{"vulnerability": "cve-2016-10739", "sightings": [{"uuid": "81fb67e4-04e7-4274-a7c7-33fdb45590c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2016-10739", "type": "seen", "source": "https://t.me/cibsecurity/2153", "content": "ATENTION\u203c New - CVE-2016-10739\n\nIn the GNU C Library (aka glibc or libc6) through 2.28, the getaddrinfo function would successfully parse a string that contained an IPv4 address followed by whitespace and arbitrary characters, which could lead applications to incorrectly assume that it had parsed a valid string, without the possibility of embedded HTTP headers or other potentially dangerous substrings.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2019-01-21T22:21:11.000000Z"}]}