{"vulnerability": "CVE-2020-2656", "sightings": [{"uuid": "8ec37abc-3ba2-4e11-9bee-b40452fd1551", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-26560", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "a817f526-c340-4384-8044-0673037e1f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26565", "type": "seen", "source": "https://t.me/cibsecurity/26645", "content": "\u203c CVE-2020-26565 \u203c\n\nObjectPlanet Opinio before 7.14 allows Expression Language Injection via the admin/permissionList.do from parameter. This can be used to retrieve possibly sensitive serverInfo data.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-07-31T20:25:50.000000Z"}, {"uuid": "08c21dc1-a429-4614-a4d6-488cff52194b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26562", "type": "published-proof-of-concept", "source": "https://t.me/avdno/856", "content": "\u0420\u0430\u0437\u0431\u043e\u0440 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Cybereason EDR, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0432\u0448\u0438\u0445 \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0443 Denial of Service. \u041f\u043e\u0441\u043b\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 EDR \u0441\u0435\u043d\u0441\u043e\u0440 \u043f\u0435\u0440\u0435\u0441\u0442\u0430\u0435\u0442 \"\u0432\u0438\u0434\u0435\u0442\u044c\" \u0441\u043e\u0431\u044b\u0442\u0438\u044f, \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u044f\u0449\u0438\u0435 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435: https://airbus-cyber-security.com/a-case-study-with-cybereason-edr-cve-2020-26562-cve-2020-26871/", "creation_timestamp": "2020-10-22T12:44:21.000000Z"}, {"uuid": "9007f9a1-647a-4cc2-91a6-6c530557fb9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26564", "type": "seen", "source": "https://t.me/cibsecurity/26644", "content": "\u203c CVE-2020-26564 \u203c\n\nObjectPlanet Opinio before 7.15 allows XXE attacks via three steps: modify a .css file to have ", "creation_timestamp": "2021-07-31T20:25:49.000000Z"}, {"uuid": "db100e1a-7521-4d3f-a819-7bf89eba0861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26563", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/806", "content": "CVE-2020-26563 ObjectPlanet Opinio 7.12 XSS\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-26563_ObjectPlanet_Opinio_7.12_XSS%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T04:42:01.000000Z"}, {"uuid": "b164336f-c1fb-43a6-b054-fee2eed10bc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26569", "type": "seen", "source": "https://t.me/cibsecurity/21356", "content": "\u203c CVE-2020-26569 \u203c\n\nIn EVPN VxLAN setups in Arista EOS, specific malformed packets can lead to incorrect MAC to IP bindings and as a result packets can be incorrectly forwarded across VLAN boundaries. This can result in traffic being discarded on the receiving VLAN. This affects versions: 4.21.12M and below releases in the 4.21.x train; 4.22.7M and below releases in the 4.22.x train; 4.23.5M and below releases in the 4.23.x train; 4.24.2F and below releases in the 4.24.x train.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-28T18:28:38.000000Z"}, {"uuid": "931f2620-7288-43be-b8a2-bf16fa11bc0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26564", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/810", "content": "CVE-2020-26564 ObjectPlanet Opinio 7.13/7.14 XML \u6ce8\u5165\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-26564_ObjectPlanet_Opinio_7.13/7.14_XML_%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T04:42:01.000000Z"}, {"uuid": "63ef4a08-e29c-47a1-adea-44aebdb3b384", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2656", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2629", "content": "The INFILTRATE effect: 6 bugs in 6 months (PoCs):\n- LPE via xscreensaver (CVE-2019-3010);\n- Low impact information disclosure via Solaris xlock (CVE-2020-2656);\n- LPE via CDE (CVE-2020-2696, CVE-2020-2944);\n- Stack-based buffer overflow in CDE libDtSvc (CVE-2020-2851);\n- Heap-based buffer overflow in Solaris whodo and w commands (CVE-2020-2771)\nhttps://github.com/0xdea/raptor_infiltrate20", "creation_timestamp": "2021-02-03T12:43:01.000000Z"}, {"uuid": "eb60ce74-9db5-45b5-a073-39e92e94e094", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26567", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1883", "content": "#exploit \nCVE-2020-26567:\nD-Link DSR-250N (&gt;= 3.12) - Denial Of Service\nhttps://packetstormsecurity.com/files/159516/rt-sa-2020-002.txt", "creation_timestamp": "2022-09-08T16:16:00.000000Z"}, {"uuid": "28623532-f13a-43b1-bb53-e27542347d1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26561", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2068", "content": "#WLAN_Security\nTechnical Advisory - Linksys Broadband Router WRT160NL - Authenticated Remote Buffer Overflow (PoC for CVE-2020-26561)\nhttps://research.nccgroup.com/2020/10/20/wrt160nl-cve-2020-26561-bof", "creation_timestamp": "2022-05-27T12:54:32.000000Z"}, {"uuid": "51e7ce49-94de-4aa8-8f01-174328399004", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26566", "type": "seen", "source": "https://t.me/cibsecurity/15588", "content": "\u203c CVE-2020-26566 \u203c\n\nA Denial of Service condition in Motion-Project Motion 3.2 through 4.3.1 allows remote unauthenticated users to cause a webu.c segmentation fault and kill the main process via a crafted HTTP request.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-26T21:29:10.000000Z"}]}