{"vulnerability": "CVE-2020-1099", "sightings": [{"uuid": "ebdc1065-b525-46b8-830f-02689ee5ce1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1099", "type": "seen", "source": "Telegram/bnZ3vGOGpF7JJJ_Ogwn331zowaMM5x7okudIUMraFcEaqHo9", "content": "", "creation_timestamp": "2025-03-02T11:45:45.000000Z"}, {"uuid": "a46dbd44-6aea-4d67-bb7b-0b5e3f481014", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10995", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1149", "content": "#exploit\nNXNSAttack DNS\nhttps://en.blog.nic.cz/2020/05/19/nxnsattack-upgrade-resolvers-to-stop-new-kind-of-random-subdomain-attack\n\n1. CVE-2020-8616:\nBIND does not sufficiently limit the number of fetches performed when processing referrals\nhttps://kb.isc.org/docs/cve-2020-8616\n\n2. CVE-2020-12663:\nMalformed answers from upstream name servers can be used to make Unbound unresponsive\nhttps://nlnetlabs.nl/downloads/unbound/CVE-2020-12662_2020-12663.txt\n\n3. CVE-2020-12667:\nKnot Resolver &lt;5.1.1 allows traffic amplification via a crafted DNS answer from an attacker-controlled server\nhttps://www.openwall.com/lists/oss-security/2020/05/19/2\n\n4. CVE-2020-10995:\nPowerDNS Recursor 4.1 - 4.3 DoS (Security Advisory)\nhttps://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2020-01.html", "creation_timestamp": "2024-10-24T04:43:49.000000Z"}, {"uuid": "09f06e2f-eeed-4d74-b506-400b55460e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10997", "type": "seen", "source": "https://t.me/cibsecurity/43762", "content": "\u203c CVE-2022-26944 \u203c\n\nPercona XtraBackup 2.4.20 unintentionally writes the command line to any resulting backup file output. This may include sensitive arguments passed at run time. In addition, when --history is passed at run time, this command line is also written to the PERCONA_SCHEMA.xtrabackup_history table. NOTE: this issue exists because of an incomplete fix for CVE-2020-10997.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-02T22:25:54.000000Z"}]}