cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-15789,https://securityvulnerability.io/vulnerability/CVE-2020-15789,,"A vulnerability has been identified in Polarion Subversion Webclient (All versions). The web interface could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user, who must be authenticated to the web interface. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. This could allow the attacker to read or modify contents of the web application.",Siemens,Polarion Subversion Webclient,8.1,HIGH,0.0006099999882280827,false,,false,false,false,,false,false,2020-09-09T18:11:44.000Z,0 CVE-2020-15788,https://securityvulnerability.io/vulnerability/CVE-2020-15788,,"A vulnerability has been identified in Polarion Subversion Webclient (All versions). The Polarion subversion web application does not filter user input in a way that prevents Cross-Site Scripting. If a user is enticed into passing specially crafted, malicious input to the web client (e.g. by clicking on a malicious URL with embedded JavaScript), then JavaScript code can be returned and may then be executed by the user’s client. Various actions could be triggered by running malicious JavaScript code.",Siemens,Polarion Subversion Webclient,6.1,MEDIUM,0.0007800000021234155,false,,false,false,false,,false,false,2020-09-09T18:11:42.000Z,0