PoC-in-GitHub/2022/CVE-2022-22965.json
2022-04-05 21:15:32 +09:00

1051 lines
No EOL
36 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 475776212,
"name": "Spring4Shell-POC",
"full_name": "BobTheShoplifter\/Spring4Shell-POC",
"owner": {
"login": "BobTheShoplifter",
"id": 22559547,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22559547?v=4",
"html_url": "https:\/\/github.com\/BobTheShoplifter"
},
"html_url": "https:\/\/github.com\/BobTheShoplifter\/Spring4Shell-POC",
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T07:54:45Z",
"updated_at": "2022-04-05T10:03:45Z",
"pushed_at": "2022-04-04T15:26:26Z",
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-22965",
"java",
"rce",
"spring",
"spring-core-rce",
"spring4shell",
"springshell",
"tomcat"
],
"visibility": "public",
"forks": 62,
"watchers": 180,
"score": 0
},
{
"id": 475918792,
"name": "spring-core-rce",
"full_name": "Mr-xn\/spring-core-rce",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/spring-core-rce",
"description": "CVE-2022-22965 : about spring core rce",
"fork": false,
"created_at": "2022-03-30T14:35:00Z",
"updated_at": "2022-04-05T09:29:23Z",
"pushed_at": "2022-04-01T15:34:03Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-22965",
"spring",
"spring-mvc",
"spring-security"
],
"visibility": "public",
"forks": 14,
"watchers": 39,
"score": 0
},
{
"id": 475975991,
"name": "SpringShell",
"full_name": "TheGejr\/SpringShell",
"owner": {
"login": "TheGejr",
"id": 7090568,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7090568?v=4",
"html_url": "https:\/\/github.com\/TheGejr"
},
"html_url": "https:\/\/github.com\/TheGejr\/SpringShell",
"description": "Spring4Shell - Spring Core RCE - CVE-2022-22965",
"fork": false,
"created_at": "2022-03-30T17:05:46Z",
"updated_at": "2022-04-05T06:16:51Z",
"pushed_at": "2022-04-04T14:09:11Z",
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"topics": [
"cve",
"cve-2022-22965",
"rce",
"spring",
"spring-core-rce",
"spring-security",
"spring4shell",
"springcore",
"springshell",
"working-example"
],
"visibility": "public",
"forks": 59,
"watchers": 65,
"score": 0
},
{
"id": 476094464,
"name": "Spring4Shell-POC",
"full_name": "reznok\/Spring4Shell-POC",
"owner": {
"login": "reznok",
"id": 23696484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23696484?v=4",
"html_url": "https:\/\/github.com\/reznok"
},
"html_url": "https:\/\/github.com\/reznok\/Spring4Shell-POC",
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-04-05T10:25:11Z",
"pushed_at": "2022-04-02T01:10:43Z",
"stargazers_count": 172,
"watchers_count": 172,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 143,
"watchers": 172,
"score": 0
},
{
"id": 476115414,
"name": "CVE-2022-22965-GUItools",
"full_name": "light-Life\/CVE-2022-22965-GUItools",
"owner": {
"login": "light-Life",
"id": 53685855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53685855?v=4",
"html_url": "https:\/\/github.com\/light-Life"
},
"html_url": "https:\/\/github.com\/light-Life\/CVE-2022-22965-GUItools",
"description": "spring-core单个图形化利用工具CVE-2022-22965及修复方案已出",
"fork": false,
"created_at": "2022-03-31T02:00:18Z",
"updated_at": "2022-04-02T16:37:30Z",
"pushed_at": "2022-04-02T15:29:31Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"score": 0
},
{
"id": 476210489,
"name": "springshell-rce-poc",
"full_name": "DDuarte\/springshell-rce-poc",
"owner": {
"login": "DDuarte",
"id": 530940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/530940?v=4",
"html_url": "https:\/\/github.com\/DDuarte"
},
"html_url": "https:\/\/github.com\/DDuarte\/springshell-rce-poc",
"description": "CVE-2022-22965 - CVE-2010-1622 redux",
"fork": false,
"created_at": "2022-03-31T08:06:46Z",
"updated_at": "2022-04-04T22:11:49Z",
"pushed_at": "2022-04-04T14:45:31Z",
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2010-1622",
"cve-2022-22965",
"spring4shell",
"springshell"
],
"visibility": "public",
"forks": 6,
"watchers": 18,
"score": 0
},
{
"id": 476300392,
"name": "spring-core-rce",
"full_name": "k3rwin\/spring-core-rce",
"owner": {
"login": "k3rwin",
"id": 59213152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59213152?v=4",
"html_url": "https:\/\/github.com\/k3rwin"
},
"html_url": "https:\/\/github.com\/k3rwin\/spring-core-rce",
"description": "spring框架RCE漏洞 CVE-2022-22965",
"fork": false,
"created_at": "2022-03-31T12:41:29Z",
"updated_at": "2022-04-05T04:43:56Z",
"pushed_at": "2022-04-02T03:50:26Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 10,
"score": 0
},
{
"id": 476315234,
"name": "CVE-2022-22965-PoC",
"full_name": "Kirill89\/CVE-2022-22965-PoC",
"owner": {
"login": "Kirill89",
"id": 2003936,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2003936?v=4",
"html_url": "https:\/\/github.com\/Kirill89"
},
"html_url": "https:\/\/github.com\/Kirill89\/CVE-2022-22965-PoC",
"description": null,
"fork": false,
"created_at": "2022-03-31T13:21:49Z",
"updated_at": "2022-04-05T03:01:30Z",
"pushed_at": "2022-04-05T03:29:27Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 19,
"score": 0
},
{
"id": 476355522,
"name": "spring4shell-exploit-poc",
"full_name": "FourCoreLabs\/spring4shell-exploit-poc",
"owner": {
"login": "FourCoreLabs",
"id": 75159435,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75159435?v=4",
"html_url": "https:\/\/github.com\/FourCoreLabs"
},
"html_url": "https:\/\/github.com\/FourCoreLabs\/spring4shell-exploit-poc",
"description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.",
"fork": false,
"created_at": "2022-03-31T15:01:12Z",
"updated_at": "2022-04-05T11:07:20Z",
"pushed_at": "2022-04-01T07:19:52Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 29,
"score": 0
},
{
"id": 476372267,
"name": "CVE-2022-22965_PoC",
"full_name": "alt3kx\/CVE-2022-22965_PoC",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-22965_PoC",
"description": "Spring Framework RCE (Quick pentest notes)",
"fork": false,
"created_at": "2022-03-31T15:43:06Z",
"updated_at": "2022-04-03T23:11:55Z",
"pushed_at": "2022-04-01T04:49:47Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"score": 0
},
{
"id": 476384052,
"name": "CVE-2022-22965",
"full_name": "GuayoyoCyber\/CVE-2022-22965",
"owner": {
"login": "GuayoyoCyber",
"id": 17362318,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17362318?v=4",
"html_url": "https:\/\/github.com\/GuayoyoCyber"
},
"html_url": "https:\/\/github.com\/GuayoyoCyber\/CVE-2022-22965",
"description": "Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+",
"fork": false,
"created_at": "2022-03-31T16:14:36Z",
"updated_at": "2022-04-01T02:03:07Z",
"pushed_at": "2022-04-04T19:04:10Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-22965",
"spring-framework",
"spring4shell"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 476399976,
"name": "Safer_PoC_CVE-2022-22965",
"full_name": "colincowie\/Safer_PoC_CVE-2022-22965",
"owner": {
"login": "colincowie",
"id": 14298667,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14298667?v=4",
"html_url": "https:\/\/github.com\/colincowie"
},
"html_url": "https:\/\/github.com\/colincowie\/Safer_PoC_CVE-2022-22965",
"description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)",
"fork": false,
"created_at": "2022-03-31T16:58:56Z",
"updated_at": "2022-04-05T02:59:59Z",
"pushed_at": "2022-04-04T15:58:37Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 36,
"score": 0
},
{
"id": 476424726,
"name": "spring4shell-CVE-2022-22965",
"full_name": "rwincey\/spring4shell-CVE-2022-22965",
"owner": {
"login": "rwincey",
"id": 5438659,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5438659?v=4",
"html_url": "https:\/\/github.com\/rwincey"
},
"html_url": "https:\/\/github.com\/rwincey\/spring4shell-CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-03-31T18:09:58Z",
"updated_at": "2022-04-04T14:13:42Z",
"pushed_at": "2022-04-01T13:59:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 476446818,
"name": "CVE-2022-22965-poc",
"full_name": "viniciuspereiras\/CVE-2022-22965-poc",
"owner": {
"login": "viniciuspereiras",
"id": 69733777,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69733777?v=4",
"html_url": "https:\/\/github.com\/viniciuspereiras"
},
"html_url": "https:\/\/github.com\/viniciuspereiras\/CVE-2022-22965-poc",
"description": "CVE-2022-22965 poc including reverse-shell support",
"fork": false,
"created_at": "2022-03-31T19:19:52Z",
"updated_at": "2022-04-05T09:36:38Z",
"pushed_at": "2022-04-01T14:21:55Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"score": 0
},
{
"id": 476522206,
"name": "springhound",
"full_name": "mebibite\/springhound",
"owner": {
"login": "mebibite",
"id": 54244269,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54244269?v=4",
"html_url": "https:\/\/github.com\/mebibite"
},
"html_url": "https:\/\/github.com\/mebibite\/springhound",
"description": "Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files.",
"fork": false,
"created_at": "2022-04-01T00:34:29Z",
"updated_at": "2022-04-01T00:47:30Z",
"pushed_at": "2022-04-01T00:42:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 476546576,
"name": "CVE-2022-22965",
"full_name": "likewhite\/CVE-2022-22965",
"owner": {
"login": "likewhite",
"id": 68556929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68556929?v=4",
"html_url": "https:\/\/github.com\/likewhite"
},
"html_url": "https:\/\/github.com\/likewhite\/CVE-2022-22965",
"description": "CVE-2022-22965 EXP",
"fork": false,
"created_at": "2022-04-01T02:25:46Z",
"updated_at": "2022-04-01T07:48:56Z",
"pushed_at": "2022-04-01T02:39:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 476577644,
"name": "SpringFramework_CVE-2022-22965_RCE",
"full_name": "Axx8\/SpringFramework_CVE-2022-22965_RCE",
"owner": {
"login": "Axx8",
"id": 34683107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34683107?v=4",
"html_url": "https:\/\/github.com\/Axx8"
},
"html_url": "https:\/\/github.com\/Axx8\/SpringFramework_CVE-2022-22965_RCE",
"description": "SpringFramework 远程代码执行漏洞CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T04:51:44Z",
"updated_at": "2022-04-05T01:11:31Z",
"pushed_at": "2022-04-01T12:08:45Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 19,
"score": 0
},
{
"id": 476597168,
"name": "spring-boot-cve-2022-22965",
"full_name": "snicoll-scratches\/spring-boot-cve-2022-22965",
"owner": {
"login": "snicoll-scratches",
"id": 13015101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13015101?v=4",
"html_url": "https:\/\/github.com\/snicoll-scratches"
},
"html_url": "https:\/\/github.com\/snicoll-scratches\/spring-boot-cve-2022-22965",
"description": "Showcase of overridding the Spring Framework version in older Spring Boot versions",
"fork": false,
"created_at": "2022-04-01T06:16:20Z",
"updated_at": "2022-04-01T06:44:44Z",
"pushed_at": "2022-04-01T06:53:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 476606565,
"name": "CVE-2022-22965",
"full_name": "nu0l\/CVE-2022-22965",
"owner": {
"login": "nu0l",
"id": 54735907,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54735907?v=4",
"html_url": "https:\/\/github.com\/nu0l"
},
"html_url": "https:\/\/github.com\/nu0l\/CVE-2022-22965",
"description": "Spring-0day\/CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T06:50:21Z",
"updated_at": "2022-04-05T12:12:05Z",
"pushed_at": "2022-04-02T07:35:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 476626448,
"name": "CVE-2022-22965-Spring-CachedintrospectionResults-Rce",
"full_name": "tangxiaofeng7\/CVE-2022-22965-Spring-CachedintrospectionResults-Rce",
"owner": {
"login": "tangxiaofeng7",
"id": 45926593,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45926593?v=4",
"html_url": "https:\/\/github.com\/tangxiaofeng7"
},
"html_url": "https:\/\/github.com\/tangxiaofeng7\/CVE-2022-22965-Spring-CachedintrospectionResults-Rce",
"description": "批量无损检测",
"fork": false,
"created_at": "2022-04-01T07:55:26Z",
"updated_at": "2022-04-04T12:01:26Z",
"pushed_at": "2022-04-01T08:44:19Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 20,
"score": 0
},
{
"id": 476639788,
"name": "CVE-2022-22965-POC",
"full_name": "chaosec2021\/CVE-2022-22965-POC",
"owner": {
"login": "chaosec2021",
"id": 75511051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75511051?v=4",
"html_url": "https:\/\/github.com\/chaosec2021"
},
"html_url": "https:\/\/github.com\/chaosec2021\/CVE-2022-22965-POC",
"description": "CVE-2022-22965 spring-core批量检测脚本",
"fork": false,
"created_at": "2022-04-01T08:37:00Z",
"updated_at": "2022-04-02T02:05:29Z",
"pushed_at": "2022-04-01T08:42:26Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"score": 0
},
{
"id": 476681722,
"name": "CVE-2022-22965",
"full_name": "lcarea\/CVE-2022-22965",
"owner": {
"login": "lcarea",
"id": 59819921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59819921?v=4",
"html_url": "https:\/\/github.com\/lcarea"
},
"html_url": "https:\/\/github.com\/lcarea\/CVE-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-04-01T10:51:05Z",
"updated_at": "2022-04-01T11:11:14Z",
"pushed_at": "2022-04-01T11:19:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 476708454,
"name": "CVE-2022-22965",
"full_name": "Joe1sn\/CVE-2022-22965",
"owner": {
"login": "Joe1sn",
"id": 37005640,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37005640?v=4",
"html_url": "https:\/\/github.com\/Joe1sn"
},
"html_url": "https:\/\/github.com\/Joe1sn\/CVE-2022-22965",
"description": "CVE-2022-22965 Environment",
"fork": false,
"created_at": "2022-04-01T12:18:29Z",
"updated_at": "2022-04-02T02:08:46Z",
"pushed_at": "2022-04-02T09:50:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 476734390,
"name": "CVE-2022-22965",
"full_name": "me2nuk\/CVE-2022-22965",
"owner": {
"login": "me2nuk",
"id": 57348147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57348147?v=4",
"html_url": "https:\/\/github.com\/me2nuk"
},
"html_url": "https:\/\/github.com\/me2nuk\/CVE-2022-22965",
"description": "Spring Framework RCE via Data Binding on JDK 9+ \/ spring4shell \/ CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T13:35:01Z",
"updated_at": "2022-04-04T14:34:52Z",
"pushed_at": "2022-04-04T01:16:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 476738410,
"name": "spring-framework-rce",
"full_name": "wshon\/spring-framework-rce",
"owner": {
"login": "wshon",
"id": 16683806,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16683806?v=4",
"html_url": "https:\/\/github.com\/wshon"
},
"html_url": "https:\/\/github.com\/wshon\/spring-framework-rce",
"description": "CVE-2022-22965",
"fork": false,
"created_at": "2022-04-01T13:46:55Z",
"updated_at": "2022-04-02T12:40:55Z",
"pushed_at": "2022-04-01T14:31:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 476934750,
"name": "CVE-2022-22965",
"full_name": "Wrin9\/CVE-2022-22965",
"owner": {
"login": "Wrin9",
"id": 54984589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4",
"html_url": "https:\/\/github.com\/Wrin9"
},
"html_url": "https:\/\/github.com\/Wrin9\/CVE-2022-22965",
"description": "CVE-2022-22965 POC",
"fork": false,
"created_at": "2022-04-02T03:17:48Z",
"updated_at": "2022-04-02T11:13:22Z",
"pushed_at": "2022-04-02T08:45:17Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 477004407,
"name": "CVE-2022-22965_Spring_Core_RCE",
"full_name": "wjl110\/CVE-2022-22965_Spring_Core_RCE",
"owner": {
"login": "wjl110",
"id": 53851034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53851034?v=4",
"html_url": "https:\/\/github.com\/wjl110"
},
"html_url": "https:\/\/github.com\/wjl110\/CVE-2022-22965_Spring_Core_RCE",
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
"fork": false,
"created_at": "2022-04-02T09:13:54Z",
"updated_at": "2022-04-02T10:14:14Z",
"pushed_at": "2022-04-02T10:14:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 477155956,
"name": "cve-2022-22965",
"full_name": "mwojterski\/cve-2022-22965",
"owner": {
"login": "mwojterski",
"id": 474439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/474439?v=4",
"html_url": "https:\/\/github.com\/mwojterski"
},
"html_url": "https:\/\/github.com\/mwojterski\/cve-2022-22965",
"description": null,
"fork": false,
"created_at": "2022-04-02T19:47:47Z",
"updated_at": "2022-04-02T19:51:57Z",
"pushed_at": "2022-04-02T20:23:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 477210316,
"name": "nmap-spring4shell",
"full_name": "gpiechnik2\/nmap-spring4shell",
"owner": {
"login": "gpiechnik2",
"id": 48253270,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48253270?v=4",
"html_url": "https:\/\/github.com\/gpiechnik2"
},
"html_url": "https:\/\/github.com\/gpiechnik2\/nmap-spring4shell",
"description": "Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965) ",
"fork": false,
"created_at": "2022-04-03T01:27:28Z",
"updated_at": "2022-04-04T05:19:10Z",
"pushed_at": "2022-04-04T05:31:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-22965",
"exploit",
"nmap",
"nmap-scripts",
"spring4shell",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 477260087,
"name": "CVE-2022-22965",
"full_name": "itsecurityco\/CVE-2022-22965",
"owner": {
"login": "itsecurityco",
"id": 1725054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1725054?v=4",
"html_url": "https:\/\/github.com\/itsecurityco"
},
"html_url": "https:\/\/github.com\/itsecurityco\/CVE-2022-22965",
"description": "Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5",
"fork": false,
"created_at": "2022-04-03T06:43:07Z",
"updated_at": "2022-04-04T17:26:22Z",
"pushed_at": "2022-04-03T08:38:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 477654438,
"name": "Invoke-CVE-2022-22965-SafeCheck",
"full_name": "daniel0x00\/Invoke-CVE-2022-22965-SafeCheck",
"owner": {
"login": "daniel0x00",
"id": 6474092,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6474092?v=4",
"html_url": "https:\/\/github.com\/daniel0x00"
},
"html_url": "https:\/\/github.com\/daniel0x00\/Invoke-CVE-2022-22965-SafeCheck",
"description": "PowerShell port of CVE-2022-22965 vulnerability check by colincowie.",
"fork": false,
"created_at": "2022-04-04T10:37:27Z",
"updated_at": "2022-04-04T10:42:29Z",
"pushed_at": "2022-04-04T18:55:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-22965",
"powershell",
"vulnerability-detection"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 477716252,
"name": "spring4shell_victim",
"full_name": "fracturelabs\/spring4shell_victim",
"owner": {
"login": "fracturelabs",
"id": 38447921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38447921?v=4",
"html_url": "https:\/\/github.com\/fracturelabs"
},
"html_url": "https:\/\/github.com\/fracturelabs\/spring4shell_victim",
"description": "Intentionally vulnerable Spring app to test CVE-2022-22965",
"fork": false,
"created_at": "2022-04-04T13:35:56Z",
"updated_at": "2022-04-04T13:58:11Z",
"pushed_at": "2022-04-04T15:25:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 477719633,
"name": "CVE-2022-22965-PoC",
"full_name": "sunnyvale-it\/CVE-2022-22965-PoC",
"owner": {
"login": "sunnyvale-it",
"id": 44291039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
"html_url": "https:\/\/github.com\/sunnyvale-it"
},
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2022-22965-PoC",
"description": "CVE-2022-22965 (Spring4Shell) Proof of Concept",
"fork": false,
"created_at": "2022-04-04T13:44:39Z",
"updated_at": "2022-04-04T18:15:34Z",
"pushed_at": "2022-04-04T20:30:18Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 477788509,
"name": "cve-2022-22965",
"full_name": "twseptian\/cve-2022-22965",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian"
},
"html_url": "https:\/\/github.com\/twseptian\/cve-2022-22965",
"description": "Spring4Shell - CVE-2022-22965",
"fork": false,
"created_at": "2022-04-04T16:43:03Z",
"updated_at": "2022-04-04T16:57:03Z",
"pushed_at": "2022-04-04T16:54:37Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-22965",
"spring-framework-vulnerability",
"spring4shell",
"spring4shell-poc"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 477858835,
"name": "Spring4shell-CVE-2022-22965-POC",
"full_name": "netcode\/Spring4shell-CVE-2022-22965-POC",
"owner": {
"login": "netcode",
"id": 286371,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/286371?v=4",
"html_url": "https:\/\/github.com\/netcode"
},
"html_url": "https:\/\/github.com\/netcode\/Spring4shell-CVE-2022-22965-POC",
"description": "Another spring4shell (Spring core RCE) POC",
"fork": false,
"created_at": "2022-04-04T20:16:06Z",
"updated_at": "2022-04-04T21:09:58Z",
"pushed_at": "2022-04-04T21:11:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 477871854,
"name": "go-scan-spring",
"full_name": "fracturelabs\/go-scan-spring",
"owner": {
"login": "fracturelabs",
"id": 38447921,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38447921?v=4",
"html_url": "https:\/\/github.com\/fracturelabs"
},
"html_url": "https:\/\/github.com\/fracturelabs\/go-scan-spring",
"description": "Vulnerability scanner for Spring4Shell (CVE-2022-22965)",
"fork": false,
"created_at": "2022-04-04T21:01:26Z",
"updated_at": "2022-04-05T09:44:27Z",
"pushed_at": "2022-04-04T21:42:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 478060944,
"name": "spring-shell-vuln",
"full_name": "Snip3R69\/spring-shell-vuln",
"owner": {
"login": "Snip3R69",
"id": 76834257,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76834257?v=4",
"html_url": "https:\/\/github.com\/Snip3R69"
},
"html_url": "https:\/\/github.com\/Snip3R69\/spring-shell-vuln",
"description": "Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965.",
"fork": false,
"created_at": "2022-04-05T09:35:41Z",
"updated_at": "2022-04-05T09:35:41Z",
"pushed_at": "2022-04-05T10:23:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]