{"vulnerability": "CVE-2020-0986", "sightings": [{"uuid": "617424b9-ecf1-4151-98f8-280bf862e009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/ee40784a-dec9-4f4a-b95c-3d760d8a1e2a", "content": "", "creation_timestamp": "2020-08-13T07:17:30.000000Z"}, {"uuid": "4d0f1c5c-40d9-4f40-9a67-0e8f65c7f478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/a448dfec-6f3b-4942-9e29-8c75e9d69ead", "content": "", "creation_timestamp": "2020-09-03T09:52:18.000000Z"}, {"uuid": "39083f9f-9f31-4405-9399-f40de40292df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "3ee17b2f-a9ec-402a-b852-449c7d621f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "ce1293ea-ba30-4e67-8393-9a463036a44c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/ee2f183f-20ad-4a7f-b4d2-25aeae2c6111", "content": "", "creation_timestamp": "2020-10-09T13:24:55.000000Z"}, {"uuid": "ecd31bbd-8724-4ae9-be19-83cd1cfa75a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/135595a3-a7b9-4432-8c05-852db7d8b50c", "content": "", "creation_timestamp": "2024-11-14T06:07:18.000000Z"}, {"uuid": "6dee459f-8ac1-4441-a125-511db0971921", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971030", "content": "", "creation_timestamp": "2024-12-24T20:23:17.187532Z"}, {"uuid": "951be2b3-6869-4f4f-a16f-bda6323a13ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:45.000000Z"}, {"uuid": "5e237d7a-bc2f-4f02-b459-841c5aede45d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/ee40784a-dec9-4f4a-b95c-3d760d8a1e2a", "content": "", "creation_timestamp": "2025-04-15T21:21:04.000000Z"}, {"uuid": "ef16a922-0c04-4e7b-ab94-0ea0f4ad8204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:32.000000Z"}, {"uuid": "7bec5b78-dd3f-4356-9e75-a5e4c31f62b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f465c400-430a-46e1-8555-5105c2eaa6e7", "content": "", "creation_timestamp": "2026-02-02T12:28:50.396008Z"}, {"uuid": "fc6f6a22-7660-40e4-82f1-068aa0031090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1816", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Internet Explorer and Windows #zeroday exploits used in Operation PowerFall.\n\nCVE-2020-0986\nCVE-2020-1380\n\nhttps://securelist.com/ie-and-windows-zero-day-operation-powerfall/97976/", "creation_timestamp": "2020-08-12T10:03:34.000000Z"}, {"uuid": "75fe3a64-2917-4159-9a37-51c19f6106a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "published-proof-of-concept", "source": "https://t.me/x_notes/196", "content": "\ud83e\udd20 \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439 \u0440\u0430\u0437\u0440\u0431\u043e\u0440 \u0435\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 CVE-2020-0986 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u043f\u0440\u0438 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 #PowerFall \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 #KasperskyLab \u0432 \u043c\u0430\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u0447\u0435\u0440\u0435\u0437 #0day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 #InternetExplorer \u0431\u044b\u043b\u0438 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u044b \u0440\u044f\u0434 \u0430\u0442\u0430\u043a \u043d\u0430 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438\n\n#exploit #analysis #APT\n\nhttps://securelist.com/operation-powerfall-cve-2020-0986-and-variants/98329/\nhttps://securelist.com/ie-and-windows-zero-day-operation-powerfall/97976/", "creation_timestamp": "2020-09-19T14:11:36.000000Z"}, {"uuid": "64fa7893-241a-49c2-9487-5038c2c11050", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "https://t.me/ctinow/24173", "content": "Operation PowerFall: CVE-2020-0986 and variants\n\nhttps://ift.tt/32MetG9", "creation_timestamp": "2020-09-02T12:19:04.000000Z"}, {"uuid": "3e0afe91-8007-466a-82b0-d15b043b951f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "https://t.me/arpsyndicate/1311", "content": "#ExploitObserverAlert\n\nCVE-2020-0986\n\nDESCRIPTION: Exploit Observer has 7 entries related to CVE-2020-0986. An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory, aka 'Windows Kernel Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2020-1237, CVE-2020-1246, CVE-2020-1262, CVE-2020-1264, CVE-2020-1266, CVE-2020-1269, CVE-2020-1273, CVE-2020-1274, CVE-2020-1275, CVE-2020-1276, CVE-2020-1307, CVE-2020-1316.\n\nFIRST-EPSS: 0.000560000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-04T21:36:18.000000Z"}, {"uuid": "39e45dd3-f8eb-4c8f-901b-ea1f3e8fdc82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://t.me/true_secator/1294", "content": "\u200b\u200bMicrosoft \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u044e\u0442 2020 \u0433\u043e\u0434 \u043d\u0430 \u043c\u0438\u043d\u043e\u0440\u043d\u043e\u0439 \u043d\u043e\u0442\u0435, \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044f \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0441\u0432\u043e\u0435\u0433\u043e \u0440\u0430\u0437\u0434\u043e\u043b\u0431\u0430\u0439\u0441\u0442\u0432\u0430 \u0438 \u0443\u043c\u0435\u043d\u0438\u0435 \u0438\u0437 \u043a\u0430\u0436\u0434\u043e\u0433\u043e \u0444\u0438\u043a\u0441\u0430 \u0441\u0442\u0430\u0440\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441\u0434\u0435\u043b\u0430\u0442\u044c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043d\u043e\u0432\u0443\u044e.\n\n\u0412 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b Zero Day Initiative \u044f\u043f\u043e\u043d\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0432\u0435\u043d\u0434\u043e\u0440\u0430 Trend Micro \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-0986, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0430\u0441\u044c \u0432  \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u0430 Windows \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u043b\u0430 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 (RCE). \u0415\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u0447\u0442\u043e \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0448\u0438\u0431\u043a\u0438 \u043d\u0435 \u0431\u044b\u043b\u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b, \u0430 \u0441\u0430\u043c\u0430 Microsoft \u0431\u044b\u043b\u0430 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0441 \u0446\u0435\u043b\u044c\u044e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u0414\u0435\u0442\u0438 \u0411\u0438\u043b\u043b\u0430 \u0413\u0435\u0439\u0442\u0441\u0430 \u0442\u0443\u043f\u0438\u043b\u0438 \u0446\u0435\u043b\u044b\u0445 \u043f\u043e\u043b\u0433\u043e\u0434\u0430, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u0437\u0430\u043a\u0440\u044b\u043b\u0438 \u0434\u044b\u0440\u043a\u0443 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0441\u0432\u043e\u0435\u0433\u043e \u0438\u044e\u043d\u044c\u0441\u043a\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0417\u0430 \u044d\u0442\u043e \u0432\u0440\u0435\u043c\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2020-0986 \u0431\u044b\u043b\u0430 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u0430 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u0414\u0430 \u0432\u043e\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u043f\u0430\u0442\u0447 \u0431\u044b\u043b \u043a\u0440\u0438\u0432\u043e\u0439 \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0430\u043a \u0438 \u043d\u0435 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0434\u043e \u043a\u043e\u043d\u0446\u0430, \u0447\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Google Project Zero. \u041e\u0431 \u044d\u0442\u043e\u043c \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b\u0438 Microsoft, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0441\u0432\u043e\u0438\u043b\u0430 \u043d\u043e\u0432\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0435 CVE-2020-17008. \u041e\u043d\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u0420\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u0431\u044b\u0441\u0442\u0440\u043e \u0441\u043b\u0430\u0431\u0430\u043b\u0438 Proof of Concept \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0441\u043d\u043e\u0432\u044b\u0432\u0430\u044f\u0441\u044c \u043d\u0430 PoC \u0441\u0442\u0430\u0440\u043e\u0439.\n\n\u0410 Microsoft \u043e\u043f\u044f\u0442\u044c \u0437\u0430\u0431\u0438\u043b\u0438 \u0438 \u043f\u043e \u043f\u0440\u043e\u0448\u0435\u0441\u0442\u0432\u0438\u0438 90 \u0434\u043d\u0435\u0439 \u043d\u0435 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u044f\u043b\u0438 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u043a\u0440\u044b\u0442\u0438\u044e \u0434\u044b\u0440\u043a\u0438, \u0438\u0441\u0445\u043e\u0434\u044f \u0438\u0437 \u0447\u0435\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0435\u0435 \u0432 \u043f\u0430\u0431\u043b\u0438\u043a\u0435. \u0422\u0435\u043f\u0435\u0440\u044c \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044f\u043d\u0432\u0430\u0440\u0435.\n\nMicrosoft \u0438 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u042d\u0442\u0430 \u043c\u0443\u0437\u044b\u043a\u0430 \u0431\u0443\u0434\u0435\u0442 \u0432\u0435\u0447\u043d\u043e\u0439.", "creation_timestamp": "2020-12-25T14:29:00.000000Z"}, {"uuid": "00c84f0e-26d2-4ff6-b51a-32fe2e844eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://t.me/HackerOne/2885", "content": "Google hackers disclose exploit for an UNPATCHED Windows vulnerability (CVE-2020-0986) that was exploited as 0-day in the wild, for which Microsoft issued an incomplete patch and then failed to patch it again under the 90-day deadline.\n\nRead \u2014 https://thehackernews.com/2020/12/google-discloses-poorly-patched-now.html", "creation_timestamp": "2020-12-25T10:39:43.000000Z"}, {"uuid": "d9535ca6-4820-4965-b955-69ad20d53eaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "https://t.me/information_security_channel/37956", "content": "Security researchers from Trend Micro\u2019s Zero Day Initiative (ZDI) disclosed five zero-day vulnerabilities that allow attackers to escalate the privileges on the Windows machine. Out of five, four vulnerabilities are treated as critical and they received a CVSS score of 7.0. Five Windows zero-day CVE-2020-0915, CVE-2020-0986, CVE-2020-0916 All three flaws are due to a lack [\u2026]\nThe post Researchers Disclose Five Windows zero-day Vulnerabilities that Allow Hackers to Escalate Privileges (https://gbhackers.com/five-windows-zero-day/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-05-20T16:44:14.000000Z"}, {"uuid": "f1244bb9-7b59-4e3f-b9d6-d4895b1e0e8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://t.me/information_security_channel/42509", "content": "Google: Microsoft Improperly Patched Exploited Windows Vulnerability\nhttp://feedproxy.google.com/~r/Securityweek/~3/GB7PMJpfUxg/google-microsoft-improperly-patched-exploited-windows-vulnerability\n\nGoogle Project Zero has disclosed a Windows zero-day vulnerability caused by the improper fix for CVE-2020-0986, a security flaw abused in a campaign dubbed Operation PowerFall.\nread more (https://www.securityweek.com/google-microsoft-improperly-patched-exploited-windows-vulnerability)", "creation_timestamp": "2020-12-28T15:04:08.000000Z"}, {"uuid": "a530c7f9-7ba8-46ad-a737-e64c26d80896", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://t.me/thehackernews/955", "content": "Google hackers disclose exploit for an UNPATCHED Windows vulnerability (CVE-2020-0986) that was exploited as 0-day in the wild, for which Microsoft issued an incomplete patch and then failed to patch it again under the 90-day deadline.\n\nRead \u2014 https://thehackernews.com/2020/12/google-discloses-poorly-patched-now.html", "creation_timestamp": "2020-12-24T10:14:23.000000Z"}, {"uuid": "35e555bf-a366-4faa-ba3c-a1b1bac036ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://t.me/arvin_club/3161", "content": "\ud83d\udea8\ud83d\udea8\ud83d\udea8\ud83d\udea8\n\u067e\u0686 \u0646\u0627\u062f\u0631\u0633\u062a \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc 0day \u062a\u0648\u0633\u0637 \u0645\u0627\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0645\u0646\u062c\u0631 \u0628\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u062f\u0648\u0628\u0627\u0631\u0647 \u0647\u0645\u0627\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a!!\n\n\u062f\u0631 \u0645\u0627\u0647 \u0698\u0648\u0626\u0646 \u060c \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0628\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0648\u0635\u0644\u0647 \u0627\u06cc \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f \u06a9\u0647 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u0645\u06a9\u0627\u0646 \u0645\u06cc \u062f\u0627\u062f \u062a\u0627 \u062f\u0633\u062a\u0631\u0633\u06cc \u062e\u0648\u062f \u0631\u0627 \u062f\u0631 \u0633\u0637\u062d \u06a9\u0631\u0646\u0644 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u0646\u062f \u0648\u0644\u06cc patch \u0645\u0648\u0631\u062f \u0646\u0638\u0631 \u0645\u0648\u0641\u0642 \u0639\u0645\u0644 \u0646\u06a9\u0631\u062f.\n\n\ud83d\udd3b\u0645\u0633\u0626\u0644\u0647 \u0627\u06cc \u06a9\u0647 \u0647\u06a9\u0631\u0647\u0627\u06cc \u062d\u0631\u0641\u0647 \u0627\u06cc \u0627\u0632 \u0622\u0646 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646  zero-day exploit \u062f\u0631 \u0645\u0627\u0647 \u0645\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u06a9\u0631\u062f\u0646\u062f \u060c \u0645\u062d\u0642\u0642\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627 \u0627\u0646\u062a\u0634\u0627\u0631 POC \u0628\u0647 \u0635\u0648\u0631\u062a \u0639\u0645\u0648\u0645\u06cc \u0646\u0634\u0627\u0646 \u062f\u0627\u062f\u0646 \u060c\u0647\u0646\u0648\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0642\u0627\u0628\u0644 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0633\u062a \u0627\u0645\u0627 \u0628\u0647 \u0631\u0648\u0634\u06cc \u062f\u06cc\u06af\u0631!!\n\n\u062f\u0631 \u0645\u0627\u0647 \u0645\u06cc 2020 \u0645\u0634\u06a9\u0644 \u060c \u0648\u062c\u0648\u062f \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0648\u062f \u06a9\u0647 \u0628\u0627\u0639\u062b \u0627\u0631\u062a\u0642\u0627 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u0647\u0645\u0631\u0627\u0647 \u0628\u0627 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 (RCE) \u062a\u0648\u0633\u0637 \u0628\u0627\u06af\u06cc \u062f\u0631 internet explorer \u0628\u0648\u062f.\n\n\ud83d\udd3a\u0627\u0633\u062a\u0648\u0646 \u0645\u062d\u0642\u0642 \u0627\u0645\u0646\u06cc\u062a\u06cc \u06af\u0648\u06af\u0644 \u0645\u06cc\u06af\u0648\u06cc\u062f  : \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0647\u0646\u0648\u0632 \u0645\u06cc\u062a\u0648\u0627\u0646\u0646\u062f \u0628\u0627 CVE-2020-0986 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062e\u0648\u062f \u0631\u0627 \u0628\u0627 \u0627\u0631\u0633\u0627\u0644 offset \u0628\u062c\u0627\u06cc pointer \u0628\u0647 \u062f\u0633\u062a\u0631\u0633\u06cc kernel \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u0646\u062f \u0686\u0631\u0627 \u06a9\u0647 patch \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u0628\u0648\u062f \u0632\u06cc\u0631\u0627 pointer \u0631\u0627 \u0628\u0647 offset \u062a\u063a\u06cc\u06cc\u0631 \u062f\u0627\u062f \u060c \u0628\u0646\u0627\u0628\u0631\u0627\u06cc\u0646 \u067e\u0627\u0631\u0627\u0645\u062a\u0631\u0647\u0627\u06cc function \u0647\u0646\u0648\u0632 \u0642\u0627\u0628\u0644 \u06a9\u0646\u062a\u0631\u0644 \u0647\u0633\u062a\u0646\u062f.\n\u200c@Arvin_club", "creation_timestamp": "2020-12-24T10:33:14.000000Z"}, {"uuid": "855e38ba-fc55-45b2-bebd-74d4cb1d267d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/1759", "content": "#Research\n\"Operation PowerFall - A look at vulnerability CVE-2020-0986 (a Windows LPE), how it was exploited by attackers, how it was fixed and what additional mitigations were implemented to complicate exploitation of many other similar vulnerabilities\", 2020.\nhttps://securelist.com/operation-powerfall-cve-2020-0986-and-variants/98329", "creation_timestamp": "2020-12-24T04:28:15.000000Z"}, {"uuid": "a584b612-6e41-472b-be4e-94d19c83cc31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0986", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2359", "content": "#exploit\nCVE-2020-0986 -&gt; CVE-2020-17008:\nWindows 8.1/10/2012/2016/2019 - splWOW64 EoP\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2096", "creation_timestamp": "2024-10-09T20:08:38.000000Z"}]}