{"vulnerability": "CVE-2020-1708", "sightings": [{"uuid": "fa3b8669-03c1-4ee5-9725-e85d5d0e5393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "25f4eff8-d5f0-4a7c-b3e6-b33b33f88920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "5b63b1fb-e8a1-43c6-9097-4413ecc0d0ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "MISP/e73e2520-0e56-4337-bcce-1ab65bb83d42", "content": "", "creation_timestamp": "2024-11-14T06:09:03.000000Z"}, {"uuid": "844058b4-6186-4905-8228-3711f37402c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971081", "content": "", "creation_timestamp": "2024-12-24T20:23:58.485225Z"}, {"uuid": "7374439a-a4e2-44c7-ba0f-167b79fe9973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971039", "content": "", "creation_timestamp": "2024-12-24T20:23:24.673323Z"}, {"uuid": "0e6bd3b0-8422-41c8-8f95-68ba7e614454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:47.000000Z"}, {"uuid": "9a8d80c0-8b84-4a79-82b9-e61cadc83649", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-17087", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/979c41ca-b63f-4759-b77a-6ac8d86104f1", "content": "", "creation_timestamp": "2026-02-02T12:28:49.388911Z"}, {"uuid": "eda266e6-9571-48f6-a5ca-23d7d265d2d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=526", "content": "", "creation_timestamp": "2020-11-11T04:00:00.000000Z"}, {"uuid": "aac9922d-1b37-438b-ac74-4280eddbd551", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17083", "type": "seen", "source": "https://t.me/arpsyndicate/899", "content": "#ExploitObserverAlert\n\nCVE-2020-17083\n\nDESCRIPTION: Exploit Observer has 9 entries related to CVE-2020-17083. Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17084.\n\nFIRST-EPSS: 0.023220000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-03T00:06:08.000000Z"}, {"uuid": "bedefaec-bad6-40de-90b7-235f8e78c135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17084", "type": "seen", "source": "https://t.me/arpsyndicate/899", "content": "#ExploitObserverAlert\n\nCVE-2020-17083\n\nDESCRIPTION: Exploit Observer has 9 entries related to CVE-2020-17083. Microsoft Exchange Server Remote Code Execution Vulnerability This CVE ID is unique from CVE-2020-17084.\n\nFIRST-EPSS: 0.023220000\nNVD-IS: 2.7\nNVD-ES: 2.3", "creation_timestamp": "2023-12-03T00:06:08.000000Z"}, {"uuid": "ac36f7be-8b57-4c44-9a58-4ef07a84362a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17086", "type": "seen", "source": "https://t.me/arpsyndicate/2657", "content": "#ExploitObserverAlert\n\nCVE-2020-17086\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2020-17086. Raw Image Extension Remote Code Execution Vulnerability\n\nFIRST-EPSS: 0.100700000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2024-01-08T16:25:53.000000Z"}, {"uuid": "a45aeaef-7d6c-4a1b-b436-ddcb1e1a1274", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://t.me/arpsyndicate/916", "content": "#ExploitObserverAlert\n\nCVE-2020-17087\n\nDESCRIPTION: Exploit Observer has 18 entries related to CVE-2020-17087. Windows Kernel Local Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.001040000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-03T10:52:19.000000Z"}, {"uuid": "fac9c4fc-d110-4de8-b1cf-4d01779d99ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "exploited", "source": "https://t.me/true_secator/1137", "content": "Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043d\u043e\u044f\u0431\u0440\u044c\u0441\u043a\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043b\u0438\u043d\u0435\u0439\u043a\u0438 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432.\n\n\u0412\u0441\u0435\u0433\u043e \u0437\u0430\u043a\u0440\u044b\u0442\u043e 112 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 17 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f 24 \u043e\u0448\u0438\u0431\u043e\u043a \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE), \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432 Excel, Sharepoint, Exchange Server \u0438 \u0434\u0440.\n\n\u041e\u0434\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, CVE-2020-17087, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u044f\u0434\u0440\u0435 Windows, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f 0-day \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438. \u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u043d\u0430\u0439\u0434\u0435\u043d\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u043e\u0439 Project Zero \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Google \u0432 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u043c\u0435\u0441\u044f\u0446\u0430 \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 Chrome, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0435\u0439 \u043a RCE. \u0418 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043e\u0431\u0435\u0438\u0445 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \n\n\u0418, \u0447\u0435\u0441\u0442\u043d\u043e \u0433\u043e\u0432\u043e\u0440\u044f, \u043c\u044b \u0434\u0430\u0436\u0435 \u043d\u0435 \u0437\u043d\u0430\u0435\u043c \u0447\u0442\u043e \u043f\u043e\u0441\u043e\u0432\u0435\u0442\u043e\u0432\u0430\u0442\u044c. \u0421 \u043e\u0434\u043d\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b, \u043a\u0430\u043a \u0432\u0441\u0435\u0433\u0434\u0430 \u0445\u043e\u0447\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0437\u0432\u0430\u0442\u044c \u043a \u0441\u043a\u043e\u0440\u0435\u0439\u0448\u0435\u043c\u0443 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0441 \u0443\u0447\u0435\u0442\u043e\u043c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0445\u0430\u043a\u0435\u0440\u044b. \u0421 \u0434\u0440\u0443\u0433\u043e\u0439, \u0432\u0441\u043f\u043e\u043c\u0438\u043d\u0430\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u043a\u043e\u0441\u044f\u043a Microsoft \u0441 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c, \u043c\u043e\u0436\u043d\u043e \u0438 \u043f\u043e\u0434\u043e\u0436\u0434\u0430\u0442\u044c \u043d\u0435\u043c\u043d\u043e\u0433\u043e.\n\n\u041a\u043e\u0440\u043e\u0447\u0435, \u0434\u0443\u043c\u0430\u0439\u0442\u0435 \u0441\u0430\u043c\u0438.", "creation_timestamp": "2020-11-11T09:44:51.000000Z"}, {"uuid": "3944ef58-0d35-40d7-ad44-c422a2e4fa8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18396", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:32:57.000000Z"}, {"uuid": "13ef186b-edfc-4c6e-9973-7f9497de5e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18488", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T05:25:08.000000Z"}, {"uuid": "1aa55c4d-b26b-4691-a363-f67c1de7f992", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18428", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:38:51.000000Z"}, {"uuid": "042f1950-9cce-43a5-b21a-c7d34e510fec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18416", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:35:58.000000Z"}, {"uuid": "eb77bd41-12ac-4e97-aa3e-77fe58234d42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18468", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T04:25:12.000000Z"}, {"uuid": "f66596f0-218e-4194-80ad-e7253fb831f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18448", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T03:25:13.000000Z"}, {"uuid": "9f3828d5-2392-4032-a9cd-188c7c27b6f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://t.me/thehackernews/894", "content": "November 2020 Patch Tuesday \u2014 Microsoft releases security updates for 112 newly discovered vulnerabilities, including an actively exploited zero-day flaw (CVE-2020-17087) disclosed by Google's security team last week.\n\nhttps://thehackernews.com/2020/11/microsoft-releases-windows-security.html", "creation_timestamp": "2020-11-11T11:14:11.000000Z"}, {"uuid": "71818790-e56a-4b87-96c7-3da48e8a1682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18528", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:25:09.000000Z"}, {"uuid": "0131d049-8510-4cff-8f11-6bf80595ae12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17089", "type": "seen", "source": "https://t.me/cibsecurity/18508", "content": "\u203c CVE-2020-17089 \u203c\n\n, aka 'Microsoft SharePoint Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T06:25:10.000000Z"}, {"uuid": "79b13bde-eb7b-4921-8d92-79439aed4bba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "exploited", "source": "https://t.me/thehackernews/886", "content": "WATCH OUT! Google disclosed details of a new zero-day flaw (CVE-2020-17087) in the Windows operating system that's being actively exploited in the wild.\n\nDetails: https://thehackernews.com/2020/11/warning-google-discloses-windows-zero.html", "creation_timestamp": "2020-11-02T10:46:15.000000Z"}, {"uuid": "40e876ac-f40a-4d08-9d75-22402a9eace7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "exploited", "source": "https://t.me/SecLabNews/9161", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Google Project Zero \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0438 PoC-\u043a\u043e\u0434 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 \u041e\u0421 Windows, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e CVE-2020-15999 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Google Chrome ( \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 86.0.4240.111).\n\n\u041a\u0430\u043a \u043f\u043e\u044f\u0441\u043d\u0438\u043b\u0438 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b, CVE-2020-15999 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u0430 \u0445\u0430\u043a\u0435\u0440\u0430\u043c \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435, \u0432 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a 0Day-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Windows ( CVE-2020-17087 ) \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0434\u043b\u044f \u0432\u044b\u0445\u043e\u0434\u0430 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b Chrome \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043a\u043e\u0434\u0430 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0432\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0418\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043b\u0438\u0448\u044c, \u0447\u0442\u043e \u043e\u043d\u0438 \u043d\u0435 \u043a\u0430\u0441\u0430\u044e\u0442\u0441\u044f \u043f\u0440\u0435\u0434\u0441\u0442\u043e\u044f\u0449\u0438\u0445 \u0432\u044b\u0431\u043e\u0440\u043e\u0432 \u0432 \u0421\u0428\u0410.\n\nGoogle \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 CVE-2020-17087 \u043a\u0430\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u044f\u0434\u0440\u0435 Windows. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 \u00ab\u0441\u0435\u043c\u0435\u0440\u043a\u0438\u00bb \u0438 \u0437\u0430\u043a\u0430\u043d\u0447\u0438\u0432\u0430\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u0438\u043c \u0440\u0435\u043b\u0438\u0437\u043e\u043c Windows 10.\n\nhttps://www.securitylab.ru/news/513641.php", "creation_timestamp": "2020-11-01T16:26:01.000000Z"}, {"uuid": "bcf6f5c5-0615-44c8-b7cf-a03ae04af7c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://t.me/SHATOOB/2913", "content": "\ud83c\udd94 @SHATOOB\n\n#Windows_Zero_Day\n#CVE-2020-17087\n\n\ud83d\udd3a \u06af\u0648\u06af\u0644 \u062c\u0632\u0626\u06cc\u0627\u062a \u06cc\u06a9 \u0646\u0642\u0635 \u062c\u062f\u06cc\u062f \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u062a\u06cc\u0627\u0632 \u0631\u0648\u0632 \u0635\u0641\u0631 \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0631\u0627 \u0641\u0627\u0634 \u06a9\u0631\u062f .\n\n\ud83c\udf10 https://thehackernews.com/2020/11/warning-google-discloses-windows-zero.html\n\n\u269c\ufe0f\u269c\ufe0f  \u0634\u0627\u062a\u0648\u0628 \u062f\u0631\u06cc\u0686\u0647 \u0627\u06cc \u0628\u0647 \u062f\u0646\u06cc\u0627\u06cc \u0631\u0627\u06cc\u0627\u0646\u0647 \u269c\ufe0f\u269c\ufe0f\n\n\ud83c\udd94 @SHATOOB", "creation_timestamp": "2020-11-05T03:52:26.000000Z"}, {"uuid": "e2ae0160-f64b-4322-83ec-cf7022451335", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2010", "content": "#exploit\nCVE-2020-17087:\nWindows 7 - Win10 1903 Kernel Cryptography Driver (cng.sys) pool-based buffer overflow in IOCTL\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2104\n+ CVE-2020-15999 = 0-day.", "creation_timestamp": "2022-08-02T15:40:43.000000Z"}, {"uuid": "bbffcb37-4c6a-495d-8b34-20c5a377fc3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2943", "content": "In-the-Wild Series: October 2020 0-day discovery for Android, Windows, iOS devices\nhttps://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html\nPoCs:\nCVE-2020-15999\u00a0- Chrome Freetype heap buffer overflow\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2103\nCVE-2020-17087\u00a0- Windows heap buffer overflow in cng.sys\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2104\nCVE-2020-16009\u00a0- Chrome type confusion in V8\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2106\nCVE-2020-16010/16011\u00a0- Chrome heap buffer overflow\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2112\nCVE-2020-27930\u00a0- Safari arbitrary stack read/write\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2105\nCVE-2020-27950\u00a0- iOS XNU kernel memory disclosure\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2108\nCVE-2020-27932\u00a0- iOS kernel type confusion\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2107", "creation_timestamp": "2022-06-03T18:52:35.000000Z"}, {"uuid": "9077d6ff-0f01-4966-a2b0-c0ef03db9d12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17083", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2093", "content": "#exploit\nCVE-2020-17083:\nMS Exchange Server ExportExchangeCertificate WriteCertiricate File Write RCE Vulnerability\nhttps://srcincite.io/advisories/src-2020-0025\n]-&gt; PoC:\nhttps://srcincite.io/pocs/cve-2020-17083.ps1.txt", "creation_timestamp": "2022-05-27T12:53:15.000000Z"}, {"uuid": "9268d9d7-e7c7-4d0c-962e-bf585bd75e14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2358", "content": "#Analytics\nTop-10 exploited vulnerabilities in July-December 2020:\n1. CVE-2020-0601 - CurveBall CryptoAPI\nhttps://t.me/cybersecuritytechnologies/628\n2. CVE-2019-17026/CVE-2020-0674 - 0-Day Vulnerability in Mozilla Firefox\nhttps://t.me/cybersecuritytechnologies/914\n3. CVE-2020-0796 - Windows SMBv3 LPE exploit\nhttps://t.me/cybersecuritytechnologies/874\n4. CVE-2020-1472 - Microsoft Zerologon\nhttps://t.me/cybersecuritytechnologies/1742\n5. CVE-2020-5902/5903 - F5 BigIP TMUI Critical RCE\nhttps://t.me/cybersecuritytechnologies/1378\n6. CVE-2018-10561 - Dasan GPON Router Auth. Bypass\nhttps://t.me/cybersecuritytechnologies/51\n7. CVE-2020-1350 - Exploit SIGRed\nhttps://t.me/cybersecuritytechnologies/1422\n8. CVE-2020-15999 + CVE-2020-17087 = Win Kernel cng.sys buffer overflow 0-Day\nhttps://t.me/cybersecuritytechnologies/1960\nhttps://t.me/cybersecuritytechnologies/2010\n9. CVE-2020-16898 - \"Bad Neighbor\" RCE Vulnerability\nhttps://t.me/cybersecuritytechnologies/1912\n10. CVE-2020-1938 - \"Ghostcat\" Apache Tomcat\nhttps://t.me/cybersecuritytechnologies/705", "creation_timestamp": "2025-01-04T20:00:34.000000Z"}, {"uuid": "ec0bc248-daca-4ecb-b422-d0598e2c1efc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17085", "type": "seen", "source": "https://t.me/cibsecurity/16160", "content": "\u203c CVE-2020-17085 \u203c\n\n, aka 'Microsoft Exchange Server Denial of Service Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-11T12:35:15.000000Z"}, {"uuid": "534b6b5c-f2a0-4215-870f-84ad9cdc42d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3985", "content": "#Offensive_security\nTechniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow\nhttps://github.com/vp777/Windows-Non-Paged-Pool-Overflow-Exploitation", "creation_timestamp": "2021-08-03T12:03:38.000000Z"}, {"uuid": "1d007bc6-1b1e-4da0-b396-14e9b5b933a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17087", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/4580", "content": "#Offensive_security\nCVE-2020-17087:\nExploiting the CNG.sys IOCTL 0x3904 Pool Overflow Vulnerability (PoC)\nhttps://www.pixiepointsecurity.com/blog/nday-cve-2020-17087.html", "creation_timestamp": "2021-10-23T14:51:19.000000Z"}]}