PoC-in-GitHub/2020/CVE-2020-14882.json
2023-02-06 09:33:36 +09:00

834 lines
No EOL
29 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 252131233,
"name": "exphub",
"full_name": "zhzyker\/exphub",
"owner": {
"login": "zhzyker",
"id": 32918050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4",
"html_url": "https:\/\/github.com\/zhzyker"
},
"html_url": "https:\/\/github.com\/zhzyker\/exphub",
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-02-05T03:54:06Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3667,
"watchers_count": 3667,
"has_discussions": false,
"forks_count": 1054,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-10199",
"cve-2020-10204",
"cve-2020-11444",
"cve-2020-14882",
"cve-2020-1938",
"cve-2020-2551",
"cve-2020-2555",
"cve-2020-2883",
"cve-2020-5902",
"drupal",
"exp",
"exploit",
"getshell",
"nexus",
"poc",
"tomcat",
"vulnerability",
"weblogic",
"webshell"
],
"visibility": "public",
"forks": 1054,
"watchers": 3667,
"score": 0
},
{
"id": 307998445,
"name": "CVE-2020-14882",
"full_name": "jas502n\/CVE-2020-14882",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882",
"description": "CVE-202014882、CVE-202014883",
"fork": false,
"created_at": "2020-10-28T11:43:37Z",
"updated_at": "2023-01-26T10:55:28Z",
"pushed_at": "2020-11-16T04:23:09Z",
"stargazers_count": 270,
"watchers_count": 270,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 270,
"score": 0
},
{
"id": 308145197,
"name": "CVE-2020-14882",
"full_name": "s1kr10s\/CVE-2020-14882",
"owner": {
"login": "s1kr10s",
"id": 5374475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5374475?v=4",
"html_url": "https:\/\/github.com\/s1kr10s"
},
"html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882",
"description": "CVE-202014882 by Jang",
"fork": false,
"created_at": "2020-10-28T21:28:12Z",
"updated_at": "2022-11-15T17:42:32Z",
"pushed_at": "2020-10-29T03:57:09Z",
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 31,
"score": 0
},
{
"id": 308184758,
"name": "-Patched-McMaster-University-Blind-Command-Injection",
"full_name": "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection",
"owner": {
"login": "Umarovm",
"id": 25722145,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722145?v=4",
"html_url": "https:\/\/github.com\/Umarovm"
},
"html_url": "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection",
"description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.",
"fork": false,
"created_at": "2020-10-29T01:28:41Z",
"updated_at": "2020-12-04T02:16:03Z",
"pushed_at": "2020-12-04T02:16:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 308238126,
"name": "CVE-2020-14882",
"full_name": "XTeam-Wing\/CVE-2020-14882",
"owner": {
"login": "XTeam-Wing",
"id": 25416365,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4",
"html_url": "https:\/\/github.com\/XTeam-Wing"
},
"html_url": "https:\/\/github.com\/XTeam-Wing\/CVE-2020-14882",
"description": "CVE-2020-14882 Weblogic-Exp",
"fork": false,
"created_at": "2020-10-29T06:30:30Z",
"updated_at": "2023-02-05T05:30:00Z",
"pushed_at": "2020-10-29T06:36:01Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 17,
"score": 0
},
{
"id": 308343789,
"name": "cve-2020-14882",
"full_name": "0thm4n3\/cve-2020-14882",
"owner": {
"login": "0thm4n3",
"id": 12746014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12746014?v=4",
"html_url": "https:\/\/github.com\/0thm4n3"
},
"html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882",
"description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882",
"fork": false,
"created_at": "2020-10-29T13:53:31Z",
"updated_at": "2021-03-18T23:46:12Z",
"pushed_at": "2020-10-31T13:03:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 308374913,
"name": "cve-2020-14882",
"full_name": "wsfengfan\/cve-2020-14882",
"owner": {
"login": "wsfengfan",
"id": 33821840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4",
"html_url": "https:\/\/github.com\/wsfengfan"
},
"html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882",
"description": "CVE-2020-14882 EXP 回显",
"fork": false,
"created_at": "2020-10-29T15:44:23Z",
"updated_at": "2022-11-18T05:33:56Z",
"pushed_at": "2020-11-09T09:55:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 308605927,
"name": "CVE-2020-14882",
"full_name": "alexfrancow\/CVE-2020-14882",
"owner": {
"login": "alexfrancow",
"id": 23419929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23419929?v=4",
"html_url": "https:\/\/github.com\/alexfrancow"
},
"html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-10-30T11:07:11Z",
"updated_at": "2023-01-10T03:22:09Z",
"pushed_at": "2020-10-31T15:57:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 308782228,
"name": "CVE-2020-14882_POC",
"full_name": "GGyao\/CVE-2020-14882_POC",
"owner": {
"login": "GGyao",
"id": 38530938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4",
"html_url": "https:\/\/github.com\/GGyao"
},
"html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC",
"description": "CVE-2020-14882批量验证工具。",
"fork": false,
"created_at": "2020-10-31T01:43:54Z",
"updated_at": "2022-09-05T15:26:08Z",
"pushed_at": "2020-12-01T05:05:24Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 13,
"score": 0
},
{
"id": 309098912,
"name": "Weblogic_Unauthorized-bypass-RCE",
"full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE",
"description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script",
"fork": false,
"created_at": "2020-11-01T13:12:27Z",
"updated_at": "2022-02-12T00:29:42Z",
"pushed_at": "2020-11-01T13:56:48Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 309655403,
"name": "CVE-2020-14882_ALL",
"full_name": "GGyao\/CVE-2020-14882_ALL",
"owner": {
"login": "GGyao",
"id": 38530938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4",
"html_url": "https:\/\/github.com\/GGyao"
},
"html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_ALL",
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2023-01-31T19:21:45Z",
"pushed_at": "2022-03-29T02:08:45Z",
"stargazers_count": 130,
"watchers_count": 130,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 130,
"score": 0
},
{
"id": 309666360,
"name": "CVE-2020-14882-checker",
"full_name": "ovProphet\/CVE-2020-14882-checker",
"owner": {
"login": "ovProphet",
"id": 12277617,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12277617?v=4",
"html_url": "https:\/\/github.com\/ovProphet"
},
"html_url": "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker",
"description": "CVE-2020-14882 detection script",
"fork": false,
"created_at": "2020-11-03T11:34:38Z",
"updated_at": "2021-03-18T23:48:22Z",
"pushed_at": "2020-11-03T11:34:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 309868259,
"name": "CVE-2020-14882",
"full_name": "NS-Sp4ce\/CVE-2020-14882",
"owner": {
"login": "NS-Sp4ce",
"id": 33349032,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4",
"html_url": "https:\/\/github.com\/NS-Sp4ce"
},
"html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882",
"description": "CVE-2020-14882\/14883\/14750",
"fork": false,
"created_at": "2020-11-04T03:09:13Z",
"updated_at": "2022-09-16T07:44:52Z",
"pushed_at": "2020-11-04T03:15:33Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 18,
"score": 0
},
{
"id": 310303375,
"name": "cve-2020-14882",
"full_name": "mmioimm\/cve-2020-14882",
"owner": {
"login": "mmioimm",
"id": 19258899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19258899?v=4",
"html_url": "https:\/\/github.com\/mmioimm"
},
"html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-05T13:12:28Z",
"updated_at": "2021-07-01T07:17:20Z",
"pushed_at": "2020-11-05T13:14:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 311265070,
"name": "CVE-2020-14882",
"full_name": "QmF0c3UK\/CVE-2020-14882",
"owner": {
"login": "QmF0c3UK",
"id": 29447678,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4",
"html_url": "https:\/\/github.com\/QmF0c3UK"
},
"html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-09T08:03:44Z",
"updated_at": "2021-11-16T03:38:04Z",
"pushed_at": "2020-11-12T06:23:23Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 9,
"score": 0
},
{
"id": 311340226,
"name": "CVE-2020-14882",
"full_name": "murataydemir\/CVE-2020-14882",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-14882",
"description": "[CVE-2020-14882] Oracle WebLogic Server Authentication Bypass",
"fork": false,
"created_at": "2020-11-09T13:02:43Z",
"updated_at": "2021-08-19T10:39:35Z",
"pushed_at": "2020-11-09T16:35:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 311887487,
"name": "CVE-2020-14882-GUI-Test",
"full_name": "Ormicron\/CVE-2020-14882-GUI-Test",
"owner": {
"login": "Ormicron",
"id": 26640179,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4",
"html_url": "https:\/\/github.com\/Ormicron"
},
"html_url": "https:\/\/github.com\/Ormicron\/CVE-2020-14882-GUI-Test",
"description": "基于qt的图形化CVE-2020-14882漏洞回显测试工具.",
"fork": false,
"created_at": "2020-11-11T06:52:32Z",
"updated_at": "2022-05-13T22:02:55Z",
"pushed_at": "2020-11-11T07:19:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 312193698,
"name": "CVE-2020-14882-weblogicRCE",
"full_name": "corelight\/CVE-2020-14882-weblogicRCE",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE",
"description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750",
"fork": false,
"created_at": "2020-11-12T06:59:54Z",
"updated_at": "2022-07-13T18:57:55Z",
"pushed_at": "2020-12-02T21:43:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"score": 0
},
{
"id": 312256179,
"name": "CVE-2020-14882",
"full_name": "xfiftyone\/CVE-2020-14882",
"owner": {
"login": "xfiftyone",
"id": 45651912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45651912?v=4",
"html_url": "https:\/\/github.com\/xfiftyone"
},
"html_url": "https:\/\/github.com\/xfiftyone\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-12T11:27:39Z",
"updated_at": "2021-07-08T07:02:26Z",
"pushed_at": "2020-11-13T03:35:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 313643357,
"name": "CVE-2020-14882",
"full_name": "BabyTeam1024\/CVE-2020-14882",
"owner": {
"login": "BabyTeam1024",
"id": 74447452,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4",
"html_url": "https:\/\/github.com\/BabyTeam1024"
},
"html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882",
"description": null,
"fork": false,
"created_at": "2020-11-17T14:23:23Z",
"updated_at": "2020-11-17T14:23:23Z",
"pushed_at": "2020-11-17T14:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 325429279,
"name": "CodeTest",
"full_name": "adm1in\/CodeTest",
"owner": {
"login": "adm1in",
"id": 37677854,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37677854?v=4",
"html_url": "https:\/\/github.com\/adm1in"
},
"html_url": "https:\/\/github.com\/adm1in\/CodeTest",
"description": "CodeTest信息收集和漏洞利用工具可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作漏洞利用模块可选择需要测试的漏洞模块或者选择所有模块测试包含CVE-2020-14882, CVE-2020-2555等可自己收集脚本后按照模板进行修改。",
"fork": false,
"created_at": "2020-12-30T01:55:52Z",
"updated_at": "2023-01-13T00:52:16Z",
"pushed_at": "2020-12-29T10:47:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 3,
"score": 0
},
{
"id": 334149882,
"name": "CVE-2020-14882-WebLogic",
"full_name": "pwn3z\/CVE-2020-14882-WebLogic",
"owner": {
"login": "pwn3z",
"id": 71440287,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
"html_url": "https:\/\/github.com\/pwn3z"
},
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2020-14882-WebLogic",
"description": null,
"fork": false,
"created_at": "2021-01-29T13:12:40Z",
"updated_at": "2021-11-16T02:27:31Z",
"pushed_at": "2021-01-29T13:13:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 342244938,
"name": "CVE-2020-14882",
"full_name": "milo2012\/CVE-2020-14882",
"owner": {
"login": "milo2012",
"id": 905335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4",
"html_url": "https:\/\/github.com\/milo2012"
},
"html_url": "https:\/\/github.com\/milo2012\/CVE-2020-14882",
"description": "CVE-2020-14882",
"fork": false,
"created_at": "2021-02-25T12:57:08Z",
"updated_at": "2023-01-07T06:03:58Z",
"pushed_at": "2021-03-01T16:34:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 9,
"score": 0
},
{
"id": 353271458,
"name": "CVE-2020-14882",
"full_name": "kk98kk0\/CVE-2020-14882",
"owner": {
"login": "kk98kk0",
"id": 16933557,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16933557?v=4",
"html_url": "https:\/\/github.com\/kk98kk0"
},
"html_url": "https:\/\/github.com\/kk98kk0\/CVE-2020-14882",
"description": "CVE-2020-14882部署冰蝎内存马",
"fork": false,
"created_at": "2021-03-31T07:49:06Z",
"updated_at": "2021-03-31T07:49:07Z",
"pushed_at": "2021-01-27T06:31:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 355492090,
"name": "CVE-2020-14882_Exploit_Gui",
"full_name": "nice0e3\/CVE-2020-14882_Exploit_Gui",
"owner": {
"login": "nice0e3",
"id": 42479546,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42479546?v=4",
"html_url": "https:\/\/github.com\/nice0e3"
},
"html_url": "https:\/\/github.com\/nice0e3\/CVE-2020-14882_Exploit_Gui",
"description": "CVE-2020-14882_Exploit 支持12.2.X和10.3.6版本12.2.x可回显",
"fork": false,
"created_at": "2021-04-07T09:48:49Z",
"updated_at": "2022-12-21T07:25:08Z",
"pushed_at": "2021-08-09T15:01:16Z",
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 69,
"score": 0
},
{
"id": 366180883,
"name": "CVE-2020-14882-WebLogic",
"full_name": "exploitblizzard\/CVE-2020-14882-WebLogic",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2020-14882-WebLogic",
"description": "Check YouTube - https:\/\/youtu.be\/O0ZnLXRY5Wo",
"fork": false,
"created_at": "2021-05-10T21:32:36Z",
"updated_at": "2023-01-05T21:29:24Z",
"pushed_at": "2021-09-16T07:25:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 3,
"score": 0
},
{
"id": 382503531,
"name": "CVE-2020-14882-14883",
"full_name": "N0Coriander\/CVE-2020-14882-14883",
"owner": {
"login": "N0Coriander",
"id": 53027649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53027649?v=4",
"html_url": "https:\/\/github.com\/N0Coriander"
},
"html_url": "https:\/\/github.com\/N0Coriander\/CVE-2020-14882-14883",
"description": "结合14882的未授权访问漏洞通过14883可远程执行任意代码",
"fork": false,
"created_at": "2021-07-03T02:02:42Z",
"updated_at": "2022-12-05T05:44:58Z",
"pushed_at": "2021-07-03T02:29:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 584015261,
"name": "CVE-2020-14882-",
"full_name": "Manor99\/CVE-2020-14882-",
"owner": {
"login": "Manor99",
"id": 97856285,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97856285?v=4",
"html_url": "https:\/\/github.com\/Manor99"
},
"html_url": "https:\/\/github.com\/Manor99\/CVE-2020-14882-",
"description": null,
"fork": false,
"created_at": "2022-12-31T23:17:40Z",
"updated_at": "2022-12-31T23:24:56Z",
"pushed_at": "2022-12-31T23:26:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]