{"vulnerability": "CVE-2020-2584", "sightings": [{"uuid": "4d5878b9-1394-4fb4-a80d-21f8e1dab15c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25849", "type": "seen", "source": "https://t.me/cibsecurity/15759", "content": "\u203c CVE-2020-25849 \u203c\n\nMailGates and MailAudit products contain Command Injection flaw, which can be used to inject and execute system commands from the cgi parameter after attackers obtain the user\u00c3\u00a2\u00e2\u201a\u00ac\u00e2\u201e\u00a2s access token.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-01T20:37:55.000000Z"}, {"uuid": "290e6598-7792-434e-9815-a431f6c76ad4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2584", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5992", "content": "|       PRION:CVE-2018-3067     4.0     https://vulners.com/prion/PRION:CVE-2018-3067               |       PRION:CVE-2018-3065     4.0     https://vulners.com/prion/PRION:CVE-2018-3065               |       PRION:CVE-2018-3056     4.0     https://vulners.com/prion/PRION:CVE-2018-3056               |       PRION:CVE-2018-3054     4.0     https://vulners.com/prion/PRION:CVE-2018-3054               |       PRION:CVE-2019-2503     3.8     https://vulners.com/prion/PRION:CVE-2019-2503               |       PRION:CVE-2023-22053    3.6     https://vulners.com/prion/PRION:CVE-2023-22053\n|       PRION:CVE-2019-2739     3.6     https://vulners.com/prion/PRION:CVE-2019-2739\n|       PRION:CVE-2022-21302    3.5     https://vulners.com/prion/PRION:CVE-2022-21302\n|       PRION:CVE-2021-35608    3.5     https://vulners.com/prion/PRION:CVE-2021-35608              |       PRION:CVE-2021-2174     3.5     https://vulners.com/prion/PRION:CVE-2021-2174\n|       PRION:CVE-2021-2171     3.5     https://vulners.com/prion/PRION:CVE-2021-2171               |       PRION:CVE-2020-2930     3.5     https://vulners.com/prion/PRION:CVE-2020-2930\n|       PRION:CVE-2020-2926     3.5     https://vulners.com/prion/PRION:CVE-2020-2926\n|       PRION:CVE-2020-2921     3.5     https://vulners.com/prion/PRION:CVE-2020-2921               |       PRION:CVE-2020-2752     3.5     https://vulners.com/prion/PRION:CVE-2020-2752               |       PRION:CVE-2020-2694     3.5     https://vulners.com/prion/PRION:CVE-2020-2694               |       PRION:CVE-2020-2584     3.5     https://vulners.com/prion/PRION:CVE-2020-2584\n|       PRION:CVE-2020-14791    3.5     https://vulners.com/prion/PRION:CVE-2020-14791\n|       PRION:CVE-2020-14771    3.5     https://vulners.com/prion/PRION:CVE-2020-14771\n|       PRION:CVE-2020-14550    3.5     https://vulners.com/prion/PRION:CVE-2020-14550\n|       PRION:CVE-2019-3018     3.5     https://vulners.com/prion/PRION:CVE-2019-3018               |       PRION:CVE-2019-2993     3.5     https://vulners.com/prion/PRION:CVE-2019-2993\n|       PRION:CVE-2019-2938     3.5     https://vulners.com/prion/PRION:CVE-2019-2938\n|       PRION:CVE-2019-2814     3.5     https://vulners.com/prion/PRION:CVE-2019-2814\n|       PRION:CVE-2019-2743     3.5     https://vulners.com/prion/PRION:CVE-2019-2743\n|       PRION:CVE-2019-2741     3.5     https://vulners.com/prion/PRION:CVE-2019-2741\n|       PRION:CVE-2019-2738     3.5     https://vulners.com/prion/PRION:CVE-2019-2738               |       PRION:CVE-2019-2636     3.5     https://vulners.com/prion/PRION:CVE-2019-2636\n|       PRION:CVE-2019-2630     3.5     https://vulners.com/prion/PRION:CVE-2019-2630\n|       PRION:CVE-2019-2623     3.5     https://vulners.com/prion/PRION:CVE-2019-2623               |       PRION:CVE-2019-2617     3.5     https://vulners.com/prion/PRION:CVE-2019-2617               |       PRION:CVE-2019-2614     3.5     https://vulners.com/prion/PRION:CVE-2019-2614               |       PRION:CVE-2018-3284     3.5     https://vulners.com/prion/PRION:CVE-2018-3284               |       PRION:CVE-2018-3283     3.5     https://vulners.com/prion/PRION:CVE-2018-3283\n|       PRION:CVE-2018-3074     3.5     https://vulners.com/prion/PRION:CVE-2018-3074               |       PRION:CVE-2018-3062     3.5     https://vulners.com/prion/PRION:CVE-2018-3062\n|       PRION:CVE-2023-22115    3.3     https://vulners.com/prion/PRION:CVE-2023-22115\n|       PRION:CVE-2023-22114    3.3     https://vulners.com/prion/PRION:CVE-2023-22114              |       PRION:CVE-2023-22113    3.3     https://vulners.com/prion/PRION:CVE-2023-22113              |       PRION:CVE-2023-22112    3.3     https://vulners.com/prion/PRION:CVE-2023-22112\n|       PRION:CVE-2023-22111    3.3     https://vulners.com/prion/PRION:CVE-2023-22111", "creation_timestamp": "2023-11-15T16:53:23.000000Z"}, {"uuid": "95af183e-81c2-4351-8d5e-111cb4c890a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25844", "type": "seen", "source": "https://t.me/cibsecurity/21451", "content": "\u203c CVE-2020-25844 \u203c\n\nThe digest generation function of NHIServiSignAdapter has not been verified for parameter\u00e2\u20ac\u2122s length, which leads to a stack overflow loophole. Remote attackers can use the leak to execute code without privilege.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-31T12:37:26.000000Z"}, {"uuid": "d27c26d9-f92f-4a8e-aa47-b1bbf5b3c80c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25845", "type": "seen", "source": "https://t.me/cibsecurity/21456", "content": "\u203c CVE-2020-25845 \u203c\n\nMultiple functions of NHIServiSignAdapter failed to verify the users\u00e2\u20ac\u2122 file path, which leads to the SMB request being redirected to a malicious host, resulting in the leakage of user's credential.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-31T12:37:34.000000Z"}, {"uuid": "798f38f3-f6aa-40fc-bd6e-25be70e67789", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25847", "type": "seen", "source": "https://t.me/cibsecurity/21376", "content": "\u203c CVE-2020-25847 \u203c\n\nThis command injection vulnerability allows attackers to execute arbitrary commands in a compromised application. QNAP have already fixed this vulnerability in the following versions of QTS and QuTS hero.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-29T12:29:24.000000Z"}]}