{"vulnerability": "CVE-2020-29653", "sightings": [{"uuid": "d4c3d40c-d9d2-43df-8e73-6ff323560ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5217", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-11T15:04:12.000000Z"}, {"uuid": "4927da14-24ad-4b8b-8970-7b9a363c462c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/5218", "content": "CVE-2020-29653: Stealing Froxlor login credentials using dangling markup\n\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup/", "creation_timestamp": "2021-03-12T17:04:14.000000Z"}, {"uuid": "dbace35f-1938-4a00-8ca8-bf86f4ffb441", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2925", "content": "#Threat_Research\n1. CVE-2020-29653:\nStealing Froxlor login credentials using dangling markup (PoC)\nhttps://labs.detectify.com/2021/03/10/cve-2020-29653-stealing-froxlor-login-credentials-dangling-markup\n\n2. New Mirai Variant Targeting Network Security Devices\nhttps://unit42.paloaltonetworks.com/mirai-variant-iot-vulnerabilities\n]-&gt; PoC for CVE-2020-25506:\nD-Link DNS-320 Firewall RCE Vulnerability\nhttps://gist.github.com/WinMin/6f63fd1ae95977e0e2d49bd4b5f00675\n]-&gt; PoC for CVE-2021-22502:\nRCE in Micro Focus Operation Bridge Reporter, ver.10.4\nhttps://github.com/pedrib/PoC/blob/master/advisories/Micro_Focus/Micro_Focus_OBR.md\n]-&gt; PoC for CVE-2021-27561, CVE-2021-27562:\nYealink Device Mngmnt Pre-Auth \"root\" Level RCE Vuln\nhttps://ssd-disclosure.com/ssd-advisory-yealink-dm-pre-auth-root-level-rce", "creation_timestamp": "2021-03-17T11:01:15.000000Z"}, {"uuid": "552c3219-149a-414f-8aef-fefb0064ed0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29653", "type": "seen", "source": "https://t.me/cibsecurity/40714", "content": "\u203c CVE-2020-29653 \u203c\n\nFroxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-04-13T16:23:32.000000Z"}]}