{"vulnerability": "CVE-2020-2897", "sightings": [{"uuid": "be5cf74e-bc7b-4ae1-8203-536c67e40ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28977", "type": "seen", "source": "MISP/a7309f2d-e828-4ff8-b32f-a91c6d41bc24", "content": "", "creation_timestamp": "2024-11-14T06:07:21.000000Z"}, {"uuid": "2abeeabb-69f4-43e5-97a0-9f38d8256d87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28978", "type": "seen", "source": "MISP/3fd85816-8f91-4c22-adc9-6b12fba7962c", "content": "", "creation_timestamp": "2024-11-14T06:07:24.000000Z"}, {"uuid": "25883545-7b97-4dca-9158-651e352cca2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28976", "type": "seen", "source": "MISP/15b0eb04-a9b0-47d6-9d32-cdc72a671fa1", "content": "", "creation_timestamp": "2024-11-14T06:07:24.000000Z"}, {"uuid": "ad0ef191-1c6a-4b00-8c32-530e787fb737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28975", "type": "seen", "source": "https://gist.github.com/konard/a0178709d5a7b5a78586698b8c042b15", "content": "", "creation_timestamp": "2026-01-19T11:29:46.000000Z"}, {"uuid": "96598ee3-93bb-429d-b855-4d80ffbf4468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28975", "type": "seen", "source": "https://gist.github.com/konard/65ced3fd74042bf5ba0737f60d57d145", "content": "", "creation_timestamp": "2026-01-19T00:13:20.000000Z"}, {"uuid": "65e8532f-291d-41a8-aeba-7374296ff5cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28975", "type": "seen", "source": "https://gist.github.com/konard/045d80a762f6e756763e0ef7e0895c77", "content": "", "creation_timestamp": "2026-01-19T00:16:50.000000Z"}, {"uuid": "b76a09dd-35fe-4ace-a3dd-b7d1afd8286a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28975", "type": "seen", "source": "https://gist.github.com/konard/ed57bdf6f23e9388249c3e81f52a7d40", "content": "", "creation_timestamp": "2026-01-19T00:16:42.000000Z"}, {"uuid": "2988ad7b-4153-4d42-b653-323c8f476593", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28972", "type": "seen", "source": "https://t.me/cibsecurity/24283", "content": "\u203c CVE-2020-28972 \u203c\n\nIn SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-27T07:40:11.000000Z"}, {"uuid": "61ebed72-7f00-4ec5-a5df-e49d50803c55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28971", "type": "seen", "source": "https://t.me/cibsecurity/16983", "content": "\u203c CVE-2020-28971 \u203c\n\nAn issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie, because of insufficient validation of URI paths.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-01T18:54:05.000000Z"}, {"uuid": "d4464baf-69a7-4687-8a57-5c2bd5ffd26f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28974", "type": "seen", "source": "https://t.me/cibsecurity/17415", "content": "\u203c CVE-2020-28974 \u203c\n\nA slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:25:16.000000Z"}, {"uuid": "934b8a48-4e76-4349-92bc-3da633134253", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28970", "type": "seen", "source": "https://t.me/cibsecurity/16984", "content": "\u203c CVE-2020-28970 \u203c\n\nAn issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie. (In addition, an upload endpoint could then be used by an authenticated administrator to upload executable PHP scripts.)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-01T18:54:06.000000Z"}, {"uuid": "8d8aaf3d-25e7-4173-8bd3-8322e4372383", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-28974", "type": "seen", "source": "https://t.me/cibsecurity/16669", "content": "\u203c CVE-2020-28974 \u203c\n\nA slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-20T20:42:56.000000Z"}]}