{"vulnerability": "CVE-2020-2955", "sightings": [{"uuid": "7e71803f-75a7-4e6e-84a5-8f85917ec1f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29553", "type": "seen", "source": "https://t.me/arpsyndicate/4871", "content": "#ExploitObserverAlert\n\nCVE-2020-29553\n\nDESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2020-29553. The Scheduler in Grav CMS through 1.7.0-rc.17 allows an attacker to execute a system command by tricking an admin into visiting a malicious website (CSRF).\n\nFIRST-EPSS: 0.001050000\nNVD-IS: 5.9\nNVD-ES: 2.8\nARPS-PRIORITY: 0.7616317", "creation_timestamp": "2024-04-25T21:38:04.000000Z"}, {"uuid": "ec162928-0569-40da-a017-266f30f9a9a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29555", "type": "seen", "source": "https://t.me/arpsyndicate/4869", "content": "#ExploitObserverAlert\n\nCVE-2020-29555\n\nDESCRIPTION: Exploit Observer has 10 entries in 3 file formats related to CVE-2020-29555. The BackupDelete functionality in Grav CMS through 1.7.0-rc.17 allows an authenticated attacker to delete arbitrary files on the underlying server by exploiting a path-traversal technique. (This vulnerability can also be exploited by an unauthenticated attacker due to a lack of CSRF protection.)\n\nFIRST-EPSS: 0.000810000\nNVD-IS: 5.2\nNVD-ES: 2.8\nARPS-PRIORITY: 0.7616317", "creation_timestamp": "2024-04-25T21:30:55.000000Z"}, {"uuid": "736494c0-4795-4e44-857a-ee9b895ca83c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "https://t.me/arpsyndicate/2157", "content": "#ExploitObserverAlert\n\nCVE-2020-29557\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-29557. An issue was discovered on D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20. A buffer overflow in the web interface allows attackers to achieve pre-authentication remote code execution.\n\nFIRST-EPSS: 0.037730000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-24T07:05:52.000000Z"}, {"uuid": "ab8057ea-179f-4064-895f-53ebd3881e1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29552", "type": "seen", "source": "https://t.me/cibsecurity/21234", "content": "\u203c CVE-2020-29552 \u203c\n\nAn issue was discovered in URVE Build 24.03.2020. By using the _internal/pc/vpro.php?mac=0&amp;ip=0&amp;operation=0&amp;usr=0&amp;pass=0%3bpowershell+-c+\" substring, it is possible to execute a Powershell command and redirect its output to a file under the web root.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T19:25:33.000000Z"}, {"uuid": "1a57fe41-6501-4018-affd-63010829f0bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29550", "type": "seen", "source": "https://t.me/cibsecurity/21226", "content": "\u203c CVE-2020-29550 \u203c\n\nAn issue was discovered in URVE Build 24.03.2020. The password of an integration user account (used for the connection of the MS Office 365 Integration Service) is stored in cleartext in configuration files as well as in the database. The following files contain the password in cleartext: Profiles/urve/files/sql_db.backup, Server/data/pg_wal/000000010000000A000000DD, Server/data/base/16384/18617, and Server/data/base/17202/8708746. This causes the password to be displayed as cleartext in the HTML code as roomsreservationimport_password in /urve/roomsreservationimport/roomsreservationimport/update-HTML5.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T19:25:22.000000Z"}, {"uuid": "a877db0e-add8-4e0a-a15b-f0c851c83058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29551", "type": "seen", "source": "https://t.me/cibsecurity/21231", "content": "\u203c CVE-2020-29551 \u203c\n\nAn issue was discovered in URVE Build 24.03.2020. Using the _internal/pc/shutdown.php path, it is possible to shutdown the system. Among others, the following files and scripts are also accessible: _internal/pc/abort.php, _internal/pc/restart.php, _internal/pc/vpro.php, _internal/pc/wake.php, _internal/error_u201409.txt, _internal/runcmd.php, _internal/getConfiguration.php, ews/autoload.php, ews/del.php, ews/mod.php, ews/sync.php, utils/backup/backup_server.php, utils/backup/restore_server.php, MyScreens/timeline.config, kreator.html5/test.php, and addedlogs.txt.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-23T19:25:30.000000Z"}, {"uuid": "112fa7bc-7880-4fa4-a85e-172aa45ae27e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "87e70db5-724f-47d0-ae49-634b76d2a2c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:47.000000Z"}, {"uuid": "c3feae8e-19aa-42c5-9ede-f9a9f528b440", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2e28cb83-3eb5-4683-bcd6-dc5dda244291", "content": "", "creation_timestamp": "2026-02-02T12:28:42.397760Z"}, {"uuid": "b622a038-04b7-414f-ab81-b1262e70f920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "1290a347-15d3-4bc1-a34a-4d061e21931a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29552", "type": "seen", "source": "MISP/6a079369-d681-4501-8900-e3e90a37e1ae", "content": "", "creation_timestamp": "2024-11-14T06:07:40.000000Z"}, {"uuid": "6f401e10-dfac-4dc2-b702-97693e20909a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29551", "type": "seen", "source": "MISP/db848b0a-32f8-4b0e-b6a9-4b8a52810c58", "content": "", "creation_timestamp": "2024-11-14T06:07:41.000000Z"}, {"uuid": "c727bf3b-546d-4e8f-8b46-517638f5d014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971100", "content": "", "creation_timestamp": "2024-12-24T20:24:15.939926Z"}, {"uuid": "b3ccde93-8fd9-4045-b20c-45e3a912811c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "866eba71-8983-4577-89e4-dae7c1382689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2e28cb83-3eb5-4683-bcd6-dc5dda244291", "content": "", "creation_timestamp": "2026-02-02T12:28:42.397760Z"}, {"uuid": "262d1f34-bbdf-4b14-8d4a-b969e3b3c156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "https://t.me/cibsecurity/22855", "content": "\u203c CVE-2020-29557 \u203c\n\nAn issue was discovered on D-Link DIR-825 R1 devices through 3.0.1 before 2020-11-20. A buffer overflow in the web interface allows attackers to achieve pre-authentication remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-29T23:25:09.000000Z"}, {"uuid": "f4dd09b1-5922-46ad-9e84-2bb8bef50097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29557", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "a9aae2f9-0f05-4ba8-bbb2-348c5fae50fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-29550", "type": "seen", "source": "MISP/f9094c19-eec5-49b6-9e8e-17ab22c5ab67", "content": "", "creation_timestamp": "2024-11-14T06:07:41.000000Z"}]}