PoC-in-GitHub/2022/CVE-2022-24112.json
2022-11-25 21:18:04 +09:00

210 lines
No EOL
7.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 462326409,
"name": "CVE-2022-24112",
"full_name": "Mr-xn\/CVE-2022-24112",
"owner": {
"login": "Mr-xn",
"id": 18260135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18260135?v=4",
"html_url": "https:\/\/github.com\/Mr-xn"
},
"html_url": "https:\/\/github.com\/Mr-xn\/CVE-2022-24112",
"description": "CVE-2022-24112Apache APISIX apisix\/batch-requests RCE",
"fork": false,
"created_at": "2022-02-22T14:09:49Z",
"updated_at": "2022-11-09T18:15:22Z",
"pushed_at": "2022-02-22T15:42:39Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 43,
"score": 0
},
{
"id": 462437127,
"name": "CVE-2022-24112",
"full_name": "Udyz\/CVE-2022-24112",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz"
},
"html_url": "https:\/\/github.com\/Udyz\/CVE-2022-24112",
"description": "Apache APISIX apisix\/batch-requests RCE",
"fork": false,
"created_at": "2022-02-22T19:04:52Z",
"updated_at": "2022-07-29T01:32:08Z",
"pushed_at": "2022-02-22T19:05:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"score": 0
},
{
"id": 463579186,
"name": "CVE-2022-24112",
"full_name": "Axx8\/CVE-2022-24112",
"owner": {
"login": "Axx8",
"id": 34683107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34683107?v=4",
"html_url": "https:\/\/github.com\/Axx8"
},
"html_url": "https:\/\/github.com\/Axx8\/CVE-2022-24112",
"description": "Apache APISIX batch-requests RCE(CVE-2022-24112)",
"fork": false,
"created_at": "2022-02-25T15:17:28Z",
"updated_at": "2022-10-11T09:11:22Z",
"pushed_at": "2022-02-25T15:30:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 467604662,
"name": "CVE-2022-24112",
"full_name": "Mah1ndra\/CVE-2022-24112",
"owner": {
"login": "Mah1ndra",
"id": 32550072,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32550072?v=4",
"html_url": "https:\/\/github.com\/Mah1ndra"
},
"html_url": "https:\/\/github.com\/Mah1ndra\/CVE-2022-24112",
"description": "CVE-2022-24112: Apache APISIX Remote Code Execution Vulnerability",
"fork": false,
"created_at": "2022-03-08T17:08:52Z",
"updated_at": "2022-10-20T15:28:09Z",
"pushed_at": "2022-03-08T17:12:37Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 470510353,
"name": "Apache-APISIX-CVE-2022-24112",
"full_name": "M4xSec\/Apache-APISIX-CVE-2022-24112",
"owner": {
"login": "M4xSec",
"id": 57313495,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57313495?v=4",
"html_url": "https:\/\/github.com\/M4xSec"
},
"html_url": "https:\/\/github.com\/M4xSec\/Apache-APISIX-CVE-2022-24112",
"description": "Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit ",
"fork": false,
"created_at": "2022-03-16T09:19:12Z",
"updated_at": "2022-09-24T00:32:15Z",
"pushed_at": "2022-03-16T09:19:30Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 10,
"score": 0
},
{
"id": 470905781,
"name": "CVE-2022-24112-POC",
"full_name": "kavishkagihan\/CVE-2022-24112-POC",
"owner": {
"login": "kavishkagihan",
"id": 85458014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85458014?v=4",
"html_url": "https:\/\/github.com\/kavishkagihan"
},
"html_url": "https:\/\/github.com\/kavishkagihan\/CVE-2022-24112-POC",
"description": "Apache APISIX 2.12.1 Remote Code Execution by IP restriction bypass and using default admin AIP token",
"fork": false,
"created_at": "2022-03-17T08:22:54Z",
"updated_at": "2022-11-25T09:11:40Z",
"pushed_at": "2022-03-17T08:24:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 472038804,
"name": "cve-2022-24112",
"full_name": "twseptian\/cve-2022-24112",
"owner": {
"login": "twseptian",
"id": 9025301,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9025301?v=4",
"html_url": "https:\/\/github.com\/twseptian"
},
"html_url": "https:\/\/github.com\/twseptian\/cve-2022-24112",
"description": "Apache APISIX < 2.12.1 Remote Code Execution and Docker Lab",
"fork": false,
"created_at": "2022-03-20T16:35:55Z",
"updated_at": "2022-11-15T17:17:33Z",
"pushed_at": "2022-03-20T18:09:34Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"apache-apisix",
"cve-2022-24112",
"proof-of-concept",
"remote-code-execution"
],
"visibility": "public",
"forks": 6,
"watchers": 5,
"score": 0
}
]