{"vulnerability": "CVE-2020-1509", "sightings": [{"uuid": "15c35100-cf9c-4806-b9e9-e4ee4ed22a67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15098", "type": "seen", "source": "https://gist.github.com/RajChowdhury240/31e62b3bcd398c5f0a5800d02ba13f37", "content": "", "creation_timestamp": "2026-01-15T00:18:07.000000Z"}, {"uuid": "4393db55-1390-4b38-9700-31319b71355a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15097", "type": "seen", "source": "https://t.me/Yemen_Shield/718", "content": "CVE-2020-15097 loklak is an open-source server application which is able to collect messages from various sources, including twitter. The server contains a search index and a peer-to-peer index sharing interface. All messages are stored in an elasticsea... https://t.co/1pDfpFZP7T\n\n\nhttps://twitter.com/HackrawiX", "creation_timestamp": "2021-02-06T01:52:46.000000Z"}, {"uuid": "a2a6f553-e155-4575-b376-ca3e010063e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1509", "type": "seen", "source": "https://t.me/SecLabNews/8392", "content": "\u041a\u043e\u043c\u0430\u043d\u0434\u0430 Google Project Zero \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2020-1509 \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Windows, \u043a\u043e\u0442\u043e\u0440\u0443\u044e Microsoft \u043d\u0435\u0434\u043e\u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0445 \u0432\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u0438\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n \n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Windows \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c Enterprise Authentication", "creation_timestamp": "2020-09-02T06:09:40.000000Z"}, {"uuid": "e6542df3-36f5-43ce-a431-27e0572bee07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15097", "type": "seen", "source": "https://t.me/cibsecurity/22959", "content": "\u203c CVE-2020-15097 \u203c\n\nloklak is an open-source server application which is able to collect messages from various sources, including twitter. The server contains a search index and a peer-to-peer index sharing interface. All messages are stored in an elasticsearch index. In loklak less than or equal to commit 5f48476, a path traversal vulnerability exists. Insufficient input validation in the APIs exposed by the loklak server allowed a directory traversal vulnerability. Any admin configuration and files readable by the app available on the hosted file system can be retrieved by the attacker. Furthermore, user-controlled content could be written to any admin config and files readable by the application. This has been patched in commit 50dd692. Users will need to upgrade their hosted instances of loklak to not be vulnerable to this exploit.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-02T20:33:51.000000Z"}, {"uuid": "2636cd61-ee55-45b9-b656-ac5f5bc585f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15096", "type": "seen", "source": "https://t.me/cibsecurity/13274", "content": "ATENTION\u203c New - CVE-2020-15096\n\nIn Electron before versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21, there is a context isolation bypass, meaning that code running in the main world context in the renderer can reach into the isolated Electron context and perform privileged actions. Apps using \"contextIsolation\" are affected. There are no app-side workarounds, you must update your Electron version to be protected. This is fixed in versions 6.1.1, 7.2.4, 8.2.4, and 9.0.0-beta21.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-07T07:55:23.000000Z"}]}