{"vulnerability": "CVE-2020-1709", "sightings": [{"uuid": "4e72f615-1fce-45b4-9865-50b7c3b0c95b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "MISP/5f8a3e96-abf6-47c0-89f6-7c4476939e17", "content": "", "creation_timestamp": "2024-11-14T06:07:32.000000Z"}, {"uuid": "176fc3d1-ad62-43be-a5a7-caf75e68bf51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18531", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:25:13.000000Z"}, {"uuid": "25bcba0e-ddd7-4f5d-b328-4647add25856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/1094", "content": "NTFS Remote Code Execution (CVE-2020-17096) Analysis\n\nhttps://blog.zecops.com/vulnerabilities/ntfs-remote-code-execution-cve-2020-17096-analysis/", "creation_timestamp": "2021-01-06T10:31:50.000000Z"}, {"uuid": "2f406748-c187-49d6-81b6-68fc23892fe2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18398", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:33:02.000000Z"}, {"uuid": "fe51b09e-bc90-4d58-af53-5c2c5627444e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18490", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T05:25:11.000000Z"}, {"uuid": "4933d48d-bc61-498a-a151-04ea9e8a639a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18451", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T03:25:17.000000Z"}, {"uuid": "46caeadf-dcd8-42cc-bd85-d723f3dac460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18500", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T05:25:23.000000Z"}, {"uuid": "b0a406c3-3e3b-416c-a21d-4539baee4720", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18498", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T05:25:21.000000Z"}, {"uuid": "cc73eb29-977f-4662-9882-8efcf547d786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18491", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T05:25:13.000000Z"}, {"uuid": "8001ce86-03a0-426b-ac99-a311b2374c2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18450", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T03:25:15.000000Z"}, {"uuid": "5f1c7e27-18d7-4a29-8a33-2fefedf80555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18399", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:33:03.000000Z"}, {"uuid": "3d139f37-d1c9-40f0-b785-3e93a19b30db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18688", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T12:25:09.000000Z"}, {"uuid": "10134246-d485-4fd4-b436-965c04346bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18668", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T12:02:56.000000Z"}, {"uuid": "ca2537dd-9be0-4bb6-9bd3-e4350e001939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18431", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:38:53.000000Z"}, {"uuid": "8a840fb9-0a90-4a26-a21a-c2bbaad96586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18426", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:36:13.000000Z"}, {"uuid": "6aade503-6e5d-45bb-abfe-0ce5492aa6d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18430", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:38:53.000000Z"}, {"uuid": "809156c4-5bd5-4d3f-b271-53517bfaa899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18418", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:36:03.000000Z"}, {"uuid": "093a6f03-b49a-4ffd-b43c-84c3f5447b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18419", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:36:04.000000Z"}, {"uuid": "08d3a560-945a-4c8e-ad44-cf99115efbdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18587", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T08:25:13.000000Z"}, {"uuid": "9fe6746c-39d6-48f4-b61d-470e550929ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18547", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:33:13.000000Z"}, {"uuid": "b3273645-4b75-49ec-abc4-c958c36924e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18609", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T09:25:05.000000Z"}, {"uuid": "51b9f9d1-c2a7-4c66-a9b2-fe0171b3be66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18607", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T09:25:03.000000Z"}, {"uuid": "9f592623-ab9d-43fd-9ca1-cad755e94d54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18569", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:36:17.000000Z"}, {"uuid": "2facb5f1-336f-40cb-91fd-ff2719cfeb3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18567", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:36:15.000000Z"}, {"uuid": "22e633aa-8613-4607-9a36-eb08b90729eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18520", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T06:25:23.000000Z"}, {"uuid": "31b492a4-e95e-4c3e-a77f-61f1cc27e54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18480", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T04:25:29.000000Z"}, {"uuid": "f64f3c18-0783-4d62-a754-38235494db73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18478", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T04:25:27.000000Z"}, {"uuid": "07c3f4bb-8475-4b99-ac05-5b6c79047843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18471", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T04:25:15.000000Z"}, {"uuid": "e724d016-f511-49f7-b622-ded2101f229d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18470", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T04:25:14.000000Z"}, {"uuid": "7537cbba-f5a7-4600-89b9-d346fcea30d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18440", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:39:08.000000Z"}, {"uuid": "17c121a6-8c67-4174-9287-2f4e9449e113", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18438", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:39:06.000000Z"}, {"uuid": "c38963ec-f197-4c8f-82a2-a8e54d9481bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18627", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T10:25:04.000000Z"}, {"uuid": "b04cc474-5c06-4e83-b75e-4f771ba7341a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18530", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:25:12.000000Z"}, {"uuid": "9d818092-43e1-409f-beae-eb126a511952", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18589", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T08:25:16.000000Z"}, {"uuid": "236df63f-1ee3-40eb-b0a2-315da8ac2b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18549", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:33:15.000000Z"}, {"uuid": "68fa8376-6d83-4f27-96b8-08b0dffe5c7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18406", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T02:33:12.000000Z"}, {"uuid": "b578e008-dfac-49e0-925a-c57c9a564bb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18518", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T06:25:21.000000Z"}, {"uuid": "494b3cae-ee75-43e0-8dd1-bc154064cedb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18540", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:25:25.000000Z"}, {"uuid": "ec470f34-c1d0-42a6-b635-095190ac99ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18538", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T07:25:24.000000Z"}, {"uuid": "356bed84-2135-449f-9c7e-0ecd6a1a3173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17097", "type": "seen", "source": "https://t.me/cibsecurity/18510", "content": "\u203c CVE-2020-17097 \u203c\n\n, aka 'Windows Digital Media Receiver Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T06:25:12.000000Z"}, {"uuid": "066a140d-5161-4f59-bff4-30206220b69e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/cibsecurity/18511", "content": "\u203c CVE-2020-17096 \u203c\n\n, aka 'Windows NTFS Remote Code Execution Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T06:25:13.000000Z"}, {"uuid": "0944f392-d04b-4a76-aa52-35d0e9d2f496", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18460", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T03:25:28.000000Z"}, {"uuid": "1af5054f-2e37-4036-af16-51688906e31c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18629", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T10:25:08.000000Z"}, {"uuid": "ac3176f2-0943-41ed-bb7b-2e8a321f3401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17092", "type": "seen", "source": "https://t.me/cibsecurity/18649", "content": "\u203c CVE-2020-17092 \u203c\n\n, aka 'Windows Network Connections Service Elevation of Privilege Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T11:25:18.000000Z"}, {"uuid": "57bc8a08-2132-4147-9ba3-9241fbdaa967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17099", "type": "seen", "source": "https://t.me/cibsecurity/18647", "content": "\u203c CVE-2020-17099 \u203c\n\n, aka 'Windows Lock Screen Security Feature Bypass Vulnerability'.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-10T11:25:15.000000Z"}, {"uuid": "1e9e6e4e-ae29-4e07-b84b-483cf856ffc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "published-proof-of-concept", "source": "https://t.me/information_security_channel/42738", "content": "https://blog.zecops.com/vulnerabilities/ntfs-remote-code-execution-cve-2020-17096-analysis/", "creation_timestamp": "2021-01-11T20:30:13.000000Z"}, {"uuid": "ad47ee6d-b037-43ad-8d97-cc5ca4b1b499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2439", "content": "#exploit\nCVE-2020-17096:\nNTFS Remote Code Execution\nhttps://blog.zecops.com/vulnerabilities/ntfs-remote-code-execution-cve-2020-17096-analysis", "creation_timestamp": "2024-10-09T20:04:58.000000Z"}, {"uuid": "0c0b8b59-52f1-42bf-b63f-feca8042f3a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-17096", "type": "seen", "source": "https://t.me/theninjaway1337/706", "content": "NTFS Remote Code Execution (CVE-2020-17096) Analysis\n\n\nThis is an analysis of the CVE-2020-17096\u00a0vulnerability published by Microsoft on December 12, 2020. The remote code execution vulnerability assessed with Exploitation: \u201cMore Likely\u201d,\u00a0 grabbed our attention among the last Patch Tuesday fixes.\n\nhttps://blog.zecops.com/vulnerabilities/ntfs-remote-code-execution-cve-2020-17096-analysis/\n\n#vuln #rce  #ntfs #cve202017096", "creation_timestamp": "2021-01-06T17:24:34.000000Z"}]}