PoC-in-GitHub/2023/CVE-2023-24709.json

38 lines
1.5 KiB
JSON
Raw Normal View History

2023-04-09 21:29:09 +09:00
[
{
"id": 593598818,
"name": "Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC",
2023-05-06 21:28:28 +09:00
"full_name": "DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC",
2023-04-09 21:29:09 +09:00
"owner": {
2023-05-06 21:28:28 +09:00
"login": "DRAGOWN",
2023-04-09 21:29:09 +09:00
"id": 76569084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76569084?v=4",
2023-05-06 21:28:28 +09:00
"html_url": "https:\/\/github.com\/DRAGOWN"
2023-04-09 21:29:09 +09:00
},
2023-05-06 21:28:28 +09:00
"html_url": "https:\/\/github.com\/DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC",
2023-04-09 21:29:09 +09:00
"description": "In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as \"<\/script>\" that will overwrite configurations in the file \"login.xml\" and cause the login page to crash. ",
"fork": false,
"created_at": "2023-01-26T12:13:51Z",
2023-04-10 03:28:05 +09:00
"updated_at": "2023-04-09T12:35:32Z",
"pushed_at": "2023-04-09T12:34:56Z",
2023-04-09 21:29:09 +09:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
2023-06-17 03:36:12 +09:00
"forks_count": 1,
2023-04-09 21:29:09 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-24709",
"paradox",
"security",
"systems"
],
"visibility": "public",
2023-06-17 03:36:12 +09:00
"forks": 1,
2023-04-09 21:29:09 +09:00
"watchers": 0,
2023-06-19 22:46:37 +09:00
"score": 0,
"subscribers_count": 1
2023-04-09 21:29:09 +09:00
}
]