WebLogic WLS核心组件反序列化漏洞多线程批量检测脚本 CVE-2018-2628-MultiThreading# WebLogic WLS核心组件反序列化漏洞 #
# CVE-2018-2628 #
用法:将需要检测的 ip:port 放入同目录下的url.txt文件中。然后运行:(代码93行处修改线程数)
`python CVE-2018-2628-MultiThreading.py`
Usage: Place the 'ip:port' to be detected into the url.txt file in the same directory. Then run:
`python CVE-2018-2628-MultiThreading.py`
运行环境: python2
environment:python2
[4.0K] /data/pocs/14e9535f0cd6d0136f47c88df1c1954e33677784
├── [7.6K] CVE-2018-2628-MultiThreading.py
├── [ 427] README.md
└── [ 16] url.txt
0 directories, 3 files