{"vulnerability": "CVE-2020-1051", "sightings": [{"uuid": "a55dd2d0-0a48-4c9e-9f4e-d98c05849cc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10518", "type": "seen", "source": "https://t.me/cibsecurity/14361", "content": "ATENTION\u203c New - CVE-2020-10518\n\nA remote code execution vulnerability was identified in GitHub Enterprise Server that could be exploited when building a GitHub Pages site. User-controlled configuration of the underlying parsers used by GitHub Pages were not sufficiently restricted and made it possible to execute commands on the GitHub Enterprise Server instance. To exploit this vulnerability, an attacker would need permission to create and build a GitHub Pages site on the GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in 2.21.6, 2.20.15, and 2.19.21. The underlying issues contributing to this vulnerability were identified both internally and through the GitHub Security Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-28T02:55:13.000000Z"}, {"uuid": "f66f6abf-f8aa-45fa-b784-09b5966e0961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10518", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2053", "content": "#Red_Team_Tactics\n1. GitHub Pages - Multiple RCEs via insecure Kramdown configuration (PoC for CVE-2020-10518)\nhttps://devcraft.io/2020/10/20/github-pages-multiple-rces-via-kramdown-config.html\n2. Bypass AMSI in PowerShell\nhttps://medium.com/bugbountywriteup/bypass-amsi-in-powershell-a-nice-case-study-f3c0c7bed24d", "creation_timestamp": "2020-12-29T00:21:24.000000Z"}, {"uuid": "6a0a2506-de39-40fd-8244-1e97b3330e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10511", "type": "seen", "source": "https://t.me/cibsecurity/11250", "content": "ATENTION\u203c New - CVE-2020-10511\n\nHGiga C&amp;Cmail contains insecure configurations. Attackers can exploit these flaws to access unauthorized functionality via a crafted URL.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-15T14:44:08.000000Z"}, {"uuid": "cca6fe53-c866-4edc-9fa6-1154c4b5a4ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10514", "type": "seen", "source": "https://t.me/cibsecurity/11247", "content": "ATENTION\u203c New - CVE-2020-10514\n\niCatch DVR do not validate function parameter properly, resulting attackers executing arbitrary command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-15T13:14:03.000000Z"}, {"uuid": "eff7c571-1f2e-4402-8eef-4228a252c1fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10513", "type": "seen", "source": "https://t.me/cibsecurity/11248", "content": "ATENTION\u203c New - CVE-2020-10513\n\nThe file management interface of iCatch DVR contains broken access control which allows the attacker to remotely manipulate arbitrary file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-15T14:14:11.000000Z"}, {"uuid": "01eecf99-a0c4-4532-b84a-c617fb491bbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10512", "type": "seen", "source": "https://t.me/cibsecurity/11249", "content": "ATENTION\u203c New - CVE-2020-10512\n\nHGiga C&amp;Cmail contains a SQL Injection vulnerability which allows attackers to injecting SQL commands in the URL parameter to execute unauthorized commands.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-15T14:14:12.000000Z"}, {"uuid": "23f86319-64ec-41f3-8a86-2240e80491c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10510", "type": "seen", "source": "https://t.me/cibsecurity/10809", "content": "ATENTION\u203c New - CVE-2020-10510\n\nSunnet eHRD, a human training and development management system, contains a vulnerability of Broken Access Control. After login, attackers can use a specific URL, access unauthorized functionality and data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-30T09:47:33.000000Z"}, {"uuid": "555cd677-6355-4ee5-9534-07281efc856d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10517", "type": "seen", "source": "https://t.me/cibsecurity/14362", "content": "ATENTION\u203c New - CVE-2020-10517\n\nAn improper access control vulnerability was identified in GitHub Enterprise Server that allowed authenticated users of the instance to determine the names of unauthorized private repositories given their numerical IDs. This vulnerability did not allow unauthorized access to any repository content besides the name. This vulnerability affected all versions of GitHub Enterprise Server prior to 2.22 and was fixed in versions 2.21.6, 2.20.15, and 2.19.21. This vulnerability was reported via the GitHub Bug Bounty program.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-28T02:55:14.000000Z"}]}