PoC-in-GitHub/2024/CVE-2024-6624.json
2025-03-07 03:12:43 +09:00

40 lines
No EOL
1.3 KiB
JSON

[
{
"id": 928274419,
"name": "CVE-2024-6624",
"full_name": "Jenderal92\/CVE-2024-6624",
"owner": {
"login": "Jenderal92",
"id": 59664965,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59664965?v=4",
"html_url": "https:\/\/github.com\/Jenderal92",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jenderal92\/CVE-2024-6624",
"description": "This is a Python script that exploits the CVE-2024-6624 vulnerability in the JSON API User <= 3.9.3 plugin for WordPress. ",
"fork": false,
"created_at": "2025-02-06T11:11:07Z",
"updated_at": "2025-02-06T11:23:13Z",
"pushed_at": "2025-02-06T11:17:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6624",
"ethical-hacking-tools",
"json-api-user-exploit",
"privilege-escalation",
"python-exploit-scripts",
"wordpress-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]