PoC-in-GitHub/2017/CVE-2017-10271.json

623 lines
23 KiB
JSON
Raw Normal View History

2019-12-08 14:19:20 +01:00
[
2020-08-22 11:10:29 +02:00
{
"id": 115195951,
"name": "CVE-2017-10271",
"full_name": "1337g\/CVE-2017-10271",
"owner": {
"login": "1337g",
"id": 32504404,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
"html_url": "https:\/\/github.com\/1337g"
},
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271",
"description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)",
"fork": false,
"created_at": "2017-12-23T13:04:23Z",
2020-09-01 23:09:37 +02:00
"updated_at": "2020-09-01T16:02:59Z",
2020-08-22 11:10:29 +02:00
"pushed_at": "2017-12-23T13:12:06Z",
2020-09-01 23:09:37 +02:00
"stargazers_count": 38,
"watchers_count": 38,
2020-08-22 11:10:29 +02:00
"forks_count": 26,
"forks": 26,
2020-09-01 23:09:37 +02:00
"watchers": 38,
2020-08-22 11:10:29 +02:00
"score": 0
},
{
"id": 115311346,
"name": "CVE-2017-10271",
"full_name": "s3xy\/CVE-2017-10271",
"owner": {
"login": "s3xy",
"id": 34327996,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34327996?v=4",
"html_url": "https:\/\/github.com\/s3xy"
},
"html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271",
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
"fork": false,
"created_at": "2017-12-25T06:11:54Z",
"updated_at": "2019-10-16T11:06:14Z",
"pushed_at": "2017-12-25T06:21:23Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 8,
"forks": 8,
"watchers": 23,
"score": 0
},
{
"id": 115339400,
"name": "PoCs-Weblogic_2017_10271",
"full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271",
"owner": {
"login": "ZH3FENG",
"id": 20502660,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20502660?v=4",
"html_url": "https:\/\/github.com\/ZH3FENG"
},
"html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271",
"description": "Simplified PoC for Weblogic-CVE-2017-10271",
"fork": false,
"created_at": "2017-12-25T13:18:45Z",
"updated_at": "2019-03-19T07:31:45Z",
"pushed_at": "2017-12-25T13:23:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"forks": 2,
"watchers": 3,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 115571903,
"name": "CVE-2017-10271",
"full_name": "c0mmand3rOpSec\/CVE-2017-10271",
"owner": {
"login": "c0mmand3rOpSec",
"id": 17217255,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17217255?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/c0mmand3rOpSec"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271",
"description": "WebLogic Exploit",
"fork": false,
"created_at": "2017-12-28T01:30:50Z",
2020-11-07 10:09:13 +01:00
"updated_at": "2020-11-07T09:05:16Z",
2019-12-08 14:19:20 +01:00
"pushed_at": "2018-07-13T18:56:53Z",
2020-11-07 10:09:13 +01:00
"stargazers_count": 128,
"watchers_count": 128,
2020-10-24 23:08:20 +02:00
"forks_count": 46,
"forks": 46,
2020-11-07 10:09:13 +01:00
"watchers": 128,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2020-08-15 11:08:11 +02:00
{
"id": 115596796,
"name": "CVE-2017-10271",
"full_name": "Luffin\/CVE-2017-10271",
"owner": {
"login": "Luffin",
"id": 13807870,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13807870?v=4",
"html_url": "https:\/\/github.com\/Luffin"
},
"html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271",
"description": "CVE-2017-10271 POC",
"fork": false,
"created_at": "2017-12-28T07:19:13Z",
"updated_at": "2020-08-10T02:31:05Z",
"pushed_at": "2018-01-10T02:34:56Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 14,
"forks": 14,
"watchers": 29,
"score": 0
},
2020-08-22 11:10:29 +02:00
{
"id": 116099094,
"name": "weblogic_wls_wsat_rce",
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
"owner": {
"login": "cjjduck",
"id": 23519154,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23519154?v=4",
"html_url": "https:\/\/github.com\/cjjduck"
},
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
2020-10-09 05:10:42 +02:00
"updated_at": "2020-10-09T02:33:00Z",
2020-08-22 11:10:29 +02:00
"pushed_at": "2018-01-03T00:42:57Z",
2020-10-09 05:10:42 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2020-09-28 17:10:05 +02:00
"forks_count": 39,
"forks": 39,
2020-10-09 05:10:42 +02:00
"watchers": 3,
2020-08-22 11:10:29 +02:00
"score": 0
},
2020-08-15 11:08:11 +02:00
{
"id": 116430643,
"name": "CVE-2017-10271",
"full_name": "kkirsche\/CVE-2017-10271",
"owner": {
"login": "kkirsche",
"id": 947110,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4",
"html_url": "https:\/\/github.com\/kkirsche"
},
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
"fork": false,
"created_at": "2018-01-05T21:57:03Z",
2020-10-30 10:09:11 +01:00
"updated_at": "2020-10-30T08:09:04Z",
2020-08-15 11:08:11 +02:00
"pushed_at": "2018-01-26T14:28:58Z",
2020-10-30 10:09:11 +01:00
"stargazers_count": 118,
"watchers_count": 118,
"forks_count": 43,
"forks": 43,
"watchers": 118,
2020-08-15 11:08:11 +02:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 117624791,
"name": "CVE-2017-10271",
"full_name": "pssss\/CVE-2017-10271",
"owner": {
"login": "pssss",
"id": 14834109,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14834109?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/pssss"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/pssss\/CVE-2017-10271",
"description": "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁",
"fork": false,
"created_at": "2018-01-16T03:10:48Z",
2020-01-20 10:07:34 +01:00
"updated_at": "2020-01-20T06:37:58Z",
"pushed_at": "2020-01-20T06:37:56Z",
2019-12-08 14:19:20 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2020-09-17 17:08:49 +02:00
"forks_count": 3,
"forks": 3,
2019-12-08 14:19:20 +01:00
"watchers": 3,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-27 06:17:04 +01:00
{
"id": 117926261,
"name": "cve-2017-10271-poc",
"full_name": "SuperHacker-liuan\/cve-2017-10271-poc",
"owner": {
"login": "SuperHacker-liuan",
"id": 30787037,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30787037?v=4",
"html_url": "https:\/\/github.com\/SuperHacker-liuan"
},
"html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc",
"description": "cve-2017-10271 POC",
"fork": false,
"created_at": "2018-01-18T03:21:15Z",
2020-01-06 10:30:02 +01:00
"updated_at": "2020-01-06T03:15:27Z",
2019-12-27 06:17:04 +01:00
"pushed_at": "2018-02-02T07:47:30Z",
2020-01-06 10:30:02 +01:00
"stargazers_count": 5,
"watchers_count": 5,
2019-12-27 06:17:04 +01:00
"forks_count": 1,
"forks": 1,
2020-01-06 10:30:02 +01:00
"watchers": 5,
2019-12-27 06:17:04 +01:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 118044092,
"name": "CVE-2017-10271",
"full_name": "bmcculley\/CVE-2017-10271",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "bmcculley",
"id": 6238704,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6238704?v=4",
"html_url": "https:\/\/github.com\/bmcculley"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-01-18T22:07:33Z",
"updated_at": "2019-10-26T15:31:53Z",
"pushed_at": "2019-10-26T15:31:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2020-09-24 17:09:27 +02:00
"id": 118144871,
2019-12-12 06:14:27 +01:00
"name": "Oracle-WebLogic-CVE-2017-10271",
2020-09-24 17:09:27 +02:00
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
2019-12-08 14:19:20 +01:00
"owner": {
2020-09-24 17:09:27 +02:00
"login": "peterpeter228",
"id": 22089258,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22089258?v=4",
"html_url": "https:\/\/github.com\/peterpeter228"
2019-12-08 14:19:20 +01:00
},
2020-09-24 17:09:27 +02:00
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
2019-12-08 14:19:20 +01:00
"fork": false,
2020-09-24 17:09:27 +02:00
"created_at": "2018-01-19T15:50:08Z",
"updated_at": "2020-09-24T10:47:12Z",
"pushed_at": "2018-01-19T11:29:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 120462394,
2019-12-08 14:19:20 +01:00
"name": "CVE-2017-10271",
2019-12-12 06:14:27 +01:00
"full_name": "Sch01ar\/CVE-2017-10271",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "Sch01ar",
"id": 28928231,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28928231?v=4",
"html_url": "https:\/\/github.com\/Sch01ar"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/Sch01ar\/CVE-2017-10271",
"description": null,
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-02-06T13:38:40Z",
"updated_at": "2018-02-06T13:59:34Z",
"pushed_at": "2018-02-08T09:21:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
{
"id": 120571410,
"name": "weblogic_honeypot",
"full_name": "Cymmetria\/weblogic_honeypot",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "Cymmetria",
"id": 19413345,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19413345?v=4",
"html_url": "https:\/\/github.com\/Cymmetria"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/Cymmetria\/weblogic_honeypot",
"description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-02-07T06:11:23Z",
2020-10-27 10:09:08 +01:00
"updated_at": "2020-10-27T03:58:14Z",
2020-04-25 23:07:36 +02:00
"pushed_at": "2020-04-25T20:55:29Z",
2020-10-27 10:09:08 +01:00
"stargazers_count": 17,
"watchers_count": 17,
2020-04-26 23:08:48 +02:00
"forks_count": 6,
"forks": 6,
2020-10-27 10:09:08 +01:00
"watchers": 17,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-27 06:17:04 +01:00
{
"id": 123384221,
"name": "weblogic_wls_rce_poc-exp",
"full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp",
"owner": {
"login": "JackyTsuuuy",
"id": 9449527,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9449527?v=4",
"html_url": "https:\/\/github.com\/JackyTsuuuy"
},
"html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp",
"description": "cve-2017-10271",
"fork": false,
"created_at": "2018-03-01T04:57:09Z",
2020-07-31 23:09:21 +02:00
"updated_at": "2020-07-31T16:12:20Z",
2019-12-27 06:17:04 +01:00
"pushed_at": "2018-03-01T05:08:29Z",
2020-07-31 23:09:21 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2019-12-27 06:17:04 +01:00
"forks_count": 1,
"forks": 1,
2020-07-31 23:09:21 +02:00
"watchers": 1,
2019-12-27 06:17:04 +01:00
"score": 0
},
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id": 125456636,
"name": "Oracle-WebLogic-WLS-WSAT",
"full_name": "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "s0wr0b1ndef",
"id": 37288034,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-03-16T03:09:29Z",
"updated_at": "2018-08-05T19:23:02Z",
"pushed_at": "2018-03-16T03:14:12Z",
2019-12-08 14:19:20 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
"id": 139956588,
"name": "Oracle-WebLogic-CVE-2017-10271-master",
"full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
"owner": {
"login": "lonehand",
"id": 20275278,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20275278?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/lonehand"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
"description": null,
"fork": false,
"created_at": "2018-07-06T08:32:28Z",
"updated_at": "2019-06-27T03:08:05Z",
"pushed_at": "2018-07-06T08:42:40Z",
"stargazers_count": 1,
"watchers_count": 1,
2020-11-04 10:09:17 +01:00
"forks_count": 1,
"forks": 1,
2019-12-08 14:19:20 +01:00
"watchers": 1,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 148616806,
"name": "javaserializetools",
"full_name": "shack2\/javaserializetools",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "shack2",
"id": 26374431,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26374431?v=4",
"html_url": "https:\/\/github.com\/shack2"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/shack2\/javaserializetools",
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-09-13T09:44:18Z",
2020-11-13 10:09:23 +01:00
"updated_at": "2020-11-13T09:03:04Z",
2020-10-01 23:08:45 +02:00
"pushed_at": "2020-10-01T20:20:41Z",
2020-11-13 10:09:23 +01:00
"stargazers_count": 238,
"watchers_count": 238,
2020-11-13 22:09:16 +01:00
"forks_count": 87,
"forks": 87,
2020-11-13 10:09:23 +01:00
"watchers": 238,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 160370962,
"name": "CVE-2017-10271",
"full_name": "nhwuxiaojun\/CVE-2017-10271",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "nhwuxiaojun",
"id": 15905850,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15905850?v=4",
"html_url": "https:\/\/github.com\/nhwuxiaojun"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271",
"description": "Weblogic(CVE-2017-10271)",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2018-12-04T14:34:10Z",
2020-06-10 05:07:50 +02:00
"updated_at": "2020-06-10T02:53:11Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2018-12-04T14:45:40Z",
2020-04-03 11:11:08 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2019-12-12 06:14:27 +01:00
"forks_count": 2,
"forks": 2,
2020-04-03 11:11:08 +02:00
"watchers": 2,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 161570094,
"name": "JavaDeserialization",
"full_name": "ETOCheney\/JavaDeserialization",
"owner": {
"login": "ETOCheney",
"id": 28469578,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28469578?v=4",
"html_url": "https:\/\/github.com\/ETOCheney"
},
"html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization",
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
"fork": false,
"created_at": "2018-12-13T02:00:23Z",
2020-10-28 16:09:09 +01:00
"updated_at": "2020-10-28T10:00:45Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2018-12-13T14:05:28Z",
2020-10-28 16:09:09 +01:00
"stargazers_count": 7,
"watchers_count": 7,
2019-12-12 06:14:27 +01:00
"forks_count": 1,
"forks": 1,
2020-10-28 16:09:09 +01:00
"watchers": 7,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
2019-12-30 04:30:01 +01:00
{
"id": 165317811,
"name": "cve-2017-10271",
"full_name": "cved-sources\/cve-2017-10271",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271",
"description": "cve-2017-10271",
"fork": false,
"created_at": "2019-01-11T22:11:16Z",
"updated_at": "2019-01-11T22:11:38Z",
"pushed_at": "2019-01-11T22:11:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
2019-12-08 14:19:20 +01:00
{
"id": 175729381,
"name": "Oracle-WebLogic-CVE-2017-10271",
"full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
"owner": {
"login": "XHSecurity",
"id": 48574583,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48574583?v=4",
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/XHSecurity"
2019-12-08 14:19:20 +01:00
},
"html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
"description": "Oracle-WebLogic-CVE-2017-10271",
"fork": false,
"created_at": "2019-03-15T01:50:01Z",
"updated_at": "2019-03-15T01:51:35Z",
"pushed_at": "2019-03-15T01:51:34Z",
"stargazers_count": 0,
"watchers_count": 0,
2020-11-04 10:09:17 +01:00
"forks_count": 1,
"forks": 1,
2019-12-08 14:19:20 +01:00
"watchers": 0,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 176763123,
"name": "Weblogic_Wsat_RCE",
2020-05-08 23:08:45 +02:00
"full_name": "kbsec\/Weblogic_Wsat_RCE",
2019-12-08 14:19:20 +01:00
"owner": {
2020-05-08 23:08:45 +02:00
"login": "kbsec",
2019-12-12 06:14:27 +01:00
"id": 11823496,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11823496?v=4",
2020-05-08 23:08:45 +02:00
"html_url": "https:\/\/github.com\/kbsec"
2019-12-08 14:19:20 +01:00
},
2020-05-08 23:08:45 +02:00
"html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE",
2019-12-12 06:14:27 +01:00
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-03-20T15:26:55Z",
2019-12-19 16:30:01 +01:00
"updated_at": "2019-12-19T13:44:39Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-03-27T17:47:52Z",
2019-12-19 16:30:01 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2019-12-12 06:14:27 +01:00
"forks_count": 1,
"forks": 1,
2019-12-19 16:30:01 +01:00
"watchers": 3,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 183346706,
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"owner": {
"login": "SkyBlueEternal",
"id": 46418185,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4",
"html_url": "https:\/\/github.com\/SkyBlueEternal"
},
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
"fork": false,
"created_at": "2019-04-25T03:07:53Z",
2020-09-19 23:10:13 +02:00
"updated_at": "2020-09-19T16:04:20Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-04-29T02:06:00Z",
2020-09-19 23:10:13 +02:00
"stargazers_count": 103,
"watchers_count": 103,
2020-11-02 10:09:15 +01:00
"forks_count": 37,
"forks": 37,
2020-09-19 23:10:13 +02:00
"watchers": 103,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 183428186,
"name": "WebLogic_CNVD_C_2019_48814",
"full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814",
"owner": {
"login": "Yuusuke4",
"id": 26989867,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26989867?v=4",
"html_url": "https:\/\/github.com\/Yuusuke4"
},
"html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814",
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271",
"fork": false,
"created_at": "2019-04-25T12:18:16Z",
"updated_at": "2019-04-25T12:33:00Z",
"pushed_at": "2019-04-25T12:10:18Z",
"stargazers_count": 1,
"watchers_count": 1,
2019-12-08 14:19:20 +01:00
"forks_count": 0,
"forks": 0,
2019-12-12 06:14:27 +01:00
"watchers": 1,
2019-12-09 16:05:38 +01:00
"score": 0
2019-12-08 14:19:20 +01:00
},
{
2019-12-12 06:14:27 +01:00
"id": 183430704,
"name": "WebLogic_CNVD_C2019_48814",
"full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814",
2019-12-08 14:19:20 +01:00
"owner": {
2019-12-12 06:14:27 +01:00
"login": "7kbstorm",
"id": 38887063,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38887063?v=4",
"html_url": "https:\/\/github.com\/7kbstorm"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814",
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
2019-12-08 14:19:20 +01:00
"fork": false,
2019-12-12 06:14:27 +01:00
"created_at": "2019-04-25T12:33:31Z",
2020-10-29 04:09:01 +01:00
"updated_at": "2020-10-29T01:57:54Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-04-25T12:44:02Z",
2020-10-29 04:09:01 +01:00
"stargazers_count": 112,
"watchers_count": 112,
2020-11-05 10:09:34 +01:00
"forks_count": 52,
"forks": 52,
2020-10-29 04:09:01 +01:00
"watchers": 112,
2019-12-12 06:14:27 +01:00
"score": 0
},
{
"id": 219752851,
"name": "-CVE-2017-10271-",
"full_name": "ianxtianxt\/-CVE-2017-10271-",
"owner": {
"login": "ianxtianxt",
"id": 45796484,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
"html_url": "https:\/\/github.com\/ianxtianxt"
2019-12-08 14:19:20 +01:00
},
2019-12-12 06:14:27 +01:00
"html_url": "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-",
"description": " (CVE-2017-10271)Java反序列化漏洞",
"fork": false,
"created_at": "2019-11-05T13:33:56Z",
2020-07-03 11:07:50 +02:00
"updated_at": "2020-07-03T04:06:16Z",
2019-12-12 06:14:27 +01:00
"pushed_at": "2019-11-05T13:35:14Z",
2020-07-03 11:07:50 +02:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
2019-12-09 16:05:38 +01:00
"score": 0
2020-04-06 05:07:47 +02:00
},
{
"id": 253372582,
"name": "CVE-2017-10271",
"full_name": "testwc\/CVE-2017-10271",
"owner": {
"login": "testwc",
"id": 7675910,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7675910?v=4",
"html_url": "https:\/\/github.com\/testwc"
},
"html_url": "https:\/\/github.com\/testwc\/CVE-2017-10271",
"description": "CVE-2017-10271",
"fork": false,
"created_at": "2020-04-06T02:01:20Z",
2020-05-08 11:07:27 +02:00
"updated_at": "2020-05-08T06:52:50Z",
"pushed_at": "2020-05-08T06:52:48Z",
2020-04-06 05:07:47 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2019-12-08 14:19:20 +01:00
}
]