{"vulnerability": "CVE-2020-11640", "sightings": [{"uuid": "697fd8ae-5108-42eb-8e80-51dc95391ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11640", "type": "seen", "source": "https://t.me/cvedetector/1523", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-11640 - ABB Advant MOD 300 AdvaBuild Remote Command Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2020-11640 \nPublished : July 23, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : AdvaBuild uses a command queue to launch certain operations. An attacker who gains access to the  \ncommand queue can use it to launch an attack by running any executable on the AdvaBuild node. The  \nexecutables that can be run are not limited to AdvaBuild specific executables.\u00a0  \n  \nImproper Privilege Management vulnerability in ABB Advant MOD 300 AdvaBuild.This issue affects Advant MOD 300 AdvaBuild: from 3.0 through 3.7 SP2. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"23 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-23T20:34:59.000000Z"}]}