PoC-in-GitHub/2023/CVE-2023-1454.json
2023-09-19 15:28:34 +09:00

182 lines
No EOL
6.3 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 618236086,
"name": "CVE-2023-1454",
"full_name": "gobysec\/CVE-2023-1454",
"owner": {
"login": "gobysec",
"id": 50955360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50955360?v=4",
"html_url": "https:\/\/github.com\/gobysec"
},
"html_url": "https:\/\/github.com\/gobysec\/CVE-2023-1454",
"description": "jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)",
"fork": false,
"created_at": "2023-03-24T03:02:33Z",
"updated_at": "2023-08-20T09:00:39Z",
"pushed_at": "2023-04-03T01:36:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 626193940,
"name": "CVE-2023-1454",
"full_name": "cjybao\/CVE-2023-1454",
"owner": {
"login": "cjybao",
"id": 61445855,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61445855?v=4",
"html_url": "https:\/\/github.com\/cjybao"
},
"html_url": "https:\/\/github.com\/cjybao\/CVE-2023-1454",
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc",
"fork": false,
"created_at": "2023-04-11T01:41:16Z",
"updated_at": "2023-07-25T07:41:14Z",
"pushed_at": "2023-04-07T03:41:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 627250763,
"name": "CVE-2023-1454-EXP",
"full_name": "CKevens\/CVE-2023-1454-EXP",
"owner": {
"login": "CKevens",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/CKevens"
},
"html_url": "https:\/\/github.com\/CKevens\/CVE-2023-1454-EXP",
"description": "CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability",
"fork": false,
"created_at": "2023-04-13T04:51:41Z",
"updated_at": "2023-04-25T01:38:35Z",
"pushed_at": "2023-04-13T04:53:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 627599065,
"name": "CVE-2023-1454",
"full_name": "BugFor-Pings\/CVE-2023-1454",
"owner": {
"login": "BugFor-Pings",
"id": 96440773,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96440773?v=4",
"html_url": "https:\/\/github.com\/BugFor-Pings"
},
"html_url": "https:\/\/github.com\/BugFor-Pings\/CVE-2023-1454",
"description": "CVE-2023-1454漏洞检测脚本",
"fork": false,
"created_at": "2023-04-13T19:56:47Z",
"updated_at": "2023-04-13T20:33:08Z",
"pushed_at": "2023-04-13T20:33:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 630844635,
"name": "CVE-2023-1454",
"full_name": "padbergpete47\/CVE-2023-1454",
"owner": {
"login": "padbergpete47",
"id": 61945676,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61945676?v=4",
"html_url": "https:\/\/github.com\/padbergpete47"
},
"html_url": "https:\/\/github.com\/padbergpete47\/CVE-2023-1454",
"description": "CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测",
"fork": false,
"created_at": "2023-04-21T09:27:45Z",
"updated_at": "2023-07-12T20:04:13Z",
"pushed_at": "2023-04-21T09:39:29Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},
{
"id": 656080043,
"name": "CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
"full_name": "Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
"owner": {
"login": "Sweelg",
"id": 86879265,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879265?v=4",
"html_url": "https:\/\/github.com\/Sweelg"
},
"html_url": "https:\/\/github.com\/Sweelg\/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln",
"description": "jmreport\/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。",
"fork": false,
"created_at": "2023-06-20T08:12:49Z",
"updated_at": "2023-09-04T01:39:58Z",
"pushed_at": "2023-06-20T08:51:47Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 18,
"score": 0,
"subscribers_count": 1
}
]