[ { "id": 115195951, "name": "CVE-2017-10271", "full_name": "1337g\/CVE-2017-10271", "owner": { "login": "1337g", "id": 32504404, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4", "html_url": "https:\/\/github.com\/1337g" }, "html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271", "description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)", "fork": false, "created_at": "2017-12-23T13:04:23Z", "updated_at": "2020-09-01T16:02:59Z", "pushed_at": "2017-12-23T13:12:06Z", "stargazers_count": 38, "watchers_count": 38, "forks_count": 26, "forks": 26, "watchers": 38, "score": 0 }, { "id": 115311346, "name": "CVE-2017-10271", "full_name": "s3xy\/CVE-2017-10271", "owner": { "login": "s3xy", "id": 34327996, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34327996?v=4", "html_url": "https:\/\/github.com\/s3xy" }, "html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271", "description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.", "fork": false, "created_at": "2017-12-25T06:11:54Z", "updated_at": "2020-12-11T01:36:14Z", "pushed_at": "2017-12-25T06:21:23Z", "stargazers_count": 24, "watchers_count": 24, "forks_count": 9, "forks": 9, "watchers": 24, "score": 0 }, { "id": 115339400, "name": "PoCs-Weblogic_2017_10271", "full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271", "owner": { "login": "ZH3FENG", "id": 20502660, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20502660?v=4", "html_url": "https:\/\/github.com\/ZH3FENG" }, "html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271", "description": "Simplified PoC for Weblogic-CVE-2017-10271", "fork": false, "created_at": "2017-12-25T13:18:45Z", "updated_at": "2019-03-19T07:31:45Z", "pushed_at": "2017-12-25T13:23:32Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 2, "forks": 2, "watchers": 3, "score": 0 }, { "id": 115571903, "name": "CVE-2017-10271", "full_name": "c0mmand3rOpSec\/CVE-2017-10271", "owner": { "login": "c0mmand3rOpSec", "id": 17217255, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17217255?v=4", "html_url": "https:\/\/github.com\/c0mmand3rOpSec" }, "html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271", "description": "WebLogic Exploit", "fork": false, "created_at": "2017-12-28T01:30:50Z", "updated_at": "2020-11-07T09:05:16Z", "pushed_at": "2018-07-13T18:56:53Z", "stargazers_count": 128, "watchers_count": 128, "forks_count": 47, "forks": 47, "watchers": 128, "score": 0 }, { "id": 115596796, "name": "CVE-2017-10271", "full_name": "Luffin\/CVE-2017-10271", "owner": { "login": "Luffin", "id": 13807870, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13807870?v=4", "html_url": "https:\/\/github.com\/Luffin" }, "html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271", "description": "CVE-2017-10271 POC", "fork": false, "created_at": "2017-12-28T07:19:13Z", "updated_at": "2020-08-10T02:31:05Z", "pushed_at": "2018-01-10T02:34:56Z", "stargazers_count": 29, "watchers_count": 29, "forks_count": 14, "forks": 14, "watchers": 29, "score": 0 }, { "id": 116099094, "name": "weblogic_wls_wsat_rce", "full_name": "cjjduck\/weblogic_wls_wsat_rce", "owner": { "login": "cjjduck", "id": 23519154, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23519154?v=4", "html_url": "https:\/\/github.com\/cjjduck" }, "html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce", "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l", "fork": false, "created_at": "2018-01-03T06:14:28Z", "updated_at": "2020-10-09T02:33:00Z", "pushed_at": "2018-01-03T00:42:57Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 39, "forks": 39, "watchers": 3, "score": 0 }, { "id": 116430643, "name": "CVE-2017-10271", "full_name": "kkirsche\/CVE-2017-10271", "owner": { "login": "kkirsche", "id": 947110, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4", "html_url": "https:\/\/github.com\/kkirsche" }, "html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271", "description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)", "fork": false, "created_at": "2018-01-05T21:57:03Z", "updated_at": "2020-12-04T14:32:52Z", "pushed_at": "2018-01-26T14:28:58Z", "stargazers_count": 119, "watchers_count": 119, "forks_count": 43, "forks": 43, "watchers": 119, "score": 0 }, { "id": 117624791, "name": "CVE-2017-10271", "full_name": "pssss\/CVE-2017-10271", "owner": { "login": "pssss", "id": 14834109, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14834109?v=4", "html_url": "https:\/\/github.com\/pssss" }, "html_url": "https:\/\/github.com\/pssss\/CVE-2017-10271", "description": "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁", "fork": false, "created_at": "2018-01-16T03:10:48Z", "updated_at": "2020-01-20T06:37:58Z", "pushed_at": "2020-01-20T06:37:56Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "forks": 3, "watchers": 3, "score": 0 }, { "id": 117926261, "name": "cve-2017-10271-poc", "full_name": "SuperHacker-liuan\/cve-2017-10271-poc", "owner": { "login": "SuperHacker-liuan", "id": 30787037, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30787037?v=4", "html_url": "https:\/\/github.com\/SuperHacker-liuan" }, "html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc", "description": "cve-2017-10271 POC", "fork": false, "created_at": "2018-01-18T03:21:15Z", "updated_at": "2020-01-06T03:15:27Z", "pushed_at": "2018-02-02T07:47:30Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 1, "forks": 1, "watchers": 5, "score": 0 }, { "id": 118044092, "name": "CVE-2017-10271", "full_name": "bmcculley\/CVE-2017-10271", "owner": { "login": "bmcculley", "id": 6238704, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6238704?v=4", "html_url": "https:\/\/github.com\/bmcculley" }, "html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271", "description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)", "fork": false, "created_at": "2018-01-18T22:07:33Z", "updated_at": "2020-12-11T01:14:53Z", "pushed_at": "2019-10-26T15:31:55Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 118144871, "name": "Oracle-WebLogic-CVE-2017-10271", "full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271", "owner": { "login": "peterpeter228", "id": 22089258, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22089258?v=4", "html_url": "https:\/\/github.com\/peterpeter228" }, "html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271", "description": "WebLogic wls-wsat RCE CVE-2017-10271", "fork": false, "created_at": "2018-01-19T15:50:08Z", "updated_at": "2020-09-24T10:47:12Z", "pushed_at": "2018-01-19T11:29:24Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 120462394, "name": "CVE-2017-10271", "full_name": "Sch01ar\/CVE-2017-10271", "owner": { "login": "Sch01ar", "id": 28928231, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28928231?v=4", "html_url": "https:\/\/github.com\/Sch01ar" }, "html_url": "https:\/\/github.com\/Sch01ar\/CVE-2017-10271", "description": null, "fork": false, "created_at": "2018-02-06T13:38:40Z", "updated_at": "2018-02-06T13:59:34Z", "pushed_at": "2018-02-08T09:21:18Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 120571410, "name": "weblogic_honeypot", "full_name": "Cymmetria\/weblogic_honeypot", "owner": { "login": "Cymmetria", "id": 19413345, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19413345?v=4", "html_url": "https:\/\/github.com\/Cymmetria" }, "html_url": "https:\/\/github.com\/Cymmetria\/weblogic_honeypot", "description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.", "fork": false, "created_at": "2018-02-07T06:11:23Z", "updated_at": "2020-10-27T03:58:14Z", "pushed_at": "2020-04-25T20:55:29Z", "stargazers_count": 17, "watchers_count": 17, "forks_count": 6, "forks": 6, "watchers": 17, "score": 0 }, { "id": 123384221, "name": "weblogic_wls_rce_poc-exp", "full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp", "owner": { "login": "JackyTsuuuy", "id": 9449527, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9449527?v=4", "html_url": "https:\/\/github.com\/JackyTsuuuy" }, "html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp", "description": "cve-2017-10271", "fork": false, "created_at": "2018-03-01T04:57:09Z", "updated_at": "2020-07-31T16:12:20Z", "pushed_at": "2018-03-01T05:08:29Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 125456636, "name": "Oracle-WebLogic-WLS-WSAT", "full_name": "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT", "owner": { "login": "s0wr0b1ndef", "id": 37288034, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4", "html_url": "https:\/\/github.com\/s0wr0b1ndef" }, "html_url": "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT", "description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)", "fork": false, "created_at": "2018-03-16T03:09:29Z", "updated_at": "2018-08-05T19:23:02Z", "pushed_at": "2018-03-16T03:14:12Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 139956588, "name": "Oracle-WebLogic-CVE-2017-10271-master", "full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master", "owner": { "login": "lonehand", "id": 20275278, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20275278?v=4", "html_url": "https:\/\/github.com\/lonehand" }, "html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master", "description": null, "fork": false, "created_at": "2018-07-06T08:32:28Z", "updated_at": "2019-06-27T03:08:05Z", "pushed_at": "2018-07-06T08:42:40Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 148616806, "name": "javaserializetools", "full_name": "shack2\/javaserializetools", "owner": { "login": "shack2", "id": 26374431, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26374431?v=4", "html_url": "https:\/\/github.com\/shack2" }, "html_url": "https:\/\/github.com\/shack2\/javaserializetools", "description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。", "fork": false, "created_at": "2018-09-13T09:44:18Z", "updated_at": "2020-12-11T21:44:17Z", "pushed_at": "2020-10-01T20:20:41Z", "stargazers_count": 251, "watchers_count": 251, "forks_count": 91, "forks": 91, "watchers": 251, "score": 0 }, { "id": 160370962, "name": "CVE-2017-10271", "full_name": "nhwuxiaojun\/CVE-2017-10271", "owner": { "login": "nhwuxiaojun", "id": 15905850, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15905850?v=4", "html_url": "https:\/\/github.com\/nhwuxiaojun" }, "html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271", "description": "Weblogic(CVE-2017-10271)", "fork": false, "created_at": "2018-12-04T14:34:10Z", "updated_at": "2020-06-10T02:53:11Z", "pushed_at": "2018-12-04T14:45:40Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "forks": 2, "watchers": 2, "score": 0 }, { "id": 161570094, "name": "JavaDeserialization", "full_name": "ETOCheney\/JavaDeserialization", "owner": { "login": "ETOCheney", "id": 28469578, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28469578?v=4", "html_url": "https:\/\/github.com\/ETOCheney" }, "html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization", "description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器", "fork": false, "created_at": "2018-12-13T02:00:23Z", "updated_at": "2020-10-28T10:00:45Z", "pushed_at": "2018-12-13T14:05:28Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, "forks": 1, "watchers": 7, "score": 0 }, { "id": 165317811, "name": "cve-2017-10271", "full_name": "cved-sources\/cve-2017-10271", "owner": { "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4", "html_url": "https:\/\/github.com\/cved-sources" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271", "description": "cve-2017-10271", "fork": false, "created_at": "2019-01-11T22:11:16Z", "updated_at": "2019-01-11T22:11:38Z", "pushed_at": "2019-01-11T22:11:37Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 175729381, "name": "Oracle-WebLogic-CVE-2017-10271", "full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271", "owner": { "login": "XHSecurity", "id": 48574583, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48574583?v=4", "html_url": "https:\/\/github.com\/XHSecurity" }, "html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271", "description": "Oracle-WebLogic-CVE-2017-10271", "fork": false, "created_at": "2019-03-15T01:50:01Z", "updated_at": "2020-12-11T01:36:32Z", "pushed_at": "2019-03-15T01:51:34Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "forks": 2, "watchers": 1, "score": 0 }, { "id": 176763123, "name": "Weblogic_Wsat_RCE", "full_name": "kbsec\/Weblogic_Wsat_RCE", "owner": { "login": "kbsec", "id": 11823496, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11823496?v=4", "html_url": "https:\/\/github.com\/kbsec" }, "html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE", "description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ", "fork": false, "created_at": "2019-03-20T15:26:55Z", "updated_at": "2019-12-19T13:44:39Z", "pushed_at": "2019-03-27T17:47:52Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "forks": 1, "watchers": 3, "score": 0 }, { "id": 183346706, "name": "CNVD-C-2019-48814-CNNVD-201904-961", "full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961", "owner": { "login": "SkyBlueEternal", "id": 46418185, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4", "html_url": "https:\/\/github.com\/SkyBlueEternal" }, "html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961", "description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC", "fork": false, "created_at": "2019-04-25T03:07:53Z", "updated_at": "2020-09-19T16:04:20Z", "pushed_at": "2019-04-29T02:06:00Z", "stargazers_count": 103, "watchers_count": 103, "forks_count": 37, "forks": 37, "watchers": 103, "score": 0 }, { "id": 183428186, "name": "WebLogic_CNVD_C_2019_48814", "full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814", "owner": { "login": "Yuusuke4", "id": 26989867, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26989867?v=4", "html_url": "https:\/\/github.com\/Yuusuke4" }, "html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814", "description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271", "fork": false, "created_at": "2019-04-25T12:18:16Z", "updated_at": "2019-04-25T12:33:00Z", "pushed_at": "2019-04-25T12:10:18Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 183430704, "name": "WebLogic_CNVD_C2019_48814", "full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814", "owner": { "login": "7kbstorm", "id": 38887063, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38887063?v=4", "html_url": "https:\/\/github.com\/7kbstorm" }, "html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814", "description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm", "fork": false, "created_at": "2019-04-25T12:33:31Z", "updated_at": "2020-12-01T09:11:11Z", "pushed_at": "2019-04-25T12:44:02Z", "stargazers_count": 113, "watchers_count": 113, "forks_count": 53, "forks": 53, "watchers": 113, "score": 0 }, { "id": 219752851, "name": "-CVE-2017-10271-", "full_name": "ianxtianxt\/-CVE-2017-10271-", "owner": { "login": "ianxtianxt", "id": 45796484, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4", "html_url": "https:\/\/github.com\/ianxtianxt" }, "html_url": "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-", "description": " (CVE-2017-10271)Java反序列化漏洞", "fork": false, "created_at": "2019-11-05T13:33:56Z", "updated_at": "2020-07-03T04:06:16Z", "pushed_at": "2019-11-05T13:35:14Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "forks": 2, "watchers": 2, "score": 0 }, { "id": 253372582, "name": "CVE-2017-10271", "full_name": "testwc\/CVE-2017-10271", "owner": { "login": "testwc", "id": 7675910, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7675910?v=4", "html_url": "https:\/\/github.com\/testwc" }, "html_url": "https:\/\/github.com\/testwc\/CVE-2017-10271", "description": "CVE-2017-10271", "fork": false, "created_at": "2020-04-06T02:01:20Z", "updated_at": "2020-05-08T06:52:50Z", "pushed_at": "2020-05-08T06:52:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 313801625, "name": "CVE-2017-10271", "full_name": "Al1ex\/CVE-2017-10271", "owner": { "login": "Al1ex", "id": 38161463, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38161463?v=4", "html_url": "https:\/\/github.com\/Al1ex" }, "html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-10271", "description": "CVE-2017-10271", "fork": false, "created_at": "2020-11-18T02:31:18Z", "updated_at": "2020-11-18T02:31:51Z", "pushed_at": "2020-11-18T02:31:50Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]