[ { "id": 307998445, "name": "CVE-2020-14882", "full_name": "jas502n\/CVE-2020-14882", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882", "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", "updated_at": "2020-11-02T13:22:30Z", "pushed_at": "2020-11-02T07:04:33Z", "stargazers_count": 85, "watchers_count": 85, "forks_count": 15, "forks": 15, "watchers": 85, "score": 0 }, { "id": 308145197, "name": "CVE-2020-14882", "full_name": "s1kr10s\/CVE-2020-14882", "owner": { "login": "s1kr10s", "id": 5374475, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5374475?v=4", "html_url": "https:\/\/github.com\/s1kr10s" }, "html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882", "description": "CVE-2020–14882 by Jang", "fork": false, "created_at": "2020-10-28T21:28:12Z", "updated_at": "2020-11-02T11:49:17Z", "pushed_at": "2020-10-29T03:57:09Z", "stargazers_count": 22, "watchers_count": 22, "forks_count": 15, "forks": 15, "watchers": 22, "score": 0 }, { "id": 308184758, "name": "McMaster-University-0-day-Blind-Command-Injection", "full_name": "Umarovm\/McMaster-University-0-day-Blind-Command-Injection", "owner": { "login": "Umarovm", "id": 25722145, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25722145?v=4", "html_url": "https:\/\/github.com\/Umarovm" }, "html_url": "https:\/\/github.com\/Umarovm\/McMaster-University-0-day-Blind-Command-Injection", "description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.", "fork": false, "created_at": "2020-10-29T01:28:41Z", "updated_at": "2020-10-31T01:09:15Z", "pushed_at": "2020-10-31T01:08:56Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308238126, "name": "CVE-2020-14882", "full_name": "RedTeamWing\/CVE-2020-14882", "owner": { "login": "RedTeamWing", "id": 25416365, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25416365?v=4", "html_url": "https:\/\/github.com\/RedTeamWing" }, "html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882", "description": "CVE-2020-14882 Weblogic-Exp", "fork": false, "created_at": "2020-10-29T06:30:30Z", "updated_at": "2020-11-01T01:43:30Z", "pushed_at": "2020-10-29T06:36:01Z", "stargazers_count": 12, "watchers_count": 12, "forks_count": 6, "forks": 6, "watchers": 12, "score": 0 }, { "id": 308343789, "name": "cve-2020-14882", "full_name": "0thm4n3\/cve-2020-14882", "owner": { "login": "0thm4n3", "id": 12746014, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12746014?v=4", "html_url": "https:\/\/github.com\/0thm4n3" }, "html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882", "description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882", "fork": false, "created_at": "2020-10-29T13:53:31Z", "updated_at": "2020-10-31T13:03:28Z", "pushed_at": "2020-10-31T13:03:26Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 308374913, "name": "cve-2020-14882", "full_name": "wsfengfan\/cve-2020-14882", "owner": { "login": "wsfengfan", "id": 33821840, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4", "html_url": "https:\/\/github.com\/wsfengfan" }, "html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882", "description": "CVE-2020-14882 GET POC", "fork": false, "created_at": "2020-10-29T15:44:23Z", "updated_at": "2020-10-29T16:16:31Z", "pushed_at": "2020-10-29T16:07:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 308605927, "name": "CVE-2020-14882", "full_name": "alexfrancow\/CVE-2020-14882", "owner": { "login": "alexfrancow", "id": 23419929, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4", "html_url": "https:\/\/github.com\/alexfrancow" }, "html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-10-30T11:07:11Z", "updated_at": "2020-10-31T15:57:21Z", "pushed_at": "2020-10-31T15:57:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308716809, "name": "CVE-2020-14882", "full_name": "sickwell\/CVE-2020-14882", "owner": { "login": "sickwell", "id": 32671944, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32671944?v=4", "html_url": "https:\/\/github.com\/sickwell" }, "html_url": "https:\/\/github.com\/sickwell\/CVE-2020-14882", "description": "PoC for CVE-2020-14882", "fork": false, "created_at": "2020-10-30T18:46:34Z", "updated_at": "2020-10-30T18:46:34Z", "pushed_at": "2020-10-30T18:46:35Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308782228, "name": "CVE-2020-14882", "full_name": "GGyao\/CVE-2020-14882", "owner": { "login": "GGyao", "id": 38530938, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4", "html_url": "https:\/\/github.com\/GGyao" }, "html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882", "description": "CVE-2020-14882批量验证工具。", "fork": false, "created_at": "2020-10-31T01:43:54Z", "updated_at": "2020-11-02T11:05:44Z", "pushed_at": "2020-10-31T02:03:41Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 1, "forks": 1, "watchers": 10, "score": 0 }, { "id": 309098912, "name": "Weblogic_Unauthorized-bypass-RCE", "full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE", "owner": { "login": "ludy-dev", "id": 70466565, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4", "html_url": "https:\/\/github.com\/ludy-dev" }, "html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE", "description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script", "fork": false, "created_at": "2020-11-01T13:12:27Z", "updated_at": "2020-11-02T11:06:35Z", "pushed_at": "2020-11-01T13:56:48Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 } ]