{"vulnerability": "CVE-2020-1013", "sightings": [{"uuid": "d4f8f804-2905-408d-88c3-a877557da2c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://social.circl.lu/users/circl/statuses/113831304477406737", "content": "", "creation_timestamp": "2025-01-15T07:57:45.455928Z"}, {"uuid": "e427b759-6b5f-4ae6-9eec-5b75aba501fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113952492447168187", "content": "", "creation_timestamp": "2025-02-05T17:37:25.956347Z"}, {"uuid": "06c3b2ae-5235-4b70-88fc-b18d318afa68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/113952500992294064", "content": "", "creation_timestamp": "2025-02-05T17:39:36.455491Z"}, {"uuid": "a75682b1-a398-44ce-a76d-d0f11491123b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://t.me/cvedetector/15352", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23018 - Arbor Networks Firewall IPv4/IPv6 Routing Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-23018 \nPublished : Jan. 14, 2025, 8:15 p.m. | 37\u00a0minutes ago \nDescription : IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136. \nSeverity: 5.4 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-14T22:22:42.000000Z"}, {"uuid": "dd63ef06-d30f-42bb-abc7-2cdc47a2a57b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=482", "content": "", "creation_timestamp": "2020-06-03T04:00:00.000000Z"}, {"uuid": "220780da-2a4f-41b8-a16d-b30faac0fd9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/ip-ip-protokollan-toteutuksissa-haavoittuvuuksia", "content": "", "creation_timestamp": "2020-06-03T12:39:40.000000Z"}, {"uuid": "d2666136-55e5-47bf-b1d8-5afea0738edd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/1589f952-6079-4a2c-b742-e8d947b50a39", "content": "", "creation_timestamp": "2025-01-15T07:52:57.708458Z"}, {"uuid": "62065964-580b-45de-b25f-d265b040d14f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1013", "type": "published-proof-of-concept", "source": "https://t.me/hybgl/421", "content": "#wsus #cve #privesc #windows\n\n[ WSUS Attacks Part 2:  WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day ]\n\nhttps://www.gosecure.net/blog/2020/09/08/wsus-attacks-part-2-cve-2020-1013-a-windows-10-local-privilege-escalation-1-day/", "creation_timestamp": "2020-09-09T22:46:24.000000Z"}, {"uuid": "6c375ca0-5727-4977-bd9b-5ff001da4c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1594", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23018\n\ud83d\udd39 Description: IPv4-in-IPv6 and IPv6-in-IPv6 tunneling (RFC 2473) do not require the validation or verification of the source of a network packet, allowing an attacker to spoof and route arbitrary traffic via an exposed network interface. This is a similar issue to CVE-2020-10136.\n\ud83d\udccf Published: 2025-01-14T00:00:00\n\ud83d\udccf Modified: 2025-01-14T19:51:42.363Z\n\ud83d\udd17 References:\n1. https://datatracker.ietf.org/doc/html/rfc2473\n2. https://papers.mathyvanhoef.com/usenix2025-tunnels.pdf\n3. https://www.top10vpn.com/research/tunneling-protocol-vulnerability/", "creation_timestamp": "2025-01-14T20:09:11.000000Z"}, {"uuid": "5368d7ba-3cdc-4cde-ab4f-f62c8cd77f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1013", "type": "published-proof-of-concept", "source": "https://t.me/pt_soft/270", "content": "\ud83d\uddbc\ufe0f \ud83d\udd04 Moriarty v1.2\n\n\u0427\u0435\u043a\u0435\u0440 CVEs \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 C# \u0434\u043b\u044f \u041e\u0421 \ud83c\udfe0 Windows\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\nWindows 10 (Versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H1, 22H2)\nWindows 11 (Versions: 21H2, 22H1, 22H2, 23H1)\nWindows Server 2016, 2019, 2022\n\n\u0421\u043f\u0438\u0441\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (35):\nMS10-015\nMS10-092\nMS13-053\nMS13-081\nMS14-058\nMS15-051\nMS15-078\nMS16-016\nMS16-032\nMS16-034\nMS16-135\nCVE-2017-7199\nCVE-2019-0836\nCVE-2019-0836\nCVE-2019-1064\nCVE-2019-1130\nCVE-2019-1253\nCVE-2019-1315\nCVE-2019-1385\nCVE-2019-1388\nCVE-2019-1405\nCVE-2020-0668\nCVE-2020-0683\nCVE-2020-0796\nCVE-2020-1013\nCVE-2020-1013\nCVE-2021-26855\nCVE-2021-26857\nCVE-2021-26858\nCVE-2021-27065\nCVE-2021-44228\nCVE-2021-36934\nCVE-2022-40140\nCVE-2022-22965\nCVE-2023-36664\n\n1.2 added:\n2023-23397\n2022-34718\n\n\ud83d\udc49 \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u043e\u0442 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043f\u043e CVE\n\n!poc CVE-2019-1064\n\n\ud83d\udcbb Home\n\n\u0414\u043b\u044f \u0441\u0431\u043e\u0440\u043a\u0438 \u043f\u043e\u043d\u0430\u0434\u043e\u0431\u0438\u0442\u0441\u044f Visual Studio \u0438 .NET Framework 4.8 Developer Pack\n\n#moriarty #checker #csharp\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-05-03T09:04:40.000000Z"}, {"uuid": "5b3d179e-cec6-4080-bf58-cd4bc63334a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1013", "type": "seen", "source": "https://t.me/pt_soft/243", "content": "\ud83d\uddbc\ufe0f Moriarty v1.1\n\n\u0427\u0435\u043a\u0435\u0440 CVEs \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430 C# \u0434\u043b\u044f \u041e\u0421 \ud83c\udfe0 Windows\n\n\u041f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438:\nWindows 10 (Versions: 1507, 1511, 1607, 1703, 1709, 1803, 1809, 1903, 1909, 2004, 20H2, 21H1, 21H2, 22H1, 22H2)\nWindows 11 (Versions: 21H2, 22H1, 22H2, 23H1)\nWindows Server 2016, 2019, 2022\n\n\u0421\u043f\u0438\u0441\u043e\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 (35):\nMS10-015\nMS10-092\nMS13-053\nMS13-081\nMS14-058\nMS15-051\nMS15-078\nMS16-016\nMS16-032\nMS16-034\nMS16-135\nCVE-2017-7199\nCVE-2019-0836\nCVE-2019-0836\nCVE-2019-1064\nCVE-2019-1130\nCVE-2019-1253\nCVE-2019-1315\nCVE-2019-1385\nCVE-2019-1388\nCVE-2019-1405\nCVE-2020-0668\nCVE-2020-0683\nCVE-2020-0796\nCVE-2020-1013\nCVE-2020-1013\nCVE-2021-26855\nCVE-2021-26857\nCVE-2021-26858\nCVE-2021-27065\nCVE-2021-44228\nCVE-2021-36934\nCVE-2022-40140\nCVE-2022-22965\nCVE-2023-36664\n\n\ud83d\udc49 \u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u043e\u0442 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0438\u0441\u043a \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u043e\u0432 \u043f\u043e CVE\n\n!poc CVE-2019-1064\n\n\ud83d\udcbb Home\n\n\u0414\u043b\u044f \u0441\u0431\u043e\u0440\u043a\u0438 \u043f\u043e\u043d\u0430\u0434\u043e\u0431\u0438\u0442\u0441\u044f Visual Studio \u0438 .NET Framework 4.8 Developer Pack\n\n#moriarty #checker #csharp\n\n\u2708\ufe0f // Pentest HaT \ud83c\udfa9", "creation_timestamp": "2024-03-15T08:58:02.000000Z"}, {"uuid": "05594e8f-ab6e-4e4f-aa53-3f498ab06210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "published-proof-of-concept", "source": "Telegram/S96jqAO-CMjWBUU7nj-ObwOSCjJs1eZghz1gYNvzGu99rqo", "content": "", "creation_timestamp": "2025-01-22T10:00:05.000000Z"}, {"uuid": "37bcf8ba-6b77-46ce-a65f-45a375b8da36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "published-proof-of-concept", "source": "Telegram/ZCyyLBVspoicYmnVRDpFsAn-PUOfjk4Zo72jxeO65MdecUc", "content": "", "creation_timestamp": "2025-01-24T04:00:08.000000Z"}, {"uuid": "8e225667-e2cd-4509-acb7-58b0befb8bd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10131", "type": "seen", "source": "https://t.me/cibsecurity/70037", "content": "\u203c CVE-2020-10131 \u203c\n\nSearchBlox before Version 9.2.1 is vulnerable to CSV macro injection in \"Featured Results\" parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T22:18:25.000000Z"}, {"uuid": "1ae99be5-8fbb-4753-9dbd-e1b6fda187d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10132", "type": "seen", "source": "https://t.me/cibsecurity/70024", "content": "\u203c CVE-2020-10132 \u203c\n\nSearchBlox before Version 9.1 is vulnerable to cross-origin resource sharing misconfiguration.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T22:18:03.000000Z"}, {"uuid": "98a2aed4-c0f2-423f-8105-a74f644ed15d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "seen", "source": "https://t.me/SecLabNews/7750", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u042f\u043d\u043d\u0435\u0439 \u041b\u0438\u0432\u043d\u0435\u0445 (Yannay Livneh) \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Enigmatos \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2020-10136) \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Cisco Systems \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0443\u044e \u0441 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u043c \u0442\u0443\u043d\u043d\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f IP-in-IP. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0442\u044c DoS-\u0430\u0442\u0430\u043a\u0438 \u0438 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u043c\u0435\u0440\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.     \n\u0412 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Cisco \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 IP-in-IP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c", "creation_timestamp": "2020-06-03T14:30:02.000000Z"}, {"uuid": "aed48a3a-df79-424a-9338-3d5014f1df61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1013", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6625", "content": "WSUS Attacks Part 2: CVE-2020-1013 a Windows 10 Local Privilege Escalation 1-Day\nhttps://www.gosecure.net/blog/2020/09/08/wsus-attacks-part-2-cve-2020-1013-a-windows-10-local-privilege-escalation-1-day/", "creation_timestamp": "2020-09-10T21:49:33.000000Z"}, {"uuid": "e9417518-f0d5-45c1-a380-23535ead714c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10130", "type": "seen", "source": "https://t.me/cibsecurity/70021", "content": "\u203c CVE-2020-10130 \u203c\n\nSearchBlox before Version 9.1 is vulnerable to business logic bypass where the user is able to create multiple super admin users in the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-06T22:18:01.000000Z"}, {"uuid": "daf41f95-9859-43e2-bfbc-0d991bdcf62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11737", "content": "#exploit\n1. CVE-2020-10136, CVE-2024-7595:\nScanner and attack suite for hosts that forward unauthenticated packets via IPIP/GRE protocols\nhttps://github.com/GustavoHGP/ipeeyoupeewepee\n\n2. CVE-2024-55591:\nFortiOS/FortiProxy Authentication bypass in Node.js websocket module\nhttps://github.com/robomusk52/exp-cmd-add-admin-vpn-CVE-2024-55591\n\n3. CVE-2025-0411:\n7-Zip MotW Bypass\nhttps://github.com/CastroJared/7-Zip-CVE-2025-0411-POC", "creation_timestamp": "2025-01-27T11:31:38.000000Z"}, {"uuid": "fc3a28fb-215a-49cb-ae7c-ee36f23bfaca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10136", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1218", "content": "#exploit\n1. CVE-2020-9484:\nApache Tomcat (10.x &lt;10.0.0-M5, 9.x &lt;9.0.35, 8.x &lt;8.5.55, 7.x &lt;7.0.104) Vulnerability in NetApp Products\nhttps://www.redtimmy.com/java-hacking/apache-tomcat-rce-by-deserialization-cve-2020-9484-write-up-and-exploit\n]-&gt; PoC: https://github.com/masahiro331/CVE-2020-9484\n\n2. CVE-2020-10136:\nA flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks/bypass security controls impact devices from Cisco and other vendors\nhttps://securityaffairs.co/wordpress/104192/security/ip-in-ip-flaw-cisco.html\n]-&gt; PoC: https://github.com/CERTCC/PoC-Exploits/tree/master/cve-2020-10136", "creation_timestamp": "2024-10-26T00:35:24.000000Z"}, {"uuid": "4a564441-52c6-4086-8009-52d045898520", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1013", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4826", "content": "#Offensive_security\nWSUS Attacks:\nPart 1 - Introducing PyWSUS\nhttps://www.gosecure.net/blog/2020/09/03/wsus-attacks-part-1-introducing-pywsus\nPart 2 - CVE-2020-1013 a Windows 10 LPE 1-Day\nhttps://www.gosecure.net/blog/2020/09/08/wsus-attacks-part-2-cve-2020-1013-a-windows-10-local-privilege-escalation-1-day\nPart 3 - NTLM Relaying Attacks\nhttps://www.gosecure.net/blog/2021/11/22/gosecure-investigates-abusing-windows-server-update-services-wsus-to-enable-ntlm-relaying-attacks", "creation_timestamp": "2021-11-24T12:23:43.000000Z"}, {"uuid": "024cf4e9-2e7d-43f0-b2e3-dfe2211b6920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10138", "type": "seen", "source": "https://t.me/cibsecurity/15462", "content": "\u203c CVE-2020-10138 \u203c\n\nAcronis Cyber Backup 12.5 and Cyber Protect 15 include an OpenSSL component that specifies an OPENSSLDIR variable as a subdirectory within C:\\jenkins_agent\\. Acronis Cyber Backup and Cyber Protect contain a privileged service that uses this OpenSSL component. Because unprivileged Windows users can create subdirectories off of the system root, a user can create the appropriate path to a specially-crafted openssl.cnf file to achieve arbitrary code execution with SYSTEM privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-21T19:04:15.000000Z"}]}