{"vulnerability": "CVE-2020-1521", "sightings": [{"uuid": "ad35c54f-3d23-4669-a64f-d87500b9d0a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15217", "type": "seen", "source": "https://t.me/cibsecurity/15127", "content": "\u203c CVE-2020-15217 \u203c\n\nIn GLPI before version 9.5.2, there is a leakage of user information through the public FAQ. The issue was introduced in version 9.5.0 and patched in 9.5.2. As a workaround, disable public access to the FAQ.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-07T22:29:26.000000Z"}, {"uuid": "a3e56591-8b48-4697-a3cd-cd0e877485a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15216", "type": "seen", "source": "https://t.me/cibsecurity/14937", "content": "\u203c CVE-2020-15216 \u203c\n\nIn goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revision f6188febf0c29d7ffe26a0436212b19cb9615e64 or version 1.1.0\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-09-29T20:51:03.000000Z"}]}