mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
33 lines
No EOL
1.3 KiB
JSON
33 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 895094470,
|
|
"name": "CVE-2024-9326-PoC",
|
|
"full_name": "ghostwirez\/CVE-2024-9326-PoC",
|
|
"owner": {
|
|
"login": "ghostwirez",
|
|
"id": 64195231,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64195231?v=4",
|
|
"html_url": "https:\/\/github.com\/ghostwirez",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ghostwirez\/CVE-2024-9326-PoC",
|
|
"description": "This PoC script is designed to verify the presence of CVE-2024-9326, a high SQL Injection vulnerability in PHPGurukul Online Shopping Portal v2.0. It automates the exploitation process to determine if the target web application is vulnerable, allowing security professionals to assess and confirm the flaw's existence.",
|
|
"fork": false,
|
|
"created_at": "2024-11-27T14:49:54Z",
|
|
"updated_at": "2024-11-27T14:52:57Z",
|
|
"pushed_at": "2024-11-27T14:52:42Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |