2023-04-09 21:29:09 +09:00
[
{
"id" : 593598818 ,
"name" : "Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC" ,
2023-05-06 21:28:28 +09:00
"full_name" : "DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC" ,
2023-04-09 21:29:09 +09:00
"owner" : {
2023-05-06 21:28:28 +09:00
"login" : "DRAGOWN" ,
2023-04-09 21:29:09 +09:00
"id" : 76569084 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76569084?v=4" ,
2023-05-06 21:28:28 +09:00
"html_url" : "https:\/\/github.com\/DRAGOWN"
2023-04-09 21:29:09 +09:00
} ,
2023-05-06 21:28:28 +09:00
"html_url" : "https:\/\/github.com\/DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC" ,
2023-04-09 21:29:09 +09:00
"description" : "In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as \"<\/script>\" that will overwrite configurations in the file \"login.xml\" and cause the login page to crash. " ,
"fork" : false ,
"created_at" : "2023-01-26T12:13:51Z" ,
2023-04-10 03:28:05 +09:00
"updated_at" : "2023-04-09T12:35:32Z" ,
"pushed_at" : "2023-04-09T12:34:56Z" ,
2023-04-09 21:29:09 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
2023-06-17 03:36:12 +09:00
"forks_count" : 1 ,
2023-04-09 21:29:09 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2023-24709" ,
"paradox" ,
"security" ,
"systems"
] ,
"visibility" : "public" ,
2023-06-17 03:36:12 +09:00
"forks" : 1 ,
2023-04-09 21:29:09 +09:00
"watchers" : 0 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2023-04-09 21:29:09 +09:00
}
]