{"vulnerability": "CVE-2020-0938", "sightings": [{"uuid": "12478fb9-9054-487c-8e11-8763ccf20c75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "b722f6fb-9435-4b53-a581-e10dec35b794", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "397fa595-7d97-4973-9aa0-135f7c75edc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971032", "content": "", "creation_timestamp": "2024-12-24T20:23:19.915719Z"}, {"uuid": "f95e5523-711d-40f5-8f79-cd6bc3b5927d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "https://t.me/DerechodelaRed/2746", "content": "\u26a0\ufe0f Microsoft parchea tres zero\u2011day explotadas de manera activa en \u00faltima actualizaci\u00f3n.\n\nSe trata de:\n\n\u25aa\ufe0fCVE-2020-1027: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1027\n\u25aa\ufe0fCVE-2020-0938: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1020\n\u25aa\ufe0fCVE-2020-1020: https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0938\n\n\u2795info en el parche de abril: https://portal.msrc.microsoft.com/en-us/security-guidance/releasenotedetail/2020-Apr\n\n\ud83d\udce1 t.me/derechodelared", "creation_timestamp": "2020-04-17T11:03:51.000000Z"}, {"uuid": "b9b44ba3-693a-4882-b4d1-40fcf3c03d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=468", "content": "", "creation_timestamp": "2020-04-15T04:00:00.000000Z"}, {"uuid": "a54ff81b-e33d-41e3-9b4b-087e2eb3e21b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "published-proof-of-concept", "source": "https://t.me/N0iSeBit/412", "content": "\u0415\u0441\u043b\u0438 \u0432\u044b \u0435\u0449\u0435 \u043d\u0435 \u0437\u0430\u043f\u0430\u0442\u0447\u0438\u043b\u0438 \u0443 \u0441\u0435\u0431\u044f CVE-2020-1020/CVE-2020-0938, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u0430\u0440\u0441\u0438\u043d\u0433\u043e\u043c \u0448\u0440\u0438\u0444\u0442\u043e\u0432 \u0432 Adobe Type Manager Library \u0438 Windows Adobe Type Manager Library \u0441 \u043e\u0433\u0440\u043e\u043c\u043d\u044b\u043c \u043f\u043e\u043a\u0440\u044b\u0442\u0438\u0435\u043c, \u0442\u043e \u0441\u0430\u043c\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u044d\u0442\u043e \u0441\u0434\u0435\u043b\u0430\u0442\u044c \ud83c\udf88\n\n\u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0434\u0440\u0443\u0437\u044c\u044f \u0443\u0436\u0435 \u0441\u0434\u0435\u043b\u0430\u043b\u0438 patch analysis \u0437\u0430 \u0432\u0430\u0441:\nhttps://mp.weixin.qq.com/s/RvTZWvcXiXsI7xB6L9RWIg\n\n\u0415\u0441\u043b\u0438 \u0435\u0441\u0442\u044c \u0436\u0435\u043b\u0430\u043d\u0438\u0435 \u0443\u0433\u043b\u0443\u0431\u0438\u0442\u0441\u044f \u0432 \u043f\u0440\u0438\u0440\u043e\u0434\u0443 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0442\u043e\u0433\u0434\u0430 \u0441\u043c\u043e\u0442\u0440\u0438\u0442\u0435 \u0432 \u044d\u0442\u0443 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u044e: https://googleprojectzero.blogspot.com/2015/07/one-font-vulnerability-to-rule-them-all.html", "creation_timestamp": "2020-04-16T03:39:10.000000Z"}, {"uuid": "8d96e4e3-6cca-4387-917b-6504e6e3a355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:44.000000Z"}, {"uuid": "7eeed36e-23f1-48a6-ab61-147586b4571b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-0938", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/33fd120f-ab30-4a19-830d-d414970856cd", "content": "", "creation_timestamp": "2026-02-02T12:28:50.147153Z"}, {"uuid": "8a22a8aa-d4cc-4a56-9d84-817c00cb9342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "published-proof-of-concept", "source": "https://t.me/cKure/288", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Detailed analysis of the CVE-2020-1020/CVE-2020-0938 font parsing vulnerability that was patched yesterday.\n\n#zeroday \n\nhttps://mp.weixin.qq.com/s/RvTZWvcXiXsI7xB6L9RWIg", "creation_timestamp": "2020-04-15T08:24:17.000000Z"}, {"uuid": "f9859bcd-2f2b-41a9-aa36-d0e26ee60410", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "https://t.me/true_secator/475", "content": "Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u0430\u043f\u0434\u0435\u0439\u0442, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 113 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0442\u0440\u0438 0-day.\n\n\u041f\u0435\u0440\u0432\u0430\u044f 0-day, CVE-2020-1020 (\u043c\u044b \u043e \u043d\u0435\u0439 \u043f\u0438\u0441\u0430\u043b\u0438), \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u043e\u0439 Windows Adobe Type Manager \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0432 \u0446\u0435\u043b\u0435\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c \u0440\u0430\u043d\u0435\u0435, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u041d\u043e \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0435\u0435 Microsoft \u0443\u0434\u043e\u0441\u0443\u0436\u0438\u043b\u0438\u0441\u044c \u0442\u043e\u043b\u044c\u043a\u043e \u0441\u0435\u0439\u0447\u0430\u0441.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f - CVE-2020-0938 - \u0442\u0430\u043a\u0436\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u043e\u0439 Windows Adobe Type Manager \u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 . \u0412 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043f\u043e \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u044e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432 Tenable, \u043f\u043e\u043a\u0430 \u043d\u0435 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u043b\u0430\u0441\u044c.\n\n\u0418 \u0442\u0440\u0435\u0442\u044c\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c - CVE-2020-1027- \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0432 \u044f\u0434\u0440\u0435 Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438.\n\n\u0412\u0441\u0435\u043c \u0430\u043f\u0434\u0435\u0439\u0442\u0438\u0442\u044c Windows.", "creation_timestamp": "2020-04-15T12:22:54.000000Z"}, {"uuid": "4d239d50-a999-475f-aff5-d36367c5ea53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "seen", "source": "https://t.me/thehackernews/668", "content": "It's April 2020 Patch Tuesday!\n\nMicrosoft has released the latest Windows updates to patch a total of 113 new security vulnerabilities \u2014 2 of which were also exploited as 0-day in the wild.\n\n(CVE-2020-1020 and CVE-2020-0938)\n\nRead details: https://thehackernews.com/2020/04/windows-patch-update.html", "creation_timestamp": "2020-04-14T20:39:14.000000Z"}, {"uuid": "d5d050c4-74b4-4b3a-b0fa-1f5c7bb93b21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "published-proof-of-concept", "source": "https://t.me/DC8044_Info/708", "content": "Seems a PoC #Exploit of #CVE-2020-0938 Type1 font vulnerability has been uploaded to VT from Ukraine. The system gets crashed when triggered successfully.\nhttps://www.virustotal.com/gui/file/42d3ccba38c2c3b36877a781ffdfe4fba105c763ad9b49653563f2b1ae74224c/detection", "creation_timestamp": "2020-08-12T22:11:40.000000Z"}, {"uuid": "48240923-4479-4350-8ecc-0bd2f405d061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0938", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/2486", "content": "#Research\nResearching new ways to detect 0-day exploits in the wild\nPart 1 - Introduction\nhttps://googleprojectzero.blogspot.com/2021/01/introducing-in-wild-series.html\nPart 2 - Chrome Infinity Bug\nhttps://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-infinity-bug.html\nPart 3 - Chrome Exploits (PoC for CVE-2017-5070, CVE-2020-6418, CVE-2019-5782, CVE-2019-13764)\nhttps://googleprojectzero.blogspot.com/2021/01/in-wild-series-chrome-exploits.html\nPart 4 - Android Exploits\nhttps://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-exploits.html\nPart 5 - Android Post-Exploitation\nhttps://googleprojectzero.blogspot.com/2021/01/in-wild-series-android-post-exploitation.html\nPart 6 - Windows Exploits (PoC for CVE-2020-0938, CVE-2020-1020, CVE-2020-1027)\nhttps://googleprojectzero.blogspot.com/2021/01/in-wild-series-windows-exploits.html", "creation_timestamp": "2022-06-07T18:51:40.000000Z"}]}