mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
94 lines
No EOL
3.5 KiB
JSON
94 lines
No EOL
3.5 KiB
JSON
[
|
||
{
|
||
"id": 265151514,
|
||
"name": "tomcat-cluster-session-sync-exp",
|
||
"full_name": "threedr3am\/tomcat-cluster-session-sync-exp",
|
||
"owner": {
|
||
"login": "threedr3am",
|
||
"id": 19884279,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19884279?v=4",
|
||
"html_url": "https:\/\/github.com\/threedr3am"
|
||
},
|
||
"html_url": "https:\/\/github.com\/threedr3am\/tomcat-cluster-session-sync-exp",
|
||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||
"fork": false,
|
||
"created_at": "2020-05-19T05:12:53Z",
|
||
"updated_at": "2020-05-22T16:33:16Z",
|
||
"pushed_at": "2020-05-19T05:13:19Z",
|
||
"stargazers_count": 154,
|
||
"watchers_count": 154,
|
||
"forks_count": 29,
|
||
"forks": 29,
|
||
"watchers": 154,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 265717610,
|
||
"name": "CVE-2020-9484",
|
||
"full_name": "masahiro331\/CVE-2020-9484",
|
||
"owner": {
|
||
"login": "masahiro331",
|
||
"id": 20438853,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20438853?v=4",
|
||
"html_url": "https:\/\/github.com\/masahiro331"
|
||
},
|
||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2020-9484",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-21T00:41:06Z",
|
||
"updated_at": "2020-05-22T11:14:41Z",
|
||
"pushed_at": "2020-05-21T10:15:35Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 265735756,
|
||
"name": "CVE-2020-9484",
|
||
"full_name": "FiveAourThe\/CVE-2020-9484",
|
||
"owner": {
|
||
"login": "FiveAourThe",
|
||
"id": 38708428,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38708428?v=4",
|
||
"html_url": "https:\/\/github.com\/FiveAourThe"
|
||
},
|
||
"html_url": "https:\/\/github.com\/FiveAourThe\/CVE-2020-9484",
|
||
"description": "利用ceye批量检测CVE-2020-9484",
|
||
"fork": false,
|
||
"created_at": "2020-05-21T02:30:37Z",
|
||
"updated_at": "2020-05-22T03:06:17Z",
|
||
"pushed_at": "2020-05-21T02:30:47Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 265870392,
|
||
"name": "CVE-2020-9484",
|
||
"full_name": "IdealDreamLast\/CVE-2020-9484",
|
||
"owner": {
|
||
"login": "IdealDreamLast",
|
||
"id": 33090510,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33090510?v=4",
|
||
"html_url": "https:\/\/github.com\/IdealDreamLast"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IdealDreamLast\/CVE-2020-9484",
|
||
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
|
||
"fork": false,
|
||
"created_at": "2020-05-21T14:30:46Z",
|
||
"updated_at": "2020-05-22T18:06:27Z",
|
||
"pushed_at": "2020-05-21T15:13:22Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 12,
|
||
"score": 0
|
||
}
|
||
] |