{"vulnerability": "CVE-2020-13949", "sightings": [{"uuid": "1f66213c-92f4-42f9-9ea0-6537afa3e355", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13949", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3ml42dpaud62p", "content": "CVE-2026-43868 - Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern\nCVE ID : CVE-2026-43868\n \n Published : May 5, 2026, 7:49 a.m. | 46\u00a0minutes ago\n \n Description : Memory Allocation with Excessive Size Value vulnerability in Apache Thrift.\n\nThis issue affe...", "creation_timestamp": "2026-05-05T11:09:06.791064Z"}, {"uuid": "bcbecb2a-c87f-42a9-acc2-6b2bc91e98d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13949", "type": "seen", "source": "https://t.me/cibsecurity/23566", "content": "\u203c CVE-2020-13949 \u203c\n\nIn Apache Thrift 0.9.3 to 0.13.0, malicious RPC clients could send short messages which would result in a large memory allocation, potentially leading to denial of service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-12T22:43:47.000000Z"}, {"uuid": "8ca80343-b68b-4f27-b499-fdf569d0d9c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13949", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ml2x4tl2hn2e", "content": "CVE-2026-43868: Apache Thrift: Rust implementation vulnerable to CVE-2020-13949 pattern", "creation_timestamp": "2026-05-05T00:38:55.822278Z"}]}