2020-10-29 04:09:01 +01:00
[
2020-10-29 10:08:56 +01:00
{
"id" : 307998445 ,
"name" : "CVE-2020-14882" ,
"full_name" : "jas502n\/CVE-2020-14882" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2020-14882" ,
"description" : "CVE-2020– 14882、CVE-2020– 14883" ,
"fork" : false ,
"created_at" : "2020-10-28T11:43:37Z" ,
2020-11-02 04:08:57 +01:00
"updated_at" : "2020-11-02T01:15:37Z" ,
2020-10-30 22:08:54 +01:00
"pushed_at" : "2020-10-30T16:03:55Z" ,
2020-11-02 04:08:57 +01:00
"stargazers_count" : 80 ,
"watchers_count" : 80 ,
2020-11-01 04:08:51 +01:00
"forks_count" : 13 ,
"forks" : 13 ,
2020-11-02 04:08:57 +01:00
"watchers" : 80 ,
2020-10-29 10:08:56 +01:00
"score" : 0
} ,
2020-10-29 04:09:01 +01:00
{
"id" : 308145197 ,
"name" : "CVE-2020-14882" ,
"full_name" : "s1kr10s\/CVE-2020-14882" ,
"owner" : {
"login" : "s1kr10s" ,
"id" : 5374475 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/5374475?v=4" ,
"html_url" : "https:\/\/github.com\/s1kr10s"
} ,
"html_url" : "https:\/\/github.com\/s1kr10s\/CVE-2020-14882" ,
"description" : "CVE-2020– 14882 by Jang" ,
"fork" : false ,
"created_at" : "2020-10-28T21:28:12Z" ,
2020-10-30 22:08:54 +01:00
"updated_at" : "2020-10-30T16:16:18Z" ,
2020-10-29 10:08:56 +01:00
"pushed_at" : "2020-10-29T03:57:09Z" ,
2020-10-30 22:08:54 +01:00
"stargazers_count" : 21 ,
"watchers_count" : 21 ,
2020-10-31 04:08:58 +01:00
"forks_count" : 12 ,
"forks" : 12 ,
2020-10-30 22:08:54 +01:00
"watchers" : 21 ,
2020-10-29 04:09:01 +01:00
"score" : 0
} ,
{
"id" : 308184758 ,
"name" : "McMaster-University-0-day-Blind-Command-Injection" ,
"full_name" : "Umarovm\/McMaster-University-0-day-Blind-Command-Injection" ,
"owner" : {
"login" : "Umarovm" ,
"id" : 25722145 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/25722145?v=4" ,
"html_url" : "https:\/\/github.com\/Umarovm"
} ,
"html_url" : "https:\/\/github.com\/Umarovm\/McMaster-University-0-day-Blind-Command-Injection" ,
2020-10-31 04:08:58 +01:00
"description" : "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca." ,
2020-10-29 04:09:01 +01:00
"fork" : false ,
"created_at" : "2020-10-29T01:28:41Z" ,
2020-10-31 04:08:58 +01:00
"updated_at" : "2020-10-31T01:09:15Z" ,
"pushed_at" : "2020-10-31T01:08:56Z" ,
2020-10-29 04:09:01 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-29 10:08:56 +01:00
} ,
{
"id" : 308238126 ,
"name" : "CVE-2020-14882" ,
"full_name" : "RedTeamWing\/CVE-2020-14882" ,
"owner" : {
"login" : "RedTeamWing" ,
"id" : 25416365 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/25416365?v=4" ,
"html_url" : "https:\/\/github.com\/RedTeamWing"
} ,
"html_url" : "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882" ,
"description" : "CVE-2020-14882 Weblogic-Exp" ,
"fork" : false ,
"created_at" : "2020-10-29T06:30:30Z" ,
2020-11-01 04:08:51 +01:00
"updated_at" : "2020-11-01T01:43:30Z" ,
2020-10-29 10:08:56 +01:00
"pushed_at" : "2020-10-29T06:36:01Z" ,
2020-11-01 04:08:51 +01:00
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
2020-10-30 22:08:54 +01:00
"forks_count" : 3 ,
"forks" : 3 ,
2020-11-01 04:08:51 +01:00
"watchers" : 12 ,
2020-10-29 16:09:17 +01:00
"score" : 0
} ,
{
"id" : 308343789 ,
"name" : "cve-2020-14882" ,
"full_name" : "0thm4n3\/cve-2020-14882" ,
"owner" : {
"login" : "0thm4n3" ,
"id" : 12746014 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/12746014?v=4" ,
"html_url" : "https:\/\/github.com\/0thm4n3"
} ,
"html_url" : "https:\/\/github.com\/0thm4n3\/cve-2020-14882" ,
2020-10-31 16:08:57 +01:00
"description" : "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882" ,
2020-10-29 16:09:17 +01:00
"fork" : false ,
"created_at" : "2020-10-29T13:53:31Z" ,
2020-10-31 16:08:57 +01:00
"updated_at" : "2020-10-31T13:03:28Z" ,
"pushed_at" : "2020-10-31T13:03:26Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-10-30 22:08:54 +01:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-10-31 16:08:57 +01:00
"watchers" : 1 ,
2020-10-29 10:08:56 +01:00
"score" : 0
2020-10-29 22:09:02 +01:00
} ,
{
"id" : 308374913 ,
"name" : "cve-2020-14882" ,
"full_name" : "wsfengfan\/cve-2020-14882" ,
"owner" : {
"login" : "wsfengfan" ,
"id" : 33821840 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4" ,
"html_url" : "https:\/\/github.com\/wsfengfan"
} ,
"html_url" : "https:\/\/github.com\/wsfengfan\/cve-2020-14882" ,
"description" : "CVE-2020-14882 GET POC" ,
"fork" : false ,
"created_at" : "2020-10-29T15:44:23Z" ,
"updated_at" : "2020-10-29T16:16:31Z" ,
"pushed_at" : "2020-10-29T16:07:21Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-30 16:09:05 +01:00
} ,
{
"id" : 308605927 ,
"name" : "CVE-2020-14882" ,
"full_name" : "alexfrancow\/CVE-2020-14882" ,
"owner" : {
"login" : "alexfrancow" ,
"id" : 23419929 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4" ,
"html_url" : "https:\/\/github.com\/alexfrancow"
} ,
"html_url" : "https:\/\/github.com\/alexfrancow\/CVE-2020-14882" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-10-30T11:07:11Z" ,
2020-10-31 22:08:55 +01:00
"updated_at" : "2020-10-31T15:57:21Z" ,
"pushed_at" : "2020-10-31T15:57:19Z" ,
2020-10-30 16:09:05 +01:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-30 22:08:54 +01:00
} ,
{
"id" : 308716809 ,
"name" : "CVE-2020-14882" ,
"full_name" : "sickwell\/CVE-2020-14882" ,
"owner" : {
"login" : "sickwell" ,
"id" : 32671944 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/32671944?v=4" ,
"html_url" : "https:\/\/github.com\/sickwell"
} ,
"html_url" : "https:\/\/github.com\/sickwell\/CVE-2020-14882" ,
"description" : "PoC for CVE-2020-14882" ,
"fork" : false ,
"created_at" : "2020-10-30T18:46:34Z" ,
"updated_at" : "2020-10-30T18:46:34Z" ,
"pushed_at" : "2020-10-30T18:46:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-31 04:08:58 +01:00
} ,
{
"id" : 308782228 ,
"name" : "CVE-2020-14882" ,
"full_name" : "GGyao\/CVE-2020-14882" ,
"owner" : {
"login" : "GGyao" ,
"id" : 38530938 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4" ,
"html_url" : "https:\/\/github.com\/GGyao"
} ,
"html_url" : "https:\/\/github.com\/GGyao\/CVE-2020-14882" ,
"description" : "CVE-2020-14882批量验证工具。" ,
"fork" : false ,
"created_at" : "2020-10-31T01:43:54Z" ,
2020-11-02 04:08:57 +01:00
"updated_at" : "2020-11-02T00:46:53Z" ,
2020-10-31 04:08:58 +01:00
"pushed_at" : "2020-10-31T02:03:41Z" ,
2020-11-02 04:08:57 +01:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2020-10-31 04:08:58 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-11-02 04:08:57 +01:00
"watchers" : 9 ,
2020-11-01 16:08:54 +01:00
"score" : 0
} ,
{
"id" : 309098912 ,
"name" : "Weblogic_Unauthorized-bypass-RCE" ,
"full_name" : "ludy-dev\/Weblogic_Unauthorized-bypass-RCE" ,
"owner" : {
"login" : "ludy-dev" ,
"id" : 70466565 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4" ,
"html_url" : "https:\/\/github.com\/ludy-dev"
} ,
"html_url" : "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE" ,
"description" : "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script" ,
"fork" : false ,
"created_at" : "2020-11-01T13:12:27Z" ,
"updated_at" : "2020-11-01T13:56:50Z" ,
"pushed_at" : "2020-11-01T13:56:48Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
2020-10-31 04:08:58 +01:00
"score" : 0
2020-10-29 04:09:01 +01:00
}
]