mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
854 lines
No EOL
30 KiB
JSON
854 lines
No EOL
30 KiB
JSON
[
|
||
{
|
||
"id": 115195951,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "1337g\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "1337g",
|
||
"id": 32504404,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32504404?v=4",
|
||
"html_url": "https:\/\/github.com\/1337g",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)",
|
||
"fork": false,
|
||
"created_at": "2017-12-23T13:04:23Z",
|
||
"updated_at": "2024-08-12T19:34:59Z",
|
||
"pushed_at": "2017-12-23T13:12:06Z",
|
||
"stargazers_count": 37,
|
||
"watchers_count": 37,
|
||
"has_discussions": false,
|
||
"forks_count": 27,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 27,
|
||
"watchers": 37,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 115311346,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "s3xy\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "s3xy",
|
||
"id": 34327996,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34327996?v=4",
|
||
"html_url": "https:\/\/github.com\/s3xy",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271",
|
||
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
|
||
"fork": false,
|
||
"created_at": "2017-12-25T06:11:54Z",
|
||
"updated_at": "2024-08-12T19:35:01Z",
|
||
"pushed_at": "2017-12-25T06:21:23Z",
|
||
"stargazers_count": 22,
|
||
"watchers_count": 22,
|
||
"has_discussions": false,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 22,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 115339400,
|
||
"name": "PoCs-Weblogic_2017_10271",
|
||
"full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271",
|
||
"owner": {
|
||
"login": "ZH3FENG",
|
||
"id": 20502660,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20502660?v=4",
|
||
"html_url": "https:\/\/github.com\/ZH3FENG",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271",
|
||
"description": "Simplified PoC for Weblogic-CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2017-12-25T13:18:45Z",
|
||
"updated_at": "2019-03-19T07:31:45Z",
|
||
"pushed_at": "2017-12-25T13:23:32Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 115571903,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "c0mmand3rOpSec\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "c0mmand3rOpSec",
|
||
"id": 17217255,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17217255?v=4",
|
||
"html_url": "https:\/\/github.com\/c0mmand3rOpSec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271",
|
||
"description": "WebLogic Exploit",
|
||
"fork": false,
|
||
"created_at": "2017-12-28T01:30:50Z",
|
||
"updated_at": "2025-01-13T01:37:38Z",
|
||
"pushed_at": "2018-07-13T18:56:53Z",
|
||
"stargazers_count": 142,
|
||
"watchers_count": 142,
|
||
"has_discussions": false,
|
||
"forks_count": 46,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 46,
|
||
"watchers": 142,
|
||
"score": 0,
|
||
"subscribers_count": 9
|
||
},
|
||
{
|
||
"id": 115596796,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "Luffin\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "Luffin",
|
||
"id": 13807870,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13807870?v=4",
|
||
"html_url": "https:\/\/github.com\/Luffin",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 POC",
|
||
"fork": false,
|
||
"created_at": "2017-12-28T07:19:13Z",
|
||
"updated_at": "2023-02-16T07:47:59Z",
|
||
"pushed_at": "2018-01-10T02:34:56Z",
|
||
"stargazers_count": 29,
|
||
"watchers_count": 29,
|
||
"has_discussions": false,
|
||
"forks_count": 15,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 15,
|
||
"watchers": 29,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 116099094,
|
||
"name": "weblogic_wls_wsat_rce",
|
||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||
"owner": {
|
||
"login": "cjjduck",
|
||
"id": 23519154,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23519154?v=4",
|
||
"html_url": "https:\/\/github.com\/cjjduck",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||
"fork": false,
|
||
"created_at": "2018-01-03T06:14:28Z",
|
||
"updated_at": "2020-10-09T02:33:00Z",
|
||
"pushed_at": "2018-01-03T00:42:57Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 40,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 40,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 116430643,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "kkirsche\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "kkirsche",
|
||
"id": 947110,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/947110?v=4",
|
||
"html_url": "https:\/\/github.com\/kkirsche",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271",
|
||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-01-05T21:57:03Z",
|
||
"updated_at": "2025-01-13T01:37:32Z",
|
||
"pushed_at": "2022-09-16T12:53:46Z",
|
||
"stargazers_count": 126,
|
||
"watchers_count": 126,
|
||
"has_discussions": false,
|
||
"forks_count": 42,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 42,
|
||
"watchers": 126,
|
||
"score": 0,
|
||
"subscribers_count": 7
|
||
},
|
||
{
|
||
"id": 117624791,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "pssss\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "pssss",
|
||
"id": 14834109,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14834109?v=4",
|
||
"html_url": "https:\/\/github.com\/pssss",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pssss\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁",
|
||
"fork": false,
|
||
"created_at": "2018-01-16T03:10:48Z",
|
||
"updated_at": "2024-06-06T03:25:54Z",
|
||
"pushed_at": "2020-01-20T06:37:56Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 117926261,
|
||
"name": "cve-2017-10271-poc",
|
||
"full_name": "SuperHacker-liuan\/cve-2017-10271-poc",
|
||
"owner": {
|
||
"login": "SuperHacker-liuan",
|
||
"id": 30787037,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30787037?v=4",
|
||
"html_url": "https:\/\/github.com\/SuperHacker-liuan",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc",
|
||
"description": "cve-2017-10271 POC",
|
||
"fork": false,
|
||
"created_at": "2018-01-18T03:21:15Z",
|
||
"updated_at": "2022-11-14T08:17:26Z",
|
||
"pushed_at": "2018-02-02T07:47:30Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 118144871,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||
"full_name": "peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
|
||
"owner": {
|
||
"login": "peterpeter228",
|
||
"id": 22089258,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22089258?v=4",
|
||
"html_url": "https:\/\/github.com\/peterpeter228",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/peterpeter228\/Oracle-WebLogic-CVE-2017-10271",
|
||
"description": "WebLogic wls-wsat RCE CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2018-01-19T15:50:08Z",
|
||
"updated_at": "2023-11-18T03:10:27Z",
|
||
"pushed_at": "2018-01-19T11:29:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 56,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 56,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 120571410,
|
||
"name": "weblogic_honeypot",
|
||
"full_name": "Cymmetria\/weblogic_honeypot",
|
||
"owner": {
|
||
"login": "Cymmetria",
|
||
"id": 19413345,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19413345?v=4",
|
||
"html_url": "https:\/\/github.com\/Cymmetria",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cymmetria\/weblogic_honeypot",
|
||
"description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2018-02-07T06:11:23Z",
|
||
"updated_at": "2024-09-21T11:34:13Z",
|
||
"pushed_at": "2020-04-25T20:55:29Z",
|
||
"stargazers_count": 32,
|
||
"watchers_count": 32,
|
||
"has_discussions": false,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"deception",
|
||
"execution-vulnerability",
|
||
"honeypot",
|
||
"oracle",
|
||
"security",
|
||
"security-tools",
|
||
"security-vulnerability",
|
||
"vulnerability",
|
||
"weblogic",
|
||
"weblogic-server"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 32,
|
||
"score": 0,
|
||
"subscribers_count": 5
|
||
},
|
||
{
|
||
"id": 123384221,
|
||
"name": "weblogic_wls_rce_poc-exp",
|
||
"full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp",
|
||
"owner": {
|
||
"login": "JackyTsuuuy",
|
||
"id": 9449527,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9449527?v=4",
|
||
"html_url": "https:\/\/github.com\/JackyTsuuuy",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp",
|
||
"description": "cve-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2018-03-01T04:57:09Z",
|
||
"updated_at": "2020-07-31T16:12:20Z",
|
||
"pushed_at": "2018-03-01T05:08:29Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 139956588,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271-master",
|
||
"full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
|
||
"owner": {
|
||
"login": "lonehand",
|
||
"id": 20275278,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20275278?v=4",
|
||
"html_url": "https:\/\/github.com\/lonehand",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-07-06T08:32:28Z",
|
||
"updated_at": "2019-06-27T03:08:05Z",
|
||
"pushed_at": "2018-07-06T08:42:40Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 148616806,
|
||
"name": "javaserializetools",
|
||
"full_name": "shack2\/javaserializetools",
|
||
"owner": {
|
||
"login": "shack2",
|
||
"id": 26374431,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26374431?v=4",
|
||
"html_url": "https:\/\/github.com\/shack2",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shack2\/javaserializetools",
|
||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||
"fork": false,
|
||
"created_at": "2018-09-13T09:44:18Z",
|
||
"updated_at": "2025-01-11T07:35:13Z",
|
||
"pushed_at": "2020-10-01T20:20:41Z",
|
||
"stargazers_count": 464,
|
||
"watchers_count": 464,
|
||
"has_discussions": false,
|
||
"forks_count": 115,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 115,
|
||
"watchers": 464,
|
||
"score": 0,
|
||
"subscribers_count": 9
|
||
},
|
||
{
|
||
"id": 161570094,
|
||
"name": "JavaDeserialization",
|
||
"full_name": "ETOCheney\/JavaDeserialization",
|
||
"owner": {
|
||
"login": "ETOCheney",
|
||
"id": 28469578,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28469578?v=4",
|
||
"html_url": "https:\/\/github.com\/ETOCheney",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization",
|
||
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
|
||
"fork": false,
|
||
"created_at": "2018-12-13T02:00:23Z",
|
||
"updated_at": "2023-11-21T01:26:28Z",
|
||
"pushed_at": "2018-12-13T14:05:28Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 9,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 162520695,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "r4b3rt\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "r4b3rt",
|
||
"id": 38994730,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38994730?v=4",
|
||
"html_url": "https:\/\/github.com\/r4b3rt",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r4b3rt\/CVE-2017-10271",
|
||
"description": "Weblogic(CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-12-20T03:17:51Z",
|
||
"updated_at": "2018-12-20T03:17:53Z",
|
||
"pushed_at": "2018-12-04T14:45:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 165317811,
|
||
"name": "cve-2017-10271",
|
||
"full_name": "cved-sources\/cve-2017-10271",
|
||
"owner": {
|
||
"login": "cved-sources",
|
||
"id": 46423677,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
|
||
"html_url": "https:\/\/github.com\/cved-sources",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271",
|
||
"description": "cve-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-01-11T22:11:16Z",
|
||
"updated_at": "2021-04-15T21:23:38Z",
|
||
"pushed_at": "2021-04-15T21:23:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 175729381,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||
"full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
|
||
"owner": {
|
||
"login": "XHSecurity",
|
||
"id": 48574583,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48574583?v=4",
|
||
"html_url": "https:\/\/github.com\/XHSecurity",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
|
||
"description": "原创作者:Bearcat@secfree.com",
|
||
"fork": false,
|
||
"created_at": "2019-03-15T01:50:01Z",
|
||
"updated_at": "2024-08-25T01:26:04Z",
|
||
"pushed_at": "2024-08-25T01:17:39Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 176763123,
|
||
"name": "Weblogic_Wsat_RCE",
|
||
"full_name": "kbsec\/Weblogic_Wsat_RCE",
|
||
"owner": {
|
||
"login": "kbsec",
|
||
"id": 11823496,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11823496?v=4",
|
||
"html_url": "https:\/\/github.com\/kbsec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE",
|
||
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
|
||
"fork": false,
|
||
"created_at": "2019-03-20T15:26:55Z",
|
||
"updated_at": "2021-08-30T23:51:56Z",
|
||
"pushed_at": "2019-03-27T17:47:52Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 183346706,
|
||
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"owner": {
|
||
"login": "SkyBlueEternal",
|
||
"id": 46418185,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46418185?v=4",
|
||
"html_url": "https:\/\/github.com\/SkyBlueEternal",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T03:07:53Z",
|
||
"updated_at": "2024-08-12T19:48:15Z",
|
||
"pushed_at": "2019-04-29T02:06:00Z",
|
||
"stargazers_count": 105,
|
||
"watchers_count": 105,
|
||
"has_discussions": false,
|
||
"forks_count": 36,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 36,
|
||
"watchers": 105,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 183428186,
|
||
"name": "WebLogic_CNVD_C_2019_48814",
|
||
"full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814",
|
||
"owner": {
|
||
"login": "Yuusuke4",
|
||
"id": 26989867,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26989867?v=4",
|
||
"html_url": "https:\/\/github.com\/Yuusuke4",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T12:18:16Z",
|
||
"updated_at": "2019-04-25T12:33:00Z",
|
||
"pushed_at": "2019-04-25T12:10:18Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 183430704,
|
||
"name": "WebLogic_CNVD_C2019_48814",
|
||
"full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814",
|
||
"owner": {
|
||
"login": "7kbstorm",
|
||
"id": 38887063,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38887063?v=4",
|
||
"html_url": "https:\/\/github.com\/7kbstorm",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T12:33:31Z",
|
||
"updated_at": "2024-11-01T02:37:48Z",
|
||
"pushed_at": "2019-04-25T12:44:02Z",
|
||
"stargazers_count": 116,
|
||
"watchers_count": 116,
|
||
"has_discussions": false,
|
||
"forks_count": 54,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 54,
|
||
"watchers": 116,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 219752851,
|
||
"name": "-CVE-2017-10271-",
|
||
"full_name": "ianxtianxt\/-CVE-2017-10271-",
|
||
"owner": {
|
||
"login": "ianxtianxt",
|
||
"id": 45796484,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
|
||
"html_url": "https:\/\/github.com\/ianxtianxt",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-",
|
||
"description": " (CVE-2017-10271)Java反序列化漏洞",
|
||
"fork": false,
|
||
"created_at": "2019-11-05T13:33:56Z",
|
||
"updated_at": "2024-08-12T19:54:34Z",
|
||
"pushed_at": "2019-11-05T13:35:14Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 253372582,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "testwc\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "testwc",
|
||
"id": 7675910,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7675910?v=4",
|
||
"html_url": "https:\/\/github.com\/testwc",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/testwc\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2020-04-06T02:01:20Z",
|
||
"updated_at": "2020-05-08T06:52:50Z",
|
||
"pushed_at": "2020-05-08T06:52:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 313801625,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "Al1ex\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "Al1ex",
|
||
"id": 38161463,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||
"html_url": "https:\/\/github.com\/Al1ex",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2020-11-18T02:31:18Z",
|
||
"updated_at": "2025-01-15T07:53:57Z",
|
||
"pushed_at": "2020-11-18T02:31:50Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2017-10271",
|
||
"rce",
|
||
"weblogic"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 372542306,
|
||
"name": "weblogic-CVE-2019-2729-POC",
|
||
"full_name": "pizza-power\/weblogic-CVE-2019-2729-POC",
|
||
"owner": {
|
||
"login": "pizza-power",
|
||
"id": 6135659,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
|
||
"html_url": "https:\/\/github.com\/pizza-power",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pizza-power\/weblogic-CVE-2019-2729-POC",
|
||
"description": "python3 POC for CVE-2019-2729 WebLogic Deserialization Vulnerability and CVE-2017-10271 amongst others",
|
||
"fork": false,
|
||
"created_at": "2021-05-31T14:54:38Z",
|
||
"updated_at": "2022-08-27T19:09:37Z",
|
||
"pushed_at": "2021-05-31T14:55:56Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 503359850,
|
||
"name": "7kbstormq",
|
||
"full_name": "KKsdall\/7kbstormq",
|
||
"owner": {
|
||
"login": "KKsdall",
|
||
"id": 107482959,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107482959?v=4",
|
||
"html_url": "https:\/\/github.com\/KKsdall",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KKsdall\/7kbstormq",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
|
||
"fork": false,
|
||
"created_at": "2022-06-14T12:55:53Z",
|
||
"updated_at": "2022-06-14T12:55:53Z",
|
||
"pushed_at": "2022-06-14T12:55:53Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |