github_poc_collector/exploits/2022/CVE-2022-22965.json

272 lines
No EOL
9.8 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"name": "CVE-2022-22965",
"full_name": "alt3kx/CVE-2022-22965",
"html_url": "https://github.com/alt3kx/CVE-2022-22965",
"description": "Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)",
"stargazers_count": 102,
"forks_count": 18,
"created_at": "2022-04-07T00:08:16Z"
},
{
"name": "CVE-2022-22965-rexbb",
"full_name": "zangcc/CVE-2022-22965-rexbb",
"html_url": "https://github.com/zangcc/CVE-2022-22965-rexbb",
"description": "CVE-2022-22965\\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具基于JavaFx开发图形化操作更简单提高效率。",
"stargazers_count": 100,
"forks_count": 15,
"created_at": "2022-12-28T04:50:16Z"
},
{
"name": "SpringFramework_CVE-2022-22965_RCE",
"full_name": "Axx8/SpringFramework_CVE-2022-22965_RCE",
"html_url": "https://github.com/Axx8/SpringFramework_CVE-2022-22965_RCE",
"description": "SpringFramework 远程代码执行漏洞CVE-2022-22965",
"stargazers_count": 75,
"forks_count": 17,
"created_at": "2022-04-01T04:51:44Z"
},
{
"name": "Safer_PoC_CVE-2022-22965",
"full_name": "colincowie/Safer_PoC_CVE-2022-22965",
"html_url": "https://github.com/colincowie/Safer_PoC_CVE-2022-22965",
"description": "A Safer PoC for CVE-2022-22965 (Spring4Shell)",
"stargazers_count": 44,
"forks_count": 7,
"created_at": "2022-03-31T16:58:56Z"
},
{
"name": "CVE-2022-22965-Spring-Core-Rce",
"full_name": "tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce",
"html_url": "https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce",
"description": "批量无损检测CVE-2022-22965",
"stargazers_count": 37,
"forks_count": 14,
"created_at": "2022-04-01T07:55:26Z"
},
{
"name": "CVE-2022-22965-PoC",
"full_name": "Kirill89/CVE-2022-22965-PoC",
"html_url": "https://github.com/Kirill89/CVE-2022-22965-PoC",
"description": null,
"stargazers_count": 28,
"forks_count": 24,
"created_at": "2022-03-31T13:21:49Z"
},
{
"name": "CVE-2022-22965",
"full_name": "p1ckzi/CVE-2022-22965",
"html_url": "https://github.com/p1ckzi/CVE-2022-22965",
"description": "spring4shell | CVE-2022-22965",
"stargazers_count": 21,
"forks_count": 7,
"created_at": "2022-04-12T14:59:42Z"
},
{
"name": "CVE-2022-22965_PoC",
"full_name": "alt3kx/CVE-2022-22965_PoC",
"html_url": "https://github.com/alt3kx/CVE-2022-22965_PoC",
"description": "Spring Framework RCE (Quick pentest notes)",
"stargazers_count": 17,
"forks_count": 7,
"created_at": "2022-03-31T15:43:06Z"
},
{
"name": "CVE-2022-22965-GUItools",
"full_name": "Bouquets-ai/CVE-2022-22965-GUItools",
"html_url": "https://github.com/Bouquets-ai/CVE-2022-22965-GUItools",
"description": "spring-core单个图形化利用工具CVE-2022-22965及修复方案已出",
"stargazers_count": 16,
"forks_count": 6,
"created_at": "2022-03-31T02:00:18Z"
},
{
"name": "CVE-2022-22965",
"full_name": "itsecurityco/CVE-2022-22965",
"html_url": "https://github.com/itsecurityco/CVE-2022-22965",
"description": "Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5",
"stargazers_count": 15,
"forks_count": 3,
"created_at": "2022-04-03T06:43:07Z"
},
{
"name": "CVE-2022-22965",
"full_name": "me2nuk/CVE-2022-22965",
"html_url": "https://github.com/me2nuk/CVE-2022-22965",
"description": "Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965",
"stargazers_count": 13,
"forks_count": 8,
"created_at": "2022-04-01T13:35:01Z"
},
{
"name": "CVE-2022-22965_Spring_Core_RCE",
"full_name": "wjl110/CVE-2022-22965_Spring_Core_RCE",
"html_url": "https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE",
"description": "CVE-2022-22965\\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用",
"stargazers_count": 13,
"forks_count": 7,
"created_at": "2022-04-02T09:13:54Z"
},
{
"name": "CVE-2022-22965-poc",
"full_name": "viniciuspereiras/CVE-2022-22965-poc",
"html_url": "https://github.com/viniciuspereiras/CVE-2022-22965-poc",
"description": "CVE-2022-22965 poc including reverse-shell support",
"stargazers_count": 13,
"forks_count": 5,
"created_at": "2022-03-31T19:19:52Z"
},
{
"name": "CVE-2022-22965",
"full_name": "zer0yu/CVE-2022-22965",
"html_url": "https://github.com/zer0yu/CVE-2022-22965",
"description": "Spring4Shell (CVE-2022-22965)",
"stargazers_count": 11,
"forks_count": 2,
"created_at": "2022-04-01T12:37:32Z"
},
{
"name": "CVE-2022-22965-PoC",
"full_name": "sunnyvale-it/CVE-2022-22965-PoC",
"html_url": "https://github.com/sunnyvale-it/CVE-2022-22965-PoC",
"description": "CVE-2022-22965 (Spring4Shell) Proof of Concept",
"stargazers_count": 7,
"forks_count": 3,
"created_at": "2022-04-04T13:44:39Z"
},
{
"name": "CVE-2022-22965",
"full_name": "Wrin9/CVE-2022-22965",
"html_url": "https://github.com/Wrin9/CVE-2022-22965",
"description": "CVE-2022-22965 POC",
"stargazers_count": 7,
"forks_count": 1,
"created_at": "2022-04-02T03:17:48Z"
},
{
"name": "CVE-2022-22965",
"full_name": "GuayoyoCyber/CVE-2022-22965",
"html_url": "https://github.com/GuayoyoCyber/CVE-2022-22965",
"description": "Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka \"Spring4Shell\")",
"stargazers_count": 6,
"forks_count": 3,
"created_at": "2022-03-31T16:14:36Z"
},
{
"name": "springboot_CVE-2022-22965",
"full_name": "wikiZ/springboot_CVE-2022-22965",
"html_url": "https://github.com/wikiZ/springboot_CVE-2022-22965",
"description": "CVE-2022-22965 pocsuite3 POC",
"stargazers_count": 6,
"forks_count": 1,
"created_at": "2022-04-07T02:30:26Z"
},
{
"name": "CVE-2022-22965",
"full_name": "mariomamo/CVE-2022-22965",
"html_url": "https://github.com/mariomamo/CVE-2022-22965",
"description": null,
"stargazers_count": 5,
"forks_count": 1,
"created_at": "2022-04-23T09:01:22Z"
},
{
"name": "CVE-2022-22965",
"full_name": "nu0l/CVE-2022-22965",
"html_url": "https://github.com/nu0l/CVE-2022-22965",
"description": "Spring-0day/CVE-2022-22965",
"stargazers_count": 4,
"forks_count": 3,
"created_at": "2022-04-01T06:50:21Z"
},
{
"name": "Fast-CVE-2022-22965",
"full_name": "iloveflag/Fast-CVE-2022-22965",
"html_url": "https://github.com/iloveflag/Fast-CVE-2022-22965",
"description": "CVE-2022-22965图形化检测工具",
"stargazers_count": 4,
"forks_count": 0,
"created_at": "2022-11-08T13:45:35Z"
},
{
"name": "Spring4shell-CVE-2022-22965-POC",
"full_name": "netcode/Spring4shell-CVE-2022-22965-POC",
"html_url": "https://github.com/netcode/Spring4shell-CVE-2022-22965-POC",
"description": "Another spring4shell (Spring core RCE) POC",
"stargazers_count": 3,
"forks_count": 3,
"created_at": "2022-04-04T20:16:06Z"
},
{
"name": "CVE-2022-22965",
"full_name": "BKLockly/CVE-2022-22965",
"html_url": "https://github.com/BKLockly/CVE-2022-22965",
"description": "Poc&Exp,支持批量扫描,反弹shell",
"stargazers_count": 3,
"forks_count": 3,
"created_at": "2023-06-03T16:39:50Z"
},
{
"name": "CVE-2022-22965",
"full_name": "likewhite/CVE-2022-22965",
"html_url": "https://github.com/likewhite/CVE-2022-22965",
"description": "CVE-2022-22965 EXP",
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2022-04-01T02:25:46Z"
},
{
"name": "CVE-2022-22965",
"full_name": "khidottrivi/CVE-2022-22965",
"html_url": "https://github.com/khidottrivi/CVE-2022-22965",
"description": null,
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2022-04-27T07:57:50Z"
},
{
"name": "CVE-2022-22965-PoC_Payara",
"full_name": "CalumHutton/CVE-2022-22965-PoC_Payara",
"html_url": "https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara",
"description": null,
"stargazers_count": 3,
"forks_count": 0,
"created_at": "2022-04-07T15:26:15Z"
},
{
"name": "CVE-2022-22965_Spring4Shell",
"full_name": "LudovicPatho/CVE-2022-22965_Spring4Shell",
"html_url": "https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell",
"description": "A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it.",
"stargazers_count": 2,
"forks_count": 3,
"created_at": "2022-04-05T20:34:36Z"
},
{
"name": "CVE-2022-22965-Spring4Shell",
"full_name": "jakabakos/CVE-2022-22965-Spring4Shell",
"html_url": "https://github.com/jakabakos/CVE-2022-22965-Spring4Shell",
"description": "PoC and exploit for CVE-2022-22965 Spring4Shell",
"stargazers_count": 2,
"forks_count": 2,
"created_at": "2023-06-20T11:45:29Z"
},
{
"name": "cve-2022-22965",
"full_name": "twseptian/cve-2022-22965",
"html_url": "https://github.com/twseptian/cve-2022-22965",
"description": "Spring4Shell - CVE-2022-22965",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2022-04-04T16:43:03Z"
},
{
"name": "CVE-2022-22965",
"full_name": "0xrobiul/CVE-2022-22965",
"html_url": "https://github.com/0xrobiul/CVE-2022-22965",
"description": "Exploit Of Spring4Shell!",
"stargazers_count": 2,
"forks_count": 0,
"created_at": "2022-04-05T15:45:47Z"
}
]