{"vulnerability": "CVE-2020-2517", "sightings": [{"uuid": "ef3e8167-3446-4522-b1d1-8346b693bf14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25177", "type": "seen", "source": "https://t.me/cibsecurity/16991", "content": "\u203c CVE-2020-25177 \u203c\n\nWECON PLC Editor Versions 1.3.8 and prior has a stack-based buffer overflow vulnerability has been identified that may allow arbitrary code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-01T18:54:14.000000Z"}, {"uuid": "3d596b5b-8807-437f-8ebf-8f954485c252", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-25176", "type": "seen", "source": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html", "content": "", "creation_timestamp": "2026-03-10T04:00:00.000000Z"}, {"uuid": "57fe2877-5642-43b9-9965-3cc451cba8d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-25178", "type": "seen", "source": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html", "content": "", "creation_timestamp": "2026-03-10T04:00:00.000000Z"}, {"uuid": "88fbaac7-7218-402a-b30f-28f04833ade8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25175", "type": "seen", "source": "https://t.me/cibsecurity/20750", "content": "\u203c CVE-2020-25175 \u203c\n\nGE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-14T20:39:50.000000Z"}, {"uuid": "6dae35c8-f7b4-4ccd-8b93-176268ef80a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25179", "type": "seen", "source": "https://t.me/cibsecurity/20748", "content": "\u203c CVE-2020-25179 \u203c\n\nGE Healthcare Imaging and Ultrasound Products may allow specific credentials to be exposed during transport over the network.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-14T20:39:48.000000Z"}, {"uuid": "f57c3b02-42a9-46ab-b758-a733088dd784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25171", "type": "seen", "source": "https://t.me/cibsecurity/23876", "content": "\u203c CVE-2020-25171 \u203c\n\nThe affected Fuji Electric V-Server Lite versions prior to 3.3.24.0 are vulnerable to an out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-19T20:51:29.000000Z"}, {"uuid": "d7290674-108d-4e0b-9f06-5f298f869a73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25174", "type": "seen", "source": "https://t.me/cibsecurity/15988", "content": "\u203c CVE-2020-25174 \u203c\n\nA DLL hijacking vulnerability in the B. Braun OnlineSuite Version AP 3.0 and earlier allows local attackers to execute code on the system as a high privileged user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-06T20:51:11.000000Z"}, {"uuid": "e8d05c05-49d6-40e8-aa55-cfe88cfc3a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25172", "type": "seen", "source": "https://t.me/cibsecurity/15990", "content": "\u203c CVE-2020-25172 \u203c\n\nA relative path traversal attack in the B. Braun OnlineSuite Version AP 3.0 and earlier allows unauthenticated attackers to upload or download arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-06T20:51:16.000000Z"}, {"uuid": "f126fb60-f50b-4e22-8068-723e94b6b616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25170", "type": "seen", "source": "https://t.me/cibsecurity/15985", "content": "\u203c CVE-2020-25170 \u203c\n\nAn Excel Macro Injection vulnerability exists in the export feature in the B. Braun OnlineSuite Version AP 3.0 and earlier via multiple input fields that are mishandled in an Excel export.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-06T20:51:08.000000Z"}]}