[ { "id": 553040165, "name": "CVE-2022-42889", "full_name": "0xst4n\/CVE-2022-42889", "owner": { "login": "0xst4n", "id": 17493969, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17493969?v=4", "html_url": "https:\/\/github.com\/0xst4n" }, "html_url": "https:\/\/github.com\/0xst4n\/CVE-2022-42889", "description": "CVE-2022-42889 dockerized sample application (Apache Commons Text RCE)", "fork": false, "created_at": "2022-10-17T16:07:50Z", "updated_at": "2022-11-28T06:56:49Z", "pushed_at": "2022-10-17T16:09:23Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "cve", "cve-2022-42889", "poc", "rce", "text4shell" ], "visibility": "public", "forks": 3, "watchers": 3, "score": 0 }, { "id": 553123200, "name": "CVE-2022-42889-PoC", "full_name": "SeanWrightSec\/CVE-2022-42889-PoC", "owner": { "login": "SeanWrightSec", "id": 41480796, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41480796?v=4", "html_url": "https:\/\/github.com\/SeanWrightSec" }, "html_url": "https:\/\/github.com\/SeanWrightSec\/CVE-2022-42889-PoC", "description": "Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.", "fork": false, "created_at": "2022-10-17T18:50:36Z", "updated_at": "2023-02-15T11:20:50Z", "pushed_at": "2022-10-20T11:56:13Z", "stargazers_count": 31, "watchers_count": 31, "has_discussions": true, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "cve-2022-42889-expliot", "cybersecurity", "poc" ], "visibility": "public", "forks": 16, "watchers": 31, "score": 0 }, { "id": 553199087, "name": "text4shell-policy", "full_name": "chainguard-dev\/text4shell-policy", "owner": { "login": "chainguard-dev", "id": 87436699, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87436699?v=4", "html_url": "https:\/\/github.com\/chainguard-dev" }, "html_url": "https:\/\/github.com\/chainguard-dev\/text4shell-policy", "description": "ClusterImagePolicy demo for cve-2022-42889 text4shell ", "fork": false, "created_at": "2022-10-17T21:49:13Z", "updated_at": "2022-10-25T19:42:37Z", "pushed_at": "2023-01-17T11:24:41Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0 }, { "id": 553446275, "name": "commons-text-goat", "full_name": "tulhan\/commons-text-goat", "owner": { "login": "tulhan", "id": 586439, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/586439?v=4", "html_url": "https:\/\/github.com\/tulhan" }, "html_url": "https:\/\/github.com\/tulhan\/commons-text-goat", "description": "An intentionally vulnerable webapp to get your hands dirty with CVE-2022-42889.", "fork": false, "created_at": "2022-10-18T08:22:55Z", "updated_at": "2022-10-23T11:42:26Z", "pushed_at": "2022-10-23T11:50:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 553496497, "name": "cve-2022-42889-text4shell-docker", "full_name": "karthikuj\/cve-2022-42889-text4shell-docker", "owner": { "login": "karthikuj", "id": 59091280, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59091280?v=4", "html_url": "https:\/\/github.com\/karthikuj" }, "html_url": "https:\/\/github.com\/karthikuj\/cve-2022-42889-text4shell-docker", "description": "Dockerized POC for CVE-2022-42889 Text4Shell", "fork": false, "created_at": "2022-10-18T09:58:00Z", "updated_at": "2023-02-15T03:36:47Z", "pushed_at": "2022-11-14T17:12:41Z", "stargazers_count": 69, "watchers_count": 69, "has_discussions": false, "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "act4shell", "apache", "commons", "cve", "cve-2022-42889", "poc", "text4shell" ], "visibility": "public", "forks": 24, "watchers": 69, "score": 0 }, { "id": 553621408, "name": "cve-2022-42889", "full_name": "ClickCyber\/cve-2022-42889", "owner": { "login": "ClickCyber", "id": 66947475, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66947475?v=4", "html_url": "https:\/\/github.com\/ClickCyber" }, "html_url": "https:\/\/github.com\/ClickCyber\/cve-2022-42889", "description": "cve-2022-42889 Text4Shell CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. ", "fork": false, "created_at": "2022-10-18T13:53:55Z", "updated_at": "2023-02-22T14:25:34Z", "pushed_at": "2022-10-18T14:10:07Z", "stargazers_count": 39, "watchers_count": 39, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 39, "score": 0 }, { "id": 553879048, "name": "CVE-2022-42889-POC", "full_name": "korteke\/CVE-2022-42889-POC", "owner": { "login": "korteke", "id": 2558348, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2558348?v=4", "html_url": "https:\/\/github.com\/korteke" }, "html_url": "https:\/\/github.com\/korteke\/CVE-2022-42889-POC", "description": "A simple application that shows how to exploit the CVE-2022-42889 vulnerability", "fork": false, "created_at": "2022-10-18T23:15:40Z", "updated_at": "2023-01-15T19:13:30Z", "pushed_at": "2022-11-06T16:03:44Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "cybersecurity", "exploit", "interactsh", "poc", "text4shell" ], "visibility": "public", "forks": 7, "watchers": 8, "score": 0 }, { "id": 554046000, "name": "cve-2022-42889-check", "full_name": "eunomie\/cve-2022-42889-check", "owner": { "login": "eunomie", "id": 1542321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1542321?v=4", "html_url": "https:\/\/github.com\/eunomie" }, "html_url": "https:\/\/github.com\/eunomie\/cve-2022-42889-check", "description": null, "fork": false, "created_at": "2022-10-19T06:54:57Z", "updated_at": "2022-10-19T06:57:07Z", "pushed_at": "2022-10-20T12:54:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 554185839, "name": "CVE-2022-42889-text4shell", "full_name": "kljunowsky\/CVE-2022-42889-text4shell", "owner": { "login": "kljunowsky", "id": 104329412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104329412?v=4", "html_url": "https:\/\/github.com\/kljunowsky" }, "html_url": "https:\/\/github.com\/kljunowsky\/CVE-2022-42889-text4shell", "description": "Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.", "fork": false, "created_at": "2022-10-19T11:49:08Z", "updated_at": "2023-03-09T12:59:09Z", "pushed_at": "2023-01-21T01:52:51Z", "stargazers_count": 41, "watchers_count": 41, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache", "bug-bounty", "bug-bounty-hunting", "bugbounty", "bugbounty-tool", "commons-text", "cve-2022-42889", "exploit", "oneliner", "security", "security-tools" ], "visibility": "public", "forks": 8, "watchers": 41, "score": 0 }, { "id": 554436866, "name": "text4shell-scan", "full_name": "securekomodo\/text4shell-scan", "owner": { "login": "securekomodo", "id": 4809643, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4", "html_url": "https:\/\/github.com\/securekomodo" }, "html_url": "https:\/\/github.com\/securekomodo\/text4shell-scan", "description": "A fully automated, accurate, and extensive scanner for finding text4shell RCE CVE-2022-42889", "fork": false, "created_at": "2022-10-19T20:14:22Z", "updated_at": "2023-03-11T12:39:15Z", "pushed_at": "2022-10-20T12:51:08Z", "stargazers_count": 47, "watchers_count": 47, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 47, "score": 0 }, { "id": 554494424, "name": "CVE-2022-42889", "full_name": "neerazz\/CVE-2022-42889", "owner": { "login": "neerazz", "id": 43318996, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43318996?v=4", "html_url": "https:\/\/github.com\/neerazz" }, "html_url": "https:\/\/github.com\/neerazz\/CVE-2022-42889", "description": null, "fork": false, "created_at": "2022-10-19T22:56:12Z", "updated_at": "2022-10-19T22:59:21Z", "pushed_at": "2022-10-19T22:58:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "cve-2022-42889-expliot", "cve-poc" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 554822047, "name": "cve-2022-42889-intercept", "full_name": "uk0\/cve-2022-42889-intercept", "owner": { "login": "uk0", "id": 19545292, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19545292?v=4", "html_url": "https:\/\/github.com\/uk0" }, "html_url": "https:\/\/github.com\/uk0\/cve-2022-42889-intercept", "description": "通过 jvm 启动参数 以及 jps pid进行拦截非法参数", "fork": false, "created_at": "2022-10-20T13:05:24Z", "updated_at": "2022-10-24T03:12:04Z", "pushed_at": "2022-10-21T03:46:50Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889" ], "visibility": "public", "forks": 0, "watchers": 4, "score": 0 }, { "id": 554968542, "name": "text4shell-poc", "full_name": "securekomodo\/text4shell-poc", "owner": { "login": "securekomodo", "id": 4809643, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4809643?v=4", "html_url": "https:\/\/github.com\/securekomodo" }, "html_url": "https:\/\/github.com\/securekomodo\/text4shell-poc", "description": "Proof of Concept Appliction for testing CVE-2022-42889", "fork": false, "created_at": "2022-10-20T18:07:25Z", "updated_at": "2022-12-16T11:39:00Z", "pushed_at": "2022-10-31T16:03:56Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 9, "score": 0 }, { "id": 555394668, "name": "CVE-2022-42889", "full_name": "humbss\/CVE-2022-42889", "owner": { "login": "humbss", "id": 17453152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17453152?v=4", "html_url": "https:\/\/github.com\/humbss" }, "html_url": "https:\/\/github.com\/humbss\/CVE-2022-42889", "description": null, "fork": false, "created_at": "2022-10-21T13:48:04Z", "updated_at": "2022-10-24T03:11:46Z", "pushed_at": "2022-10-21T14:01:47Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 555540963, "name": "Text4ShellPayloads", "full_name": "stavrosgns\/Text4ShellPayloads", "owner": { "login": "stavrosgns", "id": 59849433, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59849433?v=4", "html_url": "https:\/\/github.com\/stavrosgns" }, "html_url": "https:\/\/github.com\/stavrosgns\/Text4ShellPayloads", "description": "This project includes a python script which generates malicious commands leveraging CVE-2022-42889 vulnerability", "fork": false, "created_at": "2022-10-21T19:41:56Z", "updated_at": "2022-10-24T03:11:06Z", "pushed_at": "2022-10-21T19:57:38Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 555646270, "name": "CVE-2022-42889", "full_name": "s3l33\/CVE-2022-42889", "owner": { "login": "s3l33", "id": 60675004, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60675004?v=4", "html_url": "https:\/\/github.com\/s3l33" }, "html_url": "https:\/\/github.com\/s3l33\/CVE-2022-42889", "description": "python script for CVE-2022-42889", "fork": false, "created_at": "2022-10-22T02:06:40Z", "updated_at": "2022-10-25T07:40:16Z", "pushed_at": "2022-10-22T02:53:13Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 555778524, "name": "CVE-2022-42889-Text4Shell-Docker", "full_name": "galoget\/CVE-2022-42889-Text4Shell-Docker", "owner": { "login": "galoget", "id": 8353133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4", "html_url": "https:\/\/github.com\/galoget" }, "html_url": "https:\/\/github.com\/galoget\/CVE-2022-42889-Text4Shell-Docker", "description": "Dockerized PoC for CVE-2022-42889 Text4Shell", "fork": false, "created_at": "2022-10-22T10:01:13Z", "updated_at": "2022-10-22T10:03:23Z", "pushed_at": "2022-10-22T10:03:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 555787805, "name": "CVE-2022-42889-Text4Shell-Exploit-POC", "full_name": "rhitikwadhvana\/CVE-2022-42889-Text4Shell-Exploit-POC", "owner": { "login": "rhitikwadhvana", "id": 51850319, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51850319?v=4", "html_url": "https:\/\/github.com\/rhitikwadhvana" }, "html_url": "https:\/\/github.com\/rhitikwadhvana\/CVE-2022-42889-Text4Shell-Exploit-POC", "description": "CVE-2022-42889 Text4Shell Exploit POC", "fork": false, "created_at": "2022-10-22T10:30:41Z", "updated_at": "2022-12-13T04:44:38Z", "pushed_at": "2022-10-22T10:31:50Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 556131265, "name": "CVE-2022-42889-POC", "full_name": "akshayithape-devops\/CVE-2022-42889-POC", "owner": { "login": "akshayithape-devops", "id": 82793140, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82793140?v=4", "html_url": "https:\/\/github.com\/akshayithape-devops" }, "html_url": "https:\/\/github.com\/akshayithape-devops\/CVE-2022-42889-POC", "description": "A simple dockerize application that shows how to exploit the CVE-2022-42889 vulnerability.", "fork": false, "created_at": "2022-10-23T05:48:48Z", "updated_at": "2022-12-13T04:50:35Z", "pushed_at": "2022-10-23T06:23:03Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0 }, { "id": 556176876, "name": "Apache-Commons-Text-CVE-2022-42889", "full_name": "0xmaximus\/Apache-Commons-Text-CVE-2022-42889", "owner": { "login": "0xmaximus", "id": 63053441, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4", "html_url": "https:\/\/github.com\/0xmaximus" }, "html_url": "https:\/\/github.com\/0xmaximus\/Apache-Commons-Text-CVE-2022-42889", "description": "Apache Text4Shell (CVE-2022-42889) Burp Bounty Profile", "fork": false, "created_at": "2022-10-23T08:33:02Z", "updated_at": "2022-10-23T09:06:13Z", "pushed_at": "2022-10-23T09:02:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "burp-bounty", "burp-extensions", "burp-plugin", "cve-2022-42889", "cve-2022-42889-expliot", "text4shell" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 556199653, "name": "Text4Shell-Scanner", "full_name": "smileostrich\/Text4Shell-Scanner", "owner": { "login": "smileostrich", "id": 68785480, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68785480?v=4", "html_url": "https:\/\/github.com\/smileostrich" }, "html_url": "https:\/\/github.com\/smileostrich\/Text4Shell-Scanner", "description": "Vulnerability Scanner for CVE-2022-42889 (Text4Shell)", "fork": false, "created_at": "2022-10-23T09:45:41Z", "updated_at": "2023-03-05T12:20:30Z", "pushed_at": "2022-10-24T15:00:53Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 556278066, "name": "CVE-2022-42889-text4shell", "full_name": "cxzero\/CVE-2022-42889-text4shell", "owner": { "login": "cxzero", "id": 17437230, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17437230?v=4", "html_url": "https:\/\/github.com\/cxzero" }, "html_url": "https:\/\/github.com\/cxzero\/CVE-2022-42889-text4shell", "description": "CVE-2022-42889 aka Text4Shell research & PoC", "fork": false, "created_at": "2022-10-23T13:42:23Z", "updated_at": "2023-03-08T03:55:59Z", "pushed_at": "2022-10-25T13:32:18Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "poc", "text4shell" ], "visibility": "public", "forks": 3, "watchers": 15, "score": 0 }, { "id": 556824884, "name": "CVE-2022-42889", "full_name": "west-wind\/CVE-2022-42889", "owner": { "login": "west-wind", "id": 32312003, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32312003?v=4", "html_url": "https:\/\/github.com\/west-wind" }, "html_url": "https:\/\/github.com\/west-wind\/CVE-2022-42889", "description": "Text4Shell PoC Exploit ", "fork": false, "created_at": "2022-10-24T15:28:02Z", "updated_at": "2022-10-29T04:49:07Z", "pushed_at": "2022-10-25T09:48:09Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "cve-2022-42889-expliot", "text4shell", "text4shell-detection", "text4shell-exploit", "text4shell-poc-exploit", "text4shell-splunk-query" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 557311667, "name": "text4shell-CVE-2022-42889", "full_name": "Vulnmachines\/text4shell-CVE-2022-42889", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/text4shell-CVE-2022-42889", "description": null, "fork": false, "created_at": "2022-10-25T13:11:24Z", "updated_at": "2022-10-27T08:30:39Z", "pushed_at": "2022-10-25T13:15:32Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 561067220, "name": "CVE-2022-42889", "full_name": "Hack4rLIFE\/CVE-2022-42889", "owner": { "login": "Hack4rLIFE", "id": 103347307, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103347307?v=4", "html_url": "https:\/\/github.com\/Hack4rLIFE" }, "html_url": "https:\/\/github.com\/Hack4rLIFE\/CVE-2022-42889", "description": "CVE-2022-42889 Blind-RCE Nuclei Template", "fork": false, "created_at": "2022-11-02T21:49:55Z", "updated_at": "2022-11-03T19:50:13Z", "pushed_at": "2022-11-02T21:51:15Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 561912100, "name": "CVE-2022-42889-RCE", "full_name": "cryxnet\/CVE-2022-42889-RCE", "owner": { "login": "cryxnet", "id": 75471375, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75471375?v=4", "html_url": "https:\/\/github.com\/cryxnet" }, "html_url": "https:\/\/github.com\/cryxnet\/CVE-2022-42889-RCE", "description": "Proof of Concept for CVE-2022-42889 (Text4Shell Vulnerability) ", "fork": false, "created_at": "2022-11-04T19:26:23Z", "updated_at": "2022-12-19T15:14:33Z", "pushed_at": "2022-11-21T10:17:03Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "exploit", "exploits", "poc", "security", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 8, "score": 0 }, { "id": 562064682, "name": "CVE-2022-42889-PoC", "full_name": "sunnyvale-it\/CVE-2022-42889-PoC", "owner": { "login": "sunnyvale-it", "id": 44291039, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4", "html_url": "https:\/\/github.com\/sunnyvale-it" }, "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2022-42889-PoC", "description": "CVE-2022-42889 (a.k.a. Text4Shell) RCE Proof of Concept", "fork": false, "created_at": "2022-11-05T07:32:51Z", "updated_at": "2022-11-08T14:35:17Z", "pushed_at": "2022-11-07T07:57:01Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 562165502, "name": "cve-2022-42889-jmeter", "full_name": "QAInsights\/cve-2022-42889-jmeter", "owner": { "login": "QAInsights", "id": 2826376, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2826376?v=4", "html_url": "https:\/\/github.com\/QAInsights" }, "html_url": "https:\/\/github.com\/QAInsights\/cve-2022-42889-jmeter", "description": "Script to handle CVE 2022-42889", "fork": false, "created_at": "2022-11-05T14:08:18Z", "updated_at": "2023-03-04T08:49:22Z", "pushed_at": "2022-11-05T15:27:52Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "jmeter" ], "visibility": "public", "forks": 1, "watchers": 8, "score": 0 }, { "id": 562751349, "name": "Text4shell--Automated-exploit---CVE-2022-42889", "full_name": "adarshpv9746\/Text4shell--Automated-exploit---CVE-2022-42889", "owner": { "login": "adarshpv9746", "id": 33172696, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33172696?v=4", "html_url": "https:\/\/github.com\/adarshpv9746" }, "html_url": "https:\/\/github.com\/adarshpv9746\/Text4shell--Automated-exploit---CVE-2022-42889", "description": null, "fork": false, "created_at": "2022-11-07T07:19:49Z", "updated_at": "2022-11-07T07:39:20Z", "pushed_at": "2022-11-07T09:44:18Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 568929458, "name": "Text4shell-exploit", "full_name": "pwnb0y\/Text4shell-exploit", "owner": { "login": "pwnb0y", "id": 96813659, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96813659?v=4", "html_url": "https:\/\/github.com\/pwnb0y" }, "html_url": "https:\/\/github.com\/pwnb0y\/Text4shell-exploit", "description": "Python Script to exploit RCE of CVE-2022-42889 ", "fork": false, "created_at": "2022-11-21T18:01:28Z", "updated_at": "2022-11-22T06:05:51Z", "pushed_at": "2022-11-21T18:17:07Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache-common-text", "cve-2022-42889", "cve-2022-42889-expliot", "java-vulnerability", "rce", "text4shell", "text4shell-exploit" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 575527565, "name": "text4shell-exploit", "full_name": "gokul-ramesh\/text4shell-exploit", "owner": { "login": "gokul-ramesh", "id": 65040016, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65040016?v=4", "html_url": "https:\/\/github.com\/gokul-ramesh" }, "html_url": "https:\/\/github.com\/gokul-ramesh\/text4shell-exploit", "description": "CVE-2022-42889 - Text4Shell exploit", "fork": false, "created_at": "2022-12-07T17:58:59Z", "updated_at": "2023-01-31T12:19:49Z", "pushed_at": "2023-01-14T17:51:35Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-42889", "text4shell", "text4shell-exploit", "text4shell-poc-exploit" ], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 576192155, "name": "text4shellburpscanner", "full_name": "f0ng\/text4shellburpscanner", "owner": { "login": "f0ng", "id": 48286013, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48286013?v=4", "html_url": "https:\/\/github.com\/f0ng" }, "html_url": "https:\/\/github.com\/f0ng\/text4shellburpscanner", "description": "text4shell(CVE-2022-42889) BurpSuite Scanner", "fork": false, "created_at": "2022-12-09T08:18:19Z", "updated_at": "2023-02-10T17:11:32Z", "pushed_at": "2022-12-09T09:08:13Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "burp", "burp-extensions" ], "visibility": "public", "forks": 0, "watchers": 14, "score": 0 }, { "id": 603867876, "name": "vtrade-common", "full_name": "WFS-Mend\/vtrade-common", "owner": { "login": "WFS-Mend", "id": 125828953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125828953?v=4", "html_url": "https:\/\/github.com\/WFS-Mend" }, "html_url": "https:\/\/github.com\/WFS-Mend\/vtrade-common", "description": "https:\/\/github.com\/karthikuj\/cve-2022-42889-text4shell-docker.git", "fork": false, "created_at": "2023-02-19T19:49:41Z", "updated_at": "2023-02-19T20:21:31Z", "pushed_at": "2023-03-03T22:41:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 607430692, "name": "text4shell-cve-2022-42889", "full_name": "devenes\/text4shell-cve-2022-42889", "owner": { "login": "devenes", "id": 66560757, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66560757?v=4", "html_url": "https:\/\/github.com\/devenes" }, "html_url": "https:\/\/github.com\/devenes\/text4shell-cve-2022-42889", "description": "Kubernetes Lab for CVE-2022-42889", "fork": false, "created_at": "2023-02-28T00:32:01Z", "updated_at": "2023-02-28T01:34:25Z", "pushed_at": "2023-02-28T11:43:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 608352501, "name": "text4shell", "full_name": "hotblac\/text4shell", "owner": { "login": "hotblac", "id": 4406140, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4406140?v=4", "html_url": "https:\/\/github.com\/hotblac" }, "html_url": "https:\/\/github.com\/hotblac\/text4shell", "description": "A demonstration of CVE-2022-42889 (text4shell) remote code execution vulnerability", "fork": false, "created_at": "2023-03-01T20:56:37Z", "updated_at": "2023-03-01T20:57:17Z", "pushed_at": "2023-03-11T14:41:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]