{"uuid": "b027d4cd-0f6b-4bb6-a194-efb2ddd89ed5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-28052", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2350", "content": "#Threat_Research\n1. CVE-2020-35606 - Arbitrary Command Execution Vulnerability in Webmin\n// This vulnerability is bypassing the measure taken for CVE-2019-12840 and converting it into a new vector\nhttps://www.pentest.com.tr/exploits/Webmin-1962-PU-Escape-Bypass-Remote-Command-Execution.html\n2. SUNBURST, TEARDROP and the NetSec New Normal\nhttps://research.checkpoint.com/2020/sunburst-teardrop-and-the-netsec-new-normal\n3. CyRC analysis: Authentication bypass vulnerability in Java Bouncy Castle (PoC for CVE-2020-28052)\nhttps://www.synopsys.com/blogs/software-security/cve-2020-28052-bouncy-castle", "creation_timestamp": "2020-12-31T18:30:13.000000Z"}