mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
163 lines
No EOL
6.1 KiB
JSON
163 lines
No EOL
6.1 KiB
JSON
[
|
||
{
|
||
"id": 265151514,
|
||
"name": "tomcat-cluster-session-sync-exp",
|
||
"full_name": "threedr3am\/tomcat-cluster-session-sync-exp",
|
||
"owner": {
|
||
"login": "threedr3am",
|
||
"id": 19884279,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19884279?v=4",
|
||
"html_url": "https:\/\/github.com\/threedr3am"
|
||
},
|
||
"html_url": "https:\/\/github.com\/threedr3am\/tomcat-cluster-session-sync-exp",
|
||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||
"fork": false,
|
||
"created_at": "2020-05-19T05:12:53Z",
|
||
"updated_at": "2020-08-11T15:49:13Z",
|
||
"pushed_at": "2020-05-19T05:13:19Z",
|
||
"stargazers_count": 187,
|
||
"watchers_count": 187,
|
||
"forks_count": 33,
|
||
"forks": 33,
|
||
"watchers": 187,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 265717610,
|
||
"name": "CVE-2020-9484",
|
||
"full_name": "masahiro331\/CVE-2020-9484",
|
||
"owner": {
|
||
"login": "masahiro331",
|
||
"id": 20438853,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20438853?v=4",
|
||
"html_url": "https:\/\/github.com\/masahiro331"
|
||
},
|
||
"html_url": "https:\/\/github.com\/masahiro331\/CVE-2020-9484",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-05-21T00:41:06Z",
|
||
"updated_at": "2020-09-03T10:32:19Z",
|
||
"pushed_at": "2020-05-21T10:15:35Z",
|
||
"stargazers_count": 84,
|
||
"watchers_count": 84,
|
||
"forks_count": 21,
|
||
"forks": 21,
|
||
"watchers": 84,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 265870392,
|
||
"name": "CVE-2020-9484",
|
||
"full_name": "IdealDreamLast\/CVE-2020-9484",
|
||
"owner": {
|
||
"login": "IdealDreamLast",
|
||
"id": 33090510,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33090510?v=4",
|
||
"html_url": "https:\/\/github.com\/IdealDreamLast"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IdealDreamLast\/CVE-2020-9484",
|
||
"description": "用Kali 2.0复现Apache Tomcat Session反序列化代码执行漏洞",
|
||
"fork": false,
|
||
"created_at": "2020-05-21T14:30:46Z",
|
||
"updated_at": "2020-08-27T08:51:49Z",
|
||
"pushed_at": "2020-05-21T15:13:22Z",
|
||
"stargazers_count": 42,
|
||
"watchers_count": 42,
|
||
"forks_count": 21,
|
||
"forks": 21,
|
||
"watchers": 42,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 269379345,
|
||
"name": "CVE-2020-9484",
|
||
"full_name": "qerogram\/CVE-2020-9484",
|
||
"owner": {
|
||
"login": "qerogram",
|
||
"id": 29586629,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29586629?v=4",
|
||
"html_url": "https:\/\/github.com\/qerogram"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qerogram\/CVE-2020-9484",
|
||
"description": "for Ubuntu 18.04, improve functions.",
|
||
"fork": false,
|
||
"created_at": "2020-06-04T14:19:12Z",
|
||
"updated_at": "2020-06-04T18:12:20Z",
|
||
"pushed_at": "2020-06-04T18:12:18Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 269770630,
|
||
"name": "CVE-2020-9484-Mass-Scan",
|
||
"full_name": "osamahamad\/CVE-2020-9484-Mass-Scan",
|
||
"owner": {
|
||
"login": "osamahamad",
|
||
"id": 59566963,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/59566963?v=4",
|
||
"html_url": "https:\/\/github.com\/osamahamad"
|
||
},
|
||
"html_url": "https:\/\/github.com\/osamahamad\/CVE-2020-9484-Mass-Scan",
|
||
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
|
||
"fork": false,
|
||
"created_at": "2020-06-05T20:40:28Z",
|
||
"updated_at": "2020-09-05T07:37:04Z",
|
||
"pushed_at": "2020-06-05T21:04:43Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 270900495,
|
||
"name": "CVE-2020-9484-Scanner",
|
||
"full_name": "DeviantSec\/CVE-2020-9484-Scanner",
|
||
"owner": {
|
||
"login": "DeviantSec",
|
||
"id": 48874057,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/48874057?v=4",
|
||
"html_url": "https:\/\/github.com\/DeviantSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DeviantSec\/CVE-2020-9484-Scanner",
|
||
"description": "A smol bash script I threw together pretty quickly to scan for vulnerable versions of the Apache Tomcat RCE. I'll give it some love when I have the time. ",
|
||
"fork": false,
|
||
"created_at": "2020-06-09T04:13:51Z",
|
||
"updated_at": "2020-06-10T07:08:19Z",
|
||
"pushed_at": "2020-06-10T07:08:17Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 293086175,
|
||
"name": "CVE-2020-9484-exploit",
|
||
"full_name": "anjai94\/CVE-2020-9484-exploit",
|
||
"owner": {
|
||
"login": "anjai94",
|
||
"id": 30573192,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/30573192?v=4",
|
||
"html_url": "https:\/\/github.com\/anjai94"
|
||
},
|
||
"html_url": "https:\/\/github.com\/anjai94\/CVE-2020-9484-exploit",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-09-05T13:56:51Z",
|
||
"updated_at": "2020-09-05T14:08:54Z",
|
||
"pushed_at": "2020-09-05T14:08:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |