{"payload":{"header_redesign_enabled":false,"results":[{"id":"483806852","archived":false,"color":null,"followers":11,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-sim-swapping","hl_trunc_description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483806852,"name":"two-factor-authentication-sim-swapping","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:59.852Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vulnerability","sim","2fa","swapping","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"517132939","archived":false,"color":null,"followers":11,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-sim-cloning","hl_trunc_description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":517132939,"name":"two-factor-authentication-sim-cloning","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:41.229Z","has_issues":true}},"sponsorable":true,"topics":["vulnerability","bypass","2factor","qeeqbox","infosecsimplified","authintacation"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486722717","archived":false,"color":null,"followers":4,"has_funding_file":true,"hl_name":"qeeqbox/stored-cross-site-scripting","hl_trunc_description":"An adversary may inject malicious content into a vulnerable target","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486722717,"name":"stored-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:01:03.812Z","has_issues":true}},"sponsorable":true,"topics":["metadata","example","stored","scripting","site","vulnerability","xss-vulnerability","cross","visulization","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486839456","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/directory-listing","hl_trunc_description":"A threat actor may list files on a misconfigured server","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486839456,"name":"directory-listing","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:58.160Z","has_issues":true}},"sponsorable":true,"topics":["directory","listing","vulnerability","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"485967347","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/vertical-privilege-escalation","hl_trunc_description":"A threat actor may perform unauthorized functions belonging to another user with a higher privileges level","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":485967347,"name":"vertical-privilege-escalation","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:26.187Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vertical","vulnerability","escalation","privilege","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486443706","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/reflected-cross-site-scripting","hl_trunc_description":"A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the vi…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486443706,"name":"reflected-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:42.646Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","scripting","site","xss","vulnerability","cross","reflected","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"655432531","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/open-redirect","hl_trunc_description":"A threat actor may send a malicious redirection request for a vulnerable target to a victim; the victim gets redirected to a malicious we…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":655432531,"name":"open-redirect","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T00:59:14.781Z","has_issues":true}},"sponsorable":true,"topics":["open","redirect","vulnerability","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486711083","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/dom-based-cross-site-scripting","hl_trunc_description":"A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the vic…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486711083,"name":"dom-based-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T00:59:33.952Z","has_issues":true}},"sponsorable":true,"topics":["metadata","dom","example","scripting","site","xss","vulnerability","xss-vulnerability","cross","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"582131089","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/client-side-template-injection","hl_trunc_description":"A threat actor may trick a victim into executing native template syntax on a vulnerable target","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":582131089,"name":"client-side-template-injection","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:03:28.104Z","has_issues":true}},"sponsorable":true,"topics":["template","client","injection","vulnerability","side","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"581602947","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/xxe-injection","hl_trunc_description":"A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's …","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":581602947,"name":"xxe-injection","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T00:58:42.372Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","xml","injection","vulnerability","xee","xxe","xxe-injection","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":3,"elapsed_millis":186,"errors":[],"result_count":30,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Avulnerability%2Borg%253Aqeeqbox%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/qeeqbox/two-factor-authentication-sim-swapping/star":{"post":"PbgGpIBB0iOaJ9k7N4exbMdGceuOulEzS1fK76n6vKP15Dz-t03WU14PE91WPY37b4FGrEg2kSRX3cqNb_P1kA"},"/qeeqbox/two-factor-authentication-sim-swapping/unstar":{"post":"oUTNoqp-_ahCbpfwa2HPXexriDYNJm6cbQj3WJZ4vKLquKxO9oFBfxiDd5Cpdfvm2-PNkhX3jedgPsIrdlzEbA"},"/qeeqbox/two-factor-authentication-sim-cloning/star":{"post":"P3VA1G9RhBHCUXIkHrerH7kwqswx4EtzFVLYgixJEBjuMN86Omfb8jITZg7QQp9wxTbuOdmD2bt2xrE4hQ0SnQ"},"/qeeqbox/two-factor-authentication-sim-cloning/unstar":{"post":"_VK2ELGJjitQcgd7fLdUxCqqobUATVgaWGZUv7CyYg1jPCj1akQhVS8M-4uTGR6dlwgLAay0FvgWHg5wH-6oVQ"},"/qeeqbox/stored-cross-site-scripting/star":{"post":"fgKNIjDeyixcxuu0dZYDuvTYcObAec9FapYwAgWLn5p84FNw7EXS-iKs4hHaMrHliZyFoqqDN1ct_h0hFEjpUg"},"/qeeqbox/stored-cross-site-scripting/unstar":{"post":"SLVlHM9qeYBUIPD_4r7FOyMaNBMteIpEi3Xja197S-giK-zXgCQZwtPwxk1R4Di1zC1vR-4esIEVdovcJBYdnA"},"/qeeqbox/directory-listing/star":{"post":"4CY-UzEXh6qHSc23eNcPZzApm929jKXxwYgYsP0wjFZ7kfKSyDNGTVqJjlunKqHo9hd9Py1cDFOfxsQ3lDiBYw"},"/qeeqbox/directory-listing/unstar":{"post":"Ew3f1bOX4lVZblV3higcX6VTroMuiAiwr7udC7RLIdQF03BPdlMNyPiBcpxWoJIq2FRItMRNDkSQRR_Q4c38kw"},"/qeeqbox/vertical-privilege-escalation/star":{"post":"zmRfhD2wXdYtbkdOy9wDSTAm7cTzKll2AqOuSgVvdjkPRSZdw0B8WAIMzS6H58AfNlobvbRu9jNB5MycbCM35g"},"/qeeqbox/vertical-privilege-escalation/unstar":{"post":"KBPCZYHK-xHbqm-MAYAz_ac1bDxwOG7YSg6VPnu2dnm5yAIvVbI22t1HJW3eR_NPy3hg3TVv86MLu-JFxCURaQ"},"/qeeqbox/reflected-cross-site-scripting/star":{"post":"_vqc84ZtYxZBv55ph9KQMBOXZ1AEMgN7W2Qcvrt40QPlBol49CxEveL0krWMQNUHIerb2AhxHO34mzpH-fvizg"},"/qeeqbox/reflected-cross-site-scripting/unstar":{"post":"edLsBofy8Qm2XyepUo9qi176x5bluhVNYsnSA-YVMt931CO_Qg54d_zBlNI0bFX2TSjZtPW5OkdrUI12m8jPcQ"},"/qeeqbox/open-redirect/star":{"post":"82JBvGnwnMQWhXnFP521HZpDRbSwfJ5N8Kgzyzvh7IsTCEDeM8RTozM8qcAVLty0VZS3s52FnTqkr7h3o-fOuA"},"/qeeqbox/open-redirect/unstar":{"post":"ABLMiYX3f2jVCwKtNXlk_0jAJbGABb4m7PgLTGcOSVUnjV3NtFshnrUvKQEfCaRb58WAsD3EDNmnqGWLVBCtoA"},"/qeeqbox/dom-based-cross-site-scripting/star":{"post":"MrdQsrfNGpB41yCwDB9yC56mRc7d5YgQ5qCbd_JJsV_ppb7KFqJqNW7DkHrOEA10slFhOvx7I_qOLIUQ87H8-w"},"/qeeqbox/dom-based-cross-site-scripting/unstar":{"post":"O4aJxTAO8PvQI9gdJEIaqvGrKN9XU5UVLRjHok0soA4e7VRYCQyVA9rg-fZKenFJW_mMlSA3qp_k1Nnt67d5Sw"},"/qeeqbox/client-side-template-injection/star":{"post":"twaDI2X4c9hNTiu8C54DIvVdMMBnxu0sNezw2ubT3MEdCn_gSBq5qe3bvUqVW4pYBAw_SIJMW7xR9qEnmxeQgQ"},"/qeeqbox/client-side-template-injection/unstar":{"post":"mNKLISy2jypBcZwXIl4_UuQay0GQ34lOAhc9rrPWz_maj7s5eOcgaIGL4zYhNwFZUjeS1LeRybx5S9QllTGa-w"},"/qeeqbox/xxe-injection/star":{"post":"FThYafsFwvVh0cf9emOOZoLNfRU6YOoZgf41WLLxphOwAXQn4PjQh-iKt49Y8FrqpMPTX_YAxMHz12-7navTmw"},"/qeeqbox/xxe-injection/unstar":{"post":"qHUb3nkVjwQXmJb-yO9z3RaFcEJC4EAA-jSr486lyoSJPaG7aHeX_-f4bmjVz_xaIGaz550ffFW1TIJ8PBsJUw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"5_MBiIpb0xbsa7b2za0z0cbeeJb_JwDankuNTIBlM-YJ5eT0AbO-D1r_Gma0h3GDR9ti-SYBusvMnbtbAGrh3Q"}}},"title":"Repository search results"}