{"vulnerability": "CVE-2020-1098", "sightings": [{"uuid": "d5088ea5-c827-4c9f-aa23-d631ef3fcc17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/2ec4ee12-9ad3-4dba-afe0-4644cf9f52b5", "content": "", "creation_timestamp": "2020-10-09T13:20:55.000000Z"}, {"uuid": "cd3b0d7c-845d-40c5-9072-34a0d4132d2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:20.000000Z"}, {"uuid": "b5b2f80c-ff7e-47a4-9889-2337ca125259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "7b7e3a1d-79d1-4e9e-ab70-fdd78c422a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/e439b884-82c9-422e-bee5-4425a48da4c3", "content": "", "creation_timestamp": "2020-10-09T13:36:17.000000Z"}, {"uuid": "cf259d85-a369-46dd-a022-ea40285f3952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/b14f5ca4-fb33-4da3-ad29-dcaf9e3d3fc4", "content": "", "creation_timestamp": "2020-10-09T13:24:39.000000Z"}, {"uuid": "fb13ca83-e3ba-49ca-9f6b-768b8cddb884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/cb08de75-12ec-4008-b05d-d69a6925716a", "content": "", "creation_timestamp": "2020-10-30T03:00:02.000000Z"}, {"uuid": "a5bfd109-ae54-4936-bd56-48557f63b664", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10988", "type": "seen", "source": "MISP/9d5c6706-60d3-49f0-a311-c46271978c8c", "content": "", "creation_timestamp": "2024-11-14T06:07:01.000000Z"}, {"uuid": "ca67fce6-a579-43ba-ae8a-6643882c4fa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970916", "content": "", "creation_timestamp": "2024-12-24T20:21:41.692232Z"}, {"uuid": "15327bc5-34d4-4fa3-9b9e-269ffb89413b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:45.000000Z"}, {"uuid": "1c4d4743-7fbc-4e2f-86ee-e1f7aa2752e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lroeg3xky42s", "content": "", "creation_timestamp": "2025-06-15T21:02:17.908521Z"}, {"uuid": "86adbea0-0e2d-49fb-bf8a-88874c28c0a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "exploited", "source": "https://t.me/information_security_channel/40792", "content": "Netlab observed a new IoT botnet exploits two Tenda router 0-day vulnerabilities to install a Remote Access Trojan (RAT). The botnet dubbed Ttint was found to be active since November 2019, along with DDoS capabilities it includes 12 remote access functions. Ttint IoT Botnet Attack Attackers used following Tenda router 0-day vulnerability (CVE-2018-14558 &amp; CVE-2020-10987) [\u2026]\nThe post A New Mirai based IoT RAT Spreading Through 2 0-day Vulnerabilities (https://gbhackers.com/ttint-iot-botnet/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-10-05T09:50:10.000000Z"}, {"uuid": "bb3dbbb6-10ce-49ad-b682-d1a6b57b85cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-10987", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/dac68c8d-67b2-4e34-957d-6942e3e44c11", "content": "", "creation_timestamp": "2026-02-02T12:29:04.453342Z"}, {"uuid": "b6af985a-2011-4718-9741-1ffbea5429ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "seen", "source": "MISP/a41d8549-5384-5e1a-8c33-bf88e35b5a0a", "content": "", "creation_timestamp": "2025-10-14T10:31:59.000000Z"}, {"uuid": "88214c7c-f132-43a2-b37b-a140089930a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10987", "type": "published-proof-of-concept", "source": "Telegram/PO0oWKD_0dQKMdfBlUdpALOxC_j0fHtsMlyXztmz6yr7XDo", "content": "", "creation_timestamp": "2025-10-24T10:33:18.000000Z"}, {"uuid": "0189cb6d-37ee-4202-8c3f-137ac1f81246", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10985", "type": "seen", "source": "https://t.me/cibsecurity/13718", "content": "ATENTION\u203c New - CVE-2020-10985\n\nGambio GX before 4.0.1.0 allows XSS in admin/coupon_admin.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-29T00:55:20.000000Z"}, {"uuid": "7b8468b2-f29f-4ec0-b297-f628b6273712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10984", "type": "seen", "source": "https://t.me/cibsecurity/13719", "content": "ATENTION\u203c New - CVE-2020-10984\n\nGambio GX before 4.0.1.0 allows admin/admin.php CSRF.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-29T00:55:21.000000Z"}, {"uuid": "90adbb97-de97-4d6a-9ae6-b8d40decdf88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10983", "type": "seen", "source": "https://t.me/cibsecurity/13720", "content": "ATENTION\u203c New - CVE-2020-10983\n\nGambio GX before 4.0.1.0 allows SQL Injection in admin/mobile.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-29T00:55:22.000000Z"}, {"uuid": "a02f3d2c-1818-4425-b502-2dd6215681ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10982", "type": "seen", "source": "https://t.me/cibsecurity/13721", "content": "ATENTION\u203c New - CVE-2020-10982\n\nGambio GX before 4.0.1.0 allows SQL Injection in admin/gv_mail.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-29T00:55:23.000000Z"}]}