{"vulnerability": "CVE-2020-1073", "sightings": [{"uuid": "b1d5c6a7-5bcc-4e26-9edf-35db86898766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://gist.github.com/konard/d7d4988d01ed5f8addd643332f0a8ee9", "content": "", "creation_timestamp": "2025-09-23T03:22:31.000000Z"}, {"uuid": "53b20fc6-237a-43f3-b17b-c02d1e78676a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "c07c6fef-3fc0-4397-922f-f51f02a6ec3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m6kgv2urek2u", "content": "", "creation_timestamp": "2025-11-26T18:03:23.798151Z"}, {"uuid": "a058255a-1f1e-422b-8935-cf167ad538d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://t.me/arpsyndicate/1675", "content": "#ExploitObserverAlert\n\nCVE-2020-10735\n\nDESCRIPTION: Exploit Observer has 33 entries related to CVE-2020-10735. A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.\n\nFIRST-EPSS: 0.002910000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T18:41:12.000000Z"}, {"uuid": "74215f9d-fca8-4ebe-a8d9-88029fa2d2b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10737", "type": "seen", "source": "https://t.me/cibsecurity/12317", "content": "ATENTION\u203c New - CVE-2020-10737\n\nA race condition was found in the mkhomedir tool shipped with the oddjob package in versions before 0.34.5 and 0.34.6 wherein, during the home creation, mkhomedir copies the /etc/skel directory into the newly created home and changes its ownership to the home's user without properly checking the homedir path. This flaw allows an attacker to leverage this issue by creating a symlink point to a target folder, which then has its ownership transferred to the new home directory's unprivileged user.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-27T08:55:26.000000Z"}, {"uuid": "05957f6f-c281-401a-a85c-05c37990c049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10734", "type": "seen", "source": "https://t.me/cibsecurity/23457", "content": "\u203c CVE-2020-10734 \u203c\n\nA vulnerability was found in keycloak in the way that the OIDC logout endpoint does not have CSRF protection. Versions shipped with Red Hat Fuse 7, Red Hat Single Sign-on 7, and Red Hat Openshift Application Runtimes are believed to be vulnerable.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-11T20:42:49.000000Z"}, {"uuid": "a74d5285-17f7-43ec-9647-d9ed9c460421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10730", "type": "seen", "source": "https://t.me/cibsecurity/13288", "content": "ATENTION\u203c New - CVE-2020-10730\n\nA NULL pointer dereference, or possible use-after-free flaw was found in the in Samba AD LDAP server in versions before 4.10.17, before 4.11.11 and before 4.12.4. Although some versions of Samba shipped with Red Hat Enterprise Linux do not support Samba in AD mode, the affected code is shipped with the libldb package. This flaw allows an authenticated user to possibly trigger a use-after-free or NULL pointer dereference. The highest threat from this vulnerability is to system availability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-07T18:55:22.000000Z"}, {"uuid": "3725c051-caf7-4b6b-8bba-5ce6441f086b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10738", "type": "seen", "source": "https://t.me/cibsecurity/12221", "content": "ATENTION\u203c New - CVE-2020-10738\n\nA flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-21T20:46:07.000000Z"}, {"uuid": "c40c8168-3dfb-4294-ad4d-41d935084d04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10736", "type": "seen", "source": "https://t.me/cibsecurity/13018", "content": "ATENTION\u203c New - CVE-2020-10736\n\nAn authorization bypass vulnerability was found in Ceph versions 15.2.0 before 15.2.2, where the ceph-mon and ceph-mgr daemons do not properly restrict access, resulting in gaining access to unauthorized resources. This flaw allows an authenticated client to modify the configuration and possibly conduct further attacks.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-06-25T07:55:25.000000Z"}]}