Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | Spring Framework | Spring Framework versions 5.3.X prior to 5.3.18+, 5.2.x prior to 5.2.20+ and all old and unsupported versions | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965 | https://github.com/BobTheShoplifter/Spring4Shell-POC | POC Details |
| 2 | CVE-2022-22965 : about spring core rce | https://github.com/Mr-xn/spring-core-rce | POC Details |
| 3 | Spring4Shell - Spring Core RCE - CVE-2022-22965 | https://github.com/TheGejr/SpringShell | POC Details |
| 4 | Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit | https://github.com/reznok/Spring4Shell-POC | POC Details |
| 5 | spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出 | https://github.com/light-Life/CVE-2022-22965-GUItools | POC Details |
| 6 | CVE-2022-22965 - CVE-2010-1622 redux | https://github.com/DDuarte/springshell-rce-poc | POC Details |
| 7 | spring框架RCE漏洞 CVE-2022-22965 | https://github.com/k3rwin/spring-core-rce | POC Details |
| 8 | springFramework_CVE-2022-22965_RCE简单利用 | https://github.com/liangyueliangyue/spring-core-rce | POC Details |
| 9 | None | https://github.com/Kirill89/CVE-2022-22965-PoC | POC Details |
| 10 | Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability. | https://github.com/FourCoreLabs/spring4shell-exploit-poc | POC Details |
| 11 | Spring Framework RCE (Quick pentest notes) | https://github.com/alt3kx/CVE-2022-22965_PoC | POC Details |
| 12 | Vulnerabilidad RCE en Spring Framework vía Data Binding on JDK 9+ (CVE-2022-22965 aka "Spring4Shell") | https://github.com/GuayoyoCyber/CVE-2022-22965 | POC Details |
| 13 | A Safer PoC for CVE-2022-22965 (Spring4Shell) | https://github.com/colincowie/Safer_PoC_CVE-2022-22965 | POC Details |
| 14 | None | https://github.com/rwincey/spring4shell-CVE-2022-22965 | POC Details |
| 15 | CVE-2022-22965 poc including reverse-shell support | https://github.com/viniciuspereiras/CVE-2022-22965-poc | POC Details |
| 16 | Created after the release of CVE-2022-22965 and CVE-2022-22963. Bash script that detects Spring Framework occurrences in your projects and systems, allowing you to get insight on versions used. Unpacks JARs and analyzes their Manifest files. | https://github.com/mebibite/springhound | POC Details |
| 17 | CVE-2022-22965 EXP | https://github.com/likewhite/CVE-2022-22965 | POC Details |
| 18 | SpringFramework 远程代码执行漏洞CVE-2022-22965 | https://github.com/Axx8/SpringFramework_CVE-2022-22965_RCE | POC Details |
| 19 | Showcase of overridding the Spring Framework version in older Spring Boot versions | https://github.com/snicoll-scratches/spring-boot-cve-2022-22965 | POC Details |
| 20 | Spring-0day/CVE-2022-22965 | https://github.com/nu0l/CVE-2022-22965 | POC Details |
| 21 | 批量无损检测CVE-2022-22965 | https://github.com/tangxiaofeng7/CVE-2022-22965-Spring-Core-Rce | POC Details |
| 22 | CVE-2022-22965 spring-core批量检测脚本 | https://github.com/whoami0622/CVE-2022-22965-POC | POC Details |
| 23 | None | https://github.com/helsecert/CVE-2022-22965 | POC Details |
| 24 | None | https://github.com/lcarea/CVE-2022-22965 | POC Details |
| 25 | CVE-2022-22965 Environment | https://github.com/Joe1sn/CVE-2022-22965 | POC Details |
| 26 | Spring4Shell (CVE-2022-22965) | https://github.com/zer0yu/CVE-2022-22965 | POC Details |
| 27 | Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965 | https://github.com/me2nuk/CVE-2022-22965 | POC Details |
| 28 | CVE-2022-22965 | https://github.com/wshon/spring-framework-rce | POC Details |
| 29 | CVE-2022-22965 POC | https://github.com/Wrin9/CVE-2022-22965 | POC Details |
| 30 | CVE-2022-22965\Spring-Core-RCE堪比关于 Apache Log4j2核弹级别漏洞exp的rce一键利用 | https://github.com/wjl110/CVE-2022-22965_Spring_Core_RCE | POC Details |
| 31 | None | https://github.com/mwojterski/cve-2022-22965 | POC Details |
| 32 | Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965) | https://github.com/gpiechnik2/nmap-spring4shell | POC Details |
| 33 | Docker PoC for CVE-2022-22965 with Spring Boot version 2.6.5 | https://github.com/itsecurityco/CVE-2022-22965 | POC Details |
| 34 | PowerShell port of CVE-2022-22965 vulnerability check by colincowie. | https://github.com/daniel0x00/Invoke-CVE-2022-22965-SafeCheck | POC Details |
| 35 | Intentionally vulnerable Spring app to test CVE-2022-22965 | https://github.com/fracturelabs/spring4shell_victim | POC Details |
| 36 | CVE-2022-22965 (Spring4Shell) Proof of Concept | https://github.com/sunnyvale-it/CVE-2022-22965-PoC | POC Details |
| 37 | Spring4Shell - CVE-2022-22965 | https://github.com/twseptian/cve-2022-22965 | POC Details |
| 38 | Another spring4shell (Spring core RCE) POC | https://github.com/netcode/Spring4shell-CVE-2022-22965-POC | POC Details |
| 39 | Vulnerability scanner for Spring4Shell (CVE-2022-22965) | https://github.com/fracturelabs/go-scan-spring | POC Details |
| 40 | Spring has Confirmed the RCE in Spring Framework. The team has just published the statement along with the mitigation guides for the issue. Now, this vulnerability can be tracked as CVE-2022-22965. | https://github.com/Snip3R69/spring-shell-vuln | POC Details |
| 41 | Spring4Shell is a critical RCE vulnerability in the Java Spring Framework and is one of three related vulnerabilities published on March 30 | https://github.com/0xr1l3s/CVE-2022-22965 | POC Details |
| 42 | Spring Framework RCE Exploit | https://github.com/luoqianlin/CVE-2022-22965 | POC Details |
| 43 | Exploit Of Spring4Shell! | https://github.com/0xrobiul/CVE-2022-22965 | POC Details |
| 44 | A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. | https://github.com/LudovicPatho/CVE-2022-22965_Spring4Shell | POC Details |
| 45 | None | https://github.com/irgoncalves/irule-cve-2022-22965 | POC Details |
| 46 | The demo code showing the recent Spring4Shell RCE (CVE-2022-22965) | https://github.com/datawiza-inc/spring-rec-demo | POC Details |
| 47 | Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive) | https://github.com/alt3kx/CVE-2022-22965 | POC Details |
| 48 | CVE-2022-22965 pocsuite3 POC | https://github.com/wikiZ/springboot_CVE-2022-22965 | POC Details |
| 49 | CVE-2022-22965写入冰蝎webshell脚本 | https://github.com/4nth0ny1130/spring4shell_behinder | POC Details |
| 50 | Spring4Shell PoC (CVE-2022-22965) | https://github.com/t3amj3ff/Spring4ShellPoC | POC Details |
| 51 | None | https://github.com/CalumHutton/CVE-2022-22965-PoC_Payara | POC Details |
| 52 | None | https://github.com/fransvanbuul/CVE-2022-22965-susceptibility | POC Details |
| 53 | Script to check for Spring4Shell vulnerability | https://github.com/jrgdiaz/Spring4Shell-CVE-2022-22965.py | POC Details |
| 54 | Spring4Shell , Spring Framework RCE (CVE-2022-22965) , Burpsuite Plugin | https://github.com/Loneyers/Spring4Shell | POC Details |
| 55 | spring4shell | CVE-2022-22965 | https://github.com/p1ckzi/CVE-2022-22965 | POC Details |
| 56 | exploitation script tryhackme | https://github.com/Omaraitbenhaddi/-Spring4Shell-CVE-2022-22965- | POC Details |
| 57 | None | https://github.com/c4mx/CVE-2022-22965_PoC | POC Details |
| 58 | None | https://github.com/mariomamo/CVE-2022-22965 | POC Details |
| 59 | None | https://github.com/khidottrivi/CVE-2022-22965 | POC Details |
| 60 | None | https://github.com/Enokiy/spring-RCE-CVE-2022-22965 | POC Details |
| 61 | CVE-2022-22965 Spring4Shell research & PoC | https://github.com/cxzero/CVE-2022-22965-spring4shell | POC Details |
| 62 | burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977 | https://github.com/tpt11fb/SpringVulScan | POC Details |
| 63 | EXP for Spring4Shell(CVE-2022-22965) | https://github.com/D1mang/Spring4Shell-CVE-2022-22965 | POC Details |
| 64 | CVE-2022-22965图形化检测工具 | https://github.com/iloveflag/Fast-CVE-2022-22965 | POC Details |
| 65 | None | https://github.com/ClemExp/CVE-2022-22965-PoC | POC Details |
| 66 | CVE-2022-22965 proof of concept | https://github.com/clemoregan/SSE4-CVE-2022-22965 | POC Details |
| 67 | None | https://github.com/devengpk/CVE-2022-22965 | POC Details |
| 68 | CVE-2022-22965\Spring-Core-RCE核弹级别漏洞的rce图形化GUI一键利用工具,基于JavaFx开发,图形化操作更简单,提高效率。 | https://github.com/zangcc/CVE-2022-22965-rexbb | POC Details |
| 69 | User friendly Spring4Shell POC | https://github.com/ajith737/Spring4Shell-CVE-2022-22965-POC | POC Details |
| 70 | 🚀 Exploit for Spring core RCE in C [ wip ] | https://github.com/c33dd/CVE-2022-22965 | POC Details |
| 71 | Demonstrable Proof of Concept Exploit for Spring4Shell Vulnerability (CVE-2022-22965) | https://github.com/gokul-ramesh/Spring4Shell-PoC-exploit | POC Details |
| 72 | A simple python script for a firewall rule that blocks incoming requests based on the Spring4Shell (CVE-2022-22965) vulnerability | https://github.com/bL34cHig0/Telstra-Cybersecurity-Virtual-Experience- | POC Details |
| 73 | Poc&Exp,支持批量扫描,反弹shell | https://github.com/BKLockly/CVE-2022-22965 | POC Details |
| 74 | Spring rce environment for CVE-2022-22965 | https://github.com/dbgee/Spring4Shell | POC Details |
| 75 | PoC and exploit for CVE-2022-22965 Spring4Shell | https://github.com/jakabakos/CVE-2022-22965-Spring4Shell | POC Details |
| 76 | A quick python script that automates the exploitation of the second deadliest Java based vulnerability CVE-2022-22965. | https://github.com/h4ck0rman/Spring4Shell-PoC | POC Details |
| 77 | None | https://github.com/sohamsharma966/Spring4Shell-CVE-2022-22965 | POC Details |
| 78 | Spring4Shell Vulnerability RCE - CVE-2022-22965 | https://github.com/LucasPDiniz/CVE-2022-22965 | POC Details |
| 79 | None | https://github.com/xsxtw/SpringFramework_CVE-2022-22965_RCE | POC Details |
| 80 | Script to check for Spring4Shell vulnerability | https://github.com/te5t321/Spring4Shell-CVE-2022-22965.py | POC Details |
| 81 | None | https://github.com/guigui237/Expoitation-de-la-vuln-rabilit-CVE-2022-22965 | POC Details |
| 82 | POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploit | https://github.com/BlackBird63030/Block-Spring4Shell | POC Details |
| 83 | POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploit | https://github.com/SkyM1raj/Block-Spring4Shell | POC Details |
| 84 | POC firewall with rules designed to detect and block Spring4Shell vulnerability (CVE-2022-22965) exploit | https://github.com/Aur3ns/Block-Spring4Shell | POC Details |
| 85 | In this challenge, I analyzed the Spring4Shell (CVE-2022-22965) vulnerability, investigated security bypasses, and wrote an Incident Postmortem Report detailing the detection, impact, and resolution of the attack. I also implemented a firewall rule in Python to block malicious requests and prevent future exploitation. | https://github.com/jashan-lefty/Spring4Shell | POC Details |
| 86 | spring-core单个图形化利用工具,CVE-2022-22965及修复方案已出 | https://github.com/Bouquets-ai/CVE-2022-22965-GUItools | POC Details |
| 87 | Spring MVC and Spring WebFlux applications running on Java Development Kit 9+ are susceptible to remote code execution via data binding. It requires the application to run on Tomcat as a WAR deployment. An attacker can execute malware, obtain sensitive information, modify data, and/or gain full control over a compromised system without entering necessary credentials. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-22965.yaml | POC Details |
| 88 | A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run on Tomcat as a WAR deployment. If the application is deployed as a Spring Boot executable jar, i.e. the default, it is not vulnerable to the exploit. However, the nature of the vulnerability is more general, and there may be other ways to exploit it. | https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2022/CVE-2022-22965.yaml | POC Details |
| 89 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Spring%20Data%20Binding%E4%B8%8EJDK%209%2B%E5%AF%BC%E8%87%B4%E7%9A%84%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E%20CVE-2022-22965.md | POC Details |
| 90 | https://github.com/vulhub/vulhub/blob/master/spring/CVE-2022-22965/README.md | POC Details | |
| 91 | Firewall rules to mitigate a zero-day vulnerability malware attack (CVE-2022-22965), known as Spring4Shell | https://github.com/ESSAFAR/Firewall-Rules | POC Details |
| 92 | SpringFramework 远程代码执行漏洞CVE-2022-22965 | https://github.com/SecNN/SpringFramework_CVE-2022-22965_RCE | POC Details |
| 93 | Hands-on lab on detecting and mitigating web app threats using OWASP ZAP, Burp Suite, and ModSecurity WAF (with OWASP CRS). Case study: Spring4Shell (CVE-2022-22965). Local Docker-based setup. | https://github.com/brunoh6/web-threat-mitigation | POC Details |
| 94 | (CVE-2022-22965)PoC 应用程序和漏洞利用 | https://github.com/ZapcoMan/spring4shell-vulnerable-application | POC Details |
| 95 | Spring4Shell (POC) | https://github.com/osungjinwoo/CVE-2022-22965 | POC Details |
| 96 | Python-based simulated firewall to detect and block Spring4Shell (CVE-2022-22965) exploit attempts. This project filters HTTP requests by identifying malicious payload patterns using a custom firewall_server.py and tests them with test_requests.py. | https://github.com/Nosie12/fire-wall-server | POC Details |
| 97 | 🔒 Spring4Shell Firewall Defense — Cybersecurity Incident Simulation This project is part of a Cybersecurity Job Simulation I completed in August 2025 through Forage. It focuses on detecting, analyzing, and mitigating a simulated real-world cyberattack involving the Spring4Shell (CVE-2022-22965) vulnerability | https://github.com/salo-404/firewall | POC Details |
| 98 | None | https://github.com/shoucheng3/spring-projects__spring-framework_CVE-2022-22965_5-2-19-RELEASE | POC Details |
| 99 | Cybersecurity simulation showcasing SOC analyst skills in malware triage, incident response, and vulnerability management (Spring4Shell CVE-2022-22965). | https://github.com/Toph404/telstra-cyber-analyst-job-simulation | POC Details |
| 100 | Proof-of-Concept (POC) of a simple firewall in Python designed to mitigate the Spring4Shell (CVE-2022-22965) RCE attack by inspecting and blocking malicious request bodies. | https://github.com/NickoPS87/Spring4Shell-Python-Firewall-POC | POC Details |
| 101 | CVE-2022-22965 proof of concept for CS4239 report | https://github.com/xenosf/CS4239-Spring4Shell-POC | POC Details |
| 102 | Fully automated Spring4Shell (CVE-2022-22965) + GitLab RCE framework | https://github.com/mylo-2001/GhostStrike | POC Details |
| 103 | A Remote Code Execution exploit targeting Spring Framework vulnerability CVE-2022-22965 💀 | https://github.com/Hghost0x00/CVE-2022-22965 | POC Details |
| 104 | None | https://github.com/dbwlsdnr95/CVE-2022-22965-spring4shell | POC Details |
| 105 | None | https://github.com/nhattanhh/CVE-2022-22965 | POC Details |
| 106 | CVE-2022-22965 - Spring4Shell | https://github.com/Anon2Fear/CVE-2022-22965 | POC Details |
| 107 | A comprehensive Security Operations Centre (SOC) incident response simulation demonstrating threat detection, triage, analysis, and mitigation of the Spring4Shell vulnerability (CVE-2022-22965). | https://github.com/Shakur1314/CVE-2022-22965-Spring4Shell-Security-Operations-Analysis | POC Details |
| 108 | None | https://github.com/dbwlsdnr95/CVE-2022-22965 | POC Details |
| 109 | Spring4Shell (CVE-2022-22965) DFIR lab with exploit simulation, Python WAF, IOC-based detection, and PCAP analysis. | https://github.com/suyash-R-K/dfir-malware-investigation | POC Details |
| 110 | None | https://github.com/aditidutta696-dev/Spring4Shell-CVE-2022-22965-Exploitation-Attempt | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-25017 | 9.1 CRITICAL | Hitron Technologies CHITA Router Firmware 操作系统命令注入漏洞 |
| CVE-2022-21235 | 8.1 HIGH | Command Injection |
| CVE-2022-24440 | 8.1 HIGH | Command Injection |
| CVE-2022-21223 | 8.1 HIGH | Command Injection |
| CVE-2022-24066 | 8.1 HIGH | Command Injection |
| CVE-2022-22950 | Vmware Spring Framework 安全漏洞 | |
| CVE-2021-20238 | Red Hat OpenShift Container Platform 访问控制错误漏洞 | |
| CVE-2021-32503 | SICK FieldEcho 资源管理错误漏洞 | |
| CVE-2021-3461 | Red Hat Keycloak代码问题漏洞 | |
| CVE-2021-20295 | Red Hat Enterprise Linux 缓冲区错误漏洞 | |
| CVE-2021-27223 | Kaspersky Anti-Virus安全漏洞 | |
| CVE-2022-27534 | Kaspersky Anti-Virus 安全漏洞 | |
| CVE-2022-25155 | Mitsubishi Electric MELSEC iQ-F series 授权问题漏洞 | |
| CVE-2022-25156 | Mitsubishi Electric MELSEC iQ-F series 加密问题漏洞 | |
| CVE-2022-25157 | Mitsubishi Electric MELSEC iQ-F series 授权问题漏洞 | |
| CVE-2022-25159 | Mitsubishi Electric MELSEC iQ-F series 安全漏洞 | |
| CVE-2022-25158 | Mitsubishi Electric MELSEC iQ-F series 安全漏洞 | |
| CVE-2022-25160 | Mitsubishi Electric Factory Automation 安全漏洞 | |
| CVE-2021-3847 | Linux kernel 安全漏洞 | |
| CVE-2019-14839 | Business-central 信息泄露漏洞 |
Showing top 20 of 32 CVEs. View all on vendor page → →
No comments yet