{"vulnerability": "CVE-2020-25669", "sightings": [{"uuid": "75f32b2a-bf00-49c2-b87f-1c2947a450b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25669", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/1758", "content": "#Threat_Research\n1. Exploitable memory corruption using CVE-2020-25669 and Linux Kernel\nhttps://www.synopsys.com/blogs/software-security/cyrc-case-study-linux-kernel-vulnerability\n2. Zeek-Formatted Threat Intelligence Feeds\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds", "creation_timestamp": "2022-12-13T04:12:39.000000Z"}, {"uuid": "5fe60ab9-e862-45db-8c42-26dff9d4de4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-25669", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7352", "content": "#Threat_Research\n1. Exploitable memory corruption using CVE-2020-25669 and Linux Kernel\nhttps://www.synopsys.com/blogs/software-security/cyrc-case-study-linux-kernel-vulnerability\n2. Zeek-Formatted Threat Intelligence Feeds\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds", "creation_timestamp": "2022-12-13T11:01:01.000000Z"}]}