{"uuid": "a2b4e4c8-1ee8-47df-a3a9-0bd6b1911f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8617", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1189", "content": "#exploit\n1. DotNetNuke Web Content Management System &lt;9.3.0-RC - RCE through DNN Cookie Deserialization\nhttps://vulners.com/hackerone/H1:876708\n\n2. CVE-2020-8617:\nAn error in BIND (9.0.0-9.11.18, 9.12.0-9.12.4-P2, 9.14.0-9.14.11, 9.16.0-9.16.2, 9.17.0-9.17.1, all releases in 9.13 and 9.15 development branches, 9.9.3-S1-9.11.18-S1) which checks the validity of messages containing TSIG resource records can be exploited by an attacker to trigger an assertion failure in tsig.c, resulting in DoS\nhttps://packetstormsecurity.com/files/157836/bindtsig-dos.txt\n]-&gt; BIND 9 Security Vulnerability Matrix:\nhttps://kb.isc.org/docs/aa-00913", "creation_timestamp": "2024-10-24T18:06:56.000000Z"}