{"vulnerability": "CVE-2020-1110", "sightings": [{"uuid": "567d24ba-475e-40b5-9015-ba4a6efabdfb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48519", "content": "", "creation_timestamp": "2020-05-26T00:00:00.000000Z"}, {"uuid": "30c19cb2-bfd5-4455-8eed-1d0330213455", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48491", "content": "", "creation_timestamp": "2020-05-19T00:00:00.000000Z"}, {"uuid": "a2aa2667-2dc0-4fc6-8fc1-e9cf55ee5e72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "ce232bf2-1c87-457a-9d4e-e2b6e6d026e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/http/pihole_blocklist_exec.rb", "content": "", "creation_timestamp": "2020-05-18T12:53:15.000000Z"}, {"uuid": "a412e44d-2d41-4792-b2f2-20b7e0558a99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:21.000000Z"}, {"uuid": "d56aa332-e522-4039-8d79-cab8e2d23b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/749", "content": "\u0422\u0443\u0442 \u043f\u043e\u0434\u043f\u0438\u0441\u0447\u0438\u043a \u043f\u043e\u0434\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u043e\u0445\u043e\u0436\u0435 \u0440\u0435\u043b\u0438\u0437 Pi-hole 5.0 \u0431\u044b\u043b \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c, \u043d\u043e \u0438 \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d\u043d\u044b\u043c :)\n\n\u0412 Pi-hole 4.4 \u0438 \u043d\u0438\u0436\u0435 \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043d\u0430 \u0434\u043d\u044f\u0445 \u0431\u044b\u043b\u0438 \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c RCE \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u043c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b \u0443\u0436\u0435 \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0442\u0435\u043c, \u043a\u0442\u043e \u0443\u0436\u0435 \u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f Pi-hole \u043d\u0430\u0434\u043e \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f (\u044f \u0443\u0436\u0435).\n\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/\nhttps://www.exploit-db.com/exploits/48442\nhttps://www.exploit-db.com/exploits/48443", "creation_timestamp": "2020-05-11T17:21:08.000000Z"}, {"uuid": "bbd01f62-0b38-419f-a23f-293ef16be477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11101", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11649", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-11101\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Sierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges.\n\ud83d\udccf Published: 2022-12-26T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-14T16:20:13.948Z\n\ud83d\udd17 References:\n1. https://www.sierrawireless.com/company/security/\n2. https://source.sierrawireless.com/-/media/support_downloads/security-bulletins/pdf/swi-psa-2020-007---amm-unauthenticated-login.ashx", "creation_timestamp": "2025-04-14T16:53:45.000000Z"}, {"uuid": "50ce1a8e-dd12-4393-84de-a89f34237165", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11101", "type": "seen", "source": "https://t.me/cibsecurity/55366", "content": "\u203c CVE-2020-11101 \u203c\n\nSierra Wireless AirLink Mobility Manager (AMM) before 2.17 mishandles sessions and thus an unauthenticated attacker can obtain a login session with administrator privileges.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-26T22:40:57.000000Z"}, {"uuid": "94723d1e-db5f-4ec7-bb17-706ec7897ea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6431", "content": "CVE-2020-11108: How I Stumbled into a Pi-hole RCE+LPE\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/", "creation_timestamp": "2020-05-12T14:45:39.000000Z"}, {"uuid": "63f26401-ce2b-4a19-91ad-87a1eb90620e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/822", "content": "Analysis of accidentally found RCE + LPE in Pi-hole v4.4 and below. CVE-2020-11108\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/", "creation_timestamp": "2020-05-12T10:03:03.000000Z"}, {"uuid": "5e768edd-6aed-4f61-ab5b-4502c238412d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11103", "type": "seen", "source": "https://t.me/cibsecurity/21430", "content": "\u203c CVE-2020-11103 \u203c\n\nJsLink in Webswing before 2.6.12 LTS, and 2.7.x and 20.x before 20.1, allows remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-31T00:30:48.000000Z"}, {"uuid": "a0a1dd5e-cf67-4653-a930-777fd3e06cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11108", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1117", "content": "#exploit\n1. CVE-2020-5837:\nSymantec Endpoint Protection 14.2 - EoP\nhttps://labs.redyops.com/index.php/2020/04/27/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write/\n]-&gt; SEP 14.2 Arbitrary Write Exploit:\nhttps://github.com/RedyOpsResearchLabs/SEP-14.2-Arbitrary-Write\n\n2. CVE-2020-11108:\nPi-hole &lt;4.4 - RCE + LPE\nhttps://frichetten.com/blog/cve-2020-11108-pihole-rce/\n]-&gt; PoC: https://github.com/frichetten/CVE-2020-11108-PoC", "creation_timestamp": "2024-10-23T17:00:50.000000Z"}, {"uuid": "5bf9629e-05f3-44f4-a23d-b0bdd90a2d5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11100", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1336", "content": "#exploit\n1. Node.js third-party modules: \nbunyan 1.8.12 - RCE via insecure command formatting\nhttps://vulners.com/hackerone/H1:902739\n]-&gt; PoC: https://github.com/trentm/node-bunyan/blob/master/bin/bunyan#L1224\n\n2. CVE-2020-11100:\nIn hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8, 2.x - 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing RCE\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2023", "creation_timestamp": "2024-10-31T01:40:27.000000Z"}]}