mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
||
{
|
||
"id": 582778329,
|
||
"name": "CVE-2019-18265",
|
||
"full_name": "Live-Hack-CVE\/CVE-2019-18265",
|
||
"owner": {
|
||
"login": "Live-Hack-CVE",
|
||
"id": 121191732,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
||
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2019-18265",
|
||
"description": "Digital Alert Systems’ DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability that allows remote attackers to inject arbitrary web script or HTML via the SSH username, username field of the login page, or via the HTTP host header. The injected content is stored in logs and rendered whe CVE project by @Sn0wAlice",
|
||
"fork": false,
|
||
"created_at": "2022-12-27T21:00:40Z",
|
||
"updated_at": "2022-12-27T21:00:40Z",
|
||
"pushed_at": "2022-12-27T21:00:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |