PoC-in-GitHub/2024/CVE-2024-56903.json
2025-02-03 15:32:12 +09:00

39 lines
No EOL
1.4 KiB
JSON

[
{
"id": 926102313,
"name": "CVE-2024-56903",
"full_name": "DRAGOWN\/CVE-2024-56903",
"owner": {
"login": "DRAGOWN",
"id": 76569084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76569084?v=4",
"html_url": "https:\/\/github.com\/DRAGOWN",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DRAGOWN\/CVE-2024-56903",
"description": "CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST requests with GET in critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.",
"fork": false,
"created_at": "2025-02-02T15:04:25Z",
"updated_at": "2025-02-02T18:09:00Z",
"pushed_at": "2025-02-02T18:08:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"asmanager",
"asweb",
"csrf",
"cve-2024-56903",
"geovision"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]