[ { "id": 808441201, "name": "CVE-2024-5522-Poc", "full_name": "truonghuuphuc\/CVE-2024-5522-Poc", "owner": { "login": "truonghuuphuc", "id": 20487674, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20487674?v=4", "html_url": "https:\/\/github.com\/truonghuuphuc", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/truonghuuphuc\/CVE-2024-5522-Poc", "description": "CVE-2024-5522 HTML5 Video Player <= 2.5.26 - Unauthenticated SQL Injection", "fork": false, "created_at": "2024-05-31T04:41:46Z", "updated_at": "2024-07-24T14:22:31Z", "pushed_at": "2024-05-31T06:44:16Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 855566883, "name": "CVE-2024-5522-PoC", "full_name": "kryptonproject\/CVE-2024-5522-PoC", "owner": { "login": "kryptonproject", "id": 147995594, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/147995594?v=4", "html_url": "https:\/\/github.com\/kryptonproject", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kryptonproject\/CVE-2024-5522-PoC", "description": null, "fork": false, "created_at": "2024-09-11T04:46:46Z", "updated_at": "2024-09-11T05:46:06Z", "pushed_at": "2024-09-11T05:46:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 866079798, "name": "CVE-2024-5522", "full_name": "geniuszlyy\/CVE-2024-5522", "owner": { "login": "geniuszlyy", "id": 137893386, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/137893386?v=4", "html_url": "https:\/\/github.com\/geniuszlyy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/geniuszlyy\/CVE-2024-5522", "description": "A PoC exploit scanner for CVE-2024-5522 vulnerability in WordPress websites", "fork": false, "created_at": "2024-10-01T16:02:12Z", "updated_at": "2024-11-20T16:31:06Z", "pushed_at": "2024-10-01T16:03:38Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "buffer-overflow", "cve", "cve-2024-5522", "cybersecurity", "ethical-hacking", "exploit", "exploit-development", "linux", "poc", "security", "vulnerability", "vulnerability-research", "wordpress", "wp" ], "visibility": "public", "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 3 } ]