{"vulnerability": "CVE-2020-25182", "sightings": [{"uuid": "8744ea78-d547-4352-a4c4-38d688c4b4f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-25182", "type": "seen", "source": "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1771.html", "content": "", "creation_timestamp": "2026-03-10T04:00:00.000000Z"}, {"uuid": "147d362d-bbe5-48e6-b3bb-225cd2e1f12d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25182", "type": "seen", "source": "https://t.me/cibsecurity/39259", "content": "\u203c CVE-2020-25182 \u203c\n\nRockwell Automation ISaGRAF Runtime Versions 4.x and 5.x searches for and loads DLLs as dynamic libraries. Uncontrolled loading of dynamic libraries could allow a local, unauthenticated attacker to execute arbitrary code. This vulnerability only affects ISaGRAF Runtime when running on Microsoft Windows systems.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-18T21:33:45.000000Z"}]}