PoC-in-GitHub/2022/CVE-2022-24112.json
2025-01-08 09:32:44 +09:00

286 lines
No EOL
9.8 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 462326409,
"name": "CVE-2022-24112",
"full_name": "Mr-xn\/CVE-2022-24112",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-24112",
"description": "CVE-2022-24112Apache APISIX apisix\/batch-requests RCE",
"fork": false,
"created_at": "2022-02-22T14:09:49Z",
"updated_at": "2024-08-12T20:20:55Z",
"pushed_at": "2022-02-22T15:42:39Z",
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 44,
"score": 0,
"subscribers_count": 4
},
{
"id": 462508832,
"name": "CVE-2022-24112",
"full_name": "CrackerCat\/CVE-2022-24112",
"owner": {
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2022-24112",
"description": "Apache APISIX apisix\/batch-requests RCE",
"fork": false,
"created_at": "2022-02-22T23:21:26Z",
"updated_at": "2022-02-22T20:31:08Z",
"pushed_at": "2022-02-22T19:05:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 463579186,
"name": "CVE-2022-24112",
"full_name": "Axx8\/CVE-2022-24112",
"owner": {
"login": "Axx8",
"id": 34683107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34683107?v=4",
"html_url": "https:\/\/github.com\/Axx8",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Axx8\/CVE-2022-24112",
"description": "Apache APISIX batch-requests RCE(CVE-2022-24112)",
"fork": false,
"created_at": "2022-02-25T15:17:28Z",
"updated_at": "2024-11-06T23:16:14Z",
"pushed_at": "2022-02-25T15:30:08Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 467604662,
"name": "CVE-2022-24112",
"full_name": "Mah1ndra\/CVE-2022-24112",
"owner": {
"login": "Mah1ndra",
"id": 32550072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32550072?v=4",
"html_url": "https:\/\/github.com\/Mah1ndra",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mah1ndra\/CVE-2022-24112",
"description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-03-08T17:08:52Z",
"updated_at": "2024-02-18T09:53:21Z",
"pushed_at": "2022-03-08T17:12:37Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 2
},
{
"id": 470510353,
"name": "Apache-APISIX-CVE-2022-24112",
"full_name": "M4xSec\/Apache-APISIX-CVE-2022-24112",
"owner": {
"login": "M4xSec",
"id": 57313495,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57313495?v=4",
"html_url": "https:\/\/github.com\/M4xSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/M4xSec\/Apache-APISIX-CVE-2022-24112",
"description": "Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit ",
"fork": false,
"created_at": "2022-03-16T09:19:12Z",
"updated_at": "2024-12-07T00:01:55Z",
"pushed_at": "2022-03-16T09:19:30Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 470905781,
"name": "CVE-2022-24112-POC",
"full_name": "kavishkagihan\/CVE-2022-24112-POC",
"owner": {
"login": "kavishkagihan",
"id": 85458014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85458014?v=4",
"html_url": "https:\/\/github.com\/kavishkagihan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kavishkagihan\/CVE-2022-24112-POC",
"description": "Apache APISIX 2.12.1 Remote Code Execution by IP restriction bypass and using default admin AIP token",
"fork": false,
"created_at": "2022-03-17T08:22:54Z",
"updated_at": "2023-07-18T07:35:54Z",
"pushed_at": "2022-03-17T08:24:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 472038804,
"name": "cve-2022-24112",
"full_name": "twseptian\/cve-2022-24112",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/twseptian\/cve-2022-24112",
"description": "Apache APISIX < 2.12.1 Remote Code Execution and Docker Lab",
"fork": false,
"created_at": "2022-03-20T16:35:55Z",
"updated_at": "2024-12-19T13:32:51Z",
"pushed_at": "2022-03-20T18:09:34Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-apisix",
"cve-2022-24112",
"proof-of-concept",
"remote-code-execution"
],
"visibility": "public",
"forks": 11,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 573818685,
"name": "CVE-2022-24112_POC",
"full_name": "Acczdy\/CVE-2022-24112_POC",
"owner": {
"login": "Acczdy",
"id": 107027804,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107027804?v=4",
"html_url": "https:\/\/github.com\/Acczdy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Acczdy\/CVE-2022-24112_POC",
"description": "CVE-2022-24112_POC",
"fork": false,
"created_at": "2022-12-03T14:31:28Z",
"updated_at": "2023-11-01T00:54:12Z",
"pushed_at": "2022-12-04T03:12:17Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 809913189,
"name": "exploit_CVE-2022-24112",
"full_name": "btar1gan\/exploit_CVE-2022-24112",
"owner": {
"login": "btar1gan",
"id": 92728059,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92728059?v=4",
"html_url": "https:\/\/github.com\/btar1gan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/btar1gan\/exploit_CVE-2022-24112",
"description": "New exploit for Apache APISIX v2.12.1 - Remote code execution (RCE)",
"fork": false,
"created_at": "2024-06-03T17:33:59Z",
"updated_at": "2024-09-15T17:20:39Z",
"pushed_at": "2024-06-07T05:09:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]