{"vulnerability": "CVE-2020-1247", "sightings": [{"uuid": "191ca729-8526-4f21-b985-e26089160d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1247", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2077", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2020-1247\n\nhttps://cpr-zero.checkpoint.com/vulns/cprid-2154/", "creation_timestamp": "2020-09-03T11:14:27.000000Z"}, {"uuid": "75d80724-a0f3-4b87-96cc-d795a79d6001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-12478", "type": "seen", "source": "https://t.me/arpsyndicate/4878", "content": "#ExploitObserverAlert\n\nCVE-2020-12478\n\nDESCRIPTION: Exploit Observer has 13 entries in 6 file formats related to CVE-2020-12478. TeamPass 2.1.27.36 allows an unauthenticated attacker to retrieve files from the TeamPass web root. This may include backups or LDAP debug files.\n\nFIRST-EPSS: 0.014960000\nNVD-IS: 3.6\nNVD-ES: 3.9\nARPS-PRIORITY: 0.960217", "creation_timestamp": "2024-04-25T22:12:29.000000Z"}, {"uuid": "0a47d85d-623d-4b1f-98a4-fb2b59311610", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1247", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1691", "content": "#exploit\nCVE-2020-1247:\nWindows 10 x64 1909 (OS Build 18363.719) / 10.0.18362.719 (WinBuild.160101.0800) - Win32k Elevation of Privilege Vulnerability (Out Of Bound Read/Write)\nhttps://cpr-zero.checkpoint.com/vulns/cprid-2154\n]-&gt; PoC: https://cpr-zero.checkpoint.com/assets/attachments/cprid-2154/poc.c", "creation_timestamp": "2022-07-04T14:21:25.000000Z"}]}