mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 03:20:10 +01:00
25 lines
No EOL
1.2 KiB
JSON
25 lines
No EOL
1.2 KiB
JSON
[
|
||
{
|
||
"id": 378112590,
|
||
"name": "CVE-2021-26928",
|
||
"full_name": "PwnCast\/CVE-2021-26928",
|
||
"owner": {
|
||
"login": "PwnCast",
|
||
"id": 86027931,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86027931?v=4",
|
||
"html_url": "https:\/\/github.com\/PwnCast"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PwnCast\/CVE-2021-26928",
|
||
"description": "PoC for exploiting CVE-2021-26928 : ** DISPUTED ** BIRD through 2.0.7 does not provide functionality for password authentication of BGP peers. Because of this, products that use BIRD (which may, for example, include Tigera products in some configurations, as well as products of other vendors) may have been susceptible to route redirection for Denial of Service and\/or Information Disclosure. NOTE: a researcher has asserted that the behavior is within Tigera’s area of responsibility; however, Tigera disagrees.",
|
||
"fork": false,
|
||
"created_at": "2021-06-18T10:18:22Z",
|
||
"updated_at": "2021-06-18T10:18:30Z",
|
||
"pushed_at": "2021-06-18T10:18:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |