{"vulnerability": "CVE-2020-2578", "sightings": [{"uuid": "6b11c2c4-f74d-47e7-ac0f-471cb6763ca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25787", "type": "seen", "source": "MISP/524666c7-708e-47c5-97ac-7f29e9387c88", "content": "", "creation_timestamp": "2024-11-14T06:08:16.000000Z"}, {"uuid": "00206359-226e-4610-a47d-168b584d7aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25784", "type": "seen", "source": "https://t.me/cibsecurity/22771", "content": "\u203c CVE-2020-25784 \u203c\n\nAn issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientGuard::SubOprMsg during incoming message handling.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T07:38:01.000000Z"}, {"uuid": "3e79db10-7136-456b-bcd3-fd3fae3f0b41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25787", "type": "published-proof-of-concept", "source": "https://t.me/pwnwiki_zhchannel/133", "content": "CVE-2020-25787 Tiny Tiny RSS \u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-25787_Tiny_Tiny_RSS_%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T06:42:51.000000Z"}, {"uuid": "1fa6295c-8a4a-4566-86c1-3fddb7bbc925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25782", "type": "seen", "source": "https://t.me/cibsecurity/22772", "content": "\u203c CVE-2020-25782 \u203c\n\nAn issue was discovered on Accfly Wireless Security IR Camera 720P System with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CNetClientManage::ServerIP_Proto_Set during incoming message handling.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T07:38:02.000000Z"}, {"uuid": "47e38058-0d7b-45dd-87d9-504d1904ed73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25783", "type": "seen", "source": "https://t.me/cibsecurity/22770", "content": "\u203c CVE-2020-25783 \u203c\n\nAn issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated heap-based buffer overflow in the function CNetClientTalk::OprMsg during incoming message handling.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T07:38:01.000000Z"}, {"uuid": "e5f243d3-2550-4a42-a16a-1b54731e0fd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25785", "type": "seen", "source": "https://t.me/cibsecurity/22769", "content": "\u203c CVE-2020-25785 \u203c\n\nAn issue was discovered on Accfly Wireless Security IR Camera System 720P with software versions v3.10.73 through v4.15.77. There is an unauthenticated stack-based buffer overflow in the function CFtpProtocol::FtpLogin during the update procedure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-28T07:38:00.000000Z"}, {"uuid": "0d920c9e-5bd5-4e6a-9d7a-5fe5199027d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25781", "type": "seen", "source": "https://t.me/cibsecurity/14972", "content": "\u203c CVE-2020-25781 \u203c\n\nAn issue was discovered in file_download.php in MantisBT before 2.24.3. Users without access to view private issue notes are able to download the (supposedly private) attachments linked to these notes by accessing the corresponding file download URL directly.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-01T00:52:19.000000Z"}, {"uuid": "a0414605-ef94-4d0f-99dc-98384665a2ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25789", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1810", "content": "#Threat_Research\nExploiting Tiny Tiny RSS\n(CVE-2020-25787, CVE-2020-25788, CVE-2020-25789)\nhttps://www.digeex.de/blog/tinytinyrss", "creation_timestamp": "2020-12-31T19:27:18.000000Z"}, {"uuid": "8513dbee-080d-4dee-bb11-cf82697a03b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25787", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1810", "content": "#Threat_Research\nExploiting Tiny Tiny RSS\n(CVE-2020-25787, CVE-2020-25788, CVE-2020-25789)\nhttps://www.digeex.de/blog/tinytinyrss", "creation_timestamp": "2020-12-31T19:27:18.000000Z"}, {"uuid": "d4a4275e-1f3b-4066-a070-078418ea971e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25788", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1810", "content": "#Threat_Research\nExploiting Tiny Tiny RSS\n(CVE-2020-25787, CVE-2020-25788, CVE-2020-25789)\nhttps://www.digeex.de/blog/tinytinyrss", "creation_timestamp": "2020-12-31T19:27:18.000000Z"}]}