{"vulnerability": "cve-2020-25220", "sightings": [{"uuid": "3424a944-bf58-401b-823e-71683b8e034b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25220", "type": "seen", "source": "Telegram/pQDhEBFXbzUdJ4Hpa-mW2mVsl35TF1401FFgebTH-MQoVFc", "content": "", "creation_timestamp": "2020-09-11T18:26:57.000000Z"}, {"uuid": "beeda79d-8067-40b0-8d28-17037de5af00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-25220", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1738", "content": "#Threat_Research\n1. The short story of 1 Linux Kernel Use-After-Free bug\nand 2 CVEs (CVE-2020-14356, CVE-2020-25220)\nhttp://blog.pi3.com.pl/?p=720\n2. Windows TCPIP Finger Command / C2 Channel and Bypassing Security Software\nhttps://seclists.org/fulldisclosure/2020/Sep/30", "creation_timestamp": "2021-01-02T23:08:28.000000Z"}]}