2025-01-08 09:32:44 +09:00
[
{
"id" : 593598818 ,
"name" : "Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC" ,
"full_name" : "DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC" ,
"owner" : {
"login" : "DRAGOWN" ,
"id" : 76569084 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76569084?v=4" ,
"html_url" : "https:\/\/github.com\/DRAGOWN" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC" ,
"description" : "In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as \"<\/script>\" that will overwrite configurations in the file \"login.xml\" and cause the login page to crash. " ,
"fork" : false ,
"created_at" : "2023-01-26T12:13:51Z" ,
2025-01-09 21:33:52 +09:00
"updated_at" : "2025-01-09T12:14:04Z" ,
2025-01-08 09:32:44 +09:00
"pushed_at" : "2023-04-09T12:34:56Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2023-24709" ,
"paradox" ,
"security" ,
"systems"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]