{"vulnerability": "CVE-2020-3590", "sightings": [{"uuid": "5a861d15-a205-4f95-bb54-7a17d839fab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-35904", "type": "seen", "source": "https://t.me/cibsecurity/21452", "content": "\u203c CVE-2020-35904 \u203c\n\nAn issue was discovered in the crossbeam-channel crate before 0.4.4 for Rust. It has incorrect expectations about the relationship between the memory allocation and how many iterator elements there are.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-31T12:37:27.000000Z"}, {"uuid": "98f99226-cb2d-4a04-89d7-6c5176c1a146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-3590", "type": "seen", "source": "https://t.me/cibsecurity/15999", "content": "\u203c CVE-2020-3590 \u203c\n\nA vulnerability in the web-based management interface of the Cisco SD-WAN vManage Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user. The vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-06T22:51:17.000000Z"}]}