29 lines
No EOL
1 KiB
JSON
29 lines
No EOL
1 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2022-27666",
|
|
"full_name": "plummm/CVE-2022-27666",
|
|
"html_url": "https://github.com/plummm/CVE-2022-27666",
|
|
"description": "Exploit for CVE-2022-27666",
|
|
"stargazers_count": 203,
|
|
"forks_count": 39,
|
|
"created_at": "2022-03-23T22:54:28Z"
|
|
},
|
|
{
|
|
"name": "cve-2022-27666-exploits",
|
|
"full_name": "Albocoder/cve-2022-27666-exploits",
|
|
"html_url": "https://github.com/Albocoder/cve-2022-27666-exploits",
|
|
"description": "There are 2 exploitation methods that exploit CVE-2022-27666. For more info on how to use these code bases please check my blog.",
|
|
"stargazers_count": 2,
|
|
"forks_count": 0,
|
|
"created_at": "2023-04-11T00:12:33Z"
|
|
},
|
|
{
|
|
"name": "CVE-2022-27665",
|
|
"full_name": "dievus/CVE-2022-27665",
|
|
"html_url": "https://github.com/dievus/CVE-2022-27665",
|
|
"description": "Reflected XSS via AngularJS Sandbox Escape Expressions in IPSwitch WS_FTP Server 8.6.0",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2022-03-23T14:20:58Z"
|
|
}
|
|
] |