mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-31 03:41:36 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 582723605,
|
|
"name": "CVE-2016-8716",
|
|
"full_name": "Live-Hack-CVE\/CVE-2016-8716",
|
|
"owner": {
|
|
"login": "Live-Hack-CVE",
|
|
"id": 121191732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2016-8716",
|
|
"description": "An exploitable Cleartext Transmission of Password vulnerability exists in the Web Application functionality of Moxa AWK-3131A Wireless Access Point running firmware 1.1. The Change Password functionality of the Web Application transmits the password in cleartext. An attacker capable of intercepting this traffic is able CVE project by @Sn0wAlice",
|
|
"fork": false,
|
|
"created_at": "2022-12-27T17:30:44Z",
|
|
"updated_at": "2022-12-27T17:30:44Z",
|
|
"pushed_at": "2022-12-27T17:30:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |