{"vulnerability": "CVE-2020-2691", "sightings": [{"uuid": "395f0241-6cd9-4e36-8d33-c6ad5be7fbbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26919", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "b35757c3-88dd-4347-9cb9-131fd659b41d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26919", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "bef8a54b-f6d0-4846-950e-445c9876405c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26919", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970965", "content": "", "creation_timestamp": "2024-12-24T20:22:24.084231Z"}, {"uuid": "0c625a4e-d0ff-4ddd-b2a8-ea2b902600ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26919", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:47.000000Z"}, {"uuid": "4bc941c3-b380-49d9-8eff-047ea0c8a0a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-26919", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f6527a30-f2b0-4668-9609-5a5c87eaaace", "content": "", "creation_timestamp": "2026-02-02T12:28:58.694786Z"}, {"uuid": "ad7e1da2-a06b-40f3-a31f-a700c6661438", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26919", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2861", "content": "#Hardware_Security\nMultiple Vulnerabilities in Netgear ProSAFE Plus JGS516PE/GS116Ev2 Switches (PoCs)\nhttps://research.nccgroup.com/2021/03/08/technical-advisory-multiple-vulnerabilities-in-netgear-prosafe-plus-jgs516pe-gs116ev2-switches\n// - Unauthenticated RCE (CVE-2020-26919)\n- NSDP Auth Bypass (CVE-2020-35231)\n- Unauth Firmware Upd Mechanism (CVE-2020-35220)\n- TFTP Ineffective Firmware Checks (CVE-2020-35232)\n- Unauth BoF (CVE-2020-35224)\n- Insecure Password Hashing Mechanism (CVE-2020-35221)\n- Authentication Token Reuse (CVE-2020-35229)\n- Stored XSS in Language Settings (CVE-2020-35228)\n- Buffer Overflow in IP Source Params (CVE-2020-35227)\n- Unauthenticated Write Access to DHCP Configuration (CVE-2020-35226)\n- Unauthenticated Access to Switch Configuration Parameters (CVE-2020-35222)\n- TFTP Unexpected Behaviours (CVE-2020-35233)\n- Multiple Integer Overflow Instances (CVE-2020-35230)\n- Multiple Write Commands BoF (CVE-2020-35225)\n- Ineffective CSRF Protections (CVE-2020-35223)", "creation_timestamp": "2024-10-09T19:00:25.000000Z"}]}