mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
219 lines
No EOL
7.7 KiB
JSON
219 lines
No EOL
7.7 KiB
JSON
[
|
||
{
|
||
"id": 618236086,
|
||
"name": "CVE-2023-1454",
|
||
"full_name": "gobysec\/CVE-2023-1454",
|
||
"owner": {
|
||
"login": "gobysec",
|
||
"id": 50955360,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50955360?v=4",
|
||
"html_url": "https:\/\/github.com\/gobysec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gobysec\/CVE-2023-1454",
|
||
"description": "jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)",
|
||
"fork": false,
|
||
"created_at": "2023-03-24T03:02:33Z",
|
||
"updated_at": "2023-10-27T09:44:01Z",
|
||
"pushed_at": "2023-04-03T01:36:03Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 626193940,
|
||
"name": "CVE-2023-1454",
|
||
"full_name": "cjybao\/CVE-2023-1454",
|
||
"owner": {
|
||
"login": "cjybao",
|
||
"id": 61445855,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61445855?v=4",
|
||
"html_url": "https:\/\/github.com\/cjybao",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cjybao\/CVE-2023-1454",
|
||
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc",
|
||
"fork": false,
|
||
"created_at": "2023-04-11T01:41:16Z",
|
||
"updated_at": "2023-07-25T07:41:14Z",
|
||
"pushed_at": "2023-04-07T03:41:00Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 627250763,
|
||
"name": "CVE-2023-1454-EXP",
|
||
"full_name": "3yujw7njai\/CVE-2023-1454-EXP",
|
||
"owner": {
|
||
"login": "3yujw7njai",
|
||
"id": 7390055,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
|
||
"html_url": "https:\/\/github.com\/3yujw7njai",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2023-1454-EXP",
|
||
"description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability",
|
||
"fork": false,
|
||
"created_at": "2023-04-13T04:51:41Z",
|
||
"updated_at": "2024-06-26T04:41:26Z",
|
||
"pushed_at": "2023-04-13T04:53:53Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 627599065,
|
||
"name": "CVE-2023-1454",
|
||
"full_name": "BugFor-Pings\/CVE-2023-1454",
|
||
"owner": {
|
||
"login": "BugFor-Pings",
|
||
"id": 96440773,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96440773?v=4",
|
||
"html_url": "https:\/\/github.com\/BugFor-Pings",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BugFor-Pings\/CVE-2023-1454",
|
||
"description": "CVE-2023-1454漏洞检测脚本",
|
||
"fork": false,
|
||
"created_at": "2023-04-13T19:56:47Z",
|
||
"updated_at": "2023-04-13T20:33:08Z",
|
||
"pushed_at": "2023-04-13T20:33:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 630844635,
|
||
"name": "CVE-2023-1454",
|
||
"full_name": "padbergpete47\/CVE-2023-1454",
|
||
"owner": {
|
||
"login": "padbergpete47",
|
||
"id": 61945676,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61945676?v=4",
|
||
"html_url": "https:\/\/github.com\/padbergpete47",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/padbergpete47\/CVE-2023-1454",
|
||
"description": "CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测",
|
||
"fork": false,
|
||
"created_at": "2023-04-21T09:27:45Z",
|
||
"updated_at": "2024-07-15T09:29:53Z",
|
||
"pushed_at": "2023-04-21T09:39:29Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 656080043,
|
||
"name": "CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
|
||
"full_name": "Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
|
||
"owner": {
|
||
"login": "Sweelg",
|
||
"id": 86879265,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879265?v=4",
|
||
"html_url": "https:\/\/github.com\/Sweelg",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
|
||
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。",
|
||
"fork": false,
|
||
"created_at": "2023-06-20T08:12:49Z",
|
||
"updated_at": "2024-09-13T07:08:03Z",
|
||
"pushed_at": "2023-06-20T08:51:47Z",
|
||
"stargazers_count": 21,
|
||
"watchers_count": 21,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 21,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 737472483,
|
||
"name": "CVE-2023-1454-EXP",
|
||
"full_name": "shad0w0sec\/CVE-2023-1454-EXP",
|
||
"owner": {
|
||
"login": "shad0w0sec",
|
||
"id": 73059812,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73059812?v=4",
|
||
"html_url": "https:\/\/github.com\/shad0w0sec",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shad0w0sec\/CVE-2023-1454-EXP",
|
||
"description": "JeecgBoot SQL(CVE-2023-1454)sqlmap 注入不出来的情况可以使用该脚本",
|
||
"fork": false,
|
||
"created_at": "2023-12-31T06:47:01Z",
|
||
"updated_at": "2024-09-08T04:48:34Z",
|
||
"pushed_at": "2024-01-10T08:09:11Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |