PoC-in-GitHub/2020/CVE-2020-6275.json

31 lines
1.3 KiB
JSON
Raw Normal View History

2022-12-22 13:18:48 +01:00
[
{
2022-12-29 13:20:58 +01:00
"id": 583279154,
"name": "CVE-2020-6275",
"full_name": "Live-Hack-CVE\/CVE-2020-6275",
2022-12-22 13:18:48 +01:00
"owner": {
"login": "Live-Hack-CVE",
"id": 121191732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
},
2022-12-29 13:20:58 +01:00
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-6275",
"description": "SAP Netweaver AS ABAP, versions 700, 701, 702, 710, 711, 730, 731, 740, 750, 751, 752, 753, 754, are vulnerable for Server Side Request Forgery Attack where in an attacker can use inappropriate path names containing malicious server names in the import\/export of sessions functionality and coerce the web server into aut CVE project by @Sn0wAlice",
2022-12-22 13:18:48 +01:00
"fork": false,
2022-12-29 13:20:58 +01:00
"created_at": "2022-12-29T09:53:05Z",
"updated_at": "2022-12-29T09:53:05Z",
"pushed_at": "2022-12-29T09:53:08Z",
2022-12-22 13:18:48 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]