PoC-in-GitHub/2025/CVE-2025-67906.json
2026-01-04 21:45:17 +09:00

51 lines
No EOL
1.6 KiB
JSON

[
{
"id": 1112669499,
"name": "CVE-2025-67906",
"full_name": "franckferman\/CVE-2025-67906",
"owner": {
"login": "franckferman",
"id": 73023545,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73023545?v=4",
"html_url": "https:\/\/github.com\/franckferman",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/franckferman\/CVE-2025-67906",
"description": "Proof of Concept exploit for a critical Stored XSS vulnerability in MISP <= 2.5.27 workflows, enabling persistent JavaScript and data exfiltration.",
"fork": false,
"created_at": "2025-12-09T00:10:27Z",
"updated_at": "2026-01-04T11:49:49Z",
"pushed_at": "2025-12-09T09:09:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"0day-exploit",
"0dayexploit",
"cve",
"cve-2025",
"cve-2025-67906",
"cybersecurity",
"exfiltrate-data",
"misp",
"misp-exploit",
"pentest",
"pentesting",
"stored-xss",
"stored-xss-exploit",
"xss",
"xss-exploitation",
"xss-vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]