Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-24721

EPSS 0.07% · P22
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-24721

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in the GAEN (aka Google/Apple Exposure Notifications) protocol through 2020-09-29, as used in COVID-19 applications on Android and iOS. It allows a user to be put in a position where he or she can be coerced into proving or disproving an exposure notification, because of the persistent state of a private framework.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Google Apple GAEN 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apple iOS是美国谷歌(Google)公司和开放手持设备联盟(简称OHA)公司的一套为移动设备所开发的操作系统。Android是美国谷歌(Google)和开放手持设备联盟(简称OHA)的一套以Linux为基础的开源操作系统。 Google/Apple 上的GAEN (aka Google/Apple Exposure Notifications) 协议存在安全漏洞,该漏洞源于私有框架的持久状态,它使用户可以被摆在可以强迫其证明或拒绝公开通知的位置。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-24721

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-24721

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-09-30 · 45 CVEs total

CVE-2020-261607.5 HIGHjwt-go 安全漏洞
CVE-2020-14375Ubuntu DPDK 代码问题漏洞
CVE-2020-13951Apache OpenMeetings 安全漏洞
CVE-2020-25816HashiCorp Vault和Vault Enterprise 安全漏洞
CVE-2020-25830MantisBT 跨站脚本漏洞
CVE-2020-12870RainbowFish PacsOne Server SQL注入漏洞
CVE-2020-12715RainbowFish PacsOne Server 代码问题漏洞
CVE-2020-13952Apache Superset 安全漏洞
CVE-2020-12869RainbowFish PacsOne Server 跨站脚本漏洞
CVE-2020-25781MantisBT 安全漏洞
CVE-2020-14376Ubuntu DPDK 缓冲区错误漏洞
CVE-2020-14374Ubuntu DPDK copy_data安全漏洞
CVE-2020-15849desk2.3 SettingsController SQL注入漏洞
CVE-2020-15488desk 代码问题漏洞
CVE-2020-15487Desk SQL注入漏洞
CVE-2020-19676Nacos 信息泄露漏洞
CVE-2020-19672Niushop B2B2C 代码问题漏洞
CVE-2019-18991Qualcomm 芯片和D-Link DWR-116授权问题漏洞
CVE-2019-18990多款 Realtek 授权问题漏洞
CVE-2019-18989Mediatek MT7620N 授权问题漏洞

Showing top 20 of 45 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2020-24721

No comments yet


Leave a comment