{"vulnerability": "CVE-2020-1061", "sightings": [{"uuid": "443e5c0c-4423-4f9a-9294-40b36813ebe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10613", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/964", "content": "#SCADA_Security\nCVE-2020-10611, CVE-2020-10613, CVE-2020-10615:\nTriangle MicroWorks SCADA Data Gateway (3.02.0697 - 4.0.122, 2.41.0213 - 4.0.122)\n- Access of resource using incompatible type (type confusion)\n- Out-of-bounds read\n- Stack-based buffer overflow\nhttps://www.us-cert.gov/ics/advisories/icsa-20-105-03", "creation_timestamp": "2020-12-23T17:34:41.000000Z"}, {"uuid": "1daaf5b1-1904-4e8d-a192-6bc34ff50783", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10615", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/964", "content": "#SCADA_Security\nCVE-2020-10611, CVE-2020-10613, CVE-2020-10615:\nTriangle MicroWorks SCADA Data Gateway (3.02.0697 - 4.0.122, 2.41.0213 - 4.0.122)\n- Access of resource using incompatible type (type confusion)\n- Out-of-bounds read\n- Stack-based buffer overflow\nhttps://www.us-cert.gov/ics/advisories/icsa-20-105-03", "creation_timestamp": "2020-12-23T17:34:41.000000Z"}, {"uuid": "908006b8-fde5-4309-b2a5-cfabd6c1e5c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10611", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/964", "content": "#SCADA_Security\nCVE-2020-10611, CVE-2020-10613, CVE-2020-10615:\nTriangle MicroWorks SCADA Data Gateway (3.02.0697 - 4.0.122, 2.41.0213 - 4.0.122)\n- Access of resource using incompatible type (type confusion)\n- Out-of-bounds read\n- Stack-based buffer overflow\nhttps://www.us-cert.gov/ics/advisories/icsa-20-105-03", "creation_timestamp": "2020-12-23T17:34:41.000000Z"}, {"uuid": "1bb8e979-6d65-48d7-8982-248be384a305", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10614", "type": "seen", "source": "https://t.me/cibsecurity/13666", "content": "ATENTION\u203c New - CVE-2020-10614\n\nIn OSIsoft PI System multiple products and versions, an authenticated remote attacker with write access to PI Vision databases could inject code into a display. Unauthorized information disclosure, deletion, or modification is possible if a victim views the infected display.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-25T07:55:11.000000Z"}, {"uuid": "0620af06-aced-4f6f-9127-54f175eed4e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-10610", "type": "seen", "source": "https://t.me/cibsecurity/13661", "content": "ATENTION\u203c New - CVE-2020-10610\n\nIn OSIsoft PI System multiple products and versions, a local attacker can modify a search path and plant a binary to exploit the affected PI System software to take control of the local computer at Windows system privilege level, resulting in unauthorized information disclosure, deletion, or modification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-25T02:55:11.000000Z"}]}