{"vulnerability": "CVE-2020-2752", "sightings": [{"uuid": "7332e9a4-9b66-4291-a9c0-53a7fd4d990c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27524", "type": "seen", "source": "https://t.me/cibsecurity/16169", "content": "\u203c CVE-2020-27524 \u203c\n\nOn Audi A7 MMI 2014 vehicles, the Bluetooth stack in Audi A7 MMI Multiplayer with version (N+R_CN_AU_P0395) mishandles %x and %s format string specifiers in a device name. This may lead to memory content leaks and potentially crash the services.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-11T18:30:14.000000Z"}, {"uuid": "50976e51-a83e-4b6d-9953-5c57b450291d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2752", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-027-02", "content": "", "creation_timestamp": "2026-01-27T11:00:00.000000Z"}, {"uuid": "e2744527-4352-4cde-8059-5d92c0ed6c70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-2752", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/5992", "content": "|       PRION:CVE-2018-3067     4.0     https://vulners.com/prion/PRION:CVE-2018-3067               |       PRION:CVE-2018-3065     4.0     https://vulners.com/prion/PRION:CVE-2018-3065               |       PRION:CVE-2018-3056     4.0     https://vulners.com/prion/PRION:CVE-2018-3056               |       PRION:CVE-2018-3054     4.0     https://vulners.com/prion/PRION:CVE-2018-3054               |       PRION:CVE-2019-2503     3.8     https://vulners.com/prion/PRION:CVE-2019-2503               |       PRION:CVE-2023-22053    3.6     https://vulners.com/prion/PRION:CVE-2023-22053\n|       PRION:CVE-2019-2739     3.6     https://vulners.com/prion/PRION:CVE-2019-2739\n|       PRION:CVE-2022-21302    3.5     https://vulners.com/prion/PRION:CVE-2022-21302\n|       PRION:CVE-2021-35608    3.5     https://vulners.com/prion/PRION:CVE-2021-35608              |       PRION:CVE-2021-2174     3.5     https://vulners.com/prion/PRION:CVE-2021-2174\n|       PRION:CVE-2021-2171     3.5     https://vulners.com/prion/PRION:CVE-2021-2171               |       PRION:CVE-2020-2930     3.5     https://vulners.com/prion/PRION:CVE-2020-2930\n|       PRION:CVE-2020-2926     3.5     https://vulners.com/prion/PRION:CVE-2020-2926\n|       PRION:CVE-2020-2921     3.5     https://vulners.com/prion/PRION:CVE-2020-2921               |       PRION:CVE-2020-2752     3.5     https://vulners.com/prion/PRION:CVE-2020-2752               |       PRION:CVE-2020-2694     3.5     https://vulners.com/prion/PRION:CVE-2020-2694               |       PRION:CVE-2020-2584     3.5     https://vulners.com/prion/PRION:CVE-2020-2584\n|       PRION:CVE-2020-14791    3.5     https://vulners.com/prion/PRION:CVE-2020-14791\n|       PRION:CVE-2020-14771    3.5     https://vulners.com/prion/PRION:CVE-2020-14771\n|       PRION:CVE-2020-14550    3.5     https://vulners.com/prion/PRION:CVE-2020-14550\n|       PRION:CVE-2019-3018     3.5     https://vulners.com/prion/PRION:CVE-2019-3018               |       PRION:CVE-2019-2993     3.5     https://vulners.com/prion/PRION:CVE-2019-2993\n|       PRION:CVE-2019-2938     3.5     https://vulners.com/prion/PRION:CVE-2019-2938\n|       PRION:CVE-2019-2814     3.5     https://vulners.com/prion/PRION:CVE-2019-2814\n|       PRION:CVE-2019-2743     3.5     https://vulners.com/prion/PRION:CVE-2019-2743\n|       PRION:CVE-2019-2741     3.5     https://vulners.com/prion/PRION:CVE-2019-2741\n|       PRION:CVE-2019-2738     3.5     https://vulners.com/prion/PRION:CVE-2019-2738               |       PRION:CVE-2019-2636     3.5     https://vulners.com/prion/PRION:CVE-2019-2636\n|       PRION:CVE-2019-2630     3.5     https://vulners.com/prion/PRION:CVE-2019-2630\n|       PRION:CVE-2019-2623     3.5     https://vulners.com/prion/PRION:CVE-2019-2623               |       PRION:CVE-2019-2617     3.5     https://vulners.com/prion/PRION:CVE-2019-2617               |       PRION:CVE-2019-2614     3.5     https://vulners.com/prion/PRION:CVE-2019-2614               |       PRION:CVE-2018-3284     3.5     https://vulners.com/prion/PRION:CVE-2018-3284               |       PRION:CVE-2018-3283     3.5     https://vulners.com/prion/PRION:CVE-2018-3283\n|       PRION:CVE-2018-3074     3.5     https://vulners.com/prion/PRION:CVE-2018-3074               |       PRION:CVE-2018-3062     3.5     https://vulners.com/prion/PRION:CVE-2018-3062\n|       PRION:CVE-2023-22115    3.3     https://vulners.com/prion/PRION:CVE-2023-22115\n|       PRION:CVE-2023-22114    3.3     https://vulners.com/prion/PRION:CVE-2023-22114              |       PRION:CVE-2023-22113    3.3     https://vulners.com/prion/PRION:CVE-2023-22113              |       PRION:CVE-2023-22112    3.3     https://vulners.com/prion/PRION:CVE-2023-22112\n|       PRION:CVE-2023-22111    3.3     https://vulners.com/prion/PRION:CVE-2023-22111", "creation_timestamp": "2023-11-15T16:53:23.000000Z"}, {"uuid": "c44ca95f-e6ca-49e6-9cf6-f496ce2653dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27523", "type": "seen", "source": "https://t.me/cibsecurity/16168", "content": "\u203c CVE-2020-27523 \u203c\n\nSolstice-Pod up to 5.0.2 WEBRTC server mishandles the format-string specifiers %x; %p; %c and %s in the screen_key, display_name, browser_name, and operation_system parameter during the authentication process. This may crash the server and force Solstice-Pod to reboot, which leads to a denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-11T18:30:13.000000Z"}]}