PoC-in-GitHub/2022/CVE-2022-42889.json

1472 lines
50 KiB
JSON
Raw Normal View History

2023-01-02 13:13:52 +01:00
[
2024-03-19 19:27:11 +01:00
{
"id": 553040165,
"name": "CVE-2022-42889",
"full_name": "0xst4n\/CVE-2022-42889",
"owner": {
"login": "0xst4n",
"id": 17493969,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4",
"html_url": "https:\/\/github.com\/0xst4n"
},
"html_url": "https:\/\/github.com\/0xst4n\/CVE-2022-42889",
"description": "CVE-2022-42889 dockerized sample application (Apache Commons Text RCE)",
"fork": false,
"created_at": "2022-10-17T16:07:50Z",
"updated_at": "2023-03-28T11:55:16Z",
"pushed_at": "2022-10-17T16:09:23Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"cve",
"cve-2022-42889",
"poc",
"rce",
"text4shell"
],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 553123200,
"name": "CVE-2022-42889-PoC",
"full_name": "SeanWrightSec\/CVE-2022-42889-PoC",
"owner": {
"login": "SeanWrightSec",
"id": 41480796,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41480796?v=4",
"html_url": "https:\/\/github.com\/SeanWrightSec"
},
"html_url": "https:\/\/github.com\/SeanWrightSec\/CVE-2022-42889-PoC",
"description": "Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.",
"fork": false,
"created_at": "2022-10-17T18:50:36Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:27:51Z",
2024-03-19 19:27:11 +01:00
"pushed_at": "2022-10-20T11:56:13Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 33,
"watchers_count": 33,
2024-03-19 19:27:11 +01:00
"has_discussions": true,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"cve-2022-42889-expliot",
"cybersecurity",
"poc"
],
"visibility": "public",
"forks": 17,
2024-08-13 02:29:46 +02:00
"watchers": 33,
2024-03-19 19:27:11 +01:00
"score": 0,
"subscribers_count": 3
},
2023-01-02 13:13:52 +01:00
{
"id": 553199087,
"name": "text4shell-policy",
"full_name": "chainguard-dev\/text4shell-policy",
"owner": {
"login": "chainguard-dev",
"id": 87436699,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87436699?v=4",
"html_url": "https:\/\/github.com\/chainguard-dev"
},
"html_url": "https:\/\/github.com\/chainguard-dev\/text4shell-policy",
"description": "ClusterImagePolicy demo for cve-2022-42889 text4shell ",
"fork": false,
"created_at": "2022-10-17T21:49:13Z",
2024-03-11 01:26:48 +01:00
"updated_at": "2024-03-10T21:00:23Z",
2023-06-21 15:50:23 +02:00
"pushed_at": "2023-06-21T11:06:51Z",
2023-01-02 13:13:52 +01:00
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
2023-11-28 13:34:31 +01:00
"web_commit_signoff_required": true,
2023-01-02 13:13:52 +01:00
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
2023-06-19 15:46:37 +02:00
"score": 0,
2023-06-25 08:27:10 +02:00
"subscribers_count": 5
2023-01-02 13:13:52 +01:00
},
{
"id": 553446275,
"name": "commons-text-goat",
"full_name": "tulhan\/commons-text-goat",
"owner": {
"login": "tulhan",
"id": 586439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/586439?v=4",
"html_url": "https:\/\/github.com\/tulhan"
},
"html_url": "https:\/\/github.com\/tulhan\/commons-text-goat",
"description": "An intentionally vulnerable webapp to get your hands dirty with CVE-2022-42889.",
"fork": false,
"created_at": "2022-10-18T08:22:55Z",
"updated_at": "2022-10-23T11:42:26Z",
2023-04-19 02:29:02 +02:00
"pushed_at": "2023-04-18T22:24:14Z",
2023-01-02 13:13:52 +01:00
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-02 13:13:52 +01:00
},
{
"id": 553496497,
"name": "cve-2022-42889-text4shell-docker",
"full_name": "karthikuj\/cve-2022-42889-text4shell-docker",
"owner": {
"login": "karthikuj",
"id": 59091280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59091280?v=4",
"html_url": "https:\/\/github.com\/karthikuj"
},
"html_url": "https:\/\/github.com\/karthikuj\/cve-2022-42889-text4shell-docker",
"description": "Dockerized POC for CVE-2022-42889 Text4Shell",
"fork": false,
"created_at": "2022-10-18T09:58:00Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:27:52Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2022-11-14T17:12:41Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 75,
"watchers_count": 75,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
2024-08-22 14:29:53 +02:00
"forks_count": 30,
2023-01-02 13:13:52 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"act4shell",
"apache",
"commons",
"cve",
"cve-2022-42889",
"poc",
"text4shell"
],
"visibility": "public",
2024-08-22 14:29:53 +02:00
"forks": 30,
2024-08-13 02:29:46 +02:00
"watchers": 75,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-02 13:13:52 +01:00
},
2024-03-19 19:27:11 +01:00
{
"id": 553621408,
"name": "cve-2022-42889",
"full_name": "ClickCyber\/cve-2022-42889",
"owner": {
"login": "ClickCyber",
"id": 66947475,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66947475?v=4",
"html_url": "https:\/\/github.com\/ClickCyber"
},
"html_url": "https:\/\/github.com\/ClickCyber\/cve-2022-42889",
"description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ",
"fork": false,
"created_at": "2022-10-18T13:53:55Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:27:52Z",
2024-03-19 19:27:11 +01:00
"pushed_at": "2022-10-18T14:10:07Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 37,
"watchers_count": 37,
2024-03-19 19:27:11 +01:00
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
2024-08-13 02:29:46 +02:00
"watchers": 37,
2024-03-19 19:27:11 +01:00
"score": 0,
"subscribers_count": 1
},
{
"id": 553879048,
"name": "CVE-2022-42889-POC",
"full_name": "korteke\/CVE-2022-42889-POC",
"owner": {
"login": "korteke",
"id": 2558348,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4",
"html_url": "https:\/\/github.com\/korteke"
},
"html_url": "https:\/\/github.com\/korteke\/CVE-2022-42889-POC",
"description": "A simple application that shows how to exploit the CVE-2022-42889 vulnerability",
"fork": false,
"created_at": "2022-10-18T23:15:40Z",
2024-06-13 20:29:51 +02:00
"updated_at": "2024-06-13T13:52:03Z",
2024-03-19 19:27:11 +01:00
"pushed_at": "2022-11-06T16:03:44Z",
2024-06-13 20:29:51 +02:00
"stargazers_count": 12,
"watchers_count": 12,
2024-03-19 19:27:11 +01:00
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"cybersecurity",
"exploit",
"interactsh",
"poc",
"text4shell"
],
"visibility": "public",
"forks": 7,
2024-06-13 20:29:51 +02:00
"watchers": 12,
2024-03-19 19:27:11 +01:00
"score": 0,
"subscribers_count": 2
},
{
"id": 554046000,
"name": "cve-2022-42889-check",
"full_name": "eunomie\/cve-2022-42889-check",
"owner": {
"login": "eunomie",
"id": 1542321,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1542321?v=4",
"html_url": "https:\/\/github.com\/eunomie"
},
"html_url": "https:\/\/github.com\/eunomie\/cve-2022-42889-check",
"description": null,
"fork": false,
"created_at": "2022-10-19T06:54:57Z",
"updated_at": "2022-10-19T06:57:07Z",
"pushed_at": "2022-10-20T12:54:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
2023-01-02 13:13:52 +01:00
{
"id": 554185839,
"name": "CVE-2022-42889-text4shell",
"full_name": "kljunowsky\/CVE-2022-42889-text4shell",
"owner": {
"login": "kljunowsky",
"id": 104329412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4",
"html_url": "https:\/\/github.com\/kljunowsky"
},
"html_url": "https:\/\/github.com\/kljunowsky\/CVE-2022-42889-text4shell",
"description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.",
"fork": false,
"created_at": "2022-10-19T11:49:08Z",
2024-08-06 20:29:41 +02:00
"updated_at": "2024-08-06T15:10:49Z",
2023-12-29 19:46:41 +01:00
"pushed_at": "2023-12-29T14:57:34Z",
2024-08-06 20:29:41 +02:00
"stargazers_count": 49,
"watchers_count": 49,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache",
"bug-bounty",
"bug-bounty-hunting",
"bugbounty",
"bugbounty-tool",
"commons-text",
"cve-2022-42889",
"exploit",
"oneliner",
"security",
"security-tools"
],
"visibility": "public",
"forks": 8,
2024-08-06 20:29:41 +02:00
"watchers": 49,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-01-02 13:13:52 +01:00
},
2024-03-19 19:27:11 +01:00
{
"id": 554436866,
"name": "text4shell-scan",
"full_name": "securekomodo\/text4shell-scan",
"owner": {
"login": "securekomodo",
"id": 4809643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4",
"html_url": "https:\/\/github.com\/securekomodo"
},
"html_url": "https:\/\/github.com\/securekomodo\/text4shell-scan",
"description": "A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889",
"fork": false,
"created_at": "2022-10-19T20:14:22Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:27:54Z",
2024-03-19 19:27:11 +01:00
"pushed_at": "2022-10-20T12:51:08Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 50,
"watchers_count": 50,
2024-03-19 19:27:11 +01:00
"has_discussions": false,
2024-04-06 14:27:03 +02:00
"forks_count": 14,
2024-03-19 19:27:11 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-04-06 14:27:03 +02:00
"forks": 14,
2024-08-13 02:29:46 +02:00
"watchers": 50,
2024-03-19 19:27:11 +01:00
"score": 0,
"subscribers_count": 3
},
{
"id": 554494424,
"name": "CVE-2022-42889",
"full_name": "neerazz\/CVE-2022-42889",
"owner": {
"login": "neerazz",
"id": 43318996,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43318996?v=4",
"html_url": "https:\/\/github.com\/neerazz"
},
"html_url": "https:\/\/github.com\/neerazz\/CVE-2022-42889",
"description": null,
"fork": false,
"created_at": "2022-10-19T22:56:12Z",
"updated_at": "2022-10-19T22:59:21Z",
"pushed_at": "2022-10-19T22:58:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"cve-2022-42889-expliot",
"cve-poc"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 554822047,
"name": "cve-2022-42889-intercept",
"full_name": "uk0\/cve-2022-42889-intercept",
"owner": {
"login": "uk0",
"id": 19545292,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19545292?v=4",
"html_url": "https:\/\/github.com\/uk0"
},
"html_url": "https:\/\/github.com\/uk0\/cve-2022-42889-intercept",
"description": "通过 jvm 启动参数 以及 jps pid进行拦截非法参数",
"fork": false,
"created_at": "2022-10-20T13:05:24Z",
"updated_at": "2024-01-12T15:42:59Z",
"pushed_at": "2022-10-21T03:46:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 554968542,
"name": "text4shell-poc",
"full_name": "securekomodo\/text4shell-poc",
"owner": {
"login": "securekomodo",
"id": 4809643,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4",
"html_url": "https:\/\/github.com\/securekomodo"
},
"html_url": "https:\/\/github.com\/securekomodo\/text4shell-poc",
"description": "Proof of Concept Appliction for testing CVE-2022-42889",
"fork": false,
"created_at": "2022-10-20T18:07:25Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:27:55Z",
2024-03-19 19:27:11 +01:00
"pushed_at": "2022-10-31T16:03:56Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 8,
"watchers_count": 8,
2024-03-19 19:27:11 +01:00
"has_discussions": false,
2024-06-21 14:29:13 +02:00
"forks_count": 11,
2024-03-19 19:27:11 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-06-21 14:29:13 +02:00
"forks": 11,
2024-08-13 02:29:46 +02:00
"watchers": 8,
2024-03-19 19:27:11 +01:00
"score": 0,
"subscribers_count": 1
},
{
"id": 555394668,
"name": "CVE-2022-42889",
"full_name": "humbss\/CVE-2022-42889",
"owner": {
"login": "humbss",
"id": 17453152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17453152?v=4",
"html_url": "https:\/\/github.com\/humbss"
},
"html_url": "https:\/\/github.com\/humbss\/CVE-2022-42889",
"description": null,
"fork": false,
"created_at": "2022-10-21T13:48:04Z",
"updated_at": "2022-10-24T03:11:46Z",
"pushed_at": "2022-10-21T14:01:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 555540963,
"name": "Text4ShellPayloads",
"full_name": "stavrosgns\/Text4ShellPayloads",
"owner": {
"login": "stavrosgns",
"id": 59849433,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59849433?v=4",
"html_url": "https:\/\/github.com\/stavrosgns"
},
"html_url": "https:\/\/github.com\/stavrosgns\/Text4ShellPayloads",
"description": "This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability",
"fork": false,
"created_at": "2022-10-21T19:41:56Z",
"updated_at": "2023-09-24T20:21:47Z",
"pushed_at": "2022-10-21T19:57:38Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 555646270,
"name": "CVE-2022-42889",
"full_name": "s3l33\/CVE-2022-42889",
"owner": {
"login": "s3l33",
"id": 60675004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60675004?v=4",
"html_url": "https:\/\/github.com\/s3l33"
},
"html_url": "https:\/\/github.com\/s3l33\/CVE-2022-42889",
"description": "python script for CVE-2022-42889",
"fork": false,
"created_at": "2022-10-22T02:06:40Z",
"updated_at": "2022-10-25T07:40:16Z",
"pushed_at": "2022-10-22T02:53:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 555778524,
"name": "CVE-2022-42889-Text4Shell-Docker",
"full_name": "galoget\/CVE-2022-42889-Text4Shell-Docker",
"owner": {
"login": "galoget",
"id": 8353133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
"html_url": "https:\/\/github.com\/galoget"
},
"html_url": "https:\/\/github.com\/galoget\/CVE-2022-42889-Text4Shell-Docker",
"description": "Dockerized PoC for CVE-2022-42889 Text4Shell",
"fork": false,
"created_at": "2022-10-22T10:01:13Z",
"updated_at": "2022-10-22T10:03:23Z",
"pushed_at": "2022-10-22T10:03:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 555787805,
"name": "CVE-2022-42889-Text4Shell-Exploit-POC",
"full_name": "rhitikwadhvana\/CVE-2022-42889-Text4Shell-Exploit-POC",
"owner": {
"login": "rhitikwadhvana",
"id": 51850319,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51850319?v=4",
"html_url": "https:\/\/github.com\/rhitikwadhvana"
},
"html_url": "https:\/\/github.com\/rhitikwadhvana\/CVE-2022-42889-Text4Shell-Exploit-POC",
"description": "CVE-2022-42889 Text4Shell Exploit POC",
"fork": false,
"created_at": "2022-10-22T10:30:41Z",
"updated_at": "2022-12-13T04:44:38Z",
"pushed_at": "2022-10-22T10:31:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 556131265,
"name": "CVE-2022-42889-POC",
"full_name": "akshayithape-devops\/CVE-2022-42889-POC",
"owner": {
"login": "akshayithape-devops",
"id": 82793140,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82793140?v=4",
"html_url": "https:\/\/github.com\/akshayithape-devops"
},
"html_url": "https:\/\/github.com\/akshayithape-devops\/CVE-2022-42889-POC",
"description": "A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.",
"fork": false,
"created_at": "2022-10-23T05:48:48Z",
"updated_at": "2023-06-26T19:23:44Z",
"pushed_at": "2022-10-23T06:23:03Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
{
"id": 556176876,
"name": "Apache-Commons-Text-CVE-2022-42889",
"full_name": "0xmaximus\/Apache-Commons-Text-CVE-2022-42889",
"owner": {
"login": "0xmaximus",
"id": 63053441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4",
"html_url": "https:\/\/github.com\/0xmaximus"
},
"html_url": "https:\/\/github.com\/0xmaximus\/Apache-Commons-Text-CVE-2022-42889",
"description": "Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile",
"fork": false,
"created_at": "2022-10-23T08:33:02Z",
"updated_at": "2023-12-04T18:13:18Z",
"pushed_at": "2022-10-23T09:02:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"burp-bounty",
"burp-extensions",
"burp-plugin",
"cve-2022-42889",
"cve-2022-42889-expliot",
"text4shell"
],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 556199653,
"name": "Text4Shell-Scanner",
"full_name": "smileostrich\/Text4Shell-Scanner",
"owner": {
"login": "smileostrich",
"id": 68785480,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68785480?v=4",
"html_url": "https:\/\/github.com\/smileostrich"
},
"html_url": "https:\/\/github.com\/smileostrich\/Text4Shell-Scanner",
"description": "Vulnerability Scanner for CVE-2022-42889 (Text4Shell)",
"fork": false,
"created_at": "2022-10-23T09:45:41Z",
"updated_at": "2023-04-17T02:29:52Z",
"pushed_at": "2022-10-24T15:00:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
2023-01-02 13:13:52 +01:00
{
"id": 556278066,
"name": "CVE-2022-42889-text4shell",
"full_name": "cxzero\/CVE-2022-42889-text4shell",
"owner": {
"login": "cxzero",
"id": 17437230,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17437230?v=4",
"html_url": "https:\/\/github.com\/cxzero"
},
"html_url": "https:\/\/github.com\/cxzero\/CVE-2022-42889-text4shell",
"description": "CVE-2022-42889 aka Text4Shell research & PoC",
"fork": false,
"created_at": "2022-10-23T13:42:23Z",
2024-04-23 14:28:59 +02:00
"updated_at": "2024-04-23T10:34:47Z",
2023-03-17 19:28:48 +01:00
"pushed_at": "2023-03-17T16:15:41Z",
2024-04-23 14:28:59 +02:00
"stargazers_count": 18,
"watchers_count": 18,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"poc",
"text4shell"
],
"visibility": "public",
"forks": 3,
2024-04-23 14:28:59 +02:00
"watchers": 18,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-02 13:13:52 +01:00
},
2024-03-19 19:27:11 +01:00
{
"id": 556824884,
"name": "CVE-2022-42889",
"full_name": "west-wind\/CVE-2022-42889",
"owner": {
"login": "west-wind",
"id": 32312003,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32312003?v=4",
"html_url": "https:\/\/github.com\/west-wind"
},
"html_url": "https:\/\/github.com\/west-wind\/CVE-2022-42889",
"description": "Text4Shell PoC Exploit ",
"fork": false,
"created_at": "2022-10-24T15:28:02Z",
"updated_at": "2022-10-29T04:49:07Z",
"pushed_at": "2022-10-25T09:48:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"cve-2022-42889-expliot",
"text4shell",
"text4shell-detection",
"text4shell-exploit",
"text4shell-poc-exploit",
"text4shell-splunk-query"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
2024-05-24 08:28:50 +02:00
"subscribers_count": 1
2024-03-19 19:27:11 +01:00
},
{
"id": 557311667,
"name": "text4shell-CVE-2022-42889",
"full_name": "Vulnmachines\/text4shell-CVE-2022-42889",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/text4shell-CVE-2022-42889",
"description": null,
"fork": false,
"created_at": "2022-10-25T13:11:24Z",
"updated_at": "2022-10-27T08:30:39Z",
"pushed_at": "2022-10-25T13:15:32Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 561067220,
"name": "CVE-2022-42889",
"full_name": "Gotcha-1G\/CVE-2022-42889",
"owner": {
"login": "Gotcha-1G",
"id": 103347307,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103347307?v=4",
"html_url": "https:\/\/github.com\/Gotcha-1G"
},
"html_url": "https:\/\/github.com\/Gotcha-1G\/CVE-2022-42889",
"description": "CVE-2022-42889 Blind-RCE Nuclei Template",
"fork": false,
"created_at": "2022-11-02T21:49:55Z",
"updated_at": "2022-11-03T19:50:13Z",
"pushed_at": "2022-11-02T21:51:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
2023-01-02 13:13:52 +01:00
{
"id": 561912100,
"name": "CVE-2022-42889-RCE",
"full_name": "cryxnet\/CVE-2022-42889-RCE",
"owner": {
"login": "cryxnet",
"id": 75471375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75471375?v=4",
"html_url": "https:\/\/github.com\/cryxnet"
},
"html_url": "https:\/\/github.com\/cryxnet\/CVE-2022-42889-RCE",
"description": "Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) ",
"fork": false,
"created_at": "2022-11-04T19:26:23Z",
2024-08-06 20:29:41 +02:00
"updated_at": "2024-08-06T15:10:45Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2022-11-21T10:17:03Z",
2024-08-06 20:29:41 +02:00
"stargazers_count": 15,
"watchers_count": 15,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
2024-06-21 08:29:06 +02:00
"forks_count": 2,
2023-01-02 13:13:52 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"exploit",
"exploits",
"poc",
"security",
"vulnerability"
],
"visibility": "public",
2024-06-21 08:29:06 +02:00
"forks": 2,
2024-08-06 20:29:41 +02:00
"watchers": 15,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-02 13:13:52 +01:00
},
2024-03-19 19:27:11 +01:00
{
"id": 562064682,
"name": "CVE-2022-42889-PoC",
"full_name": "sunnyvale-it\/CVE-2022-42889-PoC",
"owner": {
"login": "sunnyvale-it",
"id": 44291039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
"html_url": "https:\/\/github.com\/sunnyvale-it"
},
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2022-42889-PoC",
"description": "CVE-2022-42889 (a.k.a. Text4Shell) RCE Proof of Concept",
"fork": false,
"created_at": "2022-11-05T07:32:51Z",
"updated_at": "2023-08-29T21:03:39Z",
"pushed_at": "2022-11-07T07:57:01Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 562165502,
"name": "cve-2022-42889-jmeter",
"full_name": "QAInsights\/cve-2022-42889-jmeter",
"owner": {
"login": "QAInsights",
"id": 2826376,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2826376?v=4",
"html_url": "https:\/\/github.com\/QAInsights"
},
"html_url": "https:\/\/github.com\/QAInsights\/cve-2022-42889-jmeter",
"description": "Script to handle CVE 2022-42889",
"fork": false,
"created_at": "2022-11-05T14:08:18Z",
"updated_at": "2024-01-15T15:59:33Z",
"pushed_at": "2022-11-05T15:27:52Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"jmeter"
],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 562751349,
"name": "Text4shell--Automated-exploit---CVE-2022-42889",
"full_name": "adarshpv9746\/Text4shell--Automated-exploit---CVE-2022-42889",
"owner": {
"login": "adarshpv9746",
"id": 33172696,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33172696?v=4",
"html_url": "https:\/\/github.com\/adarshpv9746"
},
"html_url": "https:\/\/github.com\/adarshpv9746\/Text4shell--Automated-exploit---CVE-2022-42889",
"description": null,
"fork": false,
"created_at": "2022-11-07T07:19:49Z",
"updated_at": "2022-11-07T07:39:20Z",
"pushed_at": "2022-11-07T09:44:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
2023-01-02 13:13:52 +01:00
{
"id": 568929458,
"name": "Text4shell-exploit",
"full_name": "pwnb0y\/Text4shell-exploit",
"owner": {
"login": "pwnb0y",
"id": 96813659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96813659?v=4",
"html_url": "https:\/\/github.com\/pwnb0y"
},
"html_url": "https:\/\/github.com\/pwnb0y\/Text4shell-exploit",
"description": "Python Script to exploit RCE of CVE-2022-42889 ",
"fork": false,
"created_at": "2022-11-21T18:01:28Z",
2023-11-02 13:25:58 +01:00
"updated_at": "2023-11-02T07:39:02Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2022-11-21T18:17:07Z",
2023-11-02 13:25:58 +01:00
"stargazers_count": 5,
"watchers_count": 5,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-common-text",
"cve-2022-42889",
"cve-2022-42889-expliot",
"java-vulnerability",
"rce",
"text4shell",
"text4shell-exploit"
],
"visibility": "public",
"forks": 0,
2023-11-02 13:25:58 +01:00
"watchers": 5,
2023-06-19 15:46:37 +02:00
"score": 0,
2023-11-27 07:30:47 +01:00
"subscribers_count": 3
2023-01-02 13:13:52 +01:00
},
{
"id": 575527565,
"name": "text4shell-exploit",
"full_name": "gokul-ramesh\/text4shell-exploit",
"owner": {
"login": "gokul-ramesh",
"id": 65040016,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65040016?v=4",
"html_url": "https:\/\/github.com\/gokul-ramesh"
},
"html_url": "https:\/\/github.com\/gokul-ramesh\/text4shell-exploit",
"description": "CVE-2022-42889 - Text4Shell exploit",
"fork": false,
"created_at": "2022-12-07T17:58:59Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:28:45Z",
2023-03-12 19:28:05 +01:00
"pushed_at": "2023-03-12T17:06:11Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
2023-05-16 02:28:32 +02:00
"forks_count": 3,
2023-01-02 13:13:52 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-42889",
"text4shell",
"text4shell-exploit",
"text4shell-poc-exploit"
],
"visibility": "public",
2023-05-16 02:28:32 +02:00
"forks": 3,
2024-08-13 02:29:46 +02:00
"watchers": 1,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-01-02 13:13:52 +01:00
},
{
"id": 576192155,
"name": "text4shellburpscanner",
"full_name": "f0ng\/text4shellburpscanner",
"owner": {
"login": "f0ng",
"id": 48286013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4",
"html_url": "https:\/\/github.com\/f0ng"
},
"html_url": "https:\/\/github.com\/f0ng\/text4shellburpscanner",
"description": "text4shell(CVE-2022-42889) BurpSuite Scanner",
"fork": false,
"created_at": "2022-12-09T08:18:19Z",
2024-02-09 19:26:19 +01:00
"updated_at": "2024-02-09T17:49:38Z",
2023-01-02 13:13:52 +01:00
"pushed_at": "2022-12-09T09:08:13Z",
2024-02-09 19:26:19 +01:00
"stargazers_count": 20,
"watchers_count": 20,
2023-01-02 13:13:52 +01:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"burp",
"burp-extensions"
],
"visibility": "public",
"forks": 0,
2024-02-09 19:26:19 +01:00
"watchers": 20,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-02-20 01:29:55 +01:00
},
{
"id": 603867876,
"name": "vtrade-common",
"full_name": "WFS-Mend\/vtrade-common",
"owner": {
"login": "WFS-Mend",
"id": 125828953,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125828953?v=4",
"html_url": "https:\/\/github.com\/WFS-Mend"
},
"html_url": "https:\/\/github.com\/WFS-Mend\/vtrade-common",
"description": "https:\/\/github.com\/karthikuj\/cve-2022-42889-text4shell-docker.git",
"fork": false,
"created_at": "2023-02-19T19:49:41Z",
2023-03-26 14:28:14 +02:00
"updated_at": "2023-03-26T07:35:15Z",
2024-07-19 08:30:02 +02:00
"pushed_at": "2024-07-19T06:18:44Z",
2023-02-20 01:29:55 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 0
2023-02-28 07:34:32 +01:00
},
2024-06-26 08:47:13 +02:00
{
"id": 607430692,
"name": "text4shell-cve-2022-42889",
"full_name": "devenes\/text4shell-cve-2022-42889",
"owner": {
"login": "devenes",
"id": 66560757,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66560757?v=4",
"html_url": "https:\/\/github.com\/devenes"
},
"html_url": "https:\/\/github.com\/devenes\/text4shell-cve-2022-42889",
"description": "Kubernetes Lab for CVE-2022-42889",
"fork": false,
"created_at": "2023-02-28T00:32:01Z",
"updated_at": "2023-02-28T01:34:25Z",
"pushed_at": "2023-02-28T11:43:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 608352501,
"name": "text4shell",
"full_name": "hotblac\/text4shell",
"owner": {
"login": "hotblac",
"id": 4406140,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4406140?v=4",
"html_url": "https:\/\/github.com\/hotblac"
},
"html_url": "https:\/\/github.com\/hotblac\/text4shell",
"description": "A demonstration of CVE-2022-42889 (text4shell) remote code execution vulnerability",
"fork": false,
"created_at": "2023-03-01T20:56:37Z",
"updated_at": "2023-03-01T20:57:17Z",
"pushed_at": "2023-03-12T17:34:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 623655257,
"name": "CVE-2022-42889",
"full_name": "necroteddy\/CVE-2022-42889",
"owner": {
"login": "necroteddy",
"id": 37003131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37003131?v=4",
"html_url": "https:\/\/github.com\/necroteddy"
},
"html_url": "https:\/\/github.com\/necroteddy\/CVE-2022-42889",
"description": "docker for CVE-2022-42889",
"fork": false,
"created_at": "2023-04-04T20:08:08Z",
"updated_at": "2023-04-19T05:53:19Z",
"pushed_at": "2023-04-19T05:53:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 625082348,
"name": "cve-2022-42889-text4shell-docker",
"full_name": "ReachabilityOrg\/cve-2022-42889-text4shell-docker",
"owner": {
"login": "ReachabilityOrg",
"id": 129769214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/129769214?v=4",
"html_url": "https:\/\/github.com\/ReachabilityOrg"
},
"html_url": "https:\/\/github.com\/ReachabilityOrg\/cve-2022-42889-text4shell-docker",
"description": null,
"fork": false,
"created_at": "2023-04-08T02:47:55Z",
"updated_at": "2023-04-08T02:48:07Z",
"pushed_at": "2023-04-11T15:43:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 625424909,
"name": "cve-2022-42889-text4shell-docker",
"full_name": "dgor2023\/cve-2022-42889-text4shell-docker",
"owner": {
"login": "dgor2023",
"id": 130265095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130265095?v=4",
"html_url": "https:\/\/github.com\/dgor2023"
},
"html_url": "https:\/\/github.com\/dgor2023\/cve-2022-42889-text4shell-docker",
"description": null,
"fork": false,
"created_at": "2023-04-09T04:09:34Z",
"updated_at": "2023-04-09T04:09:46Z",
"pushed_at": "2023-04-12T02:32:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 629556451,
"name": "cve-2022-42889-text4shell",
"full_name": "Dima2021\/cve-2022-42889-text4shell",
"owner": {
"login": "Dima2021",
"id": 61808880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61808880?v=4",
"html_url": "https:\/\/github.com\/Dima2021"
},
"html_url": "https:\/\/github.com\/Dima2021\/cve-2022-42889-text4shell",
"description": null,
"fork": false,
"created_at": "2023-04-18T14:49:45Z",
"updated_at": "2023-04-18T15:01:22Z",
"pushed_at": "2023-04-18T15:12:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
2023-05-23 14:31:20 +02:00
{
"id": 643789911,
"name": "text4shell-docker",
"full_name": "aaronm-sysdig\/text4shell-docker",
"owner": {
"login": "aaronm-sysdig",
"id": 132866139,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132866139?v=4",
"html_url": "https:\/\/github.com\/aaronm-sysdig"
},
"html_url": "https:\/\/github.com\/aaronm-sysdig\/text4shell-docker",
"description": "Dockerized POC for CVE-2022-42889 Text4Shell",
"fork": false,
"created_at": "2023-05-22T06:57:55Z",
"updated_at": "2023-05-23T07:32:45Z",
2024-01-05 13:40:00 +01:00
"pushed_at": "2024-01-05T10:18:55Z",
2023-05-23 14:31:20 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2023-08-29 02:27:54 +02:00
"forks_count": 2,
2023-05-23 14:31:20 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-29 02:27:54 +02:00
"forks": 2,
2023-05-23 14:31:20 +02:00
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 0
2023-06-27 15:54:15 +02:00
},
2024-06-26 08:47:13 +02:00
{
"id": 659148388,
"name": "CVE-2022-42889-Text4Shell-POC",
"full_name": "gustanini\/CVE-2022-42889-Text4Shell-POC",
"owner": {
"login": "gustanini",
"id": 47717581,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47717581?v=4",
"html_url": "https:\/\/github.com\/gustanini"
},
"html_url": "https:\/\/github.com\/gustanini\/CVE-2022-42889-Text4Shell-POC",
"description": "This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the CVE id: CVE-2022-42889. ",
"fork": false,
"created_at": "2023-06-27T08:29:24Z",
2024-08-09 08:29:33 +02:00
"updated_at": "2024-08-09T03:55:20Z",
2024-06-26 08:47:13 +02:00
"pushed_at": "2023-06-27T09:01:14Z",
2024-08-09 08:29:33 +02:00
"stargazers_count": 10,
"watchers_count": 10,
2024-06-26 08:47:13 +02:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2024-08-09 08:29:33 +02:00
"watchers": 10,
2024-06-26 08:47:13 +02:00
"score": 0,
"subscribers_count": 2
},
2023-09-06 08:58:28 +02:00
{
"id": 687770707,
"name": "CVE-2022-42889",
"full_name": "Sic4rio\/CVE-2022-42889",
"owner": {
"login": "Sic4rio",
"id": 75425513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75425513?v=4",
"html_url": "https:\/\/github.com\/Sic4rio"
},
"html_url": "https:\/\/github.com\/Sic4rio\/CVE-2022-42889",
"description": "Text4Shell",
"fork": false,
"created_at": "2023-09-06T01:13:26Z",
"updated_at": "2023-09-06T01:15:32Z",
"pushed_at": "2023-09-06T01:15:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-09-07 08:35:32 +02:00
"subscribers_count": 1
2023-09-09 15:51:17 +02:00
},
{
"id": 689311131,
"name": "CVE-2022-42889",
2023-09-10 15:52:15 +02:00
"full_name": "34006133\/CVE-2022-42889",
2023-09-09 15:51:17 +02:00
"owner": {
2023-09-10 15:52:15 +02:00
"login": "34006133",
2023-09-09 15:51:17 +02:00
"id": 143711860,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143711860?v=4",
2023-09-10 15:52:15 +02:00
"html_url": "https:\/\/github.com\/34006133"
2023-09-09 15:51:17 +02:00
},
2023-09-10 15:52:15 +02:00
"html_url": "https:\/\/github.com\/34006133\/CVE-2022-42889",
2023-09-09 20:31:27 +02:00
"description": "RCE PoC for Apache Commons Text vuln",
2023-09-09 15:51:17 +02:00
"fork": false,
"created_at": "2023-09-09T12:11:36Z",
2023-09-11 08:36:49 +02:00
"updated_at": "2023-09-11T00:54:20Z",
2023-09-10 15:52:15 +02:00
"pushed_at": "2023-09-10T13:32:05Z",
2023-09-11 08:36:49 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2023-09-09 15:51:17 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-09-11 08:36:49 +02:00
"watchers": 0,
2023-09-09 15:51:17 +02:00
"score": 0,
2023-09-10 08:32:41 +02:00
"subscribers_count": 1
2023-09-22 20:32:03 +02:00
},
{
"id": 695246530,
"name": "cve-2022-42889-text4shell",
"full_name": "DimaMend\/cve-2022-42889-text4shell",
"owner": {
"login": "DimaMend",
"id": 145161091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145161091?v=4",
"html_url": "https:\/\/github.com\/DimaMend"
},
"html_url": "https:\/\/github.com\/DimaMend\/cve-2022-42889-text4shell",
"description": null,
"fork": false,
"created_at": "2023-09-22T17:17:26Z",
"updated_at": "2023-09-22T17:17:44Z",
2024-07-19 14:29:58 +02:00
"pushed_at": "2024-07-19T07:59:23Z",
2023-09-22 20:32:03 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-09-23 08:26:16 +02:00
"subscribers_count": 1
2024-02-09 01:26:05 +01:00
},
{
"id": 754828377,
"name": "cve-2022-42889-text4shell",
"full_name": "joshbnewton31080\/cve-2022-42889-text4shell",
"owner": {
"login": "joshbnewton31080",
"id": 88124465,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88124465?v=4",
"html_url": "https:\/\/github.com\/joshbnewton31080"
},
"html_url": "https:\/\/github.com\/joshbnewton31080\/cve-2022-42889-text4shell",
"description": null,
"fork": false,
"created_at": "2024-02-08T20:54:23Z",
"updated_at": "2024-02-08T20:54:36Z",
"pushed_at": "2024-02-08T20:54:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-02-09 07:25:45 +01:00
"subscribers_count": 1
2024-02-09 01:26:05 +01:00
},
{
"id": 754828660,
"name": "cve-2022-42889-text4shell",
"full_name": "MendDemo-josh\/cve-2022-42889-text4shell",
"owner": {
"login": "MendDemo-josh",
"id": 109741065,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109741065?v=4",
"html_url": "https:\/\/github.com\/MendDemo-josh"
},
"html_url": "https:\/\/github.com\/MendDemo-josh\/cve-2022-42889-text4shell",
"description": null,
"fork": false,
"created_at": "2024-02-08T20:55:09Z",
"updated_at": "2024-02-08T20:55:23Z",
2024-02-09 19:26:19 +01:00
"pushed_at": "2024-02-09T13:48:13Z",
2024-02-09 01:26:05 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
2023-01-02 13:13:52 +01:00
}
]