{"vulnerability": "CVE-2020-1213", "sightings": [{"uuid": "798675de-3953-4860-86fc-c2fc26ea545e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12138", "type": "published-proof-of-concept", "source": "https://t.me/R0_Crew/1623", "content": "CVE-2020-12138 Exploit Proof-of-Concept, Privilege Escalation in ATI Technologies Inc. Driver atillk64.sys https://h0mbre.github.io/atillk64_exploit/ #exploitation #exploit #dukeBarman", "creation_timestamp": "2020-05-28T19:09:06.000000Z"}, {"uuid": "5f1e6029-52c7-41e0-aa27-6a74f0bc316c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12138", "type": "published-proof-of-concept", "source": "https://t.me/techpwnews/509", "content": "CVE-2020-12138 Exploit Proof-of-Concept, Privilege Escalation in ATI Technologies Inc. Driver atillk64.sys\n\nThe driver file description states the product name is ATI Diagnostics version 5.11.9.0 and its copyright is ATI Technologies Inc. 2003 .\n@...........M\"So we\u2019ve identified a \u201cProc\u201d pool allocation and we have a good idea of how they are allocated.\nAs an example, take this \u201cProc\u201d tag found by !poolfind :FFFFD48C`B102D320 00 00 B8 02 50 72 6F 63 39 B0 0D A6 8C D4 FF FF ....Proc9....... FFFFD48C`B102D330 00 10 00 00 88 0A 00 00 48 00 00 00 FF E8 2E F6 ........H....... FFFFD48C`B102D340 C0 D4 66 2F 05 F8 FF FF 24 F6 FF FF E8 1F F6 FF ..f/....$....... FFFFD48C`B102D350 4A 7F 03 00 00 00 00 00 07 00 00 00 00 00 00 00 J............... FFFFD48C`B102D360 00 00 00 00 00 00 00 00 93 00 08 00 F6 FF FF E8 ................ FFFFD48C`B102D370 C0 D4 66 2F 05 F8 FF FF 6B 85 EE 27 0F E6 FF FF ..f/....k..'.... FFFFD48C`...\n\nContinue reading at h0mbre.github.io", "creation_timestamp": "2020-04-28T14:31:39.000000Z"}, {"uuid": "a5c80677-51d0-477a-a194-7d7eb8289cfe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12133", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1029", "content": "#exploit\n1. CVE-2020-12133:\nFurukawa Electric ConsciusMAP - Tecnored provisioning system for FTTH networks (affected ver.: 2.8.1, 2.7.10, 2.6.4, 2.3.1, 2.1.49, 2.1.36, 2.1.31, 2.1.18, 2.1.16, 2.1.15, 2.1.1, 2.0.1174, 1.8, 1.4.70) - Java Deserialization RCE\nhttps://packetstormsecurity.com/files/157383/ZSL-2020-5565.txt\n\n2. CVE-2020-3894:\nWebKit AudioArray::allocate Data Race/Out-Of-Bounds Access\nhttps://packetstormsecurity.com/files/157378/GS20200423195409.txt\n//This issue is fixed in iOS 13.4, iPadOS 13.4, tvOS 13.4, Safari 13.1, iTunes for Windows 12.10.5, iCloud for Windows 10.9.3, 7.18. An application may be able to read restricted memory", "creation_timestamp": "2022-07-04T19:19:27.000000Z"}]}