{"vulnerability": "CVE-2020-1738", "sightings": [{"uuid": "f75c3349-a7b6-45e1-a154-2c1c9721953f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17384", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15499", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-17384\n\ud83d\udd25 CVSS Score: 7.2 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With the cookie of the system administrator, attackers can inject and remotely execute arbitrary command to manipulate the system.\n\ud83d\udccf Published: 2020-08-25T07:35:18.103626Z\n\ud83d\udccf Modified: 2025-05-08T09:12:49.923Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-3845-be6bf-1.html", "creation_timestamp": "2025-05-08T09:23:40.000000Z"}, {"uuid": "d476cfa0-2e93-4104-8938-754f70da871e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17382", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2353", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Kernel exploitation: weaponizing CVE-2020-17382 MSI Ambient Link driver.\n\nhttps://www.matteomalvica.com/blog/2020/09/24/weaponizing-cve-2020-17382/", "creation_timestamp": "2020-09-24T20:56:07.000000Z"}, {"uuid": "fe4ee1ab-721c-4a2a-a0bf-083e0b102439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17385", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15498", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-17385\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly, which allows unauthorized user to launch Path Traversal attack and access arbitrate file on the system.\n\ud83d\udccf Published: 2020-08-25T07:35:18.510246Z\n\ud83d\udccf Modified: 2025-05-08T09:14:05.045Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-3846-7790c-1.html", "creation_timestamp": "2025-05-08T09:23:39.000000Z"}, {"uuid": "500968b9-13c4-42b5-9512-7559c359799a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17386", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15497", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-17386\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: Cellopoint CelloOS v4.1.10 Build 20190922 does not validate URL inputted properly. With cookie of an authenticated user, attackers can temper with the URL parameter and access arbitrary file on system.\n\ud83d\udccf Published: 2020-08-25T07:35:18.925467Z\n\ud83d\udccf Modified: 2025-05-08T09:15:14.444Z\n\ud83d\udd17 References:\n1. https://www.twcert.org.tw/tw/cp-132-3847-c62ca-1.html", "creation_timestamp": "2025-05-08T09:23:38.000000Z"}, {"uuid": "6a26fabd-7dca-4be1-84b8-a07aa5587ad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17380", "type": "seen", "source": "https://t.me/arpsyndicate/669", "content": "#ExploitObserverAlert\n\nCVE-2021-3409\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2021-3409. The patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.\n\nFIRST-EPSS: 0.000470000\nNVD-IS: 3.7\nNVD-ES: 1.5", "creation_timestamp": "2023-11-29T05:12:44.000000Z"}, {"uuid": "c4fb6984-8727-4186-a0f3-4835ea9c827e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17383", "type": "seen", "source": "https://t.me/cibsecurity/36148", "content": "\u203c CVE-2020-17383 \u203c\n\nA directory traversal vulnerability on Telos Z/IP One devices through 4.0.0r grants an unauthenticated individual root level access to the device's file system. This can be used to identify configuration settings, password hashes for built-in accounts, and the cleartext password for remote configuration of the device through the WebUI.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-24T22:17:37.000000Z"}, {"uuid": "c395cb4f-aaff-47f1-be65-d8dc074eaf48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17382", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1807", "content": "Kernel exploitation:\nWeaponizing CVE-2020-17382 MSI Ambient Link driver\nhttps://www.matteomalvica.com/blog/2020/09/24/weaponizing-cve-2020-17382/\nPoC exploits (for Win10 2004, 1709, Win7 x64 SP1):\nhttps://github.com/uf0o/CVE-2020-17382", "creation_timestamp": "2020-09-25T11:08:01.000000Z"}, {"uuid": "a9570cb1-e198-4d37-bece-7175dc2253d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17380", "type": "seen", "source": "https://t.me/cibsecurity/25344", "content": "\u203c CVE-2021-3409 \u203c\n\nThe patch for CVE-2020-17380/CVE-2020-25085 was found to be ineffective, thus making QEMU vulnerable to the out-of-bounds read/write access issues previously found in the SDHCI controller emulation code. This flaw allows a malicious privileged guest to crash the QEMU process on the host, resulting in a denial of service or potential code execution. QEMU up to (including) 5.2.0 is affected by this.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-23T23:38:32.000000Z"}, {"uuid": "92f79492-f051-4723-b03f-d08e3a075175", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17380", "type": "seen", "source": "https://t.me/cibsecurity/22874", "content": "\u203c CVE-2020-17380 \u203c\n\nA heap-based buffer overflow was found in QEMU through 5.0.0 in the SDHCI device emulation support. It could occur while doing a multi block SDMA transfer via the sdhci_sdma_transfer_multi_blocks() routine in hw/sd/sdhci.c. A guest user or process could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition, or potentially execute arbitrary code with privileges of the QEMU process on the host.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-30T13:25:11.000000Z"}]}