mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 19:31:39 +01:00
416 lines
No EOL
15 KiB
JSON
416 lines
No EOL
15 KiB
JSON
[
|
||
{
|
||
"id": 115571903,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "c0mmand3rOpSec\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "c0mmand3rOpSec",
|
||
"id": 17217255,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17217255?v=4",
|
||
"html_url": "https:\/\/github.com\/c0mmand3rOpSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/c0mmand3rOpSec\/CVE-2017-10271",
|
||
"description": "WebLogic Exploit",
|
||
"fork": false,
|
||
"created_at": "2017-12-28T01:30:50Z",
|
||
"updated_at": "2021-06-08T02:15:39Z",
|
||
"pushed_at": "2018-07-13T18:56:53Z",
|
||
"stargazers_count": 131,
|
||
"watchers_count": 131,
|
||
"forks_count": 49,
|
||
"forks": 49,
|
||
"watchers": 131,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 117624791,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "pssss\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "pssss",
|
||
"id": 14834109,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14834109?v=4",
|
||
"html_url": "https:\/\/github.com\/pssss"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pssss\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271 Weblogic 漏洞验证Poc及补丁",
|
||
"fork": false,
|
||
"created_at": "2018-01-16T03:10:48Z",
|
||
"updated_at": "2021-01-03T08:20:58Z",
|
||
"pushed_at": "2020-01-20T06:37:56Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"forks_count": 4,
|
||
"forks": 4,
|
||
"watchers": 4,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 118044092,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "bmcculley\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "bmcculley",
|
||
"id": 6238704,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6238704?v=4",
|
||
"html_url": "https:\/\/github.com\/bmcculley"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bmcculley\/CVE-2017-10271",
|
||
"description": "Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-01-18T22:07:33Z",
|
||
"updated_at": "2020-12-11T01:14:53Z",
|
||
"pushed_at": "2021-06-01T21:48:38Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 120571410,
|
||
"name": "weblogic_honeypot",
|
||
"full_name": "Cymmetria\/weblogic_honeypot",
|
||
"owner": {
|
||
"login": "Cymmetria",
|
||
"id": 19413345,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19413345?v=4",
|
||
"html_url": "https:\/\/github.com\/Cymmetria"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cymmetria\/weblogic_honeypot",
|
||
"description": "WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2018-02-07T06:11:23Z",
|
||
"updated_at": "2021-05-26T09:56:01Z",
|
||
"pushed_at": "2020-04-25T20:55:29Z",
|
||
"stargazers_count": 23,
|
||
"watchers_count": 23,
|
||
"forks_count": 6,
|
||
"forks": 6,
|
||
"watchers": 23,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 139956588,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271-master",
|
||
"full_name": "lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
|
||
"owner": {
|
||
"login": "lonehand",
|
||
"id": 20275278,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20275278?v=4",
|
||
"html_url": "https:\/\/github.com\/lonehand"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lonehand\/Oracle-WebLogic-CVE-2017-10271-master",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-07-06T08:32:28Z",
|
||
"updated_at": "2019-06-27T03:08:05Z",
|
||
"pushed_at": "2018-07-06T08:42:40Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 148616806,
|
||
"name": "javaserializetools",
|
||
"full_name": "shack2\/javaserializetools",
|
||
"owner": {
|
||
"login": "shack2",
|
||
"id": 26374431,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26374431?v=4",
|
||
"html_url": "https:\/\/github.com\/shack2"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shack2\/javaserializetools",
|
||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||
"fork": false,
|
||
"created_at": "2018-09-13T09:44:18Z",
|
||
"updated_at": "2021-06-06T16:12:40Z",
|
||
"pushed_at": "2020-10-01T20:20:41Z",
|
||
"stargazers_count": 274,
|
||
"watchers_count": 274,
|
||
"forks_count": 98,
|
||
"forks": 98,
|
||
"watchers": 274,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 160370962,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "nhwuxiaojun\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "nhwuxiaojun",
|
||
"id": 15905850,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15905850?v=4",
|
||
"html_url": "https:\/\/github.com\/nhwuxiaojun"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nhwuxiaojun\/CVE-2017-10271",
|
||
"description": "Weblogic(CVE-2017-10271)",
|
||
"fork": false,
|
||
"created_at": "2018-12-04T14:34:10Z",
|
||
"updated_at": "2020-06-10T02:53:11Z",
|
||
"pushed_at": "2018-12-04T14:45:40Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 161570094,
|
||
"name": "JavaDeserialization",
|
||
"full_name": "ETOCheney\/JavaDeserialization",
|
||
"owner": {
|
||
"login": "ETOCheney",
|
||
"id": 28469578,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28469578?v=4",
|
||
"html_url": "https:\/\/github.com\/ETOCheney"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ETOCheney\/JavaDeserialization",
|
||
"description": "针对类似CVE-2017-10271漏洞的一个java反序列化漏洞扫描器",
|
||
"fork": false,
|
||
"created_at": "2018-12-13T02:00:23Z",
|
||
"updated_at": "2020-10-28T10:00:45Z",
|
||
"pushed_at": "2018-12-13T14:05:28Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 165317811,
|
||
"name": "cve-2017-10271",
|
||
"full_name": "cved-sources\/cve-2017-10271",
|
||
"owner": {
|
||
"login": "cved-sources",
|
||
"id": 46423677,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
|
||
"html_url": "https:\/\/github.com\/cved-sources"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2017-10271",
|
||
"description": "cve-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-01-11T22:11:16Z",
|
||
"updated_at": "2021-04-15T21:23:38Z",
|
||
"pushed_at": "2021-04-15T21:23:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 175729381,
|
||
"name": "Oracle-WebLogic-CVE-2017-10271",
|
||
"full_name": "XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
|
||
"owner": {
|
||
"login": "XHSecurity",
|
||
"id": 48574583,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48574583?v=4",
|
||
"html_url": "https:\/\/github.com\/XHSecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XHSecurity\/Oracle-WebLogic-CVE-2017-10271",
|
||
"description": "Oracle-WebLogic-CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-03-15T01:50:01Z",
|
||
"updated_at": "2020-12-11T01:36:32Z",
|
||
"pushed_at": "2019-03-15T01:51:34Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 176763123,
|
||
"name": "Weblogic_Wsat_RCE",
|
||
"full_name": "kbsec\/Weblogic_Wsat_RCE",
|
||
"owner": {
|
||
"login": "kbsec",
|
||
"id": 11823496,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11823496?v=4",
|
||
"html_url": "https:\/\/github.com\/kbsec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kbsec\/Weblogic_Wsat_RCE",
|
||
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
|
||
"fork": false,
|
||
"created_at": "2019-03-20T15:26:55Z",
|
||
"updated_at": "2019-12-19T13:44:39Z",
|
||
"pushed_at": "2019-03-27T17:47:52Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183346706,
|
||
"name": "CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"full_name": "SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"owner": {
|
||
"login": "SkyBlueEternal",
|
||
"id": 46418185,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46418185?v=4",
|
||
"html_url": "https:\/\/github.com\/SkyBlueEternal"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SkyBlueEternal\/CNVD-C-2019-48814-CNNVD-201904-961",
|
||
"description": "CVE-2019-2725poc汇总 更新绕过CVE-2017-10271补丁POC",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T03:07:53Z",
|
||
"updated_at": "2020-12-15T07:25:50Z",
|
||
"pushed_at": "2019-04-29T02:06:00Z",
|
||
"stargazers_count": 104,
|
||
"watchers_count": 104,
|
||
"forks_count": 37,
|
||
"forks": 37,
|
||
"watchers": 104,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183428186,
|
||
"name": "WebLogic_CNVD_C_2019_48814",
|
||
"full_name": "Yuusuke4\/WebLogic_CNVD_C_2019_48814",
|
||
"owner": {
|
||
"login": "Yuusuke4",
|
||
"id": 26989867,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26989867?v=4",
|
||
"html_url": "https:\/\/github.com\/Yuusuke4"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Yuusuke4\/WebLogic_CNVD_C_2019_48814",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T12:18:16Z",
|
||
"updated_at": "2019-04-25T12:33:00Z",
|
||
"pushed_at": "2019-04-25T12:10:18Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 183430704,
|
||
"name": "WebLogic_CNVD_C2019_48814",
|
||
"full_name": "7kbstorm\/WebLogic_CNVD_C2019_48814",
|
||
"owner": {
|
||
"login": "7kbstorm",
|
||
"id": 38887063,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38887063?v=4",
|
||
"html_url": "https:\/\/github.com\/7kbstorm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/7kbstorm\/WebLogic_CNVD_C2019_48814",
|
||
"description": "WebLogic CNVD-C-2019_48814 CVE-2017-10271 Scan By 7kbstorm",
|
||
"fork": false,
|
||
"created_at": "2019-04-25T12:33:31Z",
|
||
"updated_at": "2021-05-25T03:24:21Z",
|
||
"pushed_at": "2019-04-25T12:44:02Z",
|
||
"stargazers_count": 114,
|
||
"watchers_count": 114,
|
||
"forks_count": 53,
|
||
"forks": 53,
|
||
"watchers": 114,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 219752851,
|
||
"name": "-CVE-2017-10271-",
|
||
"full_name": "ianxtianxt\/-CVE-2017-10271-",
|
||
"owner": {
|
||
"login": "ianxtianxt",
|
||
"id": 45796484,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45796484?v=4",
|
||
"html_url": "https:\/\/github.com\/ianxtianxt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ianxtianxt\/-CVE-2017-10271-",
|
||
"description": " (CVE-2017-10271)Java反序列化漏洞",
|
||
"fork": false,
|
||
"created_at": "2019-11-05T13:33:56Z",
|
||
"updated_at": "2020-07-03T04:06:16Z",
|
||
"pushed_at": "2019-11-05T13:35:14Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 253372582,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "testwc\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "testwc",
|
||
"id": 7675910,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7675910?v=4",
|
||
"html_url": "https:\/\/github.com\/testwc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/testwc\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2020-04-06T02:01:20Z",
|
||
"updated_at": "2020-05-08T06:52:50Z",
|
||
"pushed_at": "2020-05-08T06:52:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 313801625,
|
||
"name": "CVE-2017-10271",
|
||
"full_name": "Al1ex\/CVE-2017-10271",
|
||
"owner": {
|
||
"login": "Al1ex",
|
||
"id": 38161463,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||
"html_url": "https:\/\/github.com\/Al1ex"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2017-10271",
|
||
"description": "CVE-2017-10271",
|
||
"fork": false,
|
||
"created_at": "2020-11-18T02:31:18Z",
|
||
"updated_at": "2021-05-11T07:36:14Z",
|
||
"pushed_at": "2020-11-18T02:31:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 372542306,
|
||
"name": "weblogic-CVE-2019-2729-POC",
|
||
"full_name": "pizza-power\/weblogic-CVE-2019-2729-POC",
|
||
"owner": {
|
||
"login": "pizza-power",
|
||
"id": 6135659,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6135659?v=4",
|
||
"html_url": "https:\/\/github.com\/pizza-power"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pizza-power\/weblogic-CVE-2019-2729-POC",
|
||
"description": "python3 POC for CVE-2019-2729 WebLogic Deserialization Vulnerability and CVE-2017-10271 amongst others",
|
||
"fork": false,
|
||
"created_at": "2021-05-31T14:54:38Z",
|
||
"updated_at": "2021-05-31T14:55:58Z",
|
||
"pushed_at": "2021-05-31T14:55:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |