mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
||
{
|
||
"id": 583266586,
|
||
"name": "CVE-2021-32672",
|
||
"full_name": "Live-Hack-CVE\/CVE-2021-32672",
|
||
"owner": {
|
||
"login": "Live-Hack-CVE",
|
||
"id": 121191732,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
||
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2021-32672",
|
||
"description": "Redis is an open source, in-memory database that persists on disk. When using the Redis Lua Debugger, users can send malformed requests that cause the debugger’s protocol parser to read data beyond the actual buffer. This issue affects all versions of Redis with Lua debugging support (3.2 or newer). The problem is fixe CVE project by @Sn0wAlice",
|
||
"fork": false,
|
||
"created_at": "2022-12-29T09:05:57Z",
|
||
"updated_at": "2022-12-29T09:05:57Z",
|
||
"pushed_at": "2022-12-29T09:05:59Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |