高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
| ベンダー | プロダクト | 影響を受けるバージョン | CPE | 購読 |
|---|---|---|---|---|
| Oracle Corporation | Tape Library ACSLS | 8.5 | - |
| # | POC説明 | ソースリンク | Shenlongリンク |
|---|---|---|---|
| 1 | None | https://github.com/iceMatcha/CNTA-2019-0014xCVE-2019-2725 | POC詳細 |
| 2 | None | https://github.com/lasensio/cve-2019-2725 | POC詳細 |
| 3 | None | https://github.com/davidmthomsen/CVE-2019-2725 | POC詳細 |
| 4 | None | https://github.com/leerina/CVE-2019-2725 | POC詳細 |
| 5 | None | https://github.com/zhusx110/cve-2019-2725 | POC詳細 |
| 6 | CVE-2019-2725 命令回显 | https://github.com/lufeirider/CVE-2019-2725 | POC詳細 |
| 7 | CVE-2019-2725命令回显+webshell上传+最新绕过 | https://github.com/TopScrew/CVE-2019-2725 | POC詳細 |
| 8 | None | https://github.com/welove88888/CVE-2019-2725 | POC詳細 |
| 9 | weblogic绕过和wls远程执行 | https://github.com/jiansiting/CVE-2019-2725 | POC詳細 |
| 10 | CVE-2019-2725 bypass pocscan and exp | https://github.com/kerlingcode/CVE-2019-2725 | POC詳細 |
| 11 | Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 | https://github.com/black-mirror/Weblogic | POC詳細 |
| 12 | WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit | https://github.com/pimps/CVE-2019-2725 | POC詳細 |
| 13 | CVE-2019-2725 | https://github.com/ianxtianxt/CVE-2019-2725 | POC詳細 |
| 14 | CVE-2019-2725-POC | https://github.com/N0b1e6/CVE-2019-2725-POC | POC詳細 |
| 15 | weblogic CVE-2019-2725利用exp。 | https://github.com/GGyao/weblogic_2019_2725_wls_batch | POC詳細 |
| 16 | (CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript | https://github.com/ludy-dev/Oracle-WLS-Weblogic-RCE | POC詳細 |
| 17 | None | https://github.com/1stPeak/CVE-2019-2725-environment | POC詳細 |
| 18 | A simple exploit for CVE-2019-2725. | https://github.com/CalegariMindSec/Exploit-CVE-2019-2725 | POC詳細 |
| 19 | None | https://github.com/Kamiya767/CVE-2019-2725 | POC詳細 |
| 20 | None | https://github.com/tobechenghuai/CNTA-2019-0014xCVE-2019-2725 | POC詳細 |
| 21 | The Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services) allows unauthenticated attackers with network access via HTTP to compromise Oracle WebLogic Server. Versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-2725.yaml | POC詳細 |
| 22 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Weblogic%20XMLDecoder%20%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2019-2725.md | POC詳細 |
| 23 | Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: Web Services). Supported versions that are affected are 10.3.6.0.0 and 12.1.3.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server. | https://github.com/loursha/Oracle-Weblogic-Server-AsyncResponseService-Deserialization-Remote-Code-Execution-CVE-2019-2725 | POC詳細 |
公開POCは見つかりませんでした。
ログインしてAI POCを生成まだコメントはありません