{"vulnerability": "CVE-2020-3545", "sightings": [{"uuid": "6a43a7dd-62b0-432c-88ad-92f156a3c88c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35452", "type": "seen", "source": "Telegram/Hf_SunJuoYNf_bsQCJ20cuXyI7bzH8EMEXzusn30k3vpXeQ", "content": "", "creation_timestamp": "2024-10-15T10:14:15.000000Z"}, {"uuid": "debf5af9-0ac1-4192-8b5b-750cf1305aa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35451", "type": "seen", "source": "https://t.me/cibsecurity/24607", "content": "\u203c CVE-2020-35451 \u203c\n\nThere is a race condition in OozieSharelibCLI in Apache Oozie before version 5.2.1 which allows a malicious attacker to replace the files in Oozie's sharelib during it's creation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-09T18:51:52.000000Z"}, {"uuid": "eaed6192-53af-465a-826b-c97116e0b84a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35458", "type": "seen", "source": "https://t.me/cibsecurity/21941", "content": "\u203c CVE-2020-35458 \u203c\n\nAn issue was discovered in ClusterLabs Hawk 2.x through 2.3.0-x. There is a Ruby shell code injection issue via the hawk_remember_me_id parameter in the login_from_cookie cookie. The user logout routine could be used by unauthenticated remote attackers to execute code as hauser.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-12T18:52:28.000000Z"}, {"uuid": "b91f751d-12c0-40ce-9e0e-497241cf018b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35454", "type": "seen", "source": "https://t.me/cibsecurity/25039", "content": "\u203c CVE-2020-35454 \u203c\n\nThe Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from an Android backup because of insecure application configuration.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-17T17:31:06.000000Z"}, {"uuid": "74ae643a-deea-48d8-8869-250f52241a2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35455", "type": "seen", "source": "https://t.me/cibsecurity/25037", "content": "\u203c CVE-2020-35455 \u203c\n\nThe Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to obtain user credentials from Shared Preferences and the SQLite database because of insecure data storage.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-17T17:31:04.000000Z"}, {"uuid": "617cef2e-ebea-479f-98d4-2af42ff0eba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35456", "type": "seen", "source": "https://t.me/cibsecurity/25036", "content": "\u203c CVE-2020-35456 \u203c\n\nThe Taidii Diibear Android application 2.4.0 and all its derivatives allow attackers to view private chat messages and media files via logcat because of excessive logging.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-17T17:31:03.000000Z"}, {"uuid": "d22ed001-9cf7-4e14-93dd-c4d4b8924745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35453", "type": "seen", "source": "https://t.me/cibsecurity/20972", "content": "\u203c CVE-2020-35453 \u203c\n\nHashiCorp Vault Enterprise\u00e2\u20ac\u2122s Sentinel EGP policy feature incorrectly allowed requests to be processed in parent and sibling namespaces. Fixed in 1.5.6 and 1.6.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-17T07:42:20.000000Z"}]}