mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 582712606,
|
|
"name": "CVE-2022-44532",
|
|
"full_name": "Live-Hack-CVE\/CVE-2022-44532",
|
|
"owner": {
|
|
"login": "Live-Hack-CVE",
|
|
"id": 121191732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2022-44532",
|
|
"description": "An authenticated path traversal vulnerability exists in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files in Aruba EdgeConnect Enterprise Software vers CVE project by @Sn0wAlice",
|
|
"fork": false,
|
|
"created_at": "2022-12-27T16:51:14Z",
|
|
"updated_at": "2022-12-27T16:51:14Z",
|
|
"pushed_at": "2022-12-27T16:51:16Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |