{"vulnerability": "CVE-2020-2693", "sightings": [{"uuid": "2068bf77-c961-4d34-8bde-5f88950a2868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26939", "type": "seen", "source": "https://gist.github.com/kitherill/35c9211065676c6c258f3a3f1d76a26d", "content": "", "creation_timestamp": "2026-02-11T12:49:28.000000Z"}, {"uuid": "05a4b550-dd46-4815-ace1-9bf45b3fb10e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26935", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mcxkzuf6oc27", "content": "", "creation_timestamp": "2026-01-21T21:02:59.725973Z"}, {"uuid": "0095acac-7811-449e-82b2-929df2052633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26935", "type": "seen", "source": "https://t.me/cibsecurity/15192", "content": "\u203c CVE-2020-26935 \u203c\n\nAn issue was discovered in SearchController in phpMyAdmin before 4.9.6 and 5.x before 5.0.3. A SQL injection vulnerability was discovered in how phpMyAdmin processes SQL statements in the search feature. An attacker could use this flaw to inject malicious SQL in to a query.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-10T22:35:52.000000Z"}, {"uuid": "fb1e2daa-bc19-454b-a288-2a2a36c4b676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26939", "type": "seen", "source": "https://t.me/cibsecurity/15786", "content": "\u203c CVE-2020-26939 \u203c\n\nIn Legion of the Bouncy Castle BC before 1.55 and BC-FJA before 1.0.1.2, attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-03T00:39:06.000000Z"}, {"uuid": "99bea89a-f891-4773-98c0-7493bc58c348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26933", "type": "seen", "source": "https://t.me/cibsecurity/16534", "content": "\u203c CVE-2020-26933 \u203c\n\nTrusted Computing Group (TCG) Trusted Platform Module Library Family 2.0 Library Specification Revisions 1.38 through 1.59 has Incorrect Access Control during a non-orderly TPM shut-down that uses USE_DA_USED. Improper initialization of this shut-down may result in susceptibility to a dictionary attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-18T20:40:49.000000Z"}, {"uuid": "f0d0e9cc-5e64-46a3-bf3b-49b68d8cefc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26935", "type": "seen", "source": "https://gist.github.com/Cdev12/d784e74424e2958f6abc3bddbcf4e319", "content": "", "creation_timestamp": "2025-12-16T22:48:36.000000Z"}, {"uuid": "0c425c20-1c6b-4961-9d51-2ce1e6860d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-26935", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/CVE-2020-26935.yaml", "content": "", "creation_timestamp": "2026-01-21T03:20:05.000000Z"}]}