{"vulnerability": "CVE-2020-2561", "sightings": [{"uuid": "628ee488-b70b-45fc-b33b-95b587576be7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25610", "type": "seen", "source": "https://t.me/cibsecurity/21059", "content": "\u203c CVE-2020-25610 \u203c\n\nThe AWV component of Mitel MiCollab before 9.2 could allow an attacker to gain access to a web conference due to insufficient access control for conference codes.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T12:46:53.000000Z"}, {"uuid": "cc00669d-0144-4fb5-a6f5-f69c3c0c96bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25612", "type": "seen", "source": "https://t.me/cibsecurity/21063", "content": "\u203c CVE-2020-25612 \u203c\n\nThe NuPoint Messenger of Mitel MiCollab before 9.2 could allow an attacker with escalated privilege to access user files due to insufficient access control. Successful exploit could potentially allow an attacker to gain access to sensitive information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T12:47:00.000000Z"}, {"uuid": "84f3d9a2-475d-4be2-88e1-f8b801565012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25618", "type": "seen", "source": "https://t.me/cibsecurity/20918", "content": "\u203c CVE-2020-25618 \u203c\n\nAn issue was discovered in SolarWinds N-Central 12.3.0.670. The sudo configuration has incorrect access control because the nable web user account is effectively able to run arbitrary OS commands as root (i.e., the use of root privileges is not limited to specific programs listed in the sudoers file).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T16:41:36.000000Z"}, {"uuid": "eb128d63-4155-4625-bf48-807e2272eff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25619", "type": "seen", "source": "https://t.me/cibsecurity/20916", "content": "\u203c CVE-2020-25619 \u203c\n\nAn issue was discovered in SolarWinds N-Central 12.3.0.670. The SSH component does not restrict the Communication Channel to Intended Endpoints. An attacker can leverage an SSH feature (port forwarding with a temporary key pair) to access network services on the 127.0.0.1 interface, even though this feature was only intended for user-to-agent communication.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T16:41:34.000000Z"}, {"uuid": "076d6573-6949-4317-8a5a-3c40f24d84d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25617", "type": "seen", "source": "https://t.me/cibsecurity/20913", "content": "\u203c CVE-2020-25617 \u203c\n\nAn issue was discovered in SolarWinds N-Central 12.3.0.670. The AdvancedScripts HTTP endpoint allows Relative Path Traversal by an authenticated user of the N-Central Administration Console (NAC), leading to execution of OS commands as root.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-16T16:41:31.000000Z"}, {"uuid": "afdfb795-0cd7-41bc-880a-c1a6eb13caf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25613", "type": "seen", "source": "https://t.me/cibsecurity/15074", "content": "\u203c CVE-2020-25613 \u203c\n\nAn issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-06T16:27:45.000000Z"}]}