{"uuid": "b2ea22fe-5e42-41b7-a2a9-5cebc25249b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10713", "type": "published-proof-of-concept", "source": "https://t.me/cKure/4180", "content": "\u25a0\u25a1\u25a1\u25a1\u25a1 GRUB2 boot loader maintainers fixed hundreds of flaws.\n\nIn July 2020, researchers at the cybersecurity firmware Eclypsium\u00a0disclosed a buffer overflow vulnerability, tracked as CVE-2020-10713 and dubbed\u00a0BootHole,\u00a0which can be exploited by attackers to install persistent and stealthy malware.\n\nhttps://securityaffairs.co/wordpress/115258/hacking/grub2-boot-loader-flaws.html", "creation_timestamp": "2021-03-04T16:43:44.000000Z"}