PoC-in-GitHub/2023/CVE-2023-24709.json
2023-11-03 15:25:04 +09:00

38 lines
No EOL
1.5 KiB
JSON

[
{
"id": 593598818,
"name": "Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC",
"full_name": "DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC",
"owner": {
"login": "DRAGOWN",
"id": 76569084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76569084?v=4",
"html_url": "https:\/\/github.com\/DRAGOWN"
},
"html_url": "https:\/\/github.com\/DRAGOWN\/Injection-vulnerability-in-Paradox-Security-Systems-IPR512-CVE-2023-24709-PoC",
"description": "In Paradox Security System IPR512 Web console login form page, attacker can input JavaScript string, such as \"<\/script>\" that will overwrite configurations in the file \"login.xml\" and cause the login page to crash. ",
"fork": false,
"created_at": "2023-01-26T12:13:51Z",
"updated_at": "2023-04-09T12:35:32Z",
"pushed_at": "2023-04-09T12:34:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-24709",
"paradox",
"security",
"systems"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]