{"vulnerability": "CVE-2020-1568", "sightings": [{"uuid": "07576ebe-8dda-48d9-963e-600fe151bee7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15685", "type": "seen", "source": "https://t.me/cibsecurity/55147", "content": "\u203c CVE-2020-15685 \u203c\n\nDuring the plaintext phase of the STARTTLS connection setup, protocol commands could have been injected and evaluated within the encrypted session. This vulnerability affects Thunderbird &lt; 78.7.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-12-22T22:20:15.000000Z"}, {"uuid": "861411c0-7008-4ed1-b952-dc1f5943a7fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15680", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2232", "content": "#exploit\nCVE-2020-15680:\nLeaking Browser (Chrome, Firefox, Edge)\nURL/Protocol Handlers (PoC)\nhttps://www.fortinet.com/blog/threat-research/leaking-browser-url-protocol-handlers", "creation_timestamp": "2022-05-11T06:29:08.000000Z"}]}