[ { "id": 302605271, "name": "CVE-2022-22954-POC", "full_name": "axingde\/CVE-2022-22954-POC", "owner": { "login": "axingde", "id": 65204372, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65204372?v=4", "html_url": "https:\/\/github.com\/axingde" }, "html_url": "https:\/\/github.com\/axingde\/CVE-2022-22954-POC", "description": "提供单个或批量URL扫描是否存在CVE-2022-22954功能", "fork": false, "created_at": "2020-10-09T10:14:50Z", "updated_at": "2022-04-16T10:56:25Z", "pushed_at": "2022-04-15T09:33:01Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-22954", "python" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 480404614, "name": "VMware-CVE-2022-22954", "full_name": "sherlocksecurity\/VMware-CVE-2022-22954", "owner": { "login": "sherlocksecurity", "id": 52328067, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4", "html_url": "https:\/\/github.com\/sherlocksecurity" }, "html_url": "https:\/\/github.com\/sherlocksecurity\/VMware-CVE-2022-22954", "description": "POC for VMWARE CVE-2022-22954", "fork": false, "created_at": "2022-04-11T13:59:23Z", "updated_at": "2022-05-08T04:43:42Z", "pushed_at": "2022-04-13T06:15:11Z", "stargazers_count": 257, "watchers_count": 257, "forks_count": 43, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 43, "watchers": 257, "score": 0 }, { "id": 480528421, "name": "VMWare_CVE-2022-22954", "full_name": "Vulnmachines\/VMWare_CVE-2022-22954", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/VMWare_CVE-2022-22954", "description": "CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager", "fork": false, "created_at": "2022-04-11T19:46:56Z", "updated_at": "2022-04-14T05:38:32Z", "pushed_at": "2022-04-11T19:59:53Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 480583438, "name": "CVE-2022-22954", "full_name": "aniqfakhrul\/CVE-2022-22954", "owner": { "login": "aniqfakhrul", "id": 39443758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39443758?v=4", "html_url": "https:\/\/github.com\/aniqfakhrul" }, "html_url": "https:\/\/github.com\/aniqfakhrul\/CVE-2022-22954", "description": null, "fork": false, "created_at": "2022-04-11T23:21:50Z", "updated_at": "2022-05-06T11:40:58Z", "pushed_at": "2022-04-12T08:06:37Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0 }, { "id": 480649709, "name": "CVE-2022-22954", "full_name": "jax7sec\/CVE-2022-22954", "owner": { "login": "jax7sec", "id": 102047728, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102047728?v=4", "html_url": "https:\/\/github.com\/jax7sec" }, "html_url": "https:\/\/github.com\/jax7sec\/CVE-2022-22954", "description": "提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码", "fork": false, "created_at": "2022-04-12T04:14:36Z", "updated_at": "2022-05-07T05:55:40Z", "pushed_at": "2022-04-15T11:35:35Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 9, "score": 0 }, { "id": 480671149, "name": "CVE-2022-22954-VMware-RCE", "full_name": "chaosec2021\/CVE-2022-22954-VMware-RCE", "owner": { "login": "chaosec2021", "id": 75511051, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75511051?v=4", "html_url": "https:\/\/github.com\/chaosec2021" }, "html_url": "https:\/\/github.com\/chaosec2021\/CVE-2022-22954-VMware-RCE", "description": "CVE-2022-22954-VMware-RCE批量检测POC", "fork": false, "created_at": "2022-04-12T05:48:24Z", "updated_at": "2022-04-20T05:11:25Z", "pushed_at": "2022-04-12T12:00:26Z", "stargazers_count": 19, "watchers_count": 19, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 19, "score": 0 }, { "id": 480683846, "name": "VMware-CVE-2022-22954", "full_name": "lucksec\/VMware-CVE-2022-22954", "owner": { "login": "lucksec", "id": 59011386, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59011386?v=4", "html_url": "https:\/\/github.com\/lucksec" }, "html_url": "https:\/\/github.com\/lucksec\/VMware-CVE-2022-22954", "description": null, "fork": false, "created_at": "2022-04-12T06:35:10Z", "updated_at": "2022-04-13T02:20:44Z", "pushed_at": "2022-04-12T06:46:33Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0 }, { "id": 480722090, "name": "-CVE-2022-22954-scanner", "full_name": "mumu2020629\/-CVE-2022-22954-scanner", "owner": { "login": "mumu2020629", "id": 70618861, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70618861?v=4", "html_url": "https:\/\/github.com\/mumu2020629" }, "html_url": "https:\/\/github.com\/mumu2020629\/-CVE-2022-22954-scanner", "description": null, "fork": false, "created_at": "2022-04-12T08:36:33Z", "updated_at": "2022-04-12T08:39:34Z", "pushed_at": "2022-04-14T13:19:28Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 480742480, "name": "CVE-2022-22954-Testi", "full_name": "MSeymenD\/CVE-2022-22954-Testi", "owner": { "login": "MSeymenD", "id": 83572774, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83572774?v=4", "html_url": "https:\/\/github.com\/MSeymenD" }, "html_url": "https:\/\/github.com\/MSeymenD\/CVE-2022-22954-Testi", "description": "CVE-2022-22954 Açığı test etme", "fork": false, "created_at": "2022-04-12T09:35:17Z", "updated_at": "2022-04-14T10:25:38Z", "pushed_at": "2022-04-12T09:44:09Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 480975254, "name": "CVE-2022-22954_VMware_PoC", "full_name": "DrorDvash\/CVE-2022-22954_VMware_PoC", "owner": { "login": "DrorDvash", "id": 8413651, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8413651?v=4", "html_url": "https:\/\/github.com\/DrorDvash" }, "html_url": "https:\/\/github.com\/DrorDvash\/CVE-2022-22954_VMware_PoC", "description": "PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection", "fork": false, "created_at": "2022-04-12T21:15:27Z", "updated_at": "2022-04-13T05:05:05Z", "pushed_at": "2022-04-12T23:19:41Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 481069232, "name": "CVE-2022-22954", "full_name": "Jun-5heng\/CVE-2022-22954", "owner": { "login": "Jun-5heng", "id": 88525975, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4", "html_url": "https:\/\/github.com\/Jun-5heng" }, "html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2022-22954", "description": "VMware Workspace ONE Access远程代码执行漏洞 \/ Code By:Jun_sheng", "fork": false, "created_at": "2022-04-13T04:25:54Z", "updated_at": "2022-04-13T04:28:45Z", "pushed_at": "2022-04-19T06:38:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 481141119, "name": "CVE-2022-22954-PoC", "full_name": "tunelko\/CVE-2022-22954-PoC", "owner": { "login": "tunelko", "id": 1008217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008217?v=4", "html_url": "https:\/\/github.com\/tunelko" }, "html_url": "https:\/\/github.com\/tunelko\/CVE-2022-22954-PoC", "description": "VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual. ", "fork": false, "created_at": "2022-04-13T08:52:15Z", "updated_at": "2022-04-27T06:18:18Z", "pushed_at": "2022-04-13T16:46:12Z", "stargazers_count": 8, "watchers_count": 8, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 8, "score": 0 }, { "id": 481289176, "name": "CVE-2022-22954", "full_name": "bewhale\/CVE-2022-22954", "owner": { "login": "bewhale", "id": 42403886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42403886?v=4", "html_url": "https:\/\/github.com\/bewhale" }, "html_url": "https:\/\/github.com\/bewhale\/CVE-2022-22954", "description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入", "fork": false, "created_at": "2022-04-13T16:18:56Z", "updated_at": "2022-05-05T13:10:41Z", "pushed_at": "2022-04-26T04:26:00Z", "stargazers_count": 40, "watchers_count": 40, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 40, "score": 0 }, { "id": 481779348, "name": "VMware-CVE-2022-22954-Command-Injector", "full_name": "tyleraharrison\/VMware-CVE-2022-22954-Command-Injector", "owner": { "login": "tyleraharrison", "id": 16725119, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16725119?v=4", "html_url": "https:\/\/github.com\/tyleraharrison" }, "html_url": "https:\/\/github.com\/tyleraharrison\/VMware-CVE-2022-22954-Command-Injector", "description": "Proof of Concept for exploiting VMware CVE-2022-22954", "fork": false, "created_at": "2022-04-14T23:38:06Z", "updated_at": "2022-04-16T10:53:07Z", "pushed_at": "2022-04-15T00:11:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 481811086, "name": "CVE-2022-22954-POC", "full_name": "3SsFuck\/CVE-2022-22954-POC", "owner": { "login": "3SsFuck", "id": 52556473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52556473?v=4", "html_url": "https:\/\/github.com\/3SsFuck" }, "html_url": "https:\/\/github.com\/3SsFuck\/CVE-2022-22954-POC", "description": null, "fork": false, "created_at": "2022-04-15T02:24:22Z", "updated_at": "2022-04-16T16:17:13Z", "pushed_at": "2022-04-15T02:33:01Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 2, "score": 0 }, { "id": 482063610, "name": "CVE-2022-22954", "full_name": "MLX15\/CVE-2022-22954", "owner": { "login": "MLX15", "id": 62066081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62066081?v=4", "html_url": "https:\/\/github.com\/MLX15" }, "html_url": "https:\/\/github.com\/MLX15\/CVE-2022-22954", "description": "CVE-2022-22954 VMware Workspace ONE Access free marker SSTI", "fork": false, "created_at": "2022-04-15T19:26:56Z", "updated_at": "2022-04-18T15:11:48Z", "pushed_at": "2022-04-15T19:39:10Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 } ]