{"vulnerability": "CVE-2020-2924", "sightings": [{"uuid": "9dd0ddff-13c0-4544-8ae1-e31f12803b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29240", "type": "seen", "source": "https://t.me/cibsecurity/17049", "content": "\u203c CVE-2020-29240 \u203c\n\nLepton-CMS 4.7.0 is affected by cross-site scripting (XSS). An attacker can inject the XSS payload in the URL field of the admin page and each time an admin visits the Menu-Pages-Pages Overview section, the XSS will be triggered.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-02T20:55:19.000000Z"}, {"uuid": "69cce67e-16c8-4933-938b-334b17851105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29241", "type": "seen", "source": "https://t.me/cibsecurity/22602", "content": "\u203c CVE-2020-29241 \u203c\n\nOnline News Portal using PHP/MySQLi 1.0 is affected by cross-site scripting (XSS) which allows remote attackers to inject an arbitrary web script or HTML via the \"Title\" parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-26T20:36:35.000000Z"}, {"uuid": "23c15ff6-ddca-4327-84f0-42ef0e376842", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29245", "type": "seen", "source": "https://t.me/cibsecurity/21346", "content": "\u203c CVE-2020-29245 \u203c\n\ndhowden tag before 2020-11-19 allows \"panic: runtime error: slice bounds out of range\" via readAtomData.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T12:28:38.000000Z"}, {"uuid": "b250d574-cf78-4fd5-b4ae-8c938dc2d5a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29244", "type": "seen", "source": "https://t.me/cibsecurity/21343", "content": "\u203c CVE-2020-29244 \u203c\n\ndhowden tag before 2020-11-19 allows \"panic: runtime error: slice bounds out of range\" via readTextWithDescrFrame.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T12:28:36.000000Z"}, {"uuid": "a46bca5f-3b0c-42f1-8800-50cf0c0cd18f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29243", "type": "seen", "source": "https://t.me/cibsecurity/21342", "content": "\u203c CVE-2020-29243 \u203c\n\ndhowden tag before 2020-11-19 allows \"panic: runtime error: index out of range\" via readAPICFrame.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T12:28:35.000000Z"}, {"uuid": "da25fa4d-ac7e-4586-9521-b970c8d0101d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29242", "type": "seen", "source": "https://t.me/cibsecurity/21341", "content": "\u203c CVE-2020-29242 \u203c\n\ndhowden tag before 2020-11-19 allows \"panic: runtime error: index out of range\" via readPICFrame.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T12:28:34.000000Z"}, {"uuid": "a4e8e47e-8e15-4729-86df-9dfc80903ae5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29249", "type": "seen", "source": "https://t.me/cibsecurity/21325", "content": "\u203c CVE-2020-29249 \u203c\n\nCXUUCMS V3 allows class=\"layui-input\" XSS.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-27T12:27:29.000000Z"}]}