{"vulnerability": "CVE-2020-2306", "sightings": [{"uuid": "ae4feaad-fc7b-4505-a9f1-7332085827bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23064", "type": "seen", "source": "https://t.me/nusantaraMYID/478", "content": "\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0645\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nMASA DDOS : 0\u20e34\u20e3:0\u20e30\u20e3pm\nTARIKH : 13.MAY.2024\n\nTarget: https://www.funder.co.il/\nIP address : 108.60.201.27\nHost name : 108.60.201.27\nISP : zColo\nDomain: funder.co.il |\nPorts: 53 | 80 | 443 | 9001 | 9999 |\nHTTP status: 200 | 301 |\nProvider: zColo\nOrganization: zColo\nPossible vulnerabilities: cve-2020-11022 | cve-2020-11023 | cve-2020-23064 |\nGreetz:- All Muslim Hackers\ud83c\udf0f\n\n\ud83d\udca5All info in this channel:-\nhttps://t.me/nusantaraMYID\n\n#IamNusantara", "creation_timestamp": "2024-05-13T10:01:56.000000Z"}, {"uuid": "9429d427-36ca-465d-9fb0-ae522efcc5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23064", "type": "seen", "source": "Telegram/KQJ2fokDRUpEEMEdtilLJpNYW94QEwCQWFCqP7BH6XiY", "content": "", "creation_timestamp": "2024-09-12T10:16:41.000000Z"}, {"uuid": "36ed34df-15b3-465f-a088-83204ba9fb61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23064", "type": "seen", "source": "https://t.me/RipperSec/1940", "content": "\u0633\u0652\u0645\u0650 \u0627\u0644\u0644\u064e\u0651\u0647\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0652\u0645\u064e\u0646\u0650 \u0627\u0644\u0631\u064e\u0651\u062d\u0650\u064a\u0645\n\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\u00a0\u00a0\u0627\u0644\u0644\u0647 \u0623\u0643\u0628\u0631\n\u0625\u0646 \u0634\u0627\u0621 \u0627\u0644\u0644\u0647\n\nMASA DDOS : 0\u20e34\u20e3:0\u20e30\u20e3pm\nTARIKH : 13.MAY.2024\n\nTarget: https://www.funder.co.il/\nIP address : 108.60.201.27\nHost name : 108.60.201.27\nISP : zColo\nDomain: funder.co.il |\nPorts: 53 | 80 | 443 | 9001 | 9999 |\nHTTP status: 200 | 301 |\nProvider: zColo\nOrganization: zColo\nPossible vulnerabilities: cve-2020-11022 | cve-2020-11023 | cve-2020-23064 |\nGreetz:- All Muslim Hackers\ud83c\udf0f\n\n\ud83d\udca5All info in this channel:-\nhttps://t.me/nusantaraMYID\n\n#IamNusantara", "creation_timestamp": "2024-05-13T09:59:52.000000Z"}, {"uuid": "05e274e5-d79a-4419-85cf-287128d3f838", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23064", "type": "seen", "source": "Telegram/_8ZL5qt-1oGojxv22dU451_0g677lxSwyLpoT_xQkV3Y42k0", "content": "", "creation_timestamp": "2023-11-25T00:45:50.000000Z"}, {"uuid": "a4c2ab3b-feb0-452d-9a4b-4b2d2f2c649b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23064", "type": "seen", "source": "https://t.me/cibsecurity/65528", "content": "\u203c CVE-2020-23064 \u203c\n\nCross Site Scripting vulnerability in jQuery v.2.2.0 thru v.3.5.0 allows a remote attacker to execute arbitrary code via the  element.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-26T22:11:14.000000Z"}, {"uuid": "a939698d-6310-4254-bd18-c468b61423a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23065", "type": "seen", "source": "https://t.me/cibsecurity/65527", "content": "\u203c CVE-2020-23065 \u203c\n\nCross Site Scripting vulnerabiltiy in eZ Systems AS uZPublish Platform v.5.4 and eZ Publish Legacy v.5.4 allows a remote authenticated attacker to execute arbitrary code via the video-js.swf.swf.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-26T22:11:13.000000Z"}, {"uuid": "8c5f3869-f96f-48d3-9907-8c37c98e95dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23061", "type": "seen", "source": "https://t.me/cibsecurity/31070", "content": "\u203c CVE-2020-23061 \u203c\n\nDropouts Technologies LLP Super Backup v2.0.5 was discovered to contain an issue in the path parameter of the `list` and `download` module which allows attackers to perform a directory traversal via a change to the path variable to request the local list command.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-23T00:39:41.000000Z"}, {"uuid": "f8418d39-2d08-4d85-b8cc-459ca3c7f906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23069", "type": "seen", "source": "https://t.me/cibsecurity/27543", "content": "\u203c CVE-2020-23069 \u203c\n\nPath Traversal vulneraility exists in webTareas 2.0 via the extpath parameter in general_serv.php, which could let a malicious user read arbitrary files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-08-18T20:16:55.000000Z"}, {"uuid": "0b57e181-f7c7-4dcd-b468-fcff36c6f0f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-23060", "type": "seen", "source": "https://t.me/cibsecurity/31061", "content": "\u203c CVE-2020-23060 \u203c\n\nInternet Download Manager 6.37.11.1 was discovered to contain a stack buffer overflow in the Export/Import function. This vulnerability allows attackers to escalate local process privileges via a crafted ef2 file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-10-23T00:39:29.000000Z"}]}