We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent a23b4e5 commit cce379dCopy full SHA for cce379d
README.md
@@ -1,5 +1,7 @@
1
# weblogic_exploit
2
weblogic漏洞利用工具
3
+http://mp.weixin.qq.com/s?__biz=MzIyNzY1MzUxMQ==&mid=100000071&idx=1&sn=5eaab2602d9f022a82f0d2c5d4b0ef5d&chksm=685ca3af5f2b2ab9423268185c1ea7eddd65680991802794e411f3d95746602ea8797e3c7cf4#rd
4
+支持
5
CVE_2015_4852
6
CVE_2016_0638
7
CVE_2016_3510
@@ -15,6 +17,6 @@ CVE_2019_2725
15
17
CVE_2019_2729
16
18
CVE_2020_2551
19
CVE_2020_2555
-支持漏洞会显,不支持的是使用dnslog进行判断
20
+支持漏洞回显,不支持的是使用dnslog进行判断
21
编译后的jar地址
22
https://github.com/21superman/weblogic_exploit/releases/download/1.0/weblogic_exploit-1.0-SNAPSHOT-all.jar
0 commit comments