[ { "id": 393317108, "name": "CVE-2015-8351", "full_name": "G01d3nW01f\/CVE-2015-8351", "owner": { "login": "G01d3nW01f", "id": 75846902, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75846902?v=4", "html_url": "https:\/\/github.com\/G01d3nW01f", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/G01d3nW01f\/CVE-2015-8351", "description": "this script is exploit for wordpress old plugin gwolle", "fork": false, "created_at": "2021-08-06T08:51:41Z", "updated_at": "2023-01-11T15:03:02Z", "pushed_at": "2021-08-09T23:33:01Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 637605897, "name": "exploit-CVE-2015-8351", "full_name": "G4sp4rCS\/exploit-CVE-2015-8351", "owner": { "login": "G4sp4rCS", "id": 52015401, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52015401?v=4", "html_url": "https:\/\/github.com\/G4sp4rCS", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/G4sp4rCS\/exploit-CVE-2015-8351", "description": "WordPress Plugin Gwolle Guestbook 1.5.3 - Remote File Inclusion", "fork": false, "created_at": "2023-05-08T02:55:32Z", "updated_at": "2023-12-09T01:33:33Z", "pushed_at": "2023-05-08T03:04:35Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2015-8351", "cybersecurity", "hacking", "python", "wordpress" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 } ]