mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
818 lines
No EOL
28 KiB
JSON
818 lines
No EOL
28 KiB
JSON
[
|
||
{
|
||
"id": 302605271,
|
||
"name": "CVE-2022-22954-POC",
|
||
"full_name": "axingde\/CVE-2022-22954-POC",
|
||
"owner": {
|
||
"login": "axingde",
|
||
"id": 65204372,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65204372?v=4",
|
||
"html_url": "https:\/\/github.com\/axingde",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/axingde\/CVE-2022-22954-POC",
|
||
"description": "提供单个或批量URL扫描是否存在CVE-2022-22954功能",
|
||
"fork": false,
|
||
"created_at": "2020-10-09T10:14:50Z",
|
||
"updated_at": "2022-09-07T05:13:35Z",
|
||
"pushed_at": "2022-04-15T09:33:01Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-22954",
|
||
"python"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480404614,
|
||
"name": "VMware-CVE-2022-22954",
|
||
"full_name": "sherlocksecurity\/VMware-CVE-2022-22954",
|
||
"owner": {
|
||
"login": "sherlocksecurity",
|
||
"id": 52328067,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
|
||
"html_url": "https:\/\/github.com\/sherlocksecurity",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sherlocksecurity\/VMware-CVE-2022-22954",
|
||
"description": "POC for VMWARE CVE-2022-22954",
|
||
"fork": false,
|
||
"created_at": "2022-04-11T13:59:23Z",
|
||
"updated_at": "2024-12-09T01:44:39Z",
|
||
"pushed_at": "2022-04-13T06:15:11Z",
|
||
"stargazers_count": 281,
|
||
"watchers_count": 281,
|
||
"has_discussions": false,
|
||
"forks_count": 53,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 53,
|
||
"watchers": 281,
|
||
"score": 0,
|
||
"subscribers_count": 5
|
||
},
|
||
{
|
||
"id": 480528421,
|
||
"name": "VMWare_CVE-2022-22954",
|
||
"full_name": "Vulnmachines\/VMWare_CVE-2022-22954",
|
||
"owner": {
|
||
"login": "Vulnmachines",
|
||
"id": 79006904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
|
||
"html_url": "https:\/\/github.com\/Vulnmachines",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vulnmachines\/VMWare_CVE-2022-22954",
|
||
"description": "CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager",
|
||
"fork": false,
|
||
"created_at": "2022-04-11T19:46:56Z",
|
||
"updated_at": "2022-08-11T23:58:14Z",
|
||
"pushed_at": "2022-04-11T19:59:53Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 11,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480583438,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "aniqfakhrul\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "aniqfakhrul",
|
||
"id": 39443758,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39443758?v=4",
|
||
"html_url": "https:\/\/github.com\/aniqfakhrul",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aniqfakhrul\/CVE-2022-22954",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-04-11T23:21:50Z",
|
||
"updated_at": "2024-08-12T20:22:21Z",
|
||
"pushed_at": "2022-05-27T09:07:19Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480649709,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "jax7sec\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "jax7sec",
|
||
"id": 102047728,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102047728?v=4",
|
||
"html_url": "https:\/\/github.com\/jax7sec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jax7sec\/CVE-2022-22954",
|
||
"description": "提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码",
|
||
"fork": false,
|
||
"created_at": "2022-04-12T04:14:36Z",
|
||
"updated_at": "2022-08-25T18:06:09Z",
|
||
"pushed_at": "2022-04-15T11:35:35Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 11,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480676740,
|
||
"name": "CVE-2022-22954-VMware-RCE",
|
||
"full_name": "bb33bb\/CVE-2022-22954-VMware-RCE",
|
||
"owner": {
|
||
"login": "bb33bb",
|
||
"id": 5463104,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
|
||
"html_url": "https:\/\/github.com\/bb33bb",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bb33bb\/CVE-2022-22954-VMware-RCE",
|
||
"description": "CVE-2022-22954-VMware-RCE批量检测POC",
|
||
"fork": false,
|
||
"created_at": "2022-04-12T06:09:55Z",
|
||
"updated_at": "2024-08-12T20:22:21Z",
|
||
"pushed_at": "2022-04-12T13:21:37Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 480683846,
|
||
"name": "VMware-CVE-2022-22954",
|
||
"full_name": "lucksec\/VMware-CVE-2022-22954",
|
||
"owner": {
|
||
"login": "lucksec",
|
||
"id": 59011386,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59011386?v=4",
|
||
"html_url": "https:\/\/github.com\/lucksec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lucksec\/VMware-CVE-2022-22954",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-04-12T06:35:10Z",
|
||
"updated_at": "2022-08-15T15:42:19Z",
|
||
"pushed_at": "2022-04-12T06:46:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480722090,
|
||
"name": "-CVE-2022-22954-scanner",
|
||
"full_name": "mumu2020629\/-CVE-2022-22954-scanner",
|
||
"owner": {
|
||
"login": "mumu2020629",
|
||
"id": 70618861,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70618861?v=4",
|
||
"html_url": "https:\/\/github.com\/mumu2020629",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mumu2020629\/-CVE-2022-22954-scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-04-12T08:36:33Z",
|
||
"updated_at": "2023-03-02T11:15:59Z",
|
||
"pushed_at": "2022-04-14T13:19:28Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480742480,
|
||
"name": "CVE-2022-22954-Testi",
|
||
"full_name": "MSeymenD\/CVE-2022-22954-Testi",
|
||
"owner": {
|
||
"login": "MSeymenD",
|
||
"id": 83572774,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83572774?v=4",
|
||
"html_url": "https:\/\/github.com\/MSeymenD",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MSeymenD\/CVE-2022-22954-Testi",
|
||
"description": "CVE-2022-22954 Açığı test etme",
|
||
"fork": false,
|
||
"created_at": "2022-04-12T09:35:17Z",
|
||
"updated_at": "2022-04-14T10:25:38Z",
|
||
"pushed_at": "2022-04-12T09:44:09Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 480922330,
|
||
"name": "cve-2022-22954",
|
||
"full_name": "corelight\/cve-2022-22954",
|
||
"owner": {
|
||
"login": "corelight",
|
||
"id": 21672558,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
||
"html_url": "https:\/\/github.com\/corelight",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/corelight\/cve-2022-22954",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-04-12T18:08:58Z",
|
||
"updated_at": "2024-10-24T13:39:32Z",
|
||
"pushed_at": "2024-10-25T12:23:15Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 9
|
||
},
|
||
{
|
||
"id": 480975254,
|
||
"name": "CVE-2022-22954_VMware_PoC",
|
||
"full_name": "DrorDvash\/CVE-2022-22954_VMware_PoC",
|
||
"owner": {
|
||
"login": "DrorDvash",
|
||
"id": 8413651,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8413651?v=4",
|
||
"html_url": "https:\/\/github.com\/DrorDvash",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DrorDvash\/CVE-2022-22954_VMware_PoC",
|
||
"description": "PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection",
|
||
"fork": false,
|
||
"created_at": "2022-04-12T21:15:27Z",
|
||
"updated_at": "2024-11-01T03:31:51Z",
|
||
"pushed_at": "2022-04-12T23:19:41Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 9,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 481069232,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "Jun-5heng\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "Jun-5heng",
|
||
"id": 88525975,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
|
||
"html_url": "https:\/\/github.com\/Jun-5heng",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2022-22954",
|
||
"description": "VMware Workspace ONE Access远程代码执行漏洞 \/ Code By:Jun_sheng",
|
||
"fork": false,
|
||
"created_at": "2022-04-13T04:25:54Z",
|
||
"updated_at": "2022-04-13T04:28:45Z",
|
||
"pushed_at": "2022-04-19T06:38:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 481141119,
|
||
"name": "CVE-2022-22954-PoC",
|
||
"full_name": "tunelko\/CVE-2022-22954-PoC",
|
||
"owner": {
|
||
"login": "tunelko",
|
||
"id": 1008217,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008217?v=4",
|
||
"html_url": "https:\/\/github.com\/tunelko",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tunelko\/CVE-2022-22954-PoC",
|
||
"description": "VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual. ",
|
||
"fork": false,
|
||
"created_at": "2022-04-13T08:52:15Z",
|
||
"updated_at": "2023-08-27T09:17:37Z",
|
||
"pushed_at": "2024-02-13T13:51:41Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 11,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 481289176,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "bewhale\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "bewhale",
|
||
"id": 42403886,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42403886?v=4",
|
||
"html_url": "https:\/\/github.com\/bewhale",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bewhale\/CVE-2022-22954",
|
||
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
|
||
"fork": false,
|
||
"created_at": "2022-04-13T16:18:56Z",
|
||
"updated_at": "2024-08-12T20:22:24Z",
|
||
"pushed_at": "2022-04-26T04:26:00Z",
|
||
"stargazers_count": 69,
|
||
"watchers_count": 69,
|
||
"has_discussions": false,
|
||
"forks_count": 21,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 21,
|
||
"watchers": 69,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 481779348,
|
||
"name": "VMware-CVE-2022-22954-Command-Injector",
|
||
"full_name": "emilyastranova\/VMware-CVE-2022-22954-Command-Injector",
|
||
"owner": {
|
||
"login": "emilyastranova",
|
||
"id": 16725119,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16725119?v=4",
|
||
"html_url": "https:\/\/github.com\/emilyastranova",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/emilyastranova\/VMware-CVE-2022-22954-Command-Injector",
|
||
"description": "Proof of Concept for exploiting VMware CVE-2022-22954",
|
||
"fork": false,
|
||
"created_at": "2022-04-14T23:38:06Z",
|
||
"updated_at": "2022-04-16T10:53:07Z",
|
||
"pushed_at": "2022-04-15T00:11:50Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 482063610,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "MLX15\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "MLX15",
|
||
"id": 62066081,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62066081?v=4",
|
||
"html_url": "https:\/\/github.com\/MLX15",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MLX15\/CVE-2022-22954",
|
||
"description": "CVE-2022-22954 VMware Workspace ONE Access free marker SSTI",
|
||
"fork": false,
|
||
"created_at": "2022-04-15T19:26:56Z",
|
||
"updated_at": "2024-11-02T03:44:32Z",
|
||
"pushed_at": "2022-04-15T19:39:10Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 482302278,
|
||
"name": "CVE-2022-22954-POC",
|
||
"full_name": "mhurts\/CVE-2022-22954-POC",
|
||
"owner": {
|
||
"login": "mhurts",
|
||
"id": 51972444,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972444?v=4",
|
||
"html_url": "https:\/\/github.com\/mhurts",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mhurts\/CVE-2022-22954-POC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-04-16T16:18:13Z",
|
||
"updated_at": "2022-11-17T07:23:34Z",
|
||
"pushed_at": "2022-04-15T02:33:01Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 488921076,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "nguyenv1nK\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "nguyenv1nK",
|
||
"id": 40865570,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40865570?v=4",
|
||
"html_url": "https:\/\/github.com\/nguyenv1nK",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nguyenv1nK\/CVE-2022-22954",
|
||
"description": "CVE-2022-22954 analyst",
|
||
"fork": false,
|
||
"created_at": "2022-05-05T10:06:44Z",
|
||
"updated_at": "2022-05-05T10:15:15Z",
|
||
"pushed_at": "2022-05-05T10:43:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 498873517,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "Chocapikk\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "Chocapikk",
|
||
"id": 88535377,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
|
||
"html_url": "https:\/\/github.com\/Chocapikk",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954",
|
||
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T19:33:32Z",
|
||
"updated_at": "2024-08-12T20:23:45Z",
|
||
"pushed_at": "2022-06-01T23:50:18Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 498898344,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "secfb\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "secfb",
|
||
"id": 38748801,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38748801?v=4",
|
||
"html_url": "https:\/\/github.com\/secfb",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/secfb\/CVE-2022-22954",
|
||
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T21:05:56Z",
|
||
"updated_at": "2022-06-01T21:05:53Z",
|
||
"pushed_at": "2022-06-01T23:53:17Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 10,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 10,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 499442667,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "orwagodfather\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "orwagodfather",
|
||
"id": 55083178,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55083178?v=4",
|
||
"html_url": "https:\/\/github.com\/orwagodfather",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/orwagodfather\/CVE-2022-22954",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-03T08:51:44Z",
|
||
"updated_at": "2024-10-13T17:46:27Z",
|
||
"pushed_at": "2022-06-03T08:52:06Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": false,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499449934,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "b4dboy17\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "b4dboy17",
|
||
"id": 83988282,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83988282?v=4",
|
||
"html_url": "https:\/\/github.com\/b4dboy17",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/b4dboy17\/CVE-2022-22954",
|
||
"description": "VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором)",
|
||
"fork": false,
|
||
"created_at": "2022-06-03T09:17:12Z",
|
||
"updated_at": "2023-03-13T03:53:28Z",
|
||
"pushed_at": "2022-06-03T09:18:37Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 502373402,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "arzuozkan\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "arzuozkan",
|
||
"id": 48025290,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48025290?v=4",
|
||
"html_url": "https:\/\/github.com\/arzuozkan",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/arzuozkan\/CVE-2022-22954",
|
||
"description": "Practising technical writing with researching CVE-2022-22954 VMware Workspace ONE Access RCE vulnerability.",
|
||
"fork": false,
|
||
"created_at": "2022-06-11T14:39:57Z",
|
||
"updated_at": "2022-06-14T18:58:50Z",
|
||
"pushed_at": "2022-06-11T14:42:18Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 524471767,
|
||
"name": "CVE-2022-22954",
|
||
"full_name": "amit-pathak009\/CVE-2022-22954",
|
||
"owner": {
|
||
"login": "amit-pathak009",
|
||
"id": 72250138,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||
"html_url": "https:\/\/github.com\/amit-pathak009",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-08-13T18:00:04Z",
|
||
"updated_at": "2022-06-02T01:44:19Z",
|
||
"pushed_at": "2022-06-02T01:44:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 524471940,
|
||
"name": "CVE-2022-22954-PoC",
|
||
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
|
||
"owner": {
|
||
"login": "amit-pathak009",
|
||
"id": 72250138,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
|
||
"html_url": "https:\/\/github.com\/amit-pathak009",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-08-13T18:00:39Z",
|
||
"updated_at": "2022-06-01T22:41:09Z",
|
||
"pushed_at": "2022-06-01T22:41:06Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 545257457,
|
||
"name": "VcenterKiller",
|
||
"full_name": "Schira4396\/VcenterKiller",
|
||
"owner": {
|
||
"login": "Schira4396",
|
||
"id": 57404930,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57404930?v=4",
|
||
"html_url": "https:\/\/github.com\/Schira4396",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Schira4396\/VcenterKiller",
|
||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||
"fork": false,
|
||
"created_at": "2022-10-04T03:39:27Z",
|
||
"updated_at": "2025-01-15T02:36:10Z",
|
||
"pushed_at": "2024-04-25T06:09:38Z",
|
||
"stargazers_count": 1367,
|
||
"watchers_count": 1367,
|
||
"has_discussions": false,
|
||
"forks_count": 167,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"go",
|
||
"golang",
|
||
"log4j",
|
||
"log4shell",
|
||
"scan",
|
||
"vcenter"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 167,
|
||
"watchers": 1367,
|
||
"score": 0,
|
||
"subscribers_count": 15
|
||
}
|
||
] |