{"vulnerability": "CVE-2020-2761", "sightings": [{"uuid": "3972ed00-2c05-4343-a6e1-522eb675997d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-27619", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "9de5c37e-5ddb-4cf8-a583-fbc3c1c3d642", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27615", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "fb5971fc-3b35-4556-b89e-1bcbe54e050d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27615", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:27.000000Z"}, {"uuid": "168a1e50-fc22-4e1f-b917-b287c99ec6a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27615", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lyy7rtocsj25", "content": "", "creation_timestamp": "2025-09-16T21:02:26.018138Z"}, {"uuid": "83995e07-60be-43bb-9e45-fb283e3f8a86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27615", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2020/CVE-2020-27615.yaml", "content": "", "creation_timestamp": "2025-09-13T21:36:38.000000Z"}, {"uuid": "cfd08398-e8bc-437d-9053-d2ffebfbbd85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27615", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/wp_loginizer_log_sqli.rb", "content": "", "creation_timestamp": "2020-11-05T14:43:56.000000Z"}, {"uuid": "4b0ceb33-1a19-48e3-bc06-4809d7ca2c00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27614", "type": "seen", "source": "https://t.me/cibsecurity/17459", "content": "\u203c CVE-2020-27614 \u203c\n\nAnyDesk for macOS versions 6.0.2 and older have a vulnerability in the XPC interface that does not properly validate client requests and allows local privilege escalation.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:35:03.000000Z"}, {"uuid": "644e154f-1405-4193-923b-b4169a9bdfa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27615", "type": "seen", "source": "https://t.me/cibsecurity/15509", "content": "\u203c CVE-2020-27615 \u203c\n\nThe Loginizer plugin before 1.6.4 for WordPress allows SQL injection (with resultant XSS), related to loginizer_login_failed and lz_valid_ip.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-22T00:51:26.000000Z"}, {"uuid": "302b46ab-8b3e-40ab-ac5a-07b00ebbef2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27619", "type": "seen", "source": "https://t.me/cibsecurity/15513", "content": "\u203c CVE-2020-27619 \u203c\n\nIn Python 3 through 3.9.0, the Lib/test/multibytecodec_support.py CJK codec tests call eval() on content retrieved via HTTP.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-22T07:51:50.000000Z"}, {"uuid": "c1f1bdb6-e72b-4ef1-a192-be580e8fe11b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27611", "type": "seen", "source": "https://t.me/cibsecurity/15486", "content": "\u203c CVE-2020-27611 \u203c\n\nBigBlueButton through 2.2.8 uses STUN/TURN resources from a third party, which may represent an unintended endpoint.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T19:07:35.000000Z"}, {"uuid": "2c5834da-ac06-43e0-af06-6793b674646a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27613", "type": "seen", "source": "https://t.me/cibsecurity/15475", "content": "\u203c CVE-2020-27613 \u203c\n\nThe installation procedure in BigBlueButton before 2.2.8 (or earlier) uses ClueCon as the FreeSWITCH password, which allows local users to achieve unintended FreeSWITCH access.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T19:04:31.000000Z"}, {"uuid": "41419d38-701e-46eb-8836-0c698ace1faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27612", "type": "seen", "source": "https://t.me/cibsecurity/15477", "content": "\u203c CVE-2020-27612 \u203c\n\nGreenlight in BigBlueButton through 2.2.8 places usernames in room URLs, which may represent an unintended information leak to users in a room, or an information leak to outsiders if any user publishes a screenshot of a browser window.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T19:04:34.000000Z"}]}