{"vulnerability": "CVE-2020-1336", "sightings": [{"uuid": "978bc3a0-2fb5-44fa-8932-81e98844833c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13364", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1562", "content": "#exploit\n1. CVE-2020-15900:\nGhostscript (rendering engine for Postscript/PDF content) ver.9.50 - 9.52 SAFER Sandbox Breakout\nhttps://insomniasec.com/blog/ghostscript-cve-2020-15900\n\n2. CVE-2020-13364/13365:\nZyxel NASxxx - Telnet Privilege Escalation\nhttps://github.com/r0mpage/r0mpage.github.io\n]-&gt; security advisory:\nhttps://www.zyxel.com/support/Zyxel-security-advisory-for-NAS-remote-access-vulnerability.shtml", "creation_timestamp": "2024-10-10T18:24:12.000000Z"}, {"uuid": "a25a90b5-8ec4-459b-b271-88ed09abb3a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13362", "type": "seen", "source": "https://t.me/cibsecurity/12372", "content": "ATENTION\u203c New - CVE-2020-13362\n\nIn QEMU 4.2.0, megasas_lookup_frame in hw/scsi/megasas.c has an out-of-bounds read via a crafted reply_queue_head field from a guest OS user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-28T18:55:15.000000Z"}, {"uuid": "933241a6-3b7f-4b3a-949b-bcf49c84f271", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13361", "type": "seen", "source": "https://t.me/cibsecurity/12373", "content": "ATENTION\u203c New - CVE-2020-13361\n\nIn QEMU 4.2.0, es1370_transfer_audio in hw/audio/es1370.c does not properly validate the frame count, which allows guest OS users to trigger an out-of-bounds access during an es1370_write() operation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-28T18:55:16.000000Z"}, {"uuid": "975a50c1-7554-4761-840a-c4df913d4ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13365", "type": "seen", "source": "https://t.me/cibsecurity/13938", "content": "ATENTION\u203c New - CVE-2020-13365\n\nCertain Zyxel products have a locally accessible binary that allows a non-root user to generate a password for an undocumented user account that can be used for a TELNET session as root. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-06T20:55:25.000000Z"}, {"uuid": "c751960d-8f78-4909-a7e3-2c6c6a9114bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13364", "type": "seen", "source": "https://t.me/cibsecurity/13939", "content": "ATENTION\u203c New - CVE-2020-13364\n\nA backdoor in certain Zyxel products allows remote TELNET access via a CGI script. This affects NAS520 V5.21(AASZ.4)C0, V5.21(AASZ.0)C0, V5.11(AASZ.3)C0, and V5.11(AASZ.0)C0; NAS542 V5.11(ABAG.0)C0, V5.20(ABAG.1)C0, and V5.21(ABAG.3)C0; NSA325 v2_V4.81(AALS.0)C0 and V4.81(AAAJ.1)C0; NSA310 4.22(AFK.0)C0 and 4.22(AFK.1)C0; NAS326 V5.21(AAZF.8)C0, V5.11(AAZF.4)C0, V5.11(AAZF.2)C0, and V5.11(AAZF.3)C0; NSA310S V4.75(AALH.2)C0; NSA320S V4.75(AANV.2)C0 and V4.75(AANV.1)C0; NSA221 V4.41(AFM.1)C0; and NAS540 V5.21(AATB.5)C0 and V5.21(AATB.3)C0.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-06T20:55:26.000000Z"}]}