PoC-in-GitHub/2020/CVE-2020-14882.json

232 lines
8.2 KiB
JSON
Raw Normal View History

2020-10-29 04:09:01 +01:00
[
2020-10-29 10:08:56 +01:00
{
"id": 307998445,
"name": "CVE-2020-14882",
"full_name": "jas502n\/CVE-2020-14882",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882",
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
2020-11-02 04:08:57 +01:00
"updated_at": "2020-11-02T01:15:37Z",
2020-10-30 22:08:54 +01:00
"pushed_at": "2020-10-30T16:03:55Z",
2020-11-02 04:08:57 +01:00
"stargazers_count": 80,
"watchers_count": 80,
2020-11-01 04:08:51 +01:00
"forks_count": 13,
"forks": 13,
2020-11-02 04:08:57 +01:00
"watchers": 80,
2020-10-29 10:08:56 +01:00
"score": 0
},
2020-10-29 04:09:01 +01:00
{
"id": 308145197,
"name": "CVE-2020-14882",
"full_name": "s1kr10s\/CVE-2020-14882",
"owner": {
"login": "s1kr10s",
"id": 5374475,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5374475?v=4",
"html_url": "https:\/\/github.com\/s1kr10s"
},
"html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882",
"description": "CVE-202014882 by Jang",
"fork": false,
"created_at": "2020-10-28T21:28:12Z",
2020-10-30 22:08:54 +01:00
"updated_at": "2020-10-30T16:16:18Z",
2020-10-29 10:08:56 +01:00
"pushed_at": "2020-10-29T03:57:09Z",
2020-10-30 22:08:54 +01:00
"stargazers_count": 21,
"watchers_count": 21,
2020-10-31 04:08:58 +01:00
"forks_count": 12,
"forks": 12,
2020-10-30 22:08:54 +01:00
"watchers": 21,
2020-10-29 04:09:01 +01:00
"score": 0
},
{
"id": 308184758,
"name": "McMaster-University-0-day-Blind-Command-Injection",
"full_name": "Umarovm\/McMaster-University-0-day-Blind-Command-Injection",
"owner": {
"login": "Umarovm",
"id": 25722145,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25722145?v=4",
"html_url": "https:\/\/github.com\/Umarovm"
},
"html_url": "https:\/\/github.com\/Umarovm\/McMaster-University-0-day-Blind-Command-Injection",
2020-10-31 04:08:58 +01:00
"description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.",
2020-10-29 04:09:01 +01:00
"fork": false,
"created_at": "2020-10-29T01:28:41Z",
2020-10-31 04:08:58 +01:00
"updated_at": "2020-10-31T01:09:15Z",
"pushed_at": "2020-10-31T01:08:56Z",
2020-10-29 04:09:01 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-10-29 10:08:56 +01:00
},
{
"id": 308238126,
"name": "CVE-2020-14882",
"full_name": "RedTeamWing\/CVE-2020-14882",
"owner": {
"login": "RedTeamWing",
"id": 25416365,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25416365?v=4",
"html_url": "https:\/\/github.com\/RedTeamWing"
},
"html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882",
"description": "CVE-2020-14882 Weblogic-Exp",
"fork": false,
"created_at": "2020-10-29T06:30:30Z",
2020-11-01 04:08:51 +01:00
"updated_at": "2020-11-01T01:43:30Z",
2020-10-29 10:08:56 +01:00
"pushed_at": "2020-10-29T06:36:01Z",
2020-11-01 04:08:51 +01:00
"stargazers_count": 12,
"watchers_count": 12,
2020-10-30 22:08:54 +01:00
"forks_count": 3,
"forks": 3,
2020-11-01 04:08:51 +01:00
"watchers": 12,
2020-10-29 16:09:17 +01:00
"score": 0
},
{
"id": 308343789,
"name": "cve-2020-14882",
"full_name": "0thm4n3\/cve-2020-14882",
"owner": {
"login": "0thm4n3",
"id": 12746014,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12746014?v=4",
"html_url": "https:\/\/github.com\/0thm4n3"
},
"html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882",
2020-10-31 16:08:57 +01:00
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
2020-10-29 16:09:17 +01:00
"fork": false,
"created_at": "2020-10-29T13:53:31Z",
2020-10-31 16:08:57 +01:00
"updated_at": "2020-10-31T13:03:28Z",
"pushed_at": "2020-10-31T13:03:26Z",
"stargazers_count": 1,
"watchers_count": 1,
2020-10-30 22:08:54 +01:00
"forks_count": 1,
"forks": 1,
2020-10-31 16:08:57 +01:00
"watchers": 1,
2020-10-29 10:08:56 +01:00
"score": 0
2020-10-29 22:09:02 +01:00
},
{
"id": 308374913,
"name": "cve-2020-14882",
"full_name": "wsfengfan\/cve-2020-14882",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
"description": "CVE-2020-14882 GET POC",
"fork": false,
"created_at": "2020-10-29T15:44:23Z",
"updated_at": "2020-10-29T16:16:31Z",
"pushed_at": "2020-10-29T16:07:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-10-30 16:09:05 +01:00
},
{
"id": 308605927,
"name": "CVE-2020-14882",
"full_name": "alexfrancow\/CVE-2020-14882",
"owner": {
"login": "alexfrancow",
"id": 23419929,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4",
"html_url": "https:\/\/github.com\/alexfrancow"
},
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-10-30T11:07:11Z",
2020-10-31 22:08:55 +01:00
"updated_at": "2020-10-31T15:57:21Z",
"pushed_at": "2020-10-31T15:57:19Z",
2020-10-30 16:09:05 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-10-30 22:08:54 +01:00
},
{
"id": 308716809,
"name": "CVE-2020-14882",
"full_name": "sickwell\/CVE-2020-14882",
"owner": {
"login": "sickwell",
"id": 32671944,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32671944?v=4",
"html_url": "https:\/\/github.com\/sickwell"
},
"html_url": "https:\/\/github.com\/sickwell\/CVE-2020-14882",
"description": "PoC for CVE-2020-14882",
"fork": false,
"created_at": "2020-10-30T18:46:34Z",
"updated_at": "2020-10-30T18:46:34Z",
"pushed_at": "2020-10-30T18:46:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-10-31 04:08:58 +01:00
},
{
"id": 308782228,
"name": "CVE-2020-14882",
"full_name": "GGyao\/CVE-2020-14882",
"owner": {
"login": "GGyao",
"id": 38530938,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4",
"html_url": "https:\/\/github.com\/GGyao"
},
"html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882",
"description": "CVE-2020-14882批量验证工具。",
"fork": false,
"created_at": "2020-10-31T01:43:54Z",
2020-11-02 04:08:57 +01:00
"updated_at": "2020-11-02T00:46:53Z",
2020-10-31 04:08:58 +01:00
"pushed_at": "2020-10-31T02:03:41Z",
2020-11-02 04:08:57 +01:00
"stargazers_count": 9,
"watchers_count": 9,
2020-10-31 04:08:58 +01:00
"forks_count": 0,
"forks": 0,
2020-11-02 04:08:57 +01:00
"watchers": 9,
2020-11-01 16:08:54 +01:00
"score": 0
},
{
"id": 309098912,
"name": "Weblogic_Unauthorized-bypass-RCE",
"full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
"fork": false,
"created_at": "2020-11-01T13:12:27Z",
"updated_at": "2020-11-01T13:56:50Z",
"pushed_at": "2020-11-01T13:56:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2020-10-31 04:08:58 +01:00
"score": 0
2020-10-29 04:09:01 +01:00
}
]