{"vulnerability": "CVE-2020-5723", "sightings": [{"uuid": "4ef2cdfe-be50-47c9-8a28-d08ea59a5d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5723", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/881", "content": "#exploit\n1. CVE-2020-8835:\nLinux/Ubuntu Linux kernel 5.3/5.4/5.5 bpf incorrect verifier vulnerability\nhttps://seclists.org/oss-sec/2020/q1/127\n]-&gt; Mitigation: https://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-8835.html\n\n2. CVE-2020-5723, CVE-2020-5724, CVE-2020-5725, CVE-2020-5726:\nIP-PBX Grandstream UCM62xx - Multiple SQLI\nhttps://www.tenable.com/security/research/tra-2020-17\n]-&gt; PoC 1  PoC 2  PoC 3", "creation_timestamp": "2024-10-18T16:52:06.000000Z"}, {"uuid": "0ea48002-a976-43e6-a44a-11c36785678e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5723", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "9b5dfdd7-f10d-4a06-8863-7b9b4b97264d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5723", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:29.000000Z"}, {"uuid": "6247b9a0-9189-4174-acb2-2727bfc9adb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-5723", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/grandstream_ucm62xx_sql_account_guess.rb", "content": "", "creation_timestamp": "2022-02-15T17:41:31.000000Z"}]}