{"vulnerability": "CVE-2020-1396", "sightings": [{"uuid": "99aa5dd2-6022-49c5-93f7-82c1356931c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13965", "type": "seen", "source": "MISP/2f4aabd1-905a-4667-b431-a7319f429751", "content": "", "creation_timestamp": "2024-06-27T07:06:52.000000Z"}, {"uuid": "b17cfa06-d24b-420c-bea0-7829ffa06427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13965", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-06-26T18:10:02.000000Z"}, {"uuid": "6bbc1957-0b0b-4566-a07f-74f17a20e71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-13965", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9b0268e6-3166-4783-9370-f76ecdecece7", "content": "", "creation_timestamp": "2026-02-02T12:26:34.475950Z"}, {"uuid": "38541cf3-b1ce-47c1-8ca8-e23f6e57ca60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13965", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:55.000000Z"}, {"uuid": "c53cc796-fc93-4d48-86da-c6ae8bb89806", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13965", "type": "seen", "source": "Telegram/VcMsCDQYQPLwn2p2dVnu04wKaYurHxHCIr7_NIBw3mJv46Xk", "content": "", "creation_timestamp": "2025-02-14T10:09:22.000000Z"}, {"uuid": "fa247b42-b502-49d6-85a4-0c6ef10fccd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13963", "type": "seen", "source": "https://t.me/cibsecurity/25217", "content": "\u203c CVE-2020-13963 \u203c\n\nSOPlanning before 1.47 has Incorrect Access Control because certain secret key information, and the related authentication algorithm, is public. The key for admin is hardcoded in the installation code, and there is no key for publicsp (which is a guest account).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-21T23:36:05.000000Z"}, {"uuid": "1e898199-c70a-46ce-af57-92f3750fe4c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13968", "type": "seen", "source": "https://t.me/cibsecurity/21250", "content": "\u203c CVE-2020-13968 \u203c\n\nCRK Business Platform &lt;= 2019.1 allows can inject SQL statements against the DB on any path using the 'strSessao' parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T21:13:11.000000Z"}, {"uuid": "4b3669aa-8ad3-4044-8a51-7615f6c4b65a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13969", "type": "seen", "source": "https://t.me/cibsecurity/21247", "content": "\u203c CVE-2020-13969 \u203c\n\nCRK Business Platform &lt;= 2019.1 allows reflected XSS via erro.aspx on 'CRK', 'IDContratante', 'Erro', or 'Mod' parameter. This is path-independent.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T21:13:08.000000Z"}]}