2024-05-26 14:27:05 +02:00
### [CVE-2016-3510](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3510)



### Description
Unspecified vulnerability in the Oracle WebLogic Server component in Oracle Fusion Middleware 10.3.6.0, 12.1.3.0, and 12.2.1.0 allows remote attackers to affect confidentiality, integrity, and availability via vectors related to WLS Core Components, a different vulnerability than CVE-2016-3586.
### POC
#### Reference
- http://packetstormsecurity.com/files/152324/Oracle-Weblogic-Server-Deserialization-MarshalledObject-Remote-Code-Execution.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.securityfocus.com/bid/91787
#### Github
- https://github.com/0day404/vulnerability-poc
- https://github.com/0xh4di/PayloadsAllTheThings
- https://github.com/0xn0ne/weblogicScanner
- https://github.com/20142995/pocsuite
- https://github.com/20142995/pocsuite3
- https://github.com/20142995/sectool
- https://github.com/3vikram/Application-Vulnerabilities-Payloads
- https://github.com/84KaliPleXon3/Payloads_All_The_Things
- https://github.com/ARPSyndicate/cvemon
- https://github.com/AlexisRippin/java-deserialization-exploits
- https://github.com/BabyTeam1024/CVE-2016-3510
- https://github.com/Bywalks/WeblogicScan
- https://github.com/CVEDB/PoC-List
- https://github.com/CVEDB/awesome-cve-repo
- https://github.com/CVEDB/top
- https://github.com/Coalfire-Research/java-deserialization-exploits
- https://github.com/Delishsploits/PayloadsAndMethodology
- https://github.com/GhostTroops/TOP
- https://github.com/GuynnR/Payloads
- https://github.com/Hatcat123/my_stars
- https://github.com/JERRY123S/all-poc
- https://github.com/KayCHENvip/vulnerability-poc
- https://github.com/KimJun1010/WeblogicTool
2024-07-25 21:25:12 +00:00
- https://github.com/Maarckz/PayloadParaTudo
2024-05-26 14:27:05 +02:00
- https://github.com/MacAsure/WL_Scan_GO
- https://github.com/Miraitowa70/POC-Notes
- https://github.com/Muhammd/Awesome-Payloads
- https://github.com/Nieuport/PayloadsAllTheThings
- https://github.com/ParrotSec-CN/ParrotSecCN_Community_QQbot
- https://github.com/Pav-ksd-pl/PayloadsAllTheThings
- https://github.com/R0B1NL1N/Java_Deserialization_exploits
- https://github.com/R0B1NL1N/java-deserialization-exploits
- https://github.com/Ra7mo0on/PayloadsAllTheThings
- https://github.com/SexyBeast233/SecBooks
- https://github.com/Shadowshusky/java-deserialization-exploits
- https://github.com/Snakinya/Weblogic_Attack
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Weik1/Artillery
- https://github.com/XPR1M3/Payloads_All_The_Things
2024-05-27 13:12:02 +00:00
- https://github.com/ZTK-009/RedTeamer
2024-05-26 14:27:05 +02:00
- https://github.com/aiici/weblogicAllinone
- https://github.com/andrysec/PayloadsAllVulnerability
- https://github.com/angeloqmartin/Vulnerability-Assessment
- https://github.com/anhtu97/PayloadAllEverything
- https://github.com/apkadmin/PayLoadsAll
- https://github.com/awake1t/Awesome-hacking-tools
- https://github.com/awsassets/weblogic_exploit
- https://github.com/chanchalpatra/payload
- https://github.com/cross2to/betaseclab_tools
- https://github.com/cyberanand1337x/bug-bounty-2022
- https://github.com/d4n-sec/d4n-sec.github.io
- https://github.com/djytmdj/Tool_Summary
- https://github.com/dr0op/WeblogicScan
- https://github.com/falocab/PayloadsAllTheThings
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/followboy1999/weblogic-deserialization
- https://github.com/forhub2021/weblogicScanner
- https://github.com/hanc00l/some_pocsuite
- https://github.com/hanc00l/weblogic_unserialize_exploit
- https://github.com/hellochunqiu/PayloadsAllTheThings
- https://github.com/hktalent/TOP
- https://github.com/hmoytx/weblogicscan
2024-08-05 18:41:32 +00:00
- https://github.com/huan-cdm/secure_tools_link
2024-05-26 14:27:05 +02:00
- https://github.com/iceberg-N/WL_Scan_GO
- https://github.com/jbmihoub/all-poc
- https://github.com/koutto/jok3r-pocs
- https://github.com/ksw9722/PayloadsAllTheThings
- https://github.com/langu-xyz/JavaVulnMap
- https://github.com/mrhacker51/ReverseShellCommands
- https://github.com/nevidimk0/PayloadsAllTheThings
- https://github.com/nihaohello/N-MiddlewareScan
2024-07-25 21:25:12 +00:00
- https://github.com/onewinner/VulToolsKit
2024-05-26 14:27:05 +02:00
- https://github.com/orgTestCodacy11KRepos110MB/repo-5832-java-deserialization-exploits
- https://github.com/password520/RedTeamer
- https://github.com/qi4L/WeblogicScan.go
2024-06-07 04:52:01 +00:00
- https://github.com/rabbitmask/WeblogicScan
2024-05-26 14:27:05 +02:00
- https://github.com/rabbitmask/WeblogicScanLot
2024-07-25 21:25:12 +00:00
- https://github.com/rabbitmask/WeblogicScanServer
2024-05-26 14:27:05 +02:00
- https://github.com/ranjan-prp/PayloadsAllTheThings
- https://github.com/ravijainpro/payloads_xss
- https://github.com/safe6Sec/WeblogicVuln
- https://github.com/safe6Sec/wlsEnv
- https://github.com/sobinge/--1
- https://github.com/sobinge/PayloadsAllTheThings
- https://github.com/sobinge/PayloadsAllThesobinge
- https://github.com/sp4zcmd/WeblogicExploit-GUI
- https://github.com/superfish9/pt
- https://github.com/trganda/starrlist
- https://github.com/weeka10/-hktalent-TOP
- https://github.com/whoadmin/pocs
- https://github.com/winterwolf32/PayloadsAllTheThings
- https://github.com/wr0x00/Lizard
- https://github.com/wr0x00/Lsploit
- https://github.com/zema1/oracle-vuln-crawler
- https://github.com/zhzhdoai/Weblogic_Vuln