mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-18 05:42:21 +01:00
31 lines
No EOL
1.3 KiB
JSON
31 lines
No EOL
1.3 KiB
JSON
[
|
|
{
|
|
"id": 583448824,
|
|
"name": "CVE-2020-8445",
|
|
"full_name": "Live-Hack-CVE\/CVE-2020-8445",
|
|
"owner": {
|
|
"login": "Live-Hack-CVE",
|
|
"id": 121191732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2020-8445",
|
|
"description": "In OSSEC-HIDS 2.7 through 3.5.0, the OS_CleanMSG function in ossec-analysisd doesn't remove or encode terminal control characters or newlines from processed log messages. In many cases, those characters are later logged. Because newlines (\\n) are permitted in messages processed by ossec-analysisd, it may be possible to CVE project by @Sn0wAlice",
|
|
"fork": false,
|
|
"created_at": "2022-12-29T20:15:41Z",
|
|
"updated_at": "2022-12-29T20:15:41Z",
|
|
"pushed_at": "2022-12-29T20:15:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |