[ { "id": 475776212, "name": "Spring4Shell-POC", "full_name": "BobTheShoplifter\/Spring4Shell-POC", "owner": { "login": "BobTheShoplifter", "id": 22559547, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22559547?v=4", "html_url": "https:\/\/github.com\/BobTheShoplifter" }, "html_url": "https:\/\/github.com\/BobTheShoplifter\/Spring4Shell-POC", "description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965", "fork": false, "created_at": "2022-03-30T07:54:45Z", "updated_at": "2022-05-18T15:59:45Z", "pushed_at": "2022-05-18T18:27:36Z", "stargazers_count": 268, "watchers_count": 268, "forks_count": 83, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22965", "java", "rce", "spring", "spring-core-rce", "spring4shell", "springshell", "tomcat" ], "visibility": "public", "forks": 83, "watchers": 268, "score": 0 }, { "id": 475918792, "name": "spring-core-rce", "full_name": "Mr-xn\/spring-core-rce", "owner": { "login": "Mr-xn", "id": 18260135, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", "html_url": "https:\/\/github.com\/Mr-xn" }, "html_url": "https:\/\/github.com\/Mr-xn\/spring-core-rce", "description": "CVE-2022-22965 : about spring core rce", "fork": false, "created_at": "2022-03-30T14:35:00Z", "updated_at": "2022-04-24T15:15:19Z", "pushed_at": "2022-04-01T15:34:03Z", "stargazers_count": 49, "watchers_count": 49, "forks_count": 16, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22965", "spring", "spring-mvc", "spring-security" ], "visibility": "public", "forks": 16, "watchers": 49, "score": 0 }, { "id": 475975991, "name": "SpringShell", "full_name": "TheGejr\/SpringShell", "owner": { "login": "TheGejr", "id": 7090568, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7090568?v=4", "html_url": "https:\/\/github.com\/TheGejr" }, "html_url": "https:\/\/github.com\/TheGejr\/SpringShell", "description": "Spring4Shell - Spring Core RCE - CVE-2022-22965", "fork": false, "created_at": "2022-03-30T17:05:46Z", "updated_at": "2022-05-14T04:03:36Z", "pushed_at": "2022-04-04T14:09:11Z", "stargazers_count": 92, "watchers_count": 92, "forks_count": 78, "allow_forking": true, "is_template": false, "topics": [ "cve", "cve-2022-22965", "rce", "spring", "spring-core-rce", "spring-security", "spring4shell", "springcore", "springshell", "working-example" ], "visibility": "public", "forks": 78, "watchers": 92, "score": 0 }, { "id": 476094464, "name": "Spring4Shell-POC", "full_name": "reznok\/Spring4Shell-POC", "owner": { "login": "reznok", "id": 23696484, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23696484?v=4", "html_url": "https:\/\/github.com\/reznok" }, "html_url": "https:\/\/github.com\/reznok\/Spring4Shell-POC", "description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit", "fork": false, "created_at": "2022-03-31T00:24:28Z", "updated_at": "2022-05-18T23:16:25Z", "pushed_at": "2022-04-05T16:02:33Z", "stargazers_count": 235, "watchers_count": 235, "forks_count": 195, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 195, "watchers": 235, "score": 0 }, { "id": 476115414, "name": "CVE-2022-22965-GUItools", "full_name": "light-Life\/CVE-2022-22965-GUItools", "owner": { "login": "light-Life", "id": 53685855, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4", "html_url": "https:\/\/github.com\/light-Life" }, "html_url": "https:\/\/github.com\/light-Life\/CVE-2022-22965-GUItools", "description": "spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出", "fork": false, "created_at": "2022-03-31T02:00:18Z", "updated_at": "2022-05-14T23:34:36Z", "pushed_at": "2022-04-02T15:29:31Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 18, "score": 0 }, { "id": 476210489, "name": "springshell-rce-poc", "full_name": "DDuarte\/springshell-rce-poc", "owner": { "login": "DDuarte", "id": 530940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/530940?v=4", "html_url": "https:\/\/github.com\/DDuarte" }, "html_url": "https:\/\/github.com\/DDuarte\/springshell-rce-poc", "description": "CVE-2022-22965 - CVE-2010-1622 redux", "fork": false, "created_at": "2022-03-31T08:06:46Z", "updated_at": "2022-04-12T14:48:42Z", "pushed_at": "2022-04-04T14:45:31Z", "stargazers_count": 20, "watchers_count": 20, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [ "cve-2010-1622", "cve-2022-22965", "spring4shell", "springshell" ], "visibility": "public", "forks": 9, "watchers": 20, "score": 0 }, { "id": 476300392, "name": "spring-core-rce", "full_name": "k3rwin\/spring-core-rce", "owner": { "login": "k3rwin", "id": 59213152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4", "html_url": "https:\/\/github.com\/k3rwin" }, "html_url": "https:\/\/github.com\/k3rwin\/spring-core-rce", "description": "spring框架RCE漏洞 CVE-2022-22965", "fork": false, "created_at": "2022-03-31T12:41:29Z", "updated_at": "2022-04-21T03:49:56Z", "pushed_at": "2022-04-22T07:37:16Z", "stargazers_count": 24, "watchers_count": 24, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 24, "score": 0 }, { "id": 476308143, "name": "spring-core-rce", "full_name": "liangyueliangyue\/spring-core-rce", "owner": { "login": "liangyueliangyue", "id": 73013511, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73013511?v=4", "html_url": "https:\/\/github.com\/liangyueliangyue" }, "html_url": "https:\/\/github.com\/liangyueliangyue\/spring-core-rce", "description": "springFramework_CVE-2022-22965_RCE简单利用", "fork": false, "created_at": "2022-03-31T13:02:18Z", "updated_at": "2022-04-27T02:56:25Z", "pushed_at": "2022-04-07T10:28:11Z", "stargazers_count": 24, "watchers_count": 24, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 24, "score": 0 }, { "id": 476315234, "name": "CVE-2022-22965-PoC", "full_name": "Kirill89\/CVE-2022-22965-PoC", "owner": { "login": "Kirill89", "id": 2003936, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4", "html_url": "https:\/\/github.com\/Kirill89" }, "html_url": "https:\/\/github.com\/Kirill89\/CVE-2022-22965-PoC", "description": null, "fork": false, "created_at": "2022-03-31T13:21:49Z", "updated_at": "2022-04-27T02:11:33Z", "pushed_at": "2022-04-05T21:30:19Z", "stargazers_count": 23, "watchers_count": 23, "forks_count": 21, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 21, "watchers": 23, "score": 0 }, { "id": 476355522, "name": "spring4shell-exploit-poc", "full_name": "FourCoreLabs\/spring4shell-exploit-poc", "owner": { "login": "FourCoreLabs", "id": 75159435, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75159435?v=4", "html_url": "https:\/\/github.com\/FourCoreLabs" }, "html_url": "https:\/\/github.com\/FourCoreLabs\/spring4shell-exploit-poc", "description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.", "fork": false, "created_at": "2022-03-31T15:01:12Z", "updated_at": "2022-04-17T12:48:26Z", "pushed_at": "2022-04-06T15:00:14Z", "stargazers_count": 35, "watchers_count": 35, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 35, "score": 0 }, { "id": 476372267, "name": "CVE-2022-22965_PoC", "full_name": "alt3kx\/CVE-2022-22965_PoC", "owner": { "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "html_url": "https:\/\/github.com\/alt3kx" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-22965_PoC", "description": "Spring Framework RCE (Quick pentest notes)", "fork": false, "created_at": "2022-03-31T15:43:06Z", "updated_at": "2022-04-16T15:03:12Z", "pushed_at": "2022-04-07T19:12:38Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 16, "score": 0 }, { "id": 476384052, "name": "CVE-2022-22965", "full_name": "GuayoyoCyber\/CVE-2022-22965", "owner": { "login": "GuayoyoCyber", "id": 17362318, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4", "html_url": "https:\/\/github.com\/GuayoyoCyber" }, "html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2022-22965", "description": "Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka \"Spring4Shell\")", "fork": false, "created_at": "2022-03-31T16:14:36Z", "updated_at": "2022-04-24T08:10:05Z", "pushed_at": "2022-04-19T15:05:47Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22965", "spring-framework", "spring4shell", "vulnerability", "wazuh" ], "visibility": "public", "forks": 3, "watchers": 6, "score": 0 }, { "id": 476399976, "name": "Safer_PoC_CVE-2022-22965", "full_name": "colincowie\/Safer_PoC_CVE-2022-22965", "owner": { "login": "colincowie", "id": 14298667, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14298667?v=4", "html_url": "https:\/\/github.com\/colincowie" }, "html_url": "https:\/\/github.com\/colincowie\/Safer_PoC_CVE-2022-22965", "description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)", "fork": false, "created_at": "2022-03-31T16:58:56Z", "updated_at": "2022-05-14T23:33:55Z", "pushed_at": "2022-04-04T15:58:37Z", "stargazers_count": 45, "watchers_count": 45, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 45, "score": 0 }, { "id": 476424726, "name": "spring4shell-CVE-2022-22965", "full_name": "rwincey\/spring4shell-CVE-2022-22965", "owner": { "login": "rwincey", "id": 5438659, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4", "html_url": "https:\/\/github.com\/rwincey" }, "html_url": "https:\/\/github.com\/rwincey\/spring4shell-CVE-2022-22965", "description": null, "fork": false, "created_at": "2022-03-31T18:09:58Z", "updated_at": "2022-04-04T14:13:42Z", "pushed_at": "2022-04-01T13:59:13Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 476446818, "name": "CVE-2022-22965-poc", "full_name": "viniciuspereiras\/CVE-2022-22965-poc", "owner": { "login": "viniciuspereiras", "id": 69733777, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69733777?v=4", "html_url": "https:\/\/github.com\/viniciuspereiras" }, "html_url": "https:\/\/github.com\/viniciuspereiras\/CVE-2022-22965-poc", "description": "CVE-2022-22965 poc including reverse-shell support", "fork": false, "created_at": "2022-03-31T19:19:52Z", "updated_at": "2022-04-25T07:43:27Z", "pushed_at": "2022-04-01T14:21:55Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 16, "score": 0 }, { "id": 476522206, "name": "springhound", "full_name": "mebibite\/springhound", "owner": { "login": "mebibite", "id": 54244269, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4", "html_url": "https:\/\/github.com\/mebibite" }, "html_url": "https:\/\/github.com\/mebibite\/springhound", "description": "Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files.", "fork": false, "created_at": "2022-04-01T00:34:29Z", "updated_at": "2022-04-01T00:47:30Z", "pushed_at": "2022-04-01T00:42:35Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 476546576, "name": "CVE-2022-22965", "full_name": "likewhite\/CVE-2022-22965", "owner": { "login": "likewhite", "id": 68556929, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68556929?v=4", "html_url": "https:\/\/github.com\/likewhite" }, "html_url": "https:\/\/github.com\/likewhite\/CVE-2022-22965", "description": "CVE-2022-22965 EXP", "fork": false, "created_at": "2022-04-01T02:25:46Z", "updated_at": "2022-04-01T07:48:56Z", "pushed_at": "2022-04-01T02:39:34Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 476577644, "name": "SpringFramework_CVE-2022-22965_RCE", "full_name": "Axx8\/SpringFramework_CVE-2022-22965_RCE", "owner": { "login": "Axx8", "id": 34683107, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34683107?v=4", "html_url": "https:\/\/github.com\/Axx8" }, "html_url": "https:\/\/github.com\/Axx8\/SpringFramework_CVE-2022-22965_RCE", "description": "SpringFramework 远程代码执行漏洞CVE-2022-22965", "fork": false, "created_at": "2022-04-01T04:51:44Z", "updated_at": "2022-05-17T13:19:56Z", "pushed_at": "2022-04-01T12:08:45Z", "stargazers_count": 35, "watchers_count": 35, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 35, "score": 0 }, { "id": 476597168, "name": "spring-boot-cve-2022-22965", "full_name": "snicoll-scratches\/spring-boot-cve-2022-22965", "owner": { "login": "snicoll-scratches", "id": 13015101, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13015101?v=4", "html_url": "https:\/\/github.com\/snicoll-scratches" }, "html_url": "https:\/\/github.com\/snicoll-scratches\/spring-boot-cve-2022-22965", "description": "Showcase of overridding the Spring Framework version in older Spring Boot versions", "fork": false, "created_at": "2022-04-01T06:16:20Z", "updated_at": "2022-04-01T06:44:44Z", "pushed_at": "2022-04-13T14:45:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 476606565, "name": "CVE-2022-22965", "full_name": "nu0l\/CVE-2022-22965", "owner": { "login": "nu0l", "id": 54735907, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54735907?v=4", "html_url": "https:\/\/github.com\/nu0l" }, "html_url": "https:\/\/github.com\/nu0l\/CVE-2022-22965", "description": "Spring-0day\/CVE-2022-22965", "fork": false, "created_at": "2022-04-01T06:50:21Z", "updated_at": "2022-04-05T12:12:05Z", "pushed_at": "2022-04-08T04:24:30Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 476626448, "name": "CVE-2022-22965-Spring-Core-Rce", "full_name": "tangxiaofeng7\/CVE-2022-22965-Spring-Core-Rce", "owner": { "login": "tangxiaofeng7", "id": 45926593, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4", "html_url": "https:\/\/github.com\/tangxiaofeng7" }, "html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2022-22965-Spring-Core-Rce", "description": "批量无损检测CVE-2022-22965", "fork": false, "created_at": "2022-04-01T07:55:26Z", "updated_at": "2022-05-05T03:04:09Z", "pushed_at": "2022-04-01T08:44:19Z", "stargazers_count": 28, "watchers_count": 28, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 28, "score": 0 }, { "id": 476639788, "name": "CVE-2022-22965-POC", "full_name": "chaosec2021\/CVE-2022-22965-POC", "owner": { "login": "chaosec2021", "id": 75511051, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75511051?v=4", "html_url": "https:\/\/github.com\/chaosec2021" }, "html_url": "https:\/\/github.com\/chaosec2021\/CVE-2022-22965-POC", "description": "CVE-2022-22965 spring-core批量检测脚本", "fork": false, "created_at": "2022-04-01T08:37:00Z", "updated_at": "2022-05-11T12:17:59Z", "pushed_at": "2022-04-01T08:42:26Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 8, "score": 0 }, { "id": 476681722, "name": "CVE-2022-22965", "full_name": "lcarea\/CVE-2022-22965", "owner": { "login": "lcarea", "id": 59819921, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59819921?v=4", "html_url": "https:\/\/github.com\/lcarea" }, "html_url": "https:\/\/github.com\/lcarea\/CVE-2022-22965", "description": null, "fork": false, "created_at": "2022-04-01T10:51:05Z", "updated_at": "2022-04-01T11:11:14Z", "pushed_at": "2022-04-01T11:19:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 476708454, "name": "CVE-2022-22965", "full_name": "Joe1sn\/CVE-2022-22965", "owner": { "login": "Joe1sn", "id": 37005640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37005640?v=4", "html_url": "https:\/\/github.com\/Joe1sn" }, "html_url": "https:\/\/github.com\/Joe1sn\/CVE-2022-22965", "description": "CVE-2022-22965 Environment", "fork": false, "created_at": "2022-04-01T12:18:29Z", "updated_at": "2022-04-02T02:08:46Z", "pushed_at": "2022-04-02T09:50:34Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 476714401, "name": "CVE-2022-22965", "full_name": "zer0yu\/CVE-2022-22965", "owner": { "login": "zer0yu", "id": 16551733, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16551733?v=4", "html_url": "https:\/\/github.com\/zer0yu" }, "html_url": "https:\/\/github.com\/zer0yu\/CVE-2022-22965", "description": "Spring4Shell (CVE-2022-22965)", "fork": false, "created_at": "2022-04-01T12:37:32Z", "updated_at": "2022-04-13T04:23:45Z", "pushed_at": "2022-04-07T11:46:54Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 7, "score": 0 }, { "id": 476734390, "name": "CVE-2022-22965", "full_name": "me2nuk\/CVE-2022-22965", "owner": { "login": "me2nuk", "id": 57348147, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57348147?v=4", "html_url": "https:\/\/github.com\/me2nuk" }, "html_url": "https:\/\/github.com\/me2nuk\/CVE-2022-22965", "description": "Spring Framework RCE via Data Binding on JDK 9+ \/ spring4shell \/ CVE-2022-22965", "fork": false, "created_at": "2022-04-01T13:35:01Z", "updated_at": "2022-04-06T08:35:57Z", "pushed_at": "2022-04-04T01:16:41Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 4, "score": 0 }, { "id": 476738410, "name": "spring-framework-rce", "full_name": "wshon\/spring-framework-rce", "owner": { "login": "wshon", "id": 16683806, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16683806?v=4", "html_url": "https:\/\/github.com\/wshon" }, "html_url": "https:\/\/github.com\/wshon\/spring-framework-rce", "description": "CVE-2022-22965", "fork": false, "created_at": "2022-04-01T13:46:55Z", "updated_at": "2022-04-02T12:40:55Z", "pushed_at": "2022-04-01T14:31:35Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 476934750, "name": "CVE-2022-22965", "full_name": "Wrin9\/CVE-2022-22965", "owner": { "login": "Wrin9", "id": 54984589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4", "html_url": "https:\/\/github.com\/Wrin9" }, "html_url": "https:\/\/github.com\/Wrin9\/CVE-2022-22965", "description": "CVE-2022-22965 POC", "fork": false, "created_at": "2022-04-02T03:17:48Z", "updated_at": "2022-05-07T05:45:45Z", "pushed_at": "2022-04-02T08:45:17Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 7, "score": 0 }, { "id": 477004407, "name": "CVE-2022-22965_Spring_Core_RCE", "full_name": "wjl110\/CVE-2022-22965_Spring_Core_RCE", "owner": { "login": "wjl110", "id": 53851034, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53851034?v=4", "html_url": "https:\/\/github.com\/wjl110" }, "html_url": "https:\/\/github.com\/wjl110\/CVE-2022-22965_Spring_Core_RCE", "description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用", "fork": false, "created_at": "2022-04-02T09:13:54Z", "updated_at": "2022-05-14T23:33:13Z", "pushed_at": "2022-04-02T10:14:11Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 7, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 6, "score": 0 }, { "id": 477155956, "name": "cve-2022-22965", "full_name": "mwojterski\/cve-2022-22965", "owner": { "login": "mwojterski", "id": 474439, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/474439?v=4", "html_url": "https:\/\/github.com\/mwojterski" }, "html_url": "https:\/\/github.com\/mwojterski\/cve-2022-22965", "description": null, "fork": false, "created_at": "2022-04-02T19:47:47Z", "updated_at": "2022-04-24T11:43:48Z", "pushed_at": "2022-04-02T20:23:06Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 477210316, "name": "nmap-spring4shell", "full_name": "gpiechnik2\/nmap-spring4shell", "owner": { "login": "gpiechnik2", "id": 48253270, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4", "html_url": "https:\/\/github.com\/gpiechnik2" }, "html_url": "https:\/\/github.com\/gpiechnik2\/nmap-spring4shell", "description": "Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965) ", "fork": false, "created_at": "2022-04-03T01:27:28Z", "updated_at": "2022-05-12T15:42:24Z", "pushed_at": "2022-04-08T19:24:41Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22965", "exploit", "nmap", "nmap-scripts", "spring4shell", "vulnerability" ], "visibility": "public", "forks": 3, "watchers": 2, "score": 0 }, { "id": 477260087, "name": "CVE-2022-22965", "full_name": "itsecurityco\/CVE-2022-22965", "owner": { "login": "itsecurityco", "id": 1725054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4", "html_url": "https:\/\/github.com\/itsecurityco" }, "html_url": "https:\/\/github.com\/itsecurityco\/CVE-2022-22965", "description": "Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5", "fork": false, "created_at": "2022-04-03T06:43:07Z", "updated_at": "2022-05-09T15:07:48Z", "pushed_at": "2022-04-03T08:38:30Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 7, "score": 0 }, { "id": 477654438, "name": "Invoke-CVE-2022-22965-SafeCheck", "full_name": "daniel0x00\/Invoke-CVE-2022-22965-SafeCheck", "owner": { "login": "daniel0x00", "id": 6474092, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6474092?v=4", "html_url": "https:\/\/github.com\/daniel0x00" }, "html_url": "https:\/\/github.com\/daniel0x00\/Invoke-CVE-2022-22965-SafeCheck", "description": "PowerShell port of CVE-2022-22965 vulnerability check by colincowie.", "fork": false, "created_at": "2022-04-04T10:37:27Z", "updated_at": "2022-04-06T01:28:01Z", "pushed_at": "2022-04-04T18:55:02Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22965", "powershell", "vulnerability-detection" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 477716252, "name": "spring4shell_victim", "full_name": "fracturelabs\/spring4shell_victim", "owner": { "login": "fracturelabs", "id": 38447921, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38447921?v=4", "html_url": "https:\/\/github.com\/fracturelabs" }, "html_url": "https:\/\/github.com\/fracturelabs\/spring4shell_victim", "description": "Intentionally vulnerable Spring app to test CVE-2022-22965", "fork": false, "created_at": "2022-04-04T13:35:56Z", "updated_at": "2022-04-08T22:06:28Z", "pushed_at": "2022-04-07T03:56:37Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 477719633, "name": "CVE-2022-22965-PoC", "full_name": "sunnyvale-it\/CVE-2022-22965-PoC", "owner": { "login": "sunnyvale-it", "id": 44291039, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4", "html_url": "https:\/\/github.com\/sunnyvale-it" }, "html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2022-22965-PoC", "description": "CVE-2022-22965 (Spring4Shell) Proof of Concept", "fork": false, "created_at": "2022-04-04T13:44:39Z", "updated_at": "2022-04-06T06:38:06Z", "pushed_at": "2022-04-05T13:19:53Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve", "cve-2022-22965", "cybersecurity", "spring4shell", "spring4shell-poc" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 477788509, "name": "cve-2022-22965", "full_name": "twseptian\/cve-2022-22965", "owner": { "login": "twseptian", "id": 9025301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4", "html_url": "https:\/\/github.com\/twseptian" }, "html_url": "https:\/\/github.com\/twseptian\/cve-2022-22965", "description": "Spring4Shell - CVE-2022-22965", "fork": false, "created_at": "2022-04-04T16:43:03Z", "updated_at": "2022-05-05T10:53:21Z", "pushed_at": "2022-04-04T16:54:37Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22965", "spring-framework-vulnerability", "spring4shell", "spring4shell-poc" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 477858835, "name": "Spring4shell-CVE-2022-22965-POC", "full_name": "netcode\/Spring4shell-CVE-2022-22965-POC", "owner": { "login": "netcode", "id": 286371, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/286371?v=4", "html_url": "https:\/\/github.com\/netcode" }, "html_url": "https:\/\/github.com\/netcode\/Spring4shell-CVE-2022-22965-POC", "description": "Another spring4shell (Spring core RCE) POC", "fork": false, "created_at": "2022-04-04T20:16:06Z", "updated_at": "2022-04-04T21:09:58Z", "pushed_at": "2022-04-04T21:11:13Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 2, "score": 0 }, { "id": 477871854, "name": "go-scan-spring", "full_name": "fracturelabs\/go-scan-spring", "owner": { "login": "fracturelabs", "id": 38447921, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38447921?v=4", "html_url": "https:\/\/github.com\/fracturelabs" }, "html_url": "https:\/\/github.com\/fracturelabs\/go-scan-spring", "description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)", "fork": false, "created_at": "2022-04-04T21:01:26Z", "updated_at": "2022-05-17T01:58:50Z", "pushed_at": "2022-04-07T16:04:53Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 10, "score": 0 }, { "id": 478060944, "name": "spring-shell-vuln", "full_name": "Snip3R69\/spring-shell-vuln", "owner": { "login": "Snip3R69", "id": 76834257, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76834257?v=4", "html_url": "https:\/\/github.com\/Snip3R69" }, "html_url": "https:\/\/github.com\/Snip3R69\/spring-shell-vuln", "description": "Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.", "fork": false, "created_at": "2022-04-05T09:35:41Z", "updated_at": "2022-04-05T09:35:41Z", "pushed_at": "2022-04-05T10:23:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 478183839, "name": "CVE-2022-22965", "full_name": "xnderLAN\/CVE-2022-22965", "owner": { "login": "xnderLAN", "id": 34516928, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34516928?v=4", "html_url": "https:\/\/github.com\/xnderLAN" }, "html_url": "https:\/\/github.com\/xnderLAN\/CVE-2022-22965", "description": "Spring4Shell is a critical RCE vulnerability in the Java Spring Framework and is one of three related vulnerabilities published on March 30", "fork": false, "created_at": "2022-04-05T15:12:15Z", "updated_at": "2022-04-05T15:14:50Z", "pushed_at": "2022-04-05T15:14:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 478195147, "name": "CVE-2022-22965", "full_name": "luoqianlin\/CVE-2022-22965", "owner": { "login": "luoqianlin", "id": 7350800, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7350800?v=4", "html_url": "https:\/\/github.com\/luoqianlin" }, "html_url": "https:\/\/github.com\/luoqianlin\/CVE-2022-22965", "description": "Spring Framework RCE Exploit", "fork": false, "created_at": "2022-04-05T15:41:26Z", "updated_at": "2022-04-05T15:59:01Z", "pushed_at": "2022-04-05T15:58:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 478196909, "name": "CVE-2022-22965", "full_name": "robiul-awal\/CVE-2022-22965", "owner": { "login": "robiul-awal", "id": 100078094, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100078094?v=4", "html_url": "https:\/\/github.com\/robiul-awal" }, "html_url": "https:\/\/github.com\/robiul-awal\/CVE-2022-22965", "description": "Exploit Of Spring4Shell!", "fork": false, "created_at": "2022-04-05T15:45:47Z", "updated_at": "2022-04-11T18:42:02Z", "pushed_at": "2022-04-05T15:50:19Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 478291981, "name": "CVE-2022-22965_Spring4Shell", "full_name": "LudovicPatho\/CVE-2022-22965_Spring4Shell", "owner": { "login": "LudovicPatho", "id": 26960886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4", "html_url": "https:\/\/github.com\/LudovicPatho" }, "html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2022-22965_Spring4Shell", "description": "A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.", "fork": false, "created_at": "2022-04-05T20:34:36Z", "updated_at": "2022-04-06T02:05:28Z", "pushed_at": "2022-04-05T20:53:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 478371148, "name": "irule-cve-2022-22965", "full_name": "irgoncalves\/irule-cve-2022-22965", "owner": { "login": "irgoncalves", "id": 23459099, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23459099?v=4", "html_url": "https:\/\/github.com\/irgoncalves" }, "html_url": "https:\/\/github.com\/irgoncalves\/irule-cve-2022-22965", "description": null, "fork": false, "created_at": "2022-04-06T02:17:36Z", "updated_at": "2022-04-06T20:12:07Z", "pushed_at": "2022-04-06T20:15:51Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 478399832, "name": "spring-rec-demo", "full_name": "datawiza-inc\/spring-rec-demo", "owner": { "login": "datawiza-inc", "id": 57022507, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57022507?v=4", "html_url": "https:\/\/github.com\/datawiza-inc" }, "html_url": "https:\/\/github.com\/datawiza-inc\/spring-rec-demo", "description": "The demo code showing the recent Spring4Shell RCE (CVE-2022-22965)", "fork": false, "created_at": "2022-04-06T04:17:51Z", "updated_at": "2022-04-26T19:31:44Z", "pushed_at": "2022-04-07T06:52:39Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 478766830, "name": "CVE-2022-22965", "full_name": "alt3kx\/CVE-2022-22965", "owner": { "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "html_url": "https:\/\/github.com\/alt3kx" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-22965", "description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)", "fork": false, "created_at": "2022-04-07T00:08:16Z", "updated_at": "2022-05-05T02:15:39Z", "pushed_at": "2022-04-07T23:00:29Z", "stargazers_count": 90, "watchers_count": 90, "forks_count": 18, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 18, "watchers": 90, "score": 0 }, { "id": 478798941, "name": "springboot_CVE-2022-22965", "full_name": "wikiZ\/springboot_CVE-2022-22965", "owner": { "login": "wikiZ", "id": 37897216, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37897216?v=4", "html_url": "https:\/\/github.com\/wikiZ" }, "html_url": "https:\/\/github.com\/wikiZ\/springboot_CVE-2022-22965", "description": "CVE-2022-22965 pocsuite3 POC", "fork": false, "created_at": "2022-04-07T02:30:26Z", "updated_at": "2022-05-17T07:37:17Z", "pushed_at": "2022-04-07T02:31:28Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 478817916, "name": "spring4shell_behinder", "full_name": "4nth0ny1130\/spring4shell_behinder", "owner": { "login": "4nth0ny1130", "id": 73661290, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73661290?v=4", "html_url": "https:\/\/github.com\/4nth0ny1130" }, "html_url": "https:\/\/github.com\/4nth0ny1130\/spring4shell_behinder", "description": "CVE-2022-22965写入冰蝎webshell脚本", "fork": false, "created_at": "2022-04-07T03:50:14Z", "updated_at": "2022-05-14T11:40:41Z", "pushed_at": "2022-05-10T03:54:23Z", "stargazers_count": 36, "watchers_count": 36, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 36, "score": 0 }, { "id": 478909815, "name": "Spring4ShellPoC", "full_name": "t3amj3ff\/Spring4ShellPoC", "owner": { "login": "t3amj3ff", "id": 46841774, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46841774?v=4", "html_url": "https:\/\/github.com\/t3amj3ff" }, "html_url": "https:\/\/github.com\/t3amj3ff\/Spring4ShellPoC", "description": "Spring4Shell PoC (CVE-2022-22965)", "fork": false, "created_at": "2022-04-07T09:13:11Z", "updated_at": "2022-04-07T09:21:07Z", "pushed_at": "2022-04-08T09:21:16Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 479042800, "name": "CVE-2022-22965-PoC_Payara", "full_name": "CalumHutton\/CVE-2022-22965-PoC_Payara", "owner": { "login": "CalumHutton", "id": 89394440, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89394440?v=4", "html_url": "https:\/\/github.com\/CalumHutton" }, "html_url": "https:\/\/github.com\/CalumHutton\/CVE-2022-22965-PoC_Payara", "description": null, "fork": false, "created_at": "2022-04-07T15:26:15Z", "updated_at": "2022-04-08T12:25:13Z", "pushed_at": "2022-04-08T12:16:46Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 479110196, "name": "CVE-2022-22965_SpringShell", "full_name": "Will-Beninger\/CVE-2022-22965_SpringShell", "owner": { "login": "Will-Beninger", "id": 2590379, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2590379?v=4", "html_url": "https:\/\/github.com\/Will-Beninger" }, "html_url": "https:\/\/github.com\/Will-Beninger\/CVE-2022-22965_SpringShell", "description": null, "fork": false, "created_at": "2022-04-07T18:48:43Z", "updated_at": "2022-04-07T18:55:43Z", "pushed_at": "2022-04-07T21:07:17Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 479655916, "name": "CVE-2022-22965-susceptibility", "full_name": "fransvanbuul\/CVE-2022-22965-susceptibility", "owner": { "login": "fransvanbuul", "id": 4709666, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4709666?v=4", "html_url": "https:\/\/github.com\/fransvanbuul" }, "html_url": "https:\/\/github.com\/fransvanbuul\/CVE-2022-22965-susceptibility", "description": null, "fork": false, "created_at": "2022-04-09T07:45:08Z", "updated_at": "2022-04-09T07:51:56Z", "pushed_at": "2022-04-09T07:51:53Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 479667984, "name": "Spring4Shell-CVE-2022-22965.py", "full_name": "jrgdiaz\/Spring4Shell-CVE-2022-22965.py", "owner": { "login": "jrgdiaz", "id": 17464377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17464377?v=4", "html_url": "https:\/\/github.com\/jrgdiaz" }, "html_url": "https:\/\/github.com\/jrgdiaz\/Spring4Shell-CVE-2022-22965.py", "description": "Script to check for Spring4Shell vulnerability", "fork": false, "created_at": "2022-04-09T08:40:49Z", "updated_at": "2022-04-13T03:32:59Z", "pushed_at": "2022-04-11T15:50:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 480373364, "name": "Spring4Shell", "full_name": "Loneyers\/Spring4Shell", "owner": { "login": "Loneyers", "id": 29177120, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29177120?v=4", "html_url": "https:\/\/github.com\/Loneyers" }, "html_url": "https:\/\/github.com\/Loneyers\/Spring4Shell", "description": "Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Plugin", "fork": false, "created_at": "2022-04-11T12:37:58Z", "updated_at": "2022-04-14T10:23:41Z", "pushed_at": "2022-04-11T12:39:39Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 480857529, "name": "CVE-2022-22965", "full_name": "0zvxr\/CVE-2022-22965", "owner": { "login": "0zvxr", "id": 44880203, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44880203?v=4", "html_url": "https:\/\/github.com\/0zvxr" }, "html_url": "https:\/\/github.com\/0zvxr\/CVE-2022-22965", "description": "spring4shell | CVE-2022-22965", "fork": false, "created_at": "2022-04-12T14:59:42Z", "updated_at": "2022-05-04T22:28:37Z", "pushed_at": "2022-04-13T14:44:51Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "cve", "cve-2022-22965", "exploit", "pentesting", "spring-framework", "tomcat" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 481013803, "name": "-Spring4Shell-CVE-2022-22965-", "full_name": "Omaraitbenhaddi\/-Spring4Shell-CVE-2022-22965-", "owner": { "login": "Omaraitbenhaddi", "id": 88466716, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88466716?v=4", "html_url": "https:\/\/github.com\/Omaraitbenhaddi" }, "html_url": "https:\/\/github.com\/Omaraitbenhaddi\/-Spring4Shell-CVE-2022-22965-", "description": "exploitation script tryhackme ", "fork": false, "created_at": "2022-04-13T00:15:55Z", "updated_at": "2022-04-13T00:18:45Z", "pushed_at": "2022-04-13T00:19:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 484003361, "name": "CVE-2022-22965_PoC", "full_name": "c4mx\/CVE-2022-22965_PoC", "owner": { "login": "c4mx", "id": 16646683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16646683?v=4", "html_url": "https:\/\/github.com\/c4mx" }, "html_url": "https:\/\/github.com\/c4mx\/CVE-2022-22965_PoC", "description": null, "fork": false, "created_at": "2022-04-21T10:17:42Z", "updated_at": "2022-04-21T10:18:51Z", "pushed_at": "2022-04-21T10:18:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 484697115, "name": "CVE-2022-22965", "full_name": "mariomamo\/CVE-2022-22965", "owner": { "login": "mariomamo", "id": 45656028, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45656028?v=4", "html_url": "https:\/\/github.com\/mariomamo" }, "html_url": "https:\/\/github.com\/mariomamo\/CVE-2022-22965", "description": null, "fork": false, "created_at": "2022-04-23T09:01:22Z", "updated_at": "2022-04-30T18:26:48Z", "pushed_at": "2022-04-28T13:25:08Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 4, "score": 0 }, { "id": 486099149, "name": "CVE-2022-22965", "full_name": "khidottrivi\/CVE-2022-22965", "owner": { "login": "khidottrivi", "id": 59863567, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59863567?v=4", "html_url": "https:\/\/github.com\/khidottrivi" }, "html_url": "https:\/\/github.com\/khidottrivi\/CVE-2022-22965", "description": null, "fork": false, "created_at": "2022-04-27T07:57:50Z", "updated_at": "2022-05-02T07:04:56Z", "pushed_at": "2022-04-27T08:10:46Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 } ]