{"vulnerability": "CVE-2020-1171", "sightings": [{"uuid": "a3b2153c-248b-4200-9daa-70e14834e4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11711", "type": "seen", "source": "https://t.me/cibsecurity/69198", "content": "\u203c CVE-2020-11711 \u203c\n\nAn issue was discovered in Stormshield SNS 3.8.0. Authenticated Stored XSS in the admin login panel leads to SSL VPN credential theft. A malicious disclaimer file can be uploaded from the admin panel. The resulting file is rendered on the authentication interface of the admin panel. It is possible to inject malicious HTML content in order to execute JavaScript inside a victim's browser. This results in a stored XSS on the authentication interface of the admin panel. Moreover, an unsecured authentication form is present on the authentication interface of the SSL VPN captive portal. Users are allowed to save their credentials inside the browser. If an administrator saves his credentials through this unsecured form, these credentials could be stolen via the stored XSS on the admin panel without user interaction. Another possible exploitation would be modification of the authentication form of the admin panel into a malicious form.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-25T20:15:11.000000Z"}, {"uuid": "36e5d83a-8e8e-410b-a7dd-ab57eb0f0990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11719", "type": "seen", "source": "https://t.me/cibsecurity/21242", "content": "\u203c CVE-2020-11719 \u203c\n\nAn issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and possibly below. It relies on broken encryption with a weak and guessable static encryption key.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T21:13:00.000000Z"}, {"uuid": "6785f126-8c76-4d79-be21-986e62ba9feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11718", "type": "seen", "source": "https://t.me/cibsecurity/21228", "content": "\u203c CVE-2020-11718 \u203c\n\nAn issue was discovered in Programi Bilanc build 007 release 014 31.01.2020 and below. Its software-update packages are downloaded via cleartext HTTP.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T19:25:27.000000Z"}, {"uuid": "044b5b41-79a1-48b9-a071-3d6d563dfd6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11717", "type": "seen", "source": "https://t.me/cibsecurity/21145", "content": "\u203c CVE-2020-11717 \u203c\n\nAn issue was discovered in Programi 014 31.01.2020. It has multiple SQL injection vulnerabilities.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-22T00:52:18.000000Z"}]}