{"vulnerability": "CVE-2020-1577", "sightings": [{"uuid": "28db4b61-ff19-4575-adce-b50e05932c2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "Telegram/lSatndSHKvXeOOkCe4BtgugIcZcDihrdZBJA4iXwuYPkAsH3oA", "content": "", "creation_timestamp": "2025-08-17T02:42:32.000000Z"}, {"uuid": "b774ac3c-d978-4028-87ac-75862070cc8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "Telegram/o8ZKoWV2Y_A2XRg1P8qW1kiSLgUFj0IHGqQJ6A5ARyKaU-0", "content": "", "creation_timestamp": "2025-07-29T03:00:05.000000Z"}, {"uuid": "6b8ac40b-cf8e-4a7b-b2f3-54942a578e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/10580", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "f0be269f-2b49-44fe-a9f6-2ea2d6e2a994", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10579", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "22167f35-c4fe-47f9-af4e-34c7a300e79d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2967", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "5d30bdd4-d3a2-4fa0-9798-4d1f106b0f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10573", "content": "|       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       95499236-C9FE-56A6-9D7D-E943A24B633A   8.9     https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A        *EXPLOIT*              |       PACKETSTORM:140070      7.8   https://vulners.com/packetstorm/PACKETSTORM:140070      *EXPLOIT*              |       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8     https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09  *EXPLOIT*      |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2016-10012  7.8     https://vulners.com/cve/CVE-2016-10012        |       CVE-2015-8325   7.8     https://vulners.com/cve/CVE-2015-8325         |       1337DAY-ID-26494        7.8   https://vulners.com/zdt/1337DAY-ID-26494*EXPLOIT*                              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       EDB-ID:40888    7.5     https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*                               |       CVE-2016-8858   7.5     https://vulners.com/cve/CVE-2016-8858         |       CVE-2016-6515   7.5     https://vulners.com/cve/CVE-2016-6515         |       CVE-2016-10708  7.5     https://vulners.com/cve/CVE-2016-10708        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2016-10009  7.3     https://vulners.com/cve/CVE-2016-10009        |       SSV:92582       7.2     https://vulners.com/seebug/SSV:92582   *EXPLOIT*                                     |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       CVE-2016-10010  7.0     https://vulners.com/cve/CVE-2016-10010        |       SSV:92580       6.9     https://vulners.com/seebug/SSV:92580   *EXPLOIT*                                     |       1337DAY-ID-26577        6.9   https://vulners.com/zdt/1337DAY-ID-26577*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       EDB-ID:46516    6.8     https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*                               |       EDB-ID:46193    6.8     https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*                               |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       CVE-2019-6110   6.8     https://vulners.com/cve/CVE-2019-6110         |       CVE-2019-6109   6.8     https://vulners.com/cve/CVE-2019-6109         |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "9e32f05a-e142-423e-bc2c-ad57fae00f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10586", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "6ef9f20a-b156-4589-81ec-874919224a39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2966", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "cebb6c33-0da3-4841-984a-02d5971cf530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2960", "content": "|       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       95499236-C9FE-56A6-9D7D-E943A24B633A   8.9     https://vulners.com/githubexploit/95499236-C9FE-56A6-9D7D-E943A24B633A        *EXPLOIT*              |       PACKETSTORM:140070      7.8   https://vulners.com/packetstorm/PACKETSTORM:140070      *EXPLOIT*              |       EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09   7.8     https://vulners.com/exploitpack/EXPLOITPACK:5BCA798C6BA71FAE29334297EC0B6A09  *EXPLOIT*      |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2016-10012  7.8     https://vulners.com/cve/CVE-2016-10012        |       CVE-2015-8325   7.8     https://vulners.com/cve/CVE-2015-8325         |       1337DAY-ID-26494        7.8   https://vulners.com/zdt/1337DAY-ID-26494*EXPLOIT*                              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       EDB-ID:40888    7.5     https://vulners.com/exploitdb/EDB-ID:40888   *EXPLOIT*                               |       CVE-2016-8858   7.5     https://vulners.com/cve/CVE-2016-8858         |       CVE-2016-6515   7.5     https://vulners.com/cve/CVE-2016-6515         |       CVE-2016-10708  7.5     https://vulners.com/cve/CVE-2016-10708        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2016-10009  7.3     https://vulners.com/cve/CVE-2016-10009        |       SSV:92582       7.2     https://vulners.com/seebug/SSV:92582   *EXPLOIT*                                     |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       CVE-2016-10010  7.0     https://vulners.com/cve/CVE-2016-10010        |       SSV:92580       6.9     https://vulners.com/seebug/SSV:92580   *EXPLOIT*                                     |       1337DAY-ID-26577        6.9   https://vulners.com/zdt/1337DAY-ID-26577*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       EDB-ID:46516    6.8     https://vulners.com/exploitdb/EDB-ID:46516   *EXPLOIT*                               |       EDB-ID:46193    6.8     https://vulners.com/exploitdb/EDB-ID:46193   *EXPLOIT*                               |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       CVE-2019-6110   6.8     https://vulners.com/cve/CVE-2019-6110         |       CVE-2019-6109   6.8     https://vulners.com/cve/CVE-2019-6109         |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "081b29a2-9536-4cc4-8bb7-078b4a883e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/136", "content": "CVE ID  : CVE-2020-15778\nSystem : OpenSSH  \nType : command injection\n\nExploit \n\u0637\u0631\u064a\u0642\u0629 \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 :\nPhoto1\nPhoto2\n\n\nGithub source", "creation_timestamp": "2024-05-28T11:29:33.000000Z"}, {"uuid": "9896929a-8c6a-4129-a424-479072dfe5b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2973", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "2f6e90b9-46f4-439f-9558-dd6fad6522fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "Telegram/g4YVNsl8VVhm8hCc75QWhNv5PFRAQjIgSB1n0jxM2tiTPh-tRQ", "content": "", "creation_timestamp": "2025-02-01T09:42:01.000000Z"}, {"uuid": "a19743f3-733d-4a40-86ca-f0887aaf8507", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "Telegram/u5l-ZaeBoa4rQ-jCnAd-RyTkmBiEwVQkA95tqksDWv2Ihl4", "content": "", "creation_timestamp": "2024-08-26T12:45:39.000000Z"}, {"uuid": "6788ba8f-8fa7-4ad3-824f-fd20dce1269d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "Telegram/xGsLy8z3fANiCroIRCfALnNfiha1hqkEaeyvq7MCrScixms", "content": "", "creation_timestamp": "2024-07-01T14:34:42.000000Z"}, {"uuid": "a266943a-4bb7-4126-b0aa-4955de44b333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/4508", "content": "https://redhat-satellite.si.uvsq.fr/users/login\n\nhttps://193.51.33.54/users/login\n\nCVE-2008-3844, CVE-2020-14145, CVE-2023-48795, CVE-2007-2768, CVE-2021-36368, CVE-2021-41617, CVE-2019-16905, CVE-2023-51385, CVE-2016-20012, CVE-2023-51767, CVE-2020-15778, CVE-2023-38408", "creation_timestamp": "2024-08-25T08:59:44.000000Z"}, {"uuid": "e9ba543a-853e-422a-8a4f-9c97bfd21e04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "Telegram/0T2mRQjPbxfagt_KULjNMSImpGgUw0PutX0rRmEphKviBA", "content": "", "creation_timestamp": "2022-09-12T09:43:08.000000Z"}, {"uuid": "cbfdcda3-2689-4c70-9bf8-2358d18d6eb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "Telegram/poS_ZG5aVKSKt_LXha-pFLWHU67v-9VfxvSO9FqtinvTebM", "content": "", "creation_timestamp": "2023-10-12T23:19:46.000000Z"}, {"uuid": "5d1aff0f-e784-45eb-a423-c969a9fb1cdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "Telegram/w0w9iKcyXi70OnNrtP96yLy6sw-7f3qLcDmBnN0l3DtxqHg", "content": "", "creation_timestamp": "2024-07-01T14:33:02.000000Z"}, {"uuid": "a8c79721-d8d8-43e3-8e89-64add5895ba0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "Telegram/2G0LL9YDDO0dQKSo5p4zQWAL-pbipATIxiBPSKqKsYKP6RG0", "content": "", "creation_timestamp": "2024-07-01T14:30:24.000000Z"}, {"uuid": "1a529a67-3ac6-4cd2-bd56-76ed1392f677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "seen", "source": "https://t.me/cibsecurity/66768", "content": "\u203c CVE-2023-38336 \u203c\n\nnetkit-rcp in rsh-client 0.17-24 allows command injection via filenames because /bin/sh is used by susystem, a related issue to CVE-2006-0225, CVE-2019-7283, and CVE-2020-15778.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T02:22:46.000000Z"}, {"uuid": "99401402-9463-4241-8998-c0d7476b8a69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-15778", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1596", "content": "#exploit\nCVE-2020-15778:\nSCP in OpenSSH &lt;=8.3p1 - Comand Injection/Eval injection\nhttps://github.com/cpandya2909/CVE-2020-15778\n]-&gt; A vulnerability in OpenSSH may affect IBM Spectrum Protect Plus 10.1.0-10.1.5:\nhttps://www.ibm.com/support/pages/node/6255652", "creation_timestamp": "2024-05-14T02:25:52.000000Z"}]}