[ { "id": 423093176, "name": "CVE-2021-28079", "full_name": "g33xter\/CVE-2021-28079", "owner": { "login": "g33xter", "id": 8503135, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8503135?v=4", "html_url": "https:\/\/github.com\/g33xter", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/g33xter\/CVE-2021-28079", "description": "POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.", "fork": false, "created_at": "2021-10-31T08:29:53Z", "updated_at": "2024-07-25T01:21:00Z", "pushed_at": "2021-10-31T08:57:19Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-28079", "electronjs", "jamovi", "omv", "xss-exploitation" ], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 2 } ]