{"vulnerability": "CVE-2020-8617", "sightings": [{"uuid": "08bfcd50-c624-430b-a8ca-1f638bb27506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8617", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "64a519c0-b36d-49b8-b3f2-5911dc57f2c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8617", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:31.000000Z"}, {"uuid": "f4037210-08a7-41d4-b12a-e4eda5eaa845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-8617", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/kaksi-haavoittuvuutta-isc-bind-9-nimipalvelimessa", "content": "", "creation_timestamp": "2020-05-22T07:53:40.000000Z"}, {"uuid": "cec8be34-2b5b-4f4d-9acd-d4ae47d67a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8617", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/dos/dns/bind_tsig_badtime.rb", "content": "", "creation_timestamp": "2020-05-26T16:34:50.000000Z"}, {"uuid": "a2b4e4c8-1ee8-47df-a3a9-0bd6b1911f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-8617", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1189", "content": "#exploit\n1. DotNetNuke Web Content Management System &lt;9.3.0-RC - RCE through DNN Cookie Deserialization\nhttps://vulners.com/hackerone/H1:876708\n\n2. CVE-2020-8617:\nAn error in BIND (9.0.0-9.11.18, 9.12.0-9.12.4-P2, 9.14.0-9.14.11, 9.16.0-9.16.2, 9.17.0-9.17.1, all releases in 9.13 and 9.15 development branches, 9.9.3-S1-9.11.18-S1) which checks the validity of messages containing TSIG resource records can be exploited by an attacker to trigger an assertion failure in tsig.c, resulting in DoS\nhttps://packetstormsecurity.com/files/157836/bindtsig-dos.txt\n]-&gt; BIND 9 Security Vulnerability Matrix:\nhttps://kb.isc.org/docs/aa-00913", "creation_timestamp": "2024-10-24T18:06:56.000000Z"}]}