[ { "id": 618236086, "name": "CVE-2023-1454", "full_name": "gobysec\/CVE-2023-1454", "owner": { "login": "gobysec", "id": 50955360, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50955360?v=4", "html_url": "https:\/\/github.com\/gobysec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gobysec\/CVE-2023-1454", "description": "jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)", "fork": false, "created_at": "2023-03-24T03:02:33Z", "updated_at": "2023-10-27T09:44:01Z", "pushed_at": "2023-04-03T01:36:03Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 626193940, "name": "CVE-2023-1454", "full_name": "cjybao\/CVE-2023-1454", "owner": { "login": "cjybao", "id": 61445855, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61445855?v=4", "html_url": "https:\/\/github.com\/cjybao", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cjybao\/CVE-2023-1454", "description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc", "fork": false, "created_at": "2023-04-11T01:41:16Z", "updated_at": "2023-07-25T07:41:14Z", "pushed_at": "2023-04-07T03:41:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 627250763, "name": "CVE-2023-1454-EXP", "full_name": "3yujw7njai\/CVE-2023-1454-EXP", "owner": { "login": "3yujw7njai", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/3yujw7njai", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2023-1454-EXP", "description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability", "fork": false, "created_at": "2023-04-13T04:51:41Z", "updated_at": "2024-06-26T04:41:26Z", "pushed_at": "2023-04-13T04:53:53Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 627599065, "name": "CVE-2023-1454", "full_name": "BugFor-Pings\/CVE-2023-1454", "owner": { "login": "BugFor-Pings", "id": 96440773, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96440773?v=4", "html_url": "https:\/\/github.com\/BugFor-Pings", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BugFor-Pings\/CVE-2023-1454", "description": "CVE-2023-1454漏洞检测脚本", "fork": false, "created_at": "2023-04-13T19:56:47Z", "updated_at": "2023-04-13T20:33:08Z", "pushed_at": "2023-04-13T20:33:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 630844635, "name": "CVE-2023-1454", "full_name": "padbergpete47\/CVE-2023-1454", "owner": { "login": "padbergpete47", "id": 61945676, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61945676?v=4", "html_url": "https:\/\/github.com\/padbergpete47", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/padbergpete47\/CVE-2023-1454", "description": "CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测", "fork": false, "created_at": "2023-04-21T09:27:45Z", "updated_at": "2024-07-15T09:29:53Z", "pushed_at": "2023-04-21T09:39:29Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 656080043, "name": "CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln", "full_name": "Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln", "owner": { "login": "Sweelg", "id": 86879265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879265?v=4", "html_url": "https:\/\/github.com\/Sweelg", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln", "description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。", "fork": false, "created_at": "2023-06-20T08:12:49Z", "updated_at": "2024-09-13T07:08:03Z", "pushed_at": "2023-06-20T08:51:47Z", "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 21, "score": 0, "subscribers_count": 1 }, { "id": 737472483, "name": "CVE-2023-1454-EXP", "full_name": "shad0w0sec\/CVE-2023-1454-EXP", "owner": { "login": "shad0w0sec", "id": 73059812, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73059812?v=4", "html_url": "https:\/\/github.com\/shad0w0sec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shad0w0sec\/CVE-2023-1454-EXP", "description": "JeecgBoot SQL(CVE-2023-1454)sqlmap 注入不出来的情况可以使用该脚本", "fork": false, "created_at": "2023-12-31T06:47:01Z", "updated_at": "2024-09-08T04:48:34Z", "pushed_at": "2024-01-10T08:09:11Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 } ]