{"vulnerability": "CVE-2020-8468", "sightings": [{"uuid": "df4b462c-d07f-44c2-b11c-e77e7d6168ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4238", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-8468\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2020-03-18T01:15:12.003\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://success.trendmicro.com/jp/solution/000244253\n2. https://success.trendmicro.com/jp/solution/000244836\n3. https://success.trendmicro.com/solution/000245571\n4. https://success.trendmicro.com/solution/000245572\n5. https://success.trendmicro.com/jp/solution/000244253\n6. https://success.trendmicro.com/jp/solution/000244836\n7. https://success.trendmicro.com/solution/000245571\n8. https://success.trendmicro.com/solution/000245572", "creation_timestamp": "2025-02-13T15:08:08.000000Z"}, {"uuid": "9f7f47ee-022e-4055-b1e3-4096ab5760df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "Telegram/AtPUtHcKKBa21GBlQkkN6kCFBAy5_Hm8gwZNFr3EimN2ZJzp", "content": "", "creation_timestamp": "2025-02-14T10:08:09.000000Z"}, {"uuid": "8e86998f-c13c-409b-885d-30012b5b4a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "Telegram/snrpuZcFbItROzd4ZOGYqwEfLu-vsZlmAF82J1rOmxWBgJfB", "content": "", "creation_timestamp": "2025-02-14T10:06:10.000000Z"}, {"uuid": "e924e3f0-412f-4fcc-9843-a9407b1d4274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970910", "content": "", "creation_timestamp": "2024-12-24T20:21:36.504971Z"}, {"uuid": "6c091848-75e7-4393-8b9c-6f590a3d0d15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "https://t.me/arpsyndicate/1005", "content": "#ExploitObserverAlert\n\nCVE-2020-8468\n\nDESCRIPTION: Exploit Observer has 5 entries related to CVE-2020-8468. Trend Micro Apex One (2019), OfficeScan XG and Worry-Free Business Security (9.0, 9.5, 10.0) agents are affected by a content validation escape vulnerability which could allow an attacker to manipulate certain agent client components. An attempted attack requires user authentication.\n\nFIRST-EPSS: 0.004520000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-03T19:00:03.000000Z"}, {"uuid": "eafe2187-de8d-4b56-8781-b0572c2526a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "exploited", "source": "https://t.me/SecLabNews/7124", "content": "\u041a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u043f\u043e\u043f\u044b\u0442\u0430\u043b\u0438\u0441\u044c \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u0432\u0435 0Day-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Trend Micro. \u041e\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b (CVE-2020-8467 \u0438 CVE-2020-8468) \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442\u0441\u044f \u0432 \u0437\u0430\u0449\u0438\u0442\u043d\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 Trend Micro Apex One \u0438 OfficeScan. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u0435\u0440\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430\u0445, \u0430 \u0432\u0442\u043e\u0440\u043e\u0439 \u2014 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u0438\u043c\u0438 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u043c\u0438 \u0430\u0433\u0435\u043d\u0442\u0430. \u041f\u0435\u0440\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u043e\u0446\u0435\u043d\u043a\u0443 \u0432 9,1 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS, \u0430 \u0432\u0442\u043e\u0440\u0430\u044f \u2014 8,0 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS.    \n\u0412 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Trend Micro \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0434\u0432\u0435 0Day-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438", "creation_timestamp": "2020-03-18T10:15:02.000000Z"}, {"uuid": "d51c2390-3e34-4c53-9a54-5b303df7bed3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "7a45d0a7-19c0-4f13-80bc-4531c1887e34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:20.000000Z"}, {"uuid": "c4a6eb24-e652-45a2-b40a-a9e3b971a592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:50.000000Z"}, {"uuid": "dc2ae842-a794-4ae0-a414-098a191ac51e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9bfa1acf-cfc6-4cd0-a5b1-7606cb3c0b47", "content": "", "creation_timestamp": "2026-02-02T12:29:05.101510Z"}, {"uuid": "d53c1b8d-d32c-4daa-be75-9ae96439f7ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-8468", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9bfa1acf-cfc6-4cd0-a5b1-7606cb3c0b47", "content": "", "creation_timestamp": "2026-02-02T12:29:05.101510Z"}]}