PoC-in-GitHub/2025/CVE-2025-56772.json
2025-09-18 09:37:37 +09:00

33 lines
No EOL
1.3 KiB
JSON

[
{
"id": 1023210175,
"name": "CVE-2025-56772",
"full_name": "RRespxwnss\/CVE-2025-56772",
"owner": {
"login": "RRespxwnss",
"id": 100174458,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100174458?v=4",
"html_url": "https:\/\/github.com\/RRespxwnss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RRespxwnss\/CVE-2025-56772",
"description": "During the analysis of the website ecodotempo.com.br, a Stored Cross-Site Scripting (XSS) vulnerability was discovered. This vulnerability allows an attacker to inject malicious scripts into fields that are later rendered to other users without proper sanitization, specifically on the main page of the unauthenticated (logged-out) area.",
"fork": false,
"created_at": "2025-07-20T18:53:12Z",
"updated_at": "2025-09-17T23:06:07Z",
"pushed_at": "2025-07-20T20:50:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]