{"vulnerability": "CVE-2020-1193", "sightings": [{"uuid": "3452f358-27c2-486f-98ff-18143331fae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11936", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgywjexqet27", "content": "", "creation_timestamp": "2025-01-31T02:15:44.409289Z"}, {"uuid": "f2888da2-2242-4748-9992-674a8e67ec2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11935", "type": "seen", "source": "https://t.me/cibsecurity/61638", "content": "\u203c CVE-2020-11935 \u203c\n\nIt was discovered that aufs improperly managed inode reference counts in the vfsub_dentry_open() method. A local attacker could use this vulnerability to cause a denial of service attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-07T07:27:11.000000Z"}, {"uuid": "6ba418b3-db72-46ea-8f17-76d05621d77b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11936", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113920388095631721", "content": "", "creation_timestamp": "2025-01-31T01:32:52.460031Z"}, {"uuid": "d8ede389-413f-45d1-b2dd-63bbef3a2b2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11936", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgz2y23j6t2g", "content": "", "creation_timestamp": "2025-01-31T03:35:34.460125Z"}, {"uuid": "4878fce9-660a-4e19-96b4-3c4401c1f8ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-11935", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "681b2fa0-6c85-4f98-8df9-e2576c946239", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11936", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3565", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-11936\n\ud83d\udd25 CVSS Score: 3.0 (CVSS_V3)\n\ud83d\udd39 Description: gdbus setgid privilege escalation\n\ud83d\udccf Published: 2025-01-31T03:32:13Z\n\ud83d\udccf Modified: 2025-01-31T03:32:13Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2020-11936\n2. https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1885633\n3. https://www.cve.org/CVERecord?id=CVE-2020-11936", "creation_timestamp": "2025-01-31T04:12:53.000000Z"}, {"uuid": "c0386eae-9c81-4b8a-881d-2485d1e14d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11936", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3553", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-11936\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-01-31T02:15:28.290\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1885633\n2. https://www.cve.org/CVERecord?id=CVE-2020-11936", "creation_timestamp": "2025-01-31T03:21:56.000000Z"}, {"uuid": "224baeac-1406-44fa-a5e0-5e0ef3b096bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11936", "type": "seen", "source": "https://t.me/cvedetector/16864", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2020-11936 - Linux D-Bus Setgid Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2020-11936 \nPublished : Jan. 31, 2025, 2:15 a.m. | 1\u00a0hour, 13\u00a0minutes ago \nDescription : gdbus setgid privilege escalation \nSeverity: 3.1 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-31T04:29:38.000000Z"}, {"uuid": "bbbca6c7-bd4a-4738-8945-855e145ed87c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11932", "type": "published-proof-of-concept", "source": "Telegram/LNn6pj8ux-DAGI2A-FinAo4UKc85b1xgqqrbCnJkcGnrlA", "content": "", "creation_timestamp": "2020-10-17T20:53:44.000000Z"}, {"uuid": "92506c8d-ddbb-4107-a40d-946c742197fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11934", "type": "seen", "source": "https://t.me/cibsecurity/13739", "content": "ATENTION\u203c New - CVE-2020-11934\n\nIt was discovered that snapctl user-open allowed altering the $XDG_DATA_DIRS environment variable when calling the system xdg-open. OpenURL() in usersession/userd/launcher.go would alter $XDG_DATA_DIRS to append a path to a directory controlled by the calling snap. A malicious snap could exploit this to bypass intended access restrictions to control how the host system xdg-open script opens the URL and, for example, execute a script shipped with the snap without confinement. This issue did not affect Ubuntu Core systems. Fixed in snapd versions 2.45.1ubuntu0.2, 2.45.1+18.04.2 and 2.45.1+20.04.2.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-29T20:55:26.000000Z"}, {"uuid": "aaf78b59-c479-4524-8493-12574519d5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11932", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1126", "content": "#exploit\n1. CVE-2020-11932:\nDouble-Free bug (RCE) in WhatsApp ver. 2.19.230 for Android\nhttps://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce\n]-&gt; PoC: https://github.com/ProjectorBUg/CVE-2020-11932\n\n2. CVE-2020-13166:\nMyLittleAdmin PreAuth RCE\nhttps://ssd-disclosure.com/ssd-advisory-mylittleadmin-preauth-rce", "creation_timestamp": "2022-12-09T05:11:03.000000Z"}, {"uuid": "4f414812-d47c-49aa-a9d3-506fc40a5fa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11933", "type": "seen", "source": "https://t.me/cibsecurity/13740", "content": "ATENTION\u203c New - CVE-2020-11933\n\ncloud-init as managed by snapd on Ubuntu Core 16 and Ubuntu Core 18 devices was run without restrictions on every boot, which a physical attacker could exploit by crafting cloud-init user-data/meta-data via external media to perform arbitrary changes on the device to bypass intended security mechanisms such as full disk encryption. This issue did not affect traditional Ubuntu systems. Fixed in snapd version 2.45.2, revision 8539 and core version 2.45.2, revision 9659.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-29T20:55:27.000000Z"}, {"uuid": "e65dba83-ffba-4c8d-9bdc-b01aa8297385", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-11937", "type": "seen", "source": "https://t.me/cibsecurity/13963", "content": "ATENTION\u203c New - CVE-2020-11937\n\nIn whoopsie, parse_report() from whoopsie.c allows a local attacker to cause a denial of service via a crafted file. The DoS is caused by resource exhaustion due to a memory leak. Fixed in 0.2.52.5ubuntu0.5, 0.2.62ubuntu0.5 and 0.2.69ubuntu0.1.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-07T02:55:26.000000Z"}]}