{"vulnerability": "CVE-2020-10735", "sightings": [{"uuid": "b1d5c6a7-5bcc-4e26-9edf-35db86898766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://gist.github.com/konard/d7d4988d01ed5f8addd643332f0a8ee9", "content": "", "creation_timestamp": "2025-09-23T03:22:31.000000Z"}, {"uuid": "53b20fc6-237a-43f3-b17b-c02d1e78676a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0395/", "content": "", "creation_timestamp": "2026-04-02T17:00:00.000000Z"}, {"uuid": "c07c6fef-3fc0-4397-922f-f51f02a6ec3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m6kgv2urek2u", "content": "", "creation_timestamp": "2025-11-26T18:03:23.798151Z"}, {"uuid": "a058255a-1f1e-422b-8935-cf167ad538d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10735", "type": "seen", "source": "https://t.me/arpsyndicate/1675", "content": "#ExploitObserverAlert\n\nCVE-2020-10735\n\nDESCRIPTION: Exploit Observer has 33 entries related to CVE-2020-10735. A flaw was found in python. In algorithms with quadratic time complexity using non-binary bases, when using int(\"text\"), a system could take 50ms to parse an int string with 100,000 digits and 5s for 1,000,000 digits (float, decimal, int.from_bytes(), and int() for binary bases 2, 4, 8, 16, and 32 are not affected). The highest threat from this vulnerability is to system availability.\n\nFIRST-EPSS: 0.002910000\nNVD-IS: 3.6\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T18:41:12.000000Z"}]}