尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Oracle Corporation | WebLogic Server | 10.3.6.0.0 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2020–14882、CVE-2020–14883 | https://github.com/jas502n/CVE-2020-14882 | POC详情 |
| 2 | CVE-2020–14882 by Jang | https://github.com/s1kr10s/CVE-2020-14882 | POC详情 |
| 3 | CVE-2020-14882 Weblogic-Exp | https://github.com/XTeam-Wing/CVE-2020-14882 | POC详情 |
| 4 | Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882 | https://github.com/0thm4n3/cve-2020-14882 | POC详情 |
| 5 | CVE-2020-14882 EXP 回显 | https://github.com/wsfengfan/cve-2020-14882 | POC详情 |
| 6 | None | https://github.com/alexfrancow/CVE-2020-14882 | POC详情 |
| 7 | CVE-2020-14882批量验证工具。 | https://github.com/GGyao/CVE-2020-14882_POC | POC详情 |
| 8 | (CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script | https://github.com/ludy-dev/Weblogic_Unauthorized-bypass-RCE | POC详情 |
| 9 | CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。 | https://github.com/GGyao/CVE-2020-14882_ALL | POC详情 |
| 10 | CVE-2020-14882 detection script | https://github.com/ovProphet/CVE-2020-14882-checker | POC详情 |
| 11 | CVE-2020-14882/14883/14750 | https://github.com/NS-Sp4ce/CVE-2020-14882 | POC详情 |
| 12 | None | https://github.com/mmioimm/cve-2020-14882 | POC详情 |
| 13 | None | https://github.com/QmF0c3UK/CVE-2020-14882 | POC详情 |
| 14 | [CVE-2020-14882] Oracle WebLogic Server Authentication Bypass | https://github.com/murataydemir/CVE-2020-14882 | POC详情 |
| 15 | 基于qt的图形化CVE-2020-14882漏洞回显测试工具. | https://github.com/Ormicron/CVE-2020-14882-GUI-Test | POC详情 |
| 16 | Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 / CVE-2020-14750 | https://github.com/corelight/CVE-2020-14882-weblogicRCE | POC详情 |
| 17 | None | https://github.com/xfiftyone/CVE-2020-14882 | POC详情 |
| 18 | None | https://github.com/BabyTeam1024/CVE-2020-14882 | POC详情 |
| 19 | CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。 | https://github.com/adm1in/CodeTest | POC详情 |
| 20 | None | https://github.com/pwn3z/CVE-2020-14882-WebLogic | POC详情 |
| 21 | CVE-2020-14882 | https://github.com/milo2012/CVE-2020-14882 | POC详情 |
| 22 | CVE-2020-14882部署冰蝎内存马 | https://github.com/kk98kk0/CVE-2020-14882 | POC详情 |
| 23 | Check YouTube - https://youtu.be/O0ZnLXRY5Wo | https://github.com/exploitblizzard/CVE-2020-14882-WebLogic | POC详情 |
| 24 | None | https://github.com/qianniaoge/CVE-2020-14882_Exploit_Gui | POC详情 |
| 25 | 结合14882的未授权访问漏洞,通过14883可远程执行任意代码 | https://github.com/N0Coriander/CVE-2020-14882-14883 | POC详情 |
| 26 | None | https://github.com/Manor99/CVE-2020-14882- | POC详情 |
| 27 | 综合利用工具 | https://github.com/Serendipity-Lucky/CVE-2020-14882_ALL | POC详情 |
| 28 | None | https://github.com/nik0nz7/CVE-2020-14882 | POC详情 |
| 29 | This script allows for remote code execution (RCE) on Oracle WebLogic Server | https://github.com/Danny-LLi/CVE-2020-14882 | POC详情 |
| 30 | Takeover of Oracle WebLogic Server | https://github.com/LucasPDiniz/CVE-2020-14882 | POC详情 |
| 31 | None | https://github.com/xMr110/CVE-2020-14882 | POC详情 |
| 32 | 综合利用工具 | https://github.com/lolminerxmrig/CVE-2020-14882_ALL | POC详情 |
| 33 | None | https://github.com/zesnd/CVE-2020-14882-POC | POC详情 |
| 34 | None | https://github.com/AleksaZatezalo/CVE-2020-14882-HoaxShell | POC详情 |
| 35 | None | https://github.com/AleksaZatezalo/CVE-2020-14882 | POC详情 |
| 36 | This is a repository that aims to provide research material on CVE-2020-14882 as part of a project in partial fullfilment of ACS EDU Program. | https://github.com/KKC73/weblogic-cve-2020-14882 | POC详情 |
| 37 | CVE-2020-14882 rewritten in PowerShell | https://github.com/Root-Shells/CVE-2020-14882 | POC详情 |
| 38 | Oracle WebLogic Server contains an easily exploitable remote command execution vulnerability which allows unauthenticated attackers with network access via HTTP to compromise the server. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-14882.yaml | POC详情 |
| 39 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Weblogic%20%E7%AE%A1%E7%90%86%E6%8E%A7%E5%88%B6%E5%8F%B0%E6%9C%AA%E6%8E%88%E6%9D%83%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2020-14882%2BCVE-2020-14883.md | POC详情 |
| 40 | https://github.com/vulhub/vulhub/blob/master/weblogic/CVE-2020-14882/README.md | POC详情 | |
| 41 | CVE-2020-14882 | https://github.com/AshrafZaryouh/CVE-2020-14882 | POC详情 |
| 42 | CVE-2020-14882 | https://github.com/B1ack4sh/Blackash-CVE-2020-14882 | POC详情 |
| 43 | CVE-2020-14882 | https://github.com/Ashwesker/Blackash-CVE-2020-14882 | POC详情 |
| 44 | PoC for testing if a target is vulnerable to RCE | https://github.com/b1g-b33f/CVE-2020-14882 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论