{"vulnerability": "CVE-2020-1244", "sightings": [{"uuid": "800ce76b-f560-4340-b640-81585ab28e5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "published-proof-of-concept", "source": "Telegram/fTHUl5MtxPQT56QLjrBKmgRn6IjdFlIA7evP9z5kwdufqPY", "content": "", "creation_timestamp": "2026-04-09T15:00:18.000000Z"}, {"uuid": "8d6d7791-d406-42a9-a0e1-87d49e6b3e85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12440", "type": "published-proof-of-concept", "source": "https://t.me/cKure/585", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 #HRS: HTTP Request Smuggling on Nginx 1.8.0 and earlier (CVE-2020-12440)\n\nhttps://gist.github.com/Glassware123/1023720bf4787375a04f32a0c12e956a", "creation_timestamp": "2020-05-19T09:49:32.000000Z"}, {"uuid": "32353cfd-a3a3-485e-b2e5-eb017d5eeca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "published-proof-of-concept", "source": "Telegram/cXGJKAtM4hUs9woTQlzEUCh6Ji7hbJ9irNNz-IXtpxYJiW8", "content": "", "creation_timestamp": "2025-11-17T21:00:05.000000Z"}, {"uuid": "27ba107d-be2a-4536-a491-d07d6429dc24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12441", "type": "seen", "source": "https://t.me/cibsecurity/13950", "content": "ATENTION\u203c New - CVE-2020-12441\n\nDenial-of-Service (DoS) in Ivanti Service Manager HEAT Remote Control 7.4 due to a buffer overflow in the protocol parser of the \u00e2\u20ac&tilde;HEATRemoteService\u00e2\u20ac\u2122 agent. The DoS can be triggered by sending a specially crafted network packet.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-06T22:55:09.000000Z"}, {"uuid": "0a661b7c-c639-4922-bf4d-e80067c1b889", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12446", "type": "seen", "source": "https://t.me/arpsyndicate/133", "content": "#ExploitObserverAlert\n\nCVE-2020-12446\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-12446. The ene.sys driver in G.SKILL Trident Z Lighting Control through 1.00.08 exposes mapping and un-mapping of physical memory, reading and writing to Model Specific Register (MSR) registers, and input from and output to I/O ports to local non-privileged users. This leads to privilege escalation to NT AUTHORITY\\SYSTEM.\n\nFIRST-EPSS: 0.000440000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-13T00:52:09.000000Z"}]}