[
    {
        "id": 423093176,
        "name": "CVE-2021-28079",
        "full_name": "g33xter\/CVE-2021-28079",
        "owner": {
            "login": "g33xter",
            "id": 8503135,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8503135?v=4",
            "html_url": "https:\/\/github.com\/g33xter"
        },
        "html_url": "https:\/\/github.com\/g33xter\/CVE-2021-28079",
        "description": "POC Jamovi <=1.6.18 is affected by a cross-site scripting (XSS) vulnerability. The column-name is vulnerable to XSS in the ElectronJS Framework. An attacker can make a .omv (Jamovi) document containing a payload. When opened by victim, the payload is triggered.",
        "fork": false,
        "created_at": "2021-10-31T08:29:53Z",
        "updated_at": "2022-07-01T15:45:14Z",
        "pushed_at": "2021-10-31T08:57:19Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2021-28079",
            "electronjs",
            "jamovi",
            "omv",
            "xss-exploitation"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 3,
        "score": 0
    }
]