PoC-in-GitHub/2016/CVE-2016-8716.json

31 lines
1.3 KiB
JSON
Raw Normal View History

2022-07-05 21:17:50 +09:00
[
{
2022-12-28 03:21:20 +09:00
"id": 582723605,
"name": "CVE-2016-8716",
"full_name": "Live-Hack-CVE\/CVE-2016-8716",
2022-07-05 21:17:50 +09:00
"owner": {
2022-12-23 09:25:42 +09:00
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
2022-07-05 21:17:50 +09:00
},
2022-12-28 03:21:20 +09:00
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-8716",
"description": "An exploitable Cleartext Transmission of Password vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. The Change Password functionality of the Web Application transmits the password in cleartext. An attacker capable of intercepting this traffic is able CVE project by @Sn0wAlice",
2022-07-05 21:17:50 +09:00
"fork": false,
2022-12-28 03:21:20 +09:00
"created_at": "2022-12-27T17:30:44Z",
"updated_at": "2022-12-27T17:30:44Z",
"pushed_at": "2022-12-27T17:30:46Z",
2022-07-05 21:17:50 +09:00
"stargazers_count": 0,
"watchers_count": 0,
2022-11-08 09:17:44 +09:00
"has_discussions": false,
2022-07-05 21:17:50 +09:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]