PoC-in-GitHub/2022/CVE-2022-22954.json
2025-01-15 15:32:14 +09:00

818 lines
No EOL
28 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 302605271,
"name": "CVE-2022-22954-POC",
"full_name": "axingde\/CVE-2022-22954-POC",
"owner": {
"login": "axingde",
"id": 65204372,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65204372?v=4",
"html_url": "https:\/\/github.com\/axingde",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/axingde\/CVE-2022-22954-POC",
"description": "提供单个或批量URL扫描是否存在CVE-2022-22954功能",
"fork": false,
"created_at": "2020-10-09T10:14:50Z",
"updated_at": "2022-09-07T05:13:35Z",
"pushed_at": "2022-04-15T09:33:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-22954",
"python"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 480404614,
"name": "VMware-CVE-2022-22954",
"full_name": "sherlocksecurity\/VMware-CVE-2022-22954",
"owner": {
"login": "sherlocksecurity",
"id": 52328067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
"html_url": "https:\/\/github.com\/sherlocksecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sherlocksecurity\/VMware-CVE-2022-22954",
"description": "POC for VMWARE CVE-2022-22954",
"fork": false,
"created_at": "2022-04-11T13:59:23Z",
"updated_at": "2024-12-09T01:44:39Z",
"pushed_at": "2022-04-13T06:15:11Z",
"stargazers_count": 281,
"watchers_count": 281,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 281,
"score": 0,
"subscribers_count": 5
},
{
"id": 480528421,
"name": "VMWare_CVE-2022-22954",
"full_name": "Vulnmachines\/VMWare_CVE-2022-22954",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/VMWare_CVE-2022-22954",
"description": "CVE-2022-22954 is a server-side template injection vulnerability in the VMware Workspace ONE Access and Identity Manager",
"fork": false,
"created_at": "2022-04-11T19:46:56Z",
"updated_at": "2022-08-11T23:58:14Z",
"pushed_at": "2022-04-11T19:59:53Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 480583438,
"name": "CVE-2022-22954",
"full_name": "aniqfakhrul\/CVE-2022-22954",
"owner": {
"login": "aniqfakhrul",
"id": 39443758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39443758?v=4",
"html_url": "https:\/\/github.com\/aniqfakhrul",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aniqfakhrul\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-04-11T23:21:50Z",
"updated_at": "2024-08-12T20:22:21Z",
"pushed_at": "2022-05-27T09:07:19Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 480649709,
"name": "CVE-2022-22954",
"full_name": "jax7sec\/CVE-2022-22954",
"owner": {
"login": "jax7sec",
"id": 102047728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102047728?v=4",
"html_url": "https:\/\/github.com\/jax7sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jax7sec\/CVE-2022-22954",
"description": "提供批量扫描URL以及执行命令功能。Workspace ONE Access 模板注入漏洞,可执行任意代码",
"fork": false,
"created_at": "2022-04-12T04:14:36Z",
"updated_at": "2022-08-25T18:06:09Z",
"pushed_at": "2022-04-15T11:35:35Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 480676740,
"name": "CVE-2022-22954-VMware-RCE",
"full_name": "bb33bb\/CVE-2022-22954-VMware-RCE",
"owner": {
"login": "bb33bb",
"id": 5463104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5463104?v=4",
"html_url": "https:\/\/github.com\/bb33bb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bb33bb\/CVE-2022-22954-VMware-RCE",
"description": "CVE-2022-22954-VMware-RCE批量检测POC",
"fork": false,
"created_at": "2022-04-12T06:09:55Z",
"updated_at": "2024-08-12T20:22:21Z",
"pushed_at": "2022-04-12T13:21:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 480683846,
"name": "VMware-CVE-2022-22954",
"full_name": "lucksec\/VMware-CVE-2022-22954",
"owner": {
"login": "lucksec",
"id": 59011386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59011386?v=4",
"html_url": "https:\/\/github.com\/lucksec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lucksec\/VMware-CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-04-12T06:35:10Z",
"updated_at": "2022-08-15T15:42:19Z",
"pushed_at": "2022-04-12T06:46:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 480722090,
"name": "-CVE-2022-22954-scanner",
"full_name": "mumu2020629\/-CVE-2022-22954-scanner",
"owner": {
"login": "mumu2020629",
"id": 70618861,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70618861?v=4",
"html_url": "https:\/\/github.com\/mumu2020629",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mumu2020629\/-CVE-2022-22954-scanner",
"description": null,
"fork": false,
"created_at": "2022-04-12T08:36:33Z",
"updated_at": "2023-03-02T11:15:59Z",
"pushed_at": "2022-04-14T13:19:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 480742480,
"name": "CVE-2022-22954-Testi",
"full_name": "MSeymenD\/CVE-2022-22954-Testi",
"owner": {
"login": "MSeymenD",
"id": 83572774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83572774?v=4",
"html_url": "https:\/\/github.com\/MSeymenD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MSeymenD\/CVE-2022-22954-Testi",
"description": "CVE-2022-22954 Açığı test etme",
"fork": false,
"created_at": "2022-04-12T09:35:17Z",
"updated_at": "2022-04-14T10:25:38Z",
"pushed_at": "2022-04-12T09:44:09Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 480922330,
"name": "cve-2022-22954",
"full_name": "corelight\/cve-2022-22954",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/corelight\/cve-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-04-12T18:08:58Z",
"updated_at": "2024-10-24T13:39:32Z",
"pushed_at": "2024-10-25T12:23:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 9
},
{
"id": 480975254,
"name": "CVE-2022-22954_VMware_PoC",
"full_name": "DrorDvash\/CVE-2022-22954_VMware_PoC",
"owner": {
"login": "DrorDvash",
"id": 8413651,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8413651?v=4",
"html_url": "https:\/\/github.com\/DrorDvash",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DrorDvash\/CVE-2022-22954_VMware_PoC",
"description": "PoC for CVE-2022-22954 - VMware Workspace ONE Access Freemarker Server-Side Template Injection",
"fork": false,
"created_at": "2022-04-12T21:15:27Z",
"updated_at": "2024-11-01T03:31:51Z",
"pushed_at": "2022-04-12T23:19:41Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0,
"subscribers_count": 3
},
{
"id": 481069232,
"name": "CVE-2022-22954",
"full_name": "Jun-5heng\/CVE-2022-22954",
"owner": {
"login": "Jun-5heng",
"id": 88525975,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88525975?v=4",
"html_url": "https:\/\/github.com\/Jun-5heng",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jun-5heng\/CVE-2022-22954",
"description": "VMware Workspace ONE Access远程代码执行漏洞 \/ Code By:Jun_sheng",
"fork": false,
"created_at": "2022-04-13T04:25:54Z",
"updated_at": "2022-04-13T04:28:45Z",
"pushed_at": "2022-04-19T06:38:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 481141119,
"name": "CVE-2022-22954-PoC",
"full_name": "tunelko\/CVE-2022-22954-PoC",
"owner": {
"login": "tunelko",
"id": 1008217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1008217?v=4",
"html_url": "https:\/\/github.com\/tunelko",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/tunelko\/CVE-2022-22954-PoC",
"description": "VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual. ",
"fork": false,
"created_at": "2022-04-13T08:52:15Z",
"updated_at": "2023-08-27T09:17:37Z",
"pushed_at": "2024-02-13T13:51:41Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 481289176,
"name": "CVE-2022-22954",
"full_name": "bewhale\/CVE-2022-22954",
"owner": {
"login": "bewhale",
"id": 42403886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42403886?v=4",
"html_url": "https:\/\/github.com\/bewhale",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bewhale\/CVE-2022-22954",
"description": "CVE-2022-22954 VMware Workspace ONE Access freemarker SSTI 漏洞 命令执行、批量检测脚本、文件写入",
"fork": false,
"created_at": "2022-04-13T16:18:56Z",
"updated_at": "2024-08-12T20:22:24Z",
"pushed_at": "2022-04-26T04:26:00Z",
"stargazers_count": 69,
"watchers_count": 69,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 69,
"score": 0,
"subscribers_count": 4
},
{
"id": 481779348,
"name": "VMware-CVE-2022-22954-Command-Injector",
"full_name": "emilyastranova\/VMware-CVE-2022-22954-Command-Injector",
"owner": {
"login": "emilyastranova",
"id": 16725119,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16725119?v=4",
"html_url": "https:\/\/github.com\/emilyastranova",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/emilyastranova\/VMware-CVE-2022-22954-Command-Injector",
"description": "Proof of Concept for exploiting VMware CVE-2022-22954",
"fork": false,
"created_at": "2022-04-14T23:38:06Z",
"updated_at": "2022-04-16T10:53:07Z",
"pushed_at": "2022-04-15T00:11:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 482063610,
"name": "CVE-2022-22954",
"full_name": "MLX15\/CVE-2022-22954",
"owner": {
"login": "MLX15",
"id": 62066081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62066081?v=4",
"html_url": "https:\/\/github.com\/MLX15",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MLX15\/CVE-2022-22954",
"description": "CVE-2022-22954 VMware Workspace ONE Access free marker SSTI",
"fork": false,
"created_at": "2022-04-15T19:26:56Z",
"updated_at": "2024-11-02T03:44:32Z",
"pushed_at": "2022-04-15T19:39:10Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 482302278,
"name": "CVE-2022-22954-POC",
"full_name": "mhurts\/CVE-2022-22954-POC",
"owner": {
"login": "mhurts",
"id": 51972444,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51972444?v=4",
"html_url": "https:\/\/github.com\/mhurts",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mhurts\/CVE-2022-22954-POC",
"description": null,
"fork": false,
"created_at": "2022-04-16T16:18:13Z",
"updated_at": "2022-11-17T07:23:34Z",
"pushed_at": "2022-04-15T02:33:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 488921076,
"name": "CVE-2022-22954",
"full_name": "nguyenv1nK\/CVE-2022-22954",
"owner": {
"login": "nguyenv1nK",
"id": 40865570,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40865570?v=4",
"html_url": "https:\/\/github.com\/nguyenv1nK",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nguyenv1nK\/CVE-2022-22954",
"description": "CVE-2022-22954 analyst",
"fork": false,
"created_at": "2022-05-05T10:06:44Z",
"updated_at": "2022-05-05T10:15:15Z",
"pushed_at": "2022-05-05T10:43:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 498873517,
"name": "CVE-2022-22954",
"full_name": "Chocapikk\/CVE-2022-22954",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-22954",
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
"fork": false,
"created_at": "2022-06-01T19:33:32Z",
"updated_at": "2024-08-12T20:23:45Z",
"pushed_at": "2022-06-01T23:50:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 498898344,
"name": "CVE-2022-22954",
"full_name": "secfb\/CVE-2022-22954",
"owner": {
"login": "secfb",
"id": 38748801,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38748801?v=4",
"html_url": "https:\/\/github.com\/secfb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/secfb\/CVE-2022-22954",
"description": "Python script to exploit CVE-2022-22954 and then exploit CVE-2022-22960",
"fork": false,
"created_at": "2022-06-01T21:05:56Z",
"updated_at": "2022-06-01T21:05:53Z",
"pushed_at": "2022-06-01T23:53:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 499442667,
"name": "CVE-2022-22954",
"full_name": "orwagodfather\/CVE-2022-22954",
"owner": {
"login": "orwagodfather",
"id": 55083178,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55083178?v=4",
"html_url": "https:\/\/github.com\/orwagodfather",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/orwagodfather\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-06-03T08:51:44Z",
"updated_at": "2024-10-13T17:46:27Z",
"pushed_at": "2022-06-03T08:52:06Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 499449934,
"name": "CVE-2022-22954",
"full_name": "b4dboy17\/CVE-2022-22954",
"owner": {
"login": "b4dboy17",
"id": 83988282,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83988282?v=4",
"html_url": "https:\/\/github.com\/b4dboy17",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b4dboy17\/CVE-2022-22954",
"description": "VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором)",
"fork": false,
"created_at": "2022-06-03T09:17:12Z",
"updated_at": "2023-03-13T03:53:28Z",
"pushed_at": "2022-06-03T09:18:37Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 502373402,
"name": "CVE-2022-22954",
"full_name": "arzuozkan\/CVE-2022-22954",
"owner": {
"login": "arzuozkan",
"id": 48025290,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48025290?v=4",
"html_url": "https:\/\/github.com\/arzuozkan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/arzuozkan\/CVE-2022-22954",
"description": "Practising technical writing with researching CVE-2022-22954 VMware Workspace ONE Access RCE vulnerability.",
"fork": false,
"created_at": "2022-06-11T14:39:57Z",
"updated_at": "2022-06-14T18:58:50Z",
"pushed_at": "2022-06-11T14:42:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 524471767,
"name": "CVE-2022-22954",
"full_name": "amit-pathak009\/CVE-2022-22954",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:04Z",
"updated_at": "2022-06-02T01:44:19Z",
"pushed_at": "2022-06-02T01:44:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 524471940,
"name": "CVE-2022-22954-PoC",
"full_name": "amit-pathak009\/CVE-2022-22954-PoC",
"owner": {
"login": "amit-pathak009",
"id": 72250138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72250138?v=4",
"html_url": "https:\/\/github.com\/amit-pathak009",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amit-pathak009\/CVE-2022-22954-PoC",
"description": null,
"fork": false,
"created_at": "2022-08-13T18:00:39Z",
"updated_at": "2022-06-01T22:41:09Z",
"pushed_at": "2022-06-01T22:41:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 545257457,
"name": "VcenterKiller",
"full_name": "Schira4396\/VcenterKiller",
"owner": {
"login": "Schira4396",
"id": 57404930,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57404930?v=4",
"html_url": "https:\/\/github.com\/Schira4396",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Schira4396\/VcenterKiller",
"description": "一款针对Vcenter的综合利用工具包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j提供一键上传webshell命令执行或者上传公钥使用SSH免密连接",
"fork": false,
"created_at": "2022-10-04T03:39:27Z",
"updated_at": "2025-01-15T02:36:10Z",
"pushed_at": "2024-04-25T06:09:38Z",
"stargazers_count": 1367,
"watchers_count": 1367,
"has_discussions": false,
"forks_count": 167,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"go",
"golang",
"log4j",
"log4shell",
"scan",
"vcenter"
],
"visibility": "public",
"forks": 167,
"watchers": 1367,
"score": 0,
"subscribers_count": 15
}
]