{"vulnerability": "cve-2017-0101", "sightings": [{"uuid": "b06f9c44-0392-44b6-a6cc-215b45db8173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-0101", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "ef8398a0-3ab3-45cf-bb0e-26d6dd0c7be7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-0101", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971376", "content": "", "creation_timestamp": "2024-12-24T20:28:25.273141Z"}, {"uuid": "20c98bd8-1543-4632-894d-35da0c0b49c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-0101", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:13.000000Z"}, {"uuid": "6aa059f3-2153-481a-8a1a-1c885206cb58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-0101", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:11.000000Z"}, {"uuid": "f390c2c1-54d0-4f95-9235-005293a09e01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-0101", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/94d80b23-8839-4473-8b68-20cf9d837d11", "content": "", "creation_timestamp": "2026-02-02T12:28:09.679357Z"}, {"uuid": "895b8c8e-9d83-4743-941b-7edcc8e17632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-0101", "type": "seen", "source": "Telegram/iMWKwDcLMjLmk_TOlEo6kfv-wHAY2QVWb_-d_lrmkZJTRcn6", "content": "", "creation_timestamp": "2025-02-14T09:47:01.000000Z"}, {"uuid": "c8392f78-1a8e-45c0-ae50-a2b5a1aecb94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-0101", "type": "seen", "source": "https://t.me/arpsyndicate/1441", "content": "#ExploitObserverAlert\n\nCVE-2017-0101\n\nDESCRIPTION: Exploit Observer has 9 entries related to CVE-2017-0101. The kernel-mode drivers in Transaction Manager in Microsoft Windows Vista SP2; Windows Server 2008 SP2 and R2; Windows 7 SP1; Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1; Windows 10 Gold, 1511, and 1607; and Windows Server 2016 allow local users to gain privileges via a crafted application, aka \"Windows Elevation of Privilege Vulnerability.\"\n\nFIRST-EPSS: 0.001480000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-05T09:15:29.000000Z"}]}