PoC-in-GitHub/2016/CVE-2016-3113.json

30 lines
1.1 KiB
JSON
Raw Normal View History

2020-03-02 04:07:35 +01:00
[
{
"id": 244232476,
"name": "CVE-2016-3113",
"full_name": "0xEmanuel\/CVE-2016-3113",
"owner": {
"login": "0xEmanuel",
"id": 30754525,
2021-01-21 16:10:20 +01:00
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30754525?v=4",
2020-03-02 04:07:35 +01:00
"html_url": "https:\/\/github.com\/0xEmanuel"
},
"html_url": "https:\/\/github.com\/0xEmanuel\/CVE-2016-3113",
2020-11-09 22:09:54 +01:00
"description": "A proof of concept to exploit the reflected XSS vulnerability in the oVirt web interface (RedHat). In this PoC a VM in the oVirt IaaS environment is to be started via the victim's browser session. JS code has been kept simple due to the rush.",
2020-03-02 04:07:35 +01:00
"fork": false,
"created_at": "2020-03-01T22:17:31Z",
2020-11-09 22:09:54 +01:00
"updated_at": "2020-11-09T20:00:16Z",
"pushed_at": "2020-11-09T20:00:13Z",
2020-03-02 04:07:35 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required": false,
2021-10-06 23:13:51 +02:00
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2020-03-02 04:07:35 +01:00
"forks": 0,
"watchers": 0,
"score": 0
}
]