{"vulnerability": "CVE-2020-2515", "sightings": [{"uuid": "e4d7d10f-933e-4c25-8700-9f6e35abf16a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25159", "type": "seen", "source": "https://t.me/cibsecurity/16816", "content": "\u203c CVE-2020-25159 \u203c\n\n499ES EtherNet/IP (ENIP) Adaptor Source Code is vulnerable to a stack-based buffer overflow, which may allow an attacker to send a specially crafted packet that may result in a denial-of-service condition or code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-24T22:47:08.000000Z"}, {"uuid": "7b1d7ea5-61bf-437c-93d6-109438b7e81b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25153", "type": "seen", "source": "https://t.me/cibsecurity/21219", "content": "\u203c CVE-2020-25153 \u203c\n\nThe built-in web service for MOXA NPort IAW5000A-I/O firmware version 2.1 or lower does not require users to have strong passwords.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T19:25:13.000000Z"}, {"uuid": "78822e7d-d327-47cb-8356-cf057275a7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25151", "type": "seen", "source": "https://t.me/cibsecurity/16296", "content": "\u203c CVE-2020-25151 \u203c\n\nThe affected product does not properly validate input, which may allow an attacker to execute a denial-of-service attack on the NIO 50 (all versions).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-13T18:33:50.000000Z"}]}