[ { "id": 462326409, "name": "CVE-2022-24112", "full_name": "Mr-xn\/CVE-2022-24112", "owner": { "login": "Mr-xn", "id": 18260135, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4", "html_url": "https:\/\/github.com\/Mr-xn" }, "html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-24112", "description": "CVE-2022-24112:Apache APISIX apisix\/batch-requests RCE", "fork": false, "created_at": "2022-02-22T14:09:49Z", "updated_at": "2022-07-19T02:49:20Z", "pushed_at": "2022-02-22T15:42:39Z", "stargazers_count": 43, "watchers_count": 43, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 43, "score": 0 }, { "id": 462437127, "name": "CVE-2022-24112", "full_name": "Udyz\/CVE-2022-24112", "owner": { "login": "Udyz", "id": 39673284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4", "html_url": "https:\/\/github.com\/Udyz" }, "html_url": "https:\/\/github.com\/Udyz\/CVE-2022-24112", "description": "Apache APISIX apisix\/batch-requests RCE", "fork": false, "created_at": "2022-02-22T19:04:52Z", "updated_at": "2022-07-29T01:32:08Z", "pushed_at": "2022-02-22T19:05:58Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 9, "score": 0 }, { "id": 463579186, "name": "CVE-2022-24112", "full_name": "Axx8\/CVE-2022-24112", "owner": { "login": "Axx8", "id": 34683107, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34683107?v=4", "html_url": "https:\/\/github.com\/Axx8" }, "html_url": "https:\/\/github.com\/Axx8\/CVE-2022-24112", "description": "Apache APISIX batch-requests RCE(CVE-2022-24112)", "fork": false, "created_at": "2022-02-25T15:17:28Z", "updated_at": "2022-05-17T13:20:44Z", "pushed_at": "2022-02-25T15:30:08Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0 }, { "id": 467604662, "name": "CVE-2022-24112", "full_name": "Mah1ndra\/CVE-2022-24112", "owner": { "login": "Mah1ndra", "id": 32550072, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32550072?v=4", "html_url": "https:\/\/github.com\/Mah1ndra" }, "html_url": "https:\/\/github.com\/Mah1ndra\/CVE-2022-24112", "description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability", "fork": false, "created_at": "2022-03-08T17:08:52Z", "updated_at": "2022-05-13T06:04:19Z", "pushed_at": "2022-03-08T17:12:37Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 470510353, "name": "Apache-APISIX-CVE-2022-24112", "full_name": "M4xSec\/Apache-APISIX-CVE-2022-24112", "owner": { "login": "M4xSec", "id": 57313495, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57313495?v=4", "html_url": "https:\/\/github.com\/M4xSec" }, "html_url": "https:\/\/github.com\/M4xSec\/Apache-APISIX-CVE-2022-24112", "description": "Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit ", "fork": false, "created_at": "2022-03-16T09:19:12Z", "updated_at": "2022-04-27T13:32:49Z", "pushed_at": "2022-03-16T09:19:30Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 9, "score": 0 }, { "id": 470905781, "name": "CVE-2022-24112-POC", "full_name": "kavishkagihan\/CVE-2022-24112-POC", "owner": { "login": "kavishkagihan", "id": 85458014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85458014?v=4", "html_url": "https:\/\/github.com\/kavishkagihan" }, "html_url": "https:\/\/github.com\/kavishkagihan\/CVE-2022-24112-POC", "description": "Apache APISIX 2.12.1 Remote Code Execution by IP restriction bypass and using default admin AIP token", "fork": false, "created_at": "2022-03-17T08:22:54Z", "updated_at": "2022-04-06T07:45:16Z", "pushed_at": "2022-03-17T08:24:53Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 472038804, "name": "cve-2022-24112", "full_name": "twseptian\/cve-2022-24112", "owner": { "login": "twseptian", "id": 9025301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4", "html_url": "https:\/\/github.com\/twseptian" }, "html_url": "https:\/\/github.com\/twseptian\/cve-2022-24112", "description": "Apache APISIX < 2.12.1 Remote Code Execution and Docker Lab", "fork": false, "created_at": "2022-03-20T16:35:55Z", "updated_at": "2022-04-12T10:51:18Z", "pushed_at": "2022-03-20T18:09:34Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "apache-apisix", "cve-2022-24112", "proof-of-concept", "remote-code-execution" ], "visibility": "public", "forks": 4, "watchers": 2, "score": 0 } ]