Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Oracle Corporation | Tape Library ACSLS | 8.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725 | POC Details |
| 2 | None | https://github.com/lasensio/cve-2019-2725 | POC Details |
| 3 | None | https://github.com/davidmthomsen/CVE-2019-2725 | POC Details |
| 4 | None | https://github.com/leerina/CVE-2019-2725 | POC Details |
| 5 | None | https://github.com/zhusx110/cve-2019-2725 | POC Details |
| 6 | CVE-2019-2725 命令回显 | https://github.com/lufeirider/CVE-2019-2725 | POC Details |
| 7 | CVE-2019-2725命令回显+webshell上传+最新绕过 | https://github.com/TopScrew/CVE-2019-2725 | POC Details |
| 8 | None | https://github.com/welove88888/CVE-2019-2725 | POC Details |
| 9 | weblogic绕过和wls远程执行 | https://github.com/jiansiting/CVE-2019-2725 | POC Details |
| 10 | CVE-2019-2725 bypass pocscan and exp | https://github.com/kerlingcode/CVE-2019-2725 | POC Details |
| 11 | Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 | https://github.com/black-mirror/Weblogic | POC Details |
| 12 | WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit | https://github.com/pimps/CVE-2019-2725 | POC Details |
| 13 | CVE-2019-2725 | https://github.com/ianxtianxt/CVE-2019-2725 | POC Details |
| 14 | CVE-2019-2725-POC | https://github.com/N0b1e6/CVE-2019-2725-POC | POC Details |
| 15 | weblogic CVE-2019-2725利用exp。 | https://github.com/GGyao/weblogic_2019_2725_wls_batch | POC Details |
| 16 | (CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript | https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE | POC Details |
| 17 | None | https://github.com/1stPeak/CVE-2019-2725-environment | POC Details |
| 18 | A simple exploit for CVE-2019-2725. | https://github.com/CalegariMindSec/Exploit-CVE-2019-2725 | POC Details |
| 19 | None | https://github.com/Kamiya767/CVE-2019-2725 | POC Details |
| 20 | None | https://github.com/tobechenghuai/CNTA-2019-0014xCVE-2019-2725 | POC Details |
| 21 | The Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services) allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. Versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-2725.yaml | POC Details |
| 22 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Weblogic%20XMLDecoder%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-2725.md | POC Details |
| 23 | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. | https://github.com/loursha/Oracle-Weblogic-Server-AsyncResponseService-Deserialization-Remote-Code-Execution-CVE-2019-2725 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet