{"vulnerability": "CVE-2020-2800", "sightings": [{"uuid": "dde531d0-5af2-4631-9ea3-98bda3cf92df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28007", "type": "seen", "source": "MISP/9a3818d7-bd60-4e28-bce7-b2a9a9256102", "content": "", "creation_timestamp": "2024-11-14T06:10:17.000000Z"}, {"uuid": "944631b8-412a-4223-a2bd-3fe42485b5f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28002", "type": "seen", "source": "https://t.me/arpsyndicate/1696", "content": "#ExploitObserverAlert\n\nCVE-2020-28002\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2020-28002. In SonarQube 8.4.2.36762, an external attacker can achieve authentication bypass through SonarScanner. With an empty value for the -D sonar.login option, anonymous authentication is forced. This allows creating and overwriting public and private projects via the /api/ce/submit endpoint.\n\nFIRST-EPSS: 0.001020000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2023-12-11T03:38:24.000000Z"}, {"uuid": "62adc5eb-ea71-4177-8fd9-e72c0f144691", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28005", "type": "seen", "source": "https://t.me/cibsecurity/17384", "content": "\u203c CVE-2020-28005 \u203c\n\nhttpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T05:25:25.000000Z"}]}