{"vulnerability": "CVE-2020-12062", "sightings": [{"uuid": "13bed77d-7b5e-4182-88d4-dd8effc69e09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12062", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10579", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "b6495102-0938-4526-ac21-c9f165b7a57f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12062", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10581", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "45204f4f-7814-42d6-9894-93458e98adfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12062", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2968", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "85bfd19c-fca1-4e7d-bbe6-c7a8bbd46327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12062", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2966", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}]}