{"vulnerability": "CVE-2020-1615", "sightings": [{"uuid": "38cae96a-b062-40d6-bf11-c8a4c0f4795b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16152", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "e2aeaef2-1813-4bea-b990-e021d564ecd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16152", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:25.000000Z"}, {"uuid": "b372783a-d9a6-41d1-acba-d7bd28db326d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16152", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/aerohive_netconfig_lfi_log_poison_rce.rb", "content": "", "creation_timestamp": "2021-11-11T23:23:32.000000Z"}, {"uuid": "3c1b8f2e-2dbb-4713-896b-055b0912b0be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16155", "type": "seen", "source": "https://t.me/cibsecurity/33867", "content": "\u203c CVE-2020-16155 \u203c\n\nThe CPAN::Checksums package 2.12 for Perl does not uniquely define signed data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-13T20:11:10.000000Z"}, {"uuid": "a96fe9eb-c29c-419c-80f4-4b2b790bb0a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16154", "type": "seen", "source": "https://t.me/cibsecurity/33870", "content": "\u203c CVE-2020-16154 \u203c\n\nThe App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-13T20:11:13.000000Z"}, {"uuid": "42160f0a-372e-47a5-80f1-b5e2ea0df52c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16156", "type": "seen", "source": "https://t.me/cibsecurity/33865", "content": "\u203c CVE-2020-16156 \u203c\n\nCPAN 2.28 allows Signature Verification Bypass.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-12-13T20:11:08.000000Z"}, {"uuid": "2656422a-654d-450c-ba3c-2b3f2746810f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16152", "type": "seen", "source": "https://t.me/cibsecurity/32393", "content": "\u203c CVE-2020-16152 \u203c\n\nThe NetConfig UI administrative interface in Extreme Networks ExtremeWireless Aerohive HiveOS and IQ Engine through 10.0r8a allows attackers to execute PHP code as the root user via remote HTTP requests that insert this code into a log file and then traverse to that file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-15T00:11:50.000000Z"}, {"uuid": "ae77faa1-0e54-43c3-a6be-88bcf6f2e655", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1615", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/961", "content": "#exploit\n1. CVE-2020-2555:\nOracle WebLogic Server 12.2.1.4.0 - RCE\nhttps://github.com/nu11secur1ty/Windows10Exploits/tree/master/Undefined/CVE-2020-2555\n\n2. CVE-2020-1615:\nDefault credentials supplied in Junos OS vMX configuration (17.x, 18.x, 19.x versions)\nhttps://kb.juniper.net/InfoCenter/index?page=content&amp;id=JSA10998", "creation_timestamp": "2022-06-18T18:37:30.000000Z"}]}