尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Oracle Corporation | Oracle Concurrent Processing | 12.2.3 ~ 12.2.14 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | Detection for CVE-2025-61882 | https://github.com/rxerium/CVE-2025-61882 | POC详情 |
| 2 | None | https://github.com/watchtowrlabs/watchTowr-vs-Oracle-E-Business-Suite-CVE-2025-61882 | POC详情 |
| 3 | Exploit for CVE-2025-61882 (do not use without any written permission). | https://github.com/Sachinart/CVE-2025-61882 | POC详情 |
| 4 | Oracle Concurrent Processing 12.2.3-12.2.14 contains a remote code execution caused by unauthenticated network access via HTTP, letting unauthenticated attackers fully compromise the system, exploit requires network access via HTTP. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-61882.yaml | POC详情 |
| 5 | CVE-2025-61882 | https://github.com/B1ack4sh/Blackash-CVE-2025-61882 | POC详情 |
| 6 | None | https://github.com/zerozenxlabs/CVE-2025-61882-Oracle-EBS | POC详情 |
| 7 | Detection for CVE-2025-61882 | https://github.com/rxerium/CVE-2025-61882-CVE-2025-61884 | POC详情 |
| 8 | None | https://github.com/RootAid/CVE-2025-61882 | POC详情 |
| 9 | POC of CVE-2025-61882 | https://github.com/MindflareX/CVE-2025-61882-POC | POC详情 |
| 10 | A critical pre-authentication Remote Code Execution (RCE) flaw in Oracle E-Business Suite (versions 12.2.3 - 12.2.14) allows attackers to gain full control over vulnerable servers via malicious HTTP requests - now actively exploited in the wild. | https://github.com/AdityaBhatt3010/CVE-2025-61882-Oracle-E-Business-Suite-Pre-Auth-RCE-Exploit | POC详情 |
| 11 | Detects Oracle E-Business Suite (CVE-2025-61882). Detection: multi-tier checks — fingerprinting, version checks, endpoint & SSRF tests, timing analysis & controlled exploitation 4 high-confidence results. Default = safe fingerprinting only. Set aggressive=true 2 enable active/probing checks use w/caution. Provided By BattalionX BattalionX@proton.me | https://github.com/BattalionX/http-oracle-ebs-cve-2025-61882.nse | POC详情 |
| 12 | CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit | https://github.com/godnish/CVE-2025-61882 | POC详情 |
| 13 | 🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats. | https://github.com/siddu7575/CVE-2025-61882-CVE-2025-61884 | POC详情 |
| 14 | CVE-2025-61882 — Critical Oracle EBS RCE: Analysis & Response | https://github.com/AshrafZaryouh/CVE-2025-61882-Executive-Summary | POC详情 |
| 15 | CVE-2025-61882: Oracle E-Business Suite RCE Scanner and Exploit | https://github.com/GhoStZA-debug/CVE-2025-61882 | POC详情 |
| 16 | Sorumluluk Reddi Kendi sorumluluğunuzda kullanın, size ait olmayan veya tarama izninizin olmadığı altyapılarda gerçekleştireceğiniz yasa dışı faaliyetlerden sorumlu olmayacağım. | https://github.com/Zhert-lab/CVE-2025-61882-CVE-2025-61884 | POC详情 |
| 17 | CVE-2025-61882 | https://github.com/Ashwesker/Blackash-CVE-2025-61882 | POC详情 |
| 18 | None | https://github.com/George0Papasotiriou/CVE-2025-61882-Oracle-BI-Publisher-RCE | POC详情 |
| 19 | Real-world information security risk assessment based on the Oracle E-Business Suite zero-day (CVE-2025-61882). Analyses attacker methods, enterprise risks, and mitigation strategies using ISO 27001, NIST CSF, Cyber Essentials and COBIT. | https://github.com/sid-203/Enterprise-Information-Security-Risk-Assessment-Oracle-E-Business-Suite-Case-Study | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论