PoC-in-GitHub/2024/CVE-2024-9326.json

33 lines
1.3 KiB
JSON
Raw Normal View History

2025-01-08 01:32:44 +01:00
[
{
"id": 895094470,
"name": "CVE-2024-9326-PoC",
"full_name": "ghostwirez\/CVE-2024-9326-PoC",
"owner": {
"login": "ghostwirez",
"id": 64195231,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64195231?v=4",
"html_url": "https:\/\/github.com\/ghostwirez",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ghostwirez\/CVE-2024-9326-PoC",
"description": "This PoC script is designed to verify the presence of CVE-2024-9326, a high SQL Injection vulnerability in PHPGurukul Online Shopping Portal v2.0. It automates the exploitation process to determine if the target web application is vulnerable, allowing security professionals to assess and confirm the flaw's existence.",
"fork": false,
"created_at": "2024-11-27T14:49:54Z",
"updated_at": "2024-11-27T14:52:57Z",
"pushed_at": "2024-11-27T14:52:42Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]