{"vulnerability": "CVE-2020-6105", "sightings": [{"uuid": "897c0733-810a-4dfb-804f-7b712f1ad836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-6105", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1925", "content": "Vulnerability Spotlight in F2FS toolset (PoC): \nCode execution &amp; information disclosure vulnerabilities (CVE-2020-6104, CVE-2020-6105, CVE-2020-6106, CVE-2020-6107, CVE-2020-6108)\nhttps://blog.talosintelligence.com/2020/10/vuln-spotlight-f2fs-tools-.html", "creation_timestamp": "2022-06-08T21:16:15.000000Z"}, {"uuid": "60bde678-11ec-4d28-a299-9ba75124d77d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-6105", "type": "seen", "source": "https://t.me/cibsecurity/15295", "content": "\u203c CVE-2020-6105 \u203c\n\nAn exploitable code execution vulnerability exists in the multiple devices functionality of F2fs-Tools F2fs.Fsck 1.13. A specially crafted f2fs filesystem can cause Information overwrite resulting in a code execution. An attacker can provide a malicious file to trigger this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-15T18:40:44.000000Z"}]}