{"vulnerability": "CVE-2020-2579", "sightings": [{"uuid": "fc3ca19d-24ef-47c5-affd-33193e630402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25792", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/14936", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-25792\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue was discovered in the sized-chunks crate through 0.6.2 for Rust. In the Chunk implementation, the array size is not checked when constructed with pair().\n\ud83d\udccf Published: 2020-09-19T00:00:00.000Z\n\ud83d\udccf Modified: 2025-05-05T17:07:40.294Z\n\ud83d\udd17 References:\n1. https://rustsec.org/advisories/RUSTSEC-2020-0041.html\n2. https://github.com/bodil/sized-chunks/issues/11\n3. https://github.com/bodil/sized-chunks/commit/3ae48bd463c1af41c24b96b84079946f51f51e3c", "creation_timestamp": "2025-05-05T17:20:25.000000Z"}, {"uuid": "df830902-e371-40e0-a0f8-be00c76889b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25790", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1872", "content": "CVE-2020-25790:\nTypesetter CMS (up to 5.1) - .zip Archive Unrestricted Upload / Privilege Escalation\nhttps://seclists.org/fulldisclosure/2020/Oct/11\nPoC (Bypass File Uploading):\nhttps://github.com/Typesetter/Typesetter/issues/674", "creation_timestamp": "2020-10-07T11:10:05.000000Z"}, {"uuid": "f2208200-38b4-4cdd-a5b4-695fe2c48d3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25798", "type": "seen", "source": "https://t.me/cibsecurity/16448", "content": "\u203c CVE-2020-25798 \u203c\n\nA stored cross-site scripting (XSS) vulnerability in LimeSurvey before and including 3.21.1 allows authenticated users with correct permissions to inject arbitrary web script or HTML via parameter ParticipantAttributeNamesDropdown of the Attributes on the central participant database page. When the survey attribute being edited or viewed, e.g. by an administrative user, the JavaScript code will be executed in the browser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-17T18:39:11.000000Z"}]}