Auto Update 2024/07/30 06:29:34

This commit is contained in:
motikan2010-bot 2024-07-30 15:29:34 +09:00
parent ca647f673c
commit 27e2043fe9
37 changed files with 200 additions and 99 deletions

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2024-07-29T15:24:25Z",
"updated_at": "2024-07-30T04:47:16Z",
"pushed_at": "2024-06-16T15:35:20Z",
"stargazers_count": 939,
"watchers_count": 939,
"stargazers_count": 940,
"watchers_count": 940,
"has_discussions": false,
"forks_count": 179,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 179,
"watchers": 939,
"watchers": 940,
"score": 0,
"subscribers_count": 18
},

View file

@ -253,10 +253,10 @@
"description": null,
"fork": false,
"created_at": "2020-02-21T09:56:19Z",
"updated_at": "2024-03-13T14:58:31Z",
"updated_at": "2024-07-30T04:05:35Z",
"pushed_at": "2020-02-28T07:08:16Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -265,7 +265,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 8,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,8 +13,8 @@
"description": null,
"fork": false,
"created_at": "2024-07-29T07:11:06Z",
"updated_at": "2024-07-29T07:24:58Z",
"pushed_at": "2024-07-29T07:24:55Z",
"updated_at": "2024-07-30T05:31:37Z",
"pushed_at": "2024-07-30T05:31:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -133,10 +133,10 @@
"description": "Spring Cloud Gateway < 3.0.7 & < 3.1.1 Code Injection (RCE)",
"fork": false,
"created_at": "2022-03-03T18:26:18Z",
"updated_at": "2024-07-07T13:53:46Z",
"updated_at": "2024-07-30T02:53:34Z",
"pushed_at": "2022-03-04T21:10:45Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
},

View file

@ -18,7 +18,7 @@
"stargazers_count": 75,
"watchers_count": 75,
"has_discussions": false,
"forks_count": 17,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -36,7 +36,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 17,
"forks": 18,
"watchers": 75,
"score": 0,
"subscribers_count": 3

View file

@ -150,7 +150,7 @@
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -164,7 +164,7 @@
"text4shell"
],
"visibility": "public",
"forks": 28,
"forks": 29,
"watchers": 76,
"score": 0,
"subscribers_count": 1

View file

@ -73,10 +73,10 @@
"description": "Using CVE-2023-21768 to manual map kernel mode driver ",
"fork": false,
"created_at": "2023-03-10T19:08:28Z",
"updated_at": "2024-07-29T21:25:57Z",
"updated_at": "2024-07-30T05:34:22Z",
"pushed_at": "2023-03-10T20:16:53Z",
"stargazers_count": 168,
"watchers_count": 168,
"stargazers_count": 170,
"watchers_count": 170,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -93,7 +93,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 168,
"watchers": 170,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)",
"fork": false,
"created_at": "2023-02-24T13:54:42Z",
"updated_at": "2024-06-20T07:40:51Z",
"updated_at": "2024-07-30T00:32:09Z",
"pushed_at": "2023-02-24T13:29:38Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 108,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 108,
"watchers": 41,
"watchers": 42,
"score": 0,
"subscribers_count": 1
},
@ -227,10 +227,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-07-24T11:11:22Z",
"updated_at": "2024-07-30T00:36:58Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -239,7 +239,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 2
}

View file

@ -2,14 +2,14 @@
{
"id": 666237071,
"name": "CVE-2023-33592",
"full_name": "FuckingHack3r\/CVE-2023-33592",
"full_name": "ChineseOldboy\/CVE-2023-33592",
"owner": {
"login": "FuckingHack3r",
"login": "ChineseOldboy",
"id": 102947998,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102947998?v=4",
"html_url": "https:\/\/github.com\/FuckingHack3r"
"html_url": "https:\/\/github.com\/ChineseOldboy"
},
"html_url": "https:\/\/github.com\/FuckingHack3r\/CVE-2023-33592",
"html_url": "https:\/\/github.com\/ChineseOldboy\/CVE-2023-33592",
"description": "CVE-2023-33592批量漏洞利用程序",
"fork": false,
"created_at": "2023-07-14T03:15:13Z",

View file

@ -103,10 +103,10 @@
"description": "Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE",
"fork": false,
"created_at": "2023-08-24T22:24:34Z",
"updated_at": "2024-07-29T22:11:42Z",
"updated_at": "2024-07-30T04:31:56Z",
"pushed_at": "2023-08-25T00:30:01Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 190,
"watchers_count": 190,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 186,
"watchers": 190,
"score": 0,
"subscribers_count": 4
}

32
2023/CVE-2023-43040.json Normal file
View file

@ -0,0 +1,32 @@
[
{
"id": 835371220,
"name": "CVE-2023-43040",
"full_name": "riza\/CVE-2023-43040",
"owner": {
"login": "riza",
"id": 2565849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2565849?v=4",
"html_url": "https:\/\/github.com\/riza"
},
"html_url": "https:\/\/github.com\/riza\/CVE-2023-43040",
"description": "CVE-2023-43040 PoC",
"fork": false,
"created_at": "2024-07-29T17:39:14Z",
"updated_at": "2024-07-30T05:53:26Z",
"pushed_at": "2024-07-29T17:53:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2024-07-25T11:41:29Z",
"updated_at": "2024-07-30T06:26:55Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 379,
"watchers_count": 379,
"stargazers_count": 378,
"watchers_count": 378,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 379,
"watchers": 378,
"score": 0,
"subscribers_count": 5
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13",
"fork": false,
"created_at": "2024-06-18T12:30:53Z",
"updated_at": "2024-07-29T11:52:05Z",
"updated_at": "2024-07-30T01:39:47Z",
"pushed_at": "2024-07-25T18:12:57Z",
"stargazers_count": 164,
"watchers_count": 164,
"stargazers_count": 165,
"watchers_count": 165,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 164,
"watchers": 165,
"score": 0,
"subscribers_count": 5
},

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -103,10 +103,10 @@
"description": "CVE-2024-20931, this is the bypass of the patch of CVE-2023-21839",
"fork": false,
"created_at": "2024-02-06T15:09:33Z",
"updated_at": "2024-07-24T11:11:22Z",
"updated_at": "2024-07-30T00:36:58Z",
"pushed_at": "2024-02-06T15:56:12Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 52,
"watchers": 53,
"score": 0,
"subscribers_count": 2
}

View file

@ -48,13 +48,13 @@
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1

View file

@ -895,13 +895,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2

View file

@ -600,10 +600,10 @@
"description": "This repository contains a proof-of-concept (PoC) exploit for CVE-2024-24919, a critical vulnerability discovered in Check Point SVN. The vulnerability allows for reading system files. CVE ID: CVE-2024-24919",
"fork": false,
"created_at": "2024-05-31T18:14:19Z",
"updated_at": "2024-06-09T05:24:59Z",
"updated_at": "2024-07-30T02:29:31Z",
"pushed_at": "2024-06-05T16:13:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -612,7 +612,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -1813,10 +1813,10 @@
"description": "GNU IFUNC is the real culprit behind CVE-2024-3094",
"fork": false,
"created_at": "2024-07-05T18:36:16Z",
"updated_at": "2024-07-28T17:20:18Z",
"updated_at": "2024-07-30T04:14:28Z",
"pushed_at": "2024-07-25T19:17:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1840,7 +1840,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Making a lab and testing the CVE-2024-3116, a Remote Code Execution in pgadmin <=8.4",
"fork": false,
"created_at": "2024-04-07T23:03:55Z",
"updated_at": "2024-05-15T07:27:30Z",
"updated_at": "2024-07-30T05:59:57Z",
"pushed_at": "2024-04-11T01:38:55Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -1599,8 +1599,8 @@
"description": "A Reverse shell generator for gitlab-shell vulnerability cve 2024-32002",
"fork": false,
"created_at": "2024-07-28T14:22:01Z",
"updated_at": "2024-07-28T15:33:38Z",
"pushed_at": "2024-07-28T15:33:35Z",
"updated_at": "2024-07-30T04:17:31Z",
"pushed_at": "2024-07-30T04:17:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -1643,7 +1643,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 835173287,
@ -1680,6 +1680,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -523,5 +523,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 835555212,
"name": "CVE-2024-34102-RCE",
"full_name": "etx-Arn\/CVE-2024-34102-RCE",
"owner": {
"login": "etx-Arn",
"id": 176983349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176983349?v=4",
"html_url": "https:\/\/github.com\/etx-Arn"
},
"html_url": "https:\/\/github.com\/etx-Arn\/CVE-2024-34102-RCE",
"description": "CVE-2024-34102 unauthenticated RCE PoC for Magento\/adobe commerce",
"fork": false,
"created_at": "2024-07-30T04:42:45Z",
"updated_at": "2024-07-30T04:45:20Z",
"pushed_at": "2024-07-30T04:45:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -63,6 +63,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2024-07-09T19:44:40Z",
"updated_at": "2024-07-19T09:09:54Z",
"updated_at": "2024-07-30T02:28:42Z",
"pushed_at": "2024-07-09T20:21:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2024-07-29T08:33:12Z",
"updated_at": "2024-07-29T08:36:41Z",
"pushed_at": "2024-07-29T09:13:08Z",
"pushed_at": "2024-07-30T06:32:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
@ -27,6 +27,6 @@
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "POC for CVE-2024-40348. Will attempt to read \/etc\/passwd from target",
"fork": false,
"created_at": "2024-07-21T00:54:55Z",
"updated_at": "2024-07-29T16:37:39Z",
"updated_at": "2024-07-30T03:58:55Z",
"pushed_at": "2024-07-21T09:54:02Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 21,
"watchers": 22,
"score": 0,
"subscribers_count": 2
}

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks.",
"fork": false,
"created_at": "2024-07-19T03:51:54Z",
"updated_at": "2024-07-28T15:35:25Z",
"updated_at": "2024-07-30T03:01:22Z",
"pushed_at": "2024-07-19T04:01:13Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 55,
"watchers": 56,
"score": 0,
"subscribers_count": 1
}

View file

@ -193,10 +193,10 @@
"description": "CVE-2024-4879 & CVE-2024-5217 ServiceNow RCE Scanning Using Nuclei & Shodan Dork to find it.",
"fork": false,
"created_at": "2024-07-28T06:51:33Z",
"updated_at": "2024-07-29T19:25:31Z",
"updated_at": "2024-07-30T03:22:43Z",
"pushed_at": "2024-07-28T07:53:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -205,7 +205,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -18,13 +18,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -2698,5 +2698,35 @@
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 835582804,
"name": "CVE-2024-6387",
"full_name": "l-urk\/CVE-2024-6387",
"owner": {
"login": "l-urk",
"id": 112792604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112792604?v=4",
"html_url": "https:\/\/github.com\/l-urk"
},
"html_url": "https:\/\/github.com\/l-urk\/CVE-2024-6387",
"description": "proof of concept python script for regreSSHion exploit",
"fork": false,
"created_at": "2024-07-30T06:13:11Z",
"updated_at": "2024-07-30T06:13:14Z",
"pushed_at": "2024-07-30T06:13:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -27,6 +27,6 @@
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
"subscribers_count": 2
}
]

View file

@ -1058,6 +1058,7 @@
- [ThatNotEasy/CVE-2024-6387](https://github.com/ThatNotEasy/CVE-2024-6387)
- [W1hithat/CVE-2024-6387](https://github.com/W1hithat/CVE-2024-6387)
- [prelearn-code/CVE-2024-6387](https://github.com/prelearn-code/CVE-2024-6387)
- [l-urk/CVE-2024-6387](https://github.com/l-urk/CVE-2024-6387)
### CVE-2024-6666 (2024-07-11)
@ -3114,6 +3115,7 @@
- [bughuntar/CVE-2024-34102](https://github.com/bughuntar/CVE-2024-34102)
- [bughuntar/CVE-2024-34102-Python](https://github.com/bughuntar/CVE-2024-34102-Python)
- [Phantom-IN/CVE-2024-34102](https://github.com/Phantom-IN/CVE-2024-34102)
- [etx-Arn/CVE-2024-34102-RCE](https://github.com/etx-Arn/CVE-2024-34102-RCE)
### CVE-2024-34144 (2024-05-02)
@ -7875,7 +7877,7 @@
<code>Lost and Found Information System v1.0 was discovered to contain a SQL injection vulnerability via the component /php-lfis/admin/?page=system_info/contact_information.
</code>
- [FuckingHack3r/CVE-2023-33592](https://github.com/FuckingHack3r/CVE-2023-33592)
- [ChineseOldboy/CVE-2023-33592](https://github.com/ChineseOldboy/CVE-2023-33592)
### CVE-2023-33617 (2023-05-23)
@ -9824,6 +9826,13 @@
- [d0rb/CVE-2023-42931](https://github.com/d0rb/CVE-2023-42931)
### CVE-2023-43040 (2024-05-13)
<code>IBM Spectrum Fusion HCI 2.5.2 through 2.7.2 could allow an attacker to perform unauthorized actions in RGW for Ceph due to improper bucket access. IBM X-Force ID: 266807.
</code>
- [riza/CVE-2023-43040](https://github.com/riza/CVE-2023-43040)
### CVE-2023-43115 (2023-09-18)
<code>In Artifex Ghostscript through 10.01.2, gdevijs.c in GhostPDL can lead to remote code execution via crafted PostScript documents because they can switch to the IJS device, or change the IjsServer parameter, after SAFER has been activated. NOTE: it is a documented risk that the IJS server can be specified on a gs command line (the IJS device inherently must execute a command to start the IJS server).