29 lines
No EOL
1.4 KiB
JSON
29 lines
No EOL
1.4 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2024-56902",
|
|
"full_name": "DRAGOWN/CVE-2024-56902",
|
|
"html_url": "https://github.com/DRAGOWN/CVE-2024-56902",
|
|
"description": "CVE-2024-56902 - Information disclosure vulnerability in GeoVision GV-ASManager web application with the version v6.1.0.0 or less, which discloses account information, including cleartext password.",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-02T14:16:34Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-56901",
|
|
"full_name": "DRAGOWN/CVE-2024-56901",
|
|
"html_url": "https://github.com/DRAGOWN/CVE-2024-56901",
|
|
"description": "CVE-2024-56901 - A Cross-Site Request Forgery (CSRF) vulnerability in Geovision GV-ASManager web application with the version 6.1.1.0 or less that allows attackers to arbitrarily create Admin accounts via a crafted POST request.",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-02T15:04:22Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-56903",
|
|
"full_name": "DRAGOWN/CVE-2024-56903",
|
|
"html_url": "https://github.com/DRAGOWN/CVE-2024-56903",
|
|
"description": "CVE-2024-56903 - Geovision GV-ASManager web application with the version 6.1.1.0 or less allows attackers to modify POST requests with GET in critical functionalities, such as account management. This vulnerability is used in chain with CVE-2024-56901 for a successful CSRF attack.",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2025-02-02T15:04:25Z"
|
|
}
|
|
] |