mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
219 lines
No EOL
7.4 KiB
JSON
219 lines
No EOL
7.4 KiB
JSON
[
|
|
{
|
|
"id": 764046735,
|
|
"name": "CVE-2024-1071",
|
|
"full_name": "gbrsh\/CVE-2024-1071",
|
|
"owner": {
|
|
"login": "gbrsh",
|
|
"id": 36970331,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36970331?v=4",
|
|
"html_url": "https:\/\/github.com\/gbrsh",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gbrsh\/CVE-2024-1071",
|
|
"description": "Ultimate Member Unauthorized Database Access \/ SQLi",
|
|
"fork": false,
|
|
"created_at": "2024-02-27T11:41:53Z",
|
|
"updated_at": "2024-11-20T16:30:41Z",
|
|
"pushed_at": "2024-02-27T11:45:50Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 767118935,
|
|
"name": "CVE-2024-1071-Docker",
|
|
"full_name": "Trackflaw\/CVE-2024-1071-Docker",
|
|
"owner": {
|
|
"login": "Trackflaw",
|
|
"id": 78696986,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78696986?v=4",
|
|
"html_url": "https:\/\/github.com\/Trackflaw",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Trackflaw\/CVE-2024-1071-Docker",
|
|
"description": "CVE-2024-1071 with Docker",
|
|
"fork": false,
|
|
"created_at": "2024-03-04T18:29:17Z",
|
|
"updated_at": "2025-01-05T11:01:25Z",
|
|
"pushed_at": "2024-03-05T18:35:42Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 773939193,
|
|
"name": "CVE-2024-1071",
|
|
"full_name": "Matrexdz\/CVE-2024-1071",
|
|
"owner": {
|
|
"login": "Matrexdz",
|
|
"id": 161771152,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161771152?v=4",
|
|
"html_url": "https:\/\/github.com\/Matrexdz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Matrexdz\/CVE-2024-1071",
|
|
"description": "CVE-2024-1071",
|
|
"fork": false,
|
|
"created_at": "2024-03-18T16:58:46Z",
|
|
"updated_at": "2024-03-18T17:12:07Z",
|
|
"pushed_at": "2024-03-18T17:04:20Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 773943544,
|
|
"name": "CVE-2024-1071-Docker",
|
|
"full_name": "Matrexdz\/CVE-2024-1071-Docker",
|
|
"owner": {
|
|
"login": "Matrexdz",
|
|
"id": 161771152,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161771152?v=4",
|
|
"html_url": "https:\/\/github.com\/Matrexdz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Matrexdz\/CVE-2024-1071-Docker",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-03-18T17:07:27Z",
|
|
"updated_at": "2024-03-18T17:12:06Z",
|
|
"pushed_at": "2024-03-18T17:09:50Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 849694443,
|
|
"name": "CVE-2024-1071-SQL-Injection",
|
|
"full_name": "gh-ost00\/CVE-2024-1071-SQL-Injection",
|
|
"owner": {
|
|
"login": "gh-ost00",
|
|
"id": 153366162,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/153366162?v=4",
|
|
"html_url": "https:\/\/github.com\/gh-ost00",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gh-ost00\/CVE-2024-1071-SQL-Injection",
|
|
"description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited",
|
|
"fork": false,
|
|
"created_at": "2024-08-30T04:23:04Z",
|
|
"updated_at": "2025-01-12T06:37:01Z",
|
|
"pushed_at": "2024-08-30T05:10:51Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 13,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 857700493,
|
|
"name": "WordPress-Exploit-CVE-2024-1071",
|
|
"full_name": "Dogu589\/WordPress-Exploit-CVE-2024-1071",
|
|
"owner": {
|
|
"login": "Dogu589",
|
|
"id": 73641405,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73641405?v=4",
|
|
"html_url": "https:\/\/github.com\/Dogu589",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Dogu589\/WordPress-Exploit-CVE-2024-1071",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-09-15T11:28:47Z",
|
|
"updated_at": "2024-10-03T20:08:55Z",
|
|
"pushed_at": "2024-09-15T12:28:57Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 881948753,
|
|
"name": "CVE-2024-1071-PoC-Script",
|
|
"full_name": "Spid3heX\/CVE-2024-1071-PoC-Script",
|
|
"owner": {
|
|
"login": "Spid3heX",
|
|
"id": 183846301,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/183846301?v=4",
|
|
"html_url": "https:\/\/github.com\/Spid3heX",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Spid3heX\/CVE-2024-1071-PoC-Script",
|
|
"description": "wp\/ultimate-member - SQL Injection Vulnerability Exploit Script.",
|
|
"fork": false,
|
|
"created_at": "2024-11-01T14:57:34Z",
|
|
"updated_at": "2024-11-03T03:53:40Z",
|
|
"pushed_at": "2024-11-01T18:14:34Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |