"html_url" : "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-11-17T14:23:23Z" ,
"updated_at" : "2020-11-17T14:23:23Z" ,
"pushed_at" : "2020-11-17T14:23:24Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2020-12-29 16:09:36 +01:00
{
"id" : 325240057 ,
"name" : "CodeTest" ,
"full_name" : "xkx518\/CodeTest" ,
"owner" : {
"login" : "xkx518" ,
"id" : 49984697 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/49984697?v=4" ,
2020-12-29 16:09:36 +01:00
"html_url" : "https:\/\/github.com\/xkx518"
} ,
"html_url" : "https:\/\/github.com\/xkx518\/CodeTest" ,
"description" : "CodeTest信息收集和漏洞利用工具, 可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作, 漏洞利用模块可选择需要测试的漏洞模块, 或者选择所有模块测试, 包含CVE-2020-14882, CVE-2020-2555等, 可自己收集脚本后按照模板进行修改。" ,
"fork" : false ,
"created_at" : "2020-12-29T09:11:31Z" ,
2021-03-19 04:10:32 +01:00
"updated_at" : "2021-03-18T23:43:08Z" ,
2021-01-25 10:10:12 +01:00
"pushed_at" : "2021-01-25T07:54:23Z" ,
2021-03-19 04:10:32 +01:00
"stargazers_count" : 23 ,
"watchers_count" : 23 ,
2021-03-22 10:12:24 +01:00
"forks_count" : 7 ,
"forks" : 7 ,
2021-03-19 04:10:32 +01:00
"watchers" : 23 ,
2020-12-29 16:09:36 +01:00
"score" : 0
2021-01-15 16:10:19 +01:00
} ,
{
"id" : 329870299 ,
"name" : "poc" ,
"full_name" : "securitysqs\/poc" ,
"owner" : {
"login" : "securitysqs" ,
"id" : 66762242 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/66762242?v=4" ,
2021-01-15 16:10:19 +01:00
"html_url" : "https:\/\/github.com\/securitysqs"
} ,
"html_url" : "https:\/\/github.com\/securitysqs\/poc" ,
"description" : "CVE-2020-14882" ,
"fork" : false ,
"created_at" : "2021-01-15T09:44:35Z" ,
"updated_at" : "2021-01-15T09:57:01Z" ,
"pushed_at" : "2021-01-15T09:56:59Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-01-27 10:10:01 +01:00
} ,
{
"id" : 333326000 ,
"name" : "CVE-2020-14882" ,
"full_name" : "ShmilySec\/CVE-2020-14882" ,
"owner" : {
"login" : "ShmilySec" ,
"id" : 26423638 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26423638?v=4" ,
"html_url" : "https:\/\/github.com\/ShmilySec"
} ,
"html_url" : "https:\/\/github.com\/ShmilySec\/CVE-2020-14882" ,
"description" : "CVE-2020-14882部署冰蝎内存马" ,
"fork" : false ,
"created_at" : "2021-01-27T06:29:52Z" ,
2021-04-23 11:11:23 +02:00
"updated_at" : "2021-04-23T09:08:46Z" ,
2021-01-27 10:10:01 +01:00
"pushed_at" : "2021-01-27T06:31:26Z" ,
2021-04-23 11:11:23 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2021-03-31 11:11:01 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2021-04-23 11:11:23 +02:00
"watchers" : 3 ,
2021-01-27 10:10:01 +01:00
"score" : 0
2021-01-29 16:10:08 +01:00
} ,
{
"id" : 334149882 ,
"name" : "CVE-2020-14882-WebLogic" ,
"full_name" : "pwn3z\/CVE-2020-14882-WebLogic" ,
"owner" : {
"login" : "pwn3z" ,
"id" : 71440287 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4" ,
"html_url" : "https:\/\/github.com\/pwn3z"
} ,
"html_url" : "https:\/\/github.com\/pwn3z\/CVE-2020-14882-WebLogic" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-01-29T13:12:40Z" ,
"updated_at" : "2021-01-29T13:13:37Z" ,
"pushed_at" : "2021-01-29T13:13:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2021-02-25 16:09:00 +01:00
} ,
{
"id" : 342244938 ,
"name" : "CVE-2020-14882" ,
"full_name" : "milo2012\/CVE-2020-14882" ,
"owner" : {
"login" : "milo2012" ,
"id" : 905335 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4" ,
"html_url" : "https:\/\/github.com\/milo2012"
} ,
"html_url" : "https:\/\/github.com\/milo2012\/CVE-2020-14882" ,
"description" : "CVE-2020-14882" ,
"fork" : false ,
"created_at" : "2021-02-25T12:57:08Z" ,
2021-04-23 05:11:12 +02:00
"updated_at" : "2021-04-22T23:06:24Z" ,
2021-03-01 22:09:21 +01:00
"pushed_at" : "2021-03-01T16:34:10Z" ,
2021-04-23 05:11:12 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 3 ,
"forks" : 3 ,
"watchers" : 3 ,
2021-02-25 16:09:00 +01:00
"score" : 0
2021-04-07 17:11:10 +02:00
} ,
{
"id" : 355492090 ,
"name" : "CVE-2020-14882_Exploit_Gui" ,
"full_name" : "nice0e3\/CVE-2020-14882_Exploit_Gui" ,
"owner" : {
"login" : "nice0e3" ,
"id" : 42479546 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42479546?v=4" ,
"html_url" : "https:\/\/github.com\/nice0e3"
} ,
"html_url" : "https:\/\/github.com\/nice0e3\/CVE-2020-14882_Exploit_Gui" ,
"description" : null ,
"fork" : false ,
"created_at" : "2021-04-07T09:48:49Z" ,
2021-04-20 11:11:25 +02:00
"updated_at" : "2021-04-20T04:03:57Z" ,
"pushed_at" : "2021-04-20T04:03:54Z" ,
2021-04-14 17:11:24 +02:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2021-04-07 17:11:10 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2021-04-14 17:11:24 +02:00
"watchers" : 10 ,
2021-04-07 17:11:10 +02:00
"score" : 0
2020-10-29 04:09:01 +01:00
}
]