mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
623 lines
No EOL
23 KiB
JSON
623 lines
No EOL
23 KiB
JSON
[
|
||
{
|
||
"id": 115195951,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "1337g\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "1337g",
|
||
"id": 32504404,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32504404?v=4",
|
||
"html_url": "https:\/\/github.com\/1337g"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1337g\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 WEBLOGIC RCE (TESTED)",
|
||
"fork": false,
|
||
"created_at": "2017-12-23T13:04:23Z",
|
||
"updated_at": "2020-01-30T15:17:37Z",
|
||
"pushed_at": "2017-12-23T13:12:06Z",
|
||
"stargazers_count": 38,
|
||
"watchers_count": 38,
|
||
"forks_count": 26,
|
||
"forks": 26,
|
||
"watchers": 38,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 115311346,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "s3xy\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "s3xy",
|
||
"id": 34327996,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34327996?v=4",
|
||
"html_url": "https:\/\/github.com\/s3xy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s3xy\/CVE-2017-10271",
|
||
"description": "Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in takeover of Oracle WebLogic Server.",
|
||
"fork": false,
|
||
"created_at": "2017-12-25T06:11:54Z",
|
||
"updated_at": "2019-10-16T11:06:14Z",
|
||
"pushed_at": "2017-12-25T06:21:23Z",
|
||
"stargazers_count": 23,
|
||
"watchers_count": 23,
|
||
"forks_count": 8,
|
||
"forks": 8,
|
||
"watchers": 23,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 115339400,
|
||
"name": "PoCs-Weblogic_2017_10271",
|
||
"full_name": "ZH3FENG\/PoCs-Weblogic_2017_10271",
|
||
"owner": {
|
||
"login": "ZH3FENG",
|
||
"id": 20502660,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20502660?v=4",
|
||
"html_url": "https:\/\/github.com\/ZH3FENG"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ZH3FENG\/PoCs-Weblogic_2017_10271",
|
||
"description": "Simplified PoC for Weblogic-CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2017-12-25T13:18:45Z",
|
||
"updated_at": "2019-03-19T07:31:45Z",
|
||
"pushed_at": "2017-12-25T13:23:32Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 115571903,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "c0mmand3rOpSec\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "c0mmand3rOpSec",
|
||
"id": 17217255,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/17217255?v=4",
|
||
"html_url": "https:\/\/github.com\/c0mmand3rOpSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271",
|
||
"description": "WebLogic Exploit",
|
||
"fork": false,
|
||
"created_at": "2017-12-28T01:30:50Z",
|
||
"updated_at": "2020-03-29T05:10:46Z",
|
||
"pushed_at": "2018-07-13T18:56:53Z",
|
||
"stargazers_count": 127,
|
||
"watchers_count": 127,
|
||
"forks_count": 46,
|
||
"forks": 46,
|
||
"watchers": 127,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 115596796,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "Luffin\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "Luffin",
|
||
"id": 13807870,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/13807870?v=4",
|
||
"html_url": "https:\/\/github.com\/Luffin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Luffin\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 POC",
|
||
"fork": false,
|
||
"created_at": "2017-12-28T07:19:13Z",
|
||
"updated_at": "2019-11-12T08:23:37Z",
|
||
"pushed_at": "2018-01-10T02:34:56Z",
|
||
"stargazers_count": 29,
|
||
"watchers_count": 29,
|
||
"forks_count": 13,
|
||
"forks": 13,
|
||
"watchers": 29,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 116099094,
|
||
"name": "weblogic_wls_wsat_rce",
|
||
"full_name": "cjjduck\/weblogic_wls_wsat_rce",
|
||
"owner": {
|
||
"login": "cjjduck",
|
||
"id": 23519154,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23519154?v=4",
|
||
"html_url": "https:\/\/github.com\/cjjduck"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cjjduck\/weblogic_wls_wsat_rce",
|
||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||
"fork": false,
|
||
"created_at": "2018-01-03T06:14:28Z",
|
||
"updated_at": "2020-03-05T08:20:20Z",
|
||
"pushed_at": "2018-01-03T00:42:57Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 39,
|
||
"forks": 39,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 116430643,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "kkirsche\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "kkirsche",
|
||
"id": 947110,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/947110?v=4",
|
||
"html_url": "https:\/\/github.com\/kkirsche"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kkirsche\/CVE-2017-10271",
|
||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-01-05T21:57:03Z",
|
||
"updated_at": "2020-04-27T12:19:57Z",
|
||
"pushed_at": "2018-01-26T14:28:58Z",
|
||
"stargazers_count": 114,
|
||
"watchers_count": 114,
|
||
"forks_count": 46,
|
||
"forks": 46,
|
||
"watchers": 114,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 117624791,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "pssss\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "pssss",
|
||
"id": 14834109,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14834109?v=4",
|
||
"html_url": "https:\/\/github.com\/pssss"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pssss\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁",
|
||
"fork": false,
|
||
"created_at": "2018-01-16T03:10:48Z",
|
||
"updated_at": "2020-01-20T06:37:58Z",
|
||
"pushed_at": "2020-01-20T06:37:56Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 117926261,
|
||
"name": "cve-2017-10271-poc",
|
||
"full_name": "SuperHacker-liuan\/cve-2017-10271-poc",
|
||
"owner": {
|
||
"login": "SuperHacker-liuan",
|
||
"id": 30787037,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30787037?v=4",
|
||
"html_url": "https:\/\/github.com\/SuperHacker-liuan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SuperHacker-liuan\/cve-2017-10271-poc",
|
||
"description": "cve-2017-10271 POC",
|
||
"fork": false,
|
||
"created_at": "2018-01-18T03:21:15Z",
|
||
"updated_at": "2020-01-06T03:15:27Z",
|
||
"pushed_at": "2018-02-02T07:47:30Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 118044092,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "bmcculley\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "bmcculley",
|
||
"id": 6238704,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6238704?v=4",
|
||
"html_url": "https:\/\/github.com\/bmcculley"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271",
|
||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-01-18T22:07:33Z",
|
||
"updated_at": "2019-10-26T15:31:53Z",
|
||
"pushed_at": "2019-10-26T15:31:55Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 118115633,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||
"full_name": "RealBearcat\/Oracle-WebLogic-CVE-2017-10271",
|
||
"owner": {
|
||
"login": "RealBearcat",
|
||
"id": 22558737,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
||
"html_url": "https:\/\/github.com\/RealBearcat"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RealBearcat\/Oracle-WebLogic-CVE-2017-10271",
|
||
"description": "WebLogic Wls-wsat XMLDecoder 反序列化",
|
||
"fork": false,
|
||
"created_at": "2018-01-19T11:09:11Z",
|
||
"updated_at": "2020-04-18T08:19:54Z",
|
||
"pushed_at": "2018-03-19T02:04:29Z",
|
||
"stargazers_count": 110,
|
||
"watchers_count": 110,
|
||
"forks_count": 58,
|
||
"forks": 58,
|
||
"watchers": 110,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 120462394,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "Sch01ar\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "Sch01ar",
|
||
"id": 28928231,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28928231?v=4",
|
||
"html_url": "https:\/\/github.com\/Sch01ar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Sch01ar\/CVE-2017-10271",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-02-06T13:38:40Z",
|
||
"updated_at": "2018-02-06T13:59:34Z",
|
||
"pushed_at": "2018-02-08T09:21:18Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 120571410,
|
||
"name": "weblogic_honeypot",
|
||
"full_name": "Cymmetria\/weblogic_honeypot",
|
||
"owner": {
|
||
"login": "Cymmetria",
|
||
"id": 19413345,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19413345?v=4",
|
||
"html_url": "https:\/\/github.com\/Cymmetria"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cymmetria\/weblogic_honeypot",
|
||
"description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2018-02-07T06:11:23Z",
|
||
"updated_at": "2020-04-26T01:50:16Z",
|
||
"pushed_at": "2020-04-25T20:55:29Z",
|
||
"stargazers_count": 15,
|
||
"watchers_count": 15,
|
||
"forks_count": 6,
|
||
"forks": 6,
|
||
"watchers": 15,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 123384221,
|
||
"name": "weblogic_wls_rce_poc-exp",
|
||
"full_name": "JackyTsuuuy\/weblogic_wls_rce_poc-exp",
|
||
"owner": {
|
||
"login": "JackyTsuuuy",
|
||
"id": 9449527,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/9449527?v=4",
|
||
"html_url": "https:\/\/github.com\/JackyTsuuuy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JackyTsuuuy\/weblogic_wls_rce_poc-exp",
|
||
"description": "cve-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2018-03-01T04:57:09Z",
|
||
"updated_at": "2019-10-20T09:39:21Z",
|
||
"pushed_at": "2018-03-01T05:08:29Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 125456636,
|
||
"name": "Oracle-WebLogic-WLS-WSAT",
|
||
"full_name": "s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
|
||
"owner": {
|
||
"login": "s0wr0b1ndef",
|
||
"id": 37288034,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
|
||
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
||
},
|
||
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/Oracle-WebLogic-WLS-WSAT",
|
||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-03-16T03:09:29Z",
|
||
"updated_at": "2018-08-05T19:23:02Z",
|
||
"pushed_at": "2018-03-16T03:14:12Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 139956588,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271-master",
|
||
"full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
|
||
"owner": {
|
||
"login": "lonehand",
|
||
"id": 20275278,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20275278?v=4",
|
||
"html_url": "https:\/\/github.com\/lonehand"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-07-06T08:32:28Z",
|
||
"updated_at": "2019-06-27T03:08:05Z",
|
||
"pushed_at": "2018-07-06T08:42:40Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 148616806,
|
||
"name": "javaserializetools",
|
||
"full_name": "shack2\/javaserializetools",
|
||
"owner": {
|
||
"login": "shack2",
|
||
"id": 26374431,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26374431?v=4",
|
||
"html_url": "https:\/\/github.com\/shack2"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shack2\/javaserializetools",
|
||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||
"fork": false,
|
||
"created_at": "2018-09-13T09:44:18Z",
|
||
"updated_at": "2020-05-06T14:29:36Z",
|
||
"pushed_at": "2019-08-28T12:05:45Z",
|
||
"stargazers_count": 188,
|
||
"watchers_count": 188,
|
||
"forks_count": 64,
|
||
"forks": 64,
|
||
"watchers": 188,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 160370962,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "nhwuxiaojun\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "nhwuxiaojun",
|
||
"id": 15905850,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15905850?v=4",
|
||
"html_url": "https:\/\/github.com\/nhwuxiaojun"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271",
|
||
"description": "Weblogic(CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-12-04T14:34:10Z",
|
||
"updated_at": "2020-04-03T03:53:46Z",
|
||
"pushed_at": "2018-12-04T14:45:40Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 161570094,
|
||
"name": "JavaDeserialization",
|
||
"full_name": "ETOCheney\/JavaDeserialization",
|
||
"owner": {
|
||
"login": "ETOCheney",
|
||
"id": 28469578,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/28469578?v=4",
|
||
"html_url": "https:\/\/github.com\/ETOCheney"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization",
|
||
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
|
||
"fork": false,
|
||
"created_at": "2018-12-13T02:00:23Z",
|
||
"updated_at": "2020-02-14T21:42:51Z",
|
||
"pushed_at": "2018-12-13T14:05:28Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 165317811,
|
||
"name": "cve-2017-10271",
|
||
"full_name": "cved-sources\/cve-2017-10271",
|
||
"owner": {
|
||
"login": "cved-sources",
|
||
"id": 46423677,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
||
"html_url": "https:\/\/github.com\/cved-sources"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271",
|
||
"description": "cve-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-01-11T22:11:16Z",
|
||
"updated_at": "2019-01-11T22:11:38Z",
|
||
"pushed_at": "2019-01-11T22:11:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 175729381,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||
"full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
|
||
"owner": {
|
||
"login": "XHSecurity",
|
||
"id": 48574583,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/48574583?v=4",
|
||
"html_url": "https:\/\/github.com\/XHSecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
|
||
"description": "Oracle-WebLogic-CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-03-15T01:50:01Z",
|
||
"updated_at": "2019-03-15T01:51:35Z",
|
||
"pushed_at": "2019-03-15T01:51:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 176763123,
|
||
"name": "Weblogic_Wsat_RCE",
|
||
"full_name": "kaidb\/Weblogic_Wsat_RCE",
|
||
"owner": {
|
||
"login": "kaidb",
|
||
"id": 11823496,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11823496?v=4",
|
||
"html_url": "https:\/\/github.com\/kaidb"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kaidb\/Weblogic_Wsat_RCE",
|
||
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
|
||
"fork": false,
|
||
"created_at": "2019-03-20T15:26:55Z",
|
||
"updated_at": "2019-12-19T13:44:39Z",
|
||
"pushed_at": "2019-03-27T17:47:52Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183346706,
|
||
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"owner": {
|
||
"login": "SkyBlueEternal",
|
||
"id": 46418185,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46418185?v=4",
|
||
"html_url": "https:\/\/github.com\/SkyBlueEternal"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T03:07:53Z",
|
||
"updated_at": "2020-04-24T18:17:55Z",
|
||
"pushed_at": "2019-04-29T02:06:00Z",
|
||
"stargazers_count": 99,
|
||
"watchers_count": 99,
|
||
"forks_count": 37,
|
||
"forks": 37,
|
||
"watchers": 99,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183428186,
|
||
"name": "WebLogic_CNVD_C_2019_48814",
|
||
"full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814",
|
||
"owner": {
|
||
"login": "Yuusuke4",
|
||
"id": 26989867,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26989867?v=4",
|
||
"html_url": "https:\/\/github.com\/Yuusuke4"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T12:18:16Z",
|
||
"updated_at": "2019-04-25T12:33:00Z",
|
||
"pushed_at": "2019-04-25T12:10:18Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183430704,
|
||
"name": "WebLogic_CNVD_C2019_48814",
|
||
"full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814",
|
||
"owner": {
|
||
"login": "7kbstorm",
|
||
"id": 38887063,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/38887063?v=4",
|
||
"html_url": "https:\/\/github.com\/7kbstorm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T12:33:31Z",
|
||
"updated_at": "2020-04-23T06:14:31Z",
|
||
"pushed_at": "2019-04-25T12:44:02Z",
|
||
"stargazers_count": 112,
|
||
"watchers_count": 112,
|
||
"forks_count": 51,
|
||
"forks": 51,
|
||
"watchers": 112,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 219752851,
|
||
"name": "-CVE-2017-10271-",
|
||
"full_name": "ianxtianxt\/-CVE-2017-10271-",
|
||
"owner": {
|
||
"login": "ianxtianxt",
|
||
"id": 45796484,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
|
||
"html_url": "https:\/\/github.com\/ianxtianxt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-",
|
||
"description": " (CVE-2017-10271)Java反序列化漏洞",
|
||
"fork": false,
|
||
"created_at": "2019-11-05T13:33:56Z",
|
||
"updated_at": "2019-11-05T14:38:08Z",
|
||
"pushed_at": "2019-11-05T13:35:14Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 253372582,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "testwc\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "testwc",
|
||
"id": 7675910,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7675910?v=4",
|
||
"html_url": "https:\/\/github.com\/testwc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/testwc\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2020-04-06T02:01:20Z",
|
||
"updated_at": "2020-05-08T06:52:50Z",
|
||
"pushed_at": "2020-05-08T06:52:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |