[ { "id": 764046735, "name": "CVE-2024-1071", "full_name": "gbrsh\/CVE-2024-1071", "owner": { "login": "gbrsh", "id": 36970331, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4", "html_url": "https:\/\/github.com\/gbrsh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gbrsh\/CVE-2024-1071", "description": "Ultimate Member Unauthorized Database Access \/ SQLi", "fork": false, "created_at": "2024-02-27T11:41:53Z", "updated_at": "2024-11-20T16:30:41Z", "pushed_at": "2024-02-27T11:45:50Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 767118935, "name": "CVE-2024-1071-Docker", "full_name": "Trackflaw\/CVE-2024-1071-Docker", "owner": { "login": "Trackflaw", "id": 78696986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4", "html_url": "https:\/\/github.com\/Trackflaw", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-1071-Docker", "description": "CVE-2024-1071 with Docker", "fork": false, "created_at": "2024-03-04T18:29:17Z", "updated_at": "2025-01-05T11:01:25Z", "pushed_at": "2024-03-05T18:35:42Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 773939193, "name": "CVE-2024-1071", "full_name": "Matrexdz\/CVE-2024-1071", "owner": { "login": "Matrexdz", "id": 161771152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161771152?v=4", "html_url": "https:\/\/github.com\/Matrexdz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Matrexdz\/CVE-2024-1071", "description": "CVE-2024-1071", "fork": false, "created_at": "2024-03-18T16:58:46Z", "updated_at": "2024-03-18T17:12:07Z", "pushed_at": "2024-03-18T17:04:20Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 773943544, "name": "CVE-2024-1071-Docker", "full_name": "Matrexdz\/CVE-2024-1071-Docker", "owner": { "login": "Matrexdz", "id": 161771152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161771152?v=4", "html_url": "https:\/\/github.com\/Matrexdz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Matrexdz\/CVE-2024-1071-Docker", "description": null, "fork": false, "created_at": "2024-03-18T17:07:27Z", "updated_at": "2024-03-18T17:12:06Z", "pushed_at": "2024-03-18T17:09:50Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 849694443, "name": "CVE-2024-1071-SQL-Injection", "full_name": "gh-ost00\/CVE-2024-1071-SQL-Injection", "owner": { "login": "gh-ost00", "id": 153366162, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4", "html_url": "https:\/\/github.com\/gh-ost00", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-1071-SQL-Injection", "description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited", "fork": false, "created_at": "2024-08-30T04:23:04Z", "updated_at": "2025-01-12T06:37:01Z", "pushed_at": "2024-08-30T05:10:51Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 13, "score": 0, "subscribers_count": 1 }, { "id": 857700493, "name": "WordPress-Exploit-CVE-2024-1071", "full_name": "Dogu589\/WordPress-Exploit-CVE-2024-1071", "owner": { "login": "Dogu589", "id": 73641405, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73641405?v=4", "html_url": "https:\/\/github.com\/Dogu589", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Dogu589\/WordPress-Exploit-CVE-2024-1071", "description": null, "fork": false, "created_at": "2024-09-15T11:28:47Z", "updated_at": "2024-10-03T20:08:55Z", "pushed_at": "2024-09-15T12:28:57Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 881948753, "name": "CVE-2024-1071-PoC-Script", "full_name": "Spid3heX\/CVE-2024-1071-PoC-Script", "owner": { "login": "Spid3heX", "id": 183846301, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183846301?v=4", "html_url": "https:\/\/github.com\/Spid3heX", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Spid3heX\/CVE-2024-1071-PoC-Script", "description": "wp\/ultimate-member - SQL Injection Vulnerability Exploit Script.", "fork": false, "created_at": "2024-11-01T14:57:34Z", "updated_at": "2024-11-03T03:53:40Z", "pushed_at": "2024-11-01T18:14:34Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]