cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-24595,https://securityvulnerability.io/vulnerability/CVE-2020-24595,,"Mitel MiCloud Management Portal before 6.1 SP5 could allow an attacker, by sending a crafted request, to retrieve sensitive information due to insufficient access control.",Mitel,Micloud Management Portal,5.3,MEDIUM,0.0008999999845400453,false,,false,false,false,,,false,false,,2020-09-25T03:47:42.000Z,0 CVE-2020-24594,https://securityvulnerability.io/vulnerability/CVE-2020-24594,,"Mitel MiCloud Management Portal before 6.1 SP5 could allow an unauthenticated attacker to execute arbitrary scripts due to insufficient input validation, aka XSS. A successful exploit could allow an attacker to gain access to a user session.",Mitel,Micloud Management Portal,9.6,CRITICAL,0.003530000103637576,false,,false,false,false,,,false,false,,2020-09-25T03:47:16.000Z,0 CVE-2020-24593,https://securityvulnerability.io/vulnerability/CVE-2020-24593,,Mitel MiCloud Management Portal before 6.1 SP5 could allow a remote attacker to conduct a SQL Injection attack and access user credentials due to improper input validation.,Mitel,Micloud Management Portal,7.2,HIGH,0.001129999989643693,false,,false,false,false,,,false,false,,2020-09-25T03:46:46.000Z,0 CVE-2020-24592,https://securityvulnerability.io/vulnerability/CVE-2020-24592,,"Mitel MiCloud Management Portal before 6.1 SP5 could allow an attacker, by sending a crafted request, to view system information due to insufficient output sanitization.",Mitel,Micloud Management Portal,5.3,MEDIUM,0.0008999999845400453,false,,false,false,false,,,false,false,,2020-09-25T03:44:33.000Z,0