{"uuid": "5fe60ab9-e862-45db-8c42-26dff9d4de4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25669", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7352", "content": "#Threat_Research\n1. Exploitable memory corruption using CVE-2020-25669 and Linux Kernel\nhttps://www.synopsys.com/blogs/software-security/cyrc-case-study-linux-kernel-vulnerability\n2. Zeek-Formatted Threat Intelligence Feeds\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds", "creation_timestamp": "2022-12-13T11:01:01.000000Z"}