{"vulnerability": "CVE-2020-1038", "sightings": [{"uuid": "ed1c3bfc-7ec3-46e2-9370-ca9b5a808b6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-10383", "type": "seen", "source": "https://certvde.com/de/advisories/VDE-2026-025", "content": "", "creation_timestamp": "2026-03-24T03:00:05.000000Z"}, {"uuid": "6c7e09aa-df8c-4aba-9114-c12df7fb7661", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-10383", "type": "seen", "source": "https://certvde.com/en/advisories/VDE-2026-024/", "content": "", "creation_timestamp": "2026-03-24T03:00:06.000000Z"}, {"uuid": "c6806ba0-5a18-4f3b-8f27-17b8e852738f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10385", "type": "seen", "source": "https://t.me/arpsyndicate/1793", "content": "#ExploitObserverAlert\n\nCVE-2020-10385\n\nDESCRIPTION: Exploit Observer has 10 entries related to CVE-2020-10385. A stored cross-site scripting (XSS) vulnerability exists in the WPForms Contact Form (aka wpforms-lite) plugin before 1.5.9 for WordPress.\n\nFIRST-EPSS: 0.005660000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-12T02:13:12.000000Z"}, {"uuid": "e9633cc9-82f7-4f6a-ba1b-ebc47938aa13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10384", "type": "seen", "source": "https://t.me/cibsecurity/11234", "content": "ATENTION\u203c New - CVE-2020-10384 (mbconnect24, mymbconnect24)\n\nAn issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is a local privilege escalation from the www-data account to the root account.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-14T22:44:06.000000Z"}, {"uuid": "d2c1eebe-eee7-4221-b08d-9ec4164840ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10381", "type": "seen", "source": "https://t.me/cibsecurity/11227", "content": "ATENTION\u203c New - CVE-2020-10381\n\nAn issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated SQL injection in DATA24, allowing attackers to discover database and table names.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-14T21:14:16.000000Z"}, {"uuid": "d3fe5ec0-3960-4ae8-bdef-a5af94b01207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10383", "type": "seen", "source": "https://t.me/cibsecurity/11225", "content": "ATENTION\u203c New - CVE-2020-10383\n\nAn issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an unauthenticated remote code execution in the com_mb24sysapi module.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-14T20:44:24.000000Z"}, {"uuid": "a10fc304-f149-4f86-9dba-412d77614d2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10382", "type": "seen", "source": "https://t.me/cibsecurity/11226", "content": "ATENTION\u203c New - CVE-2020-10382\n\nAn issue was discovered in the MB CONNECT LINE mymbCONNECT24 and mbCONNECT24 software in all versions through 2.5.0. There is an authenticated remote code execution in the backup-scheduler.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-04-14T21:14:15.000000Z"}]}