{"vulnerability": "CVE-2020-1601", "sightings": [{"uuid": "3410c6e4-1248-4148-bca1-dac24ff2c9a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "7f1f6b50-c4bf-441c-b12a-35c73b197dd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "65cf540b-2dc3-4de9-a1c4-e45a3d0b0b5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "237381f3-e9a6-4476-816d-52f441ad5198", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "0843f1df-d63e-43c7-b4ac-fd3ea63bd219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "c511335c-768e-415e-9885-80e190f07aed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "16341407-c59f-424c-a1fe-e2afa861318e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "MISP/2b2b4c88-48fd-40de-b94f-8429ff87eed3", "content": "", "creation_timestamp": "2024-11-14T06:07:11.000000Z"}, {"uuid": "ff0803b4-5cc8-4479-a8cb-b214d7b76160", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971075", "content": "", "creation_timestamp": "2024-12-24T20:23:53.787817Z"}, {"uuid": "53d5ad94-33f5-4c6c-b922-e403a0988cfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971079", "content": "", "creation_timestamp": "2024-12-24T20:23:56.884324Z"}, {"uuid": "22f02c15-2234-481d-acd6-b525e1b81c22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971081", "content": "", "creation_timestamp": "2024-12-24T20:23:58.513987Z"}, {"uuid": "9b543d8f-86ce-4a66-a185-cded57e664f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971082", "content": "", "creation_timestamp": "2024-12-24T20:23:59.270578Z"}, {"uuid": "1ce9ecb3-c451-43e6-ae9f-9445c584ef55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:46.000000Z"}, {"uuid": "0da55bdf-1ade-4d4e-be14-9f344bf8f592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:46.000000Z"}, {"uuid": "53bba5d4-b9be-4a73-96e0-60b05e5ee1a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:47.000000Z"}, {"uuid": "a8d30efb-690d-48b0-8b57-13aa8a1f8ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16012", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lroeg4774d22", "content": "", "creation_timestamp": "2025-06-15T21:02:19.553076Z"}, {"uuid": "14e62e1b-d7b5-4735-a38a-e67332c8b702", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/google-julkaisi-korjaavia-paivityksia-chrome-selainten-kriittisiin-haavoittuvuuksiin", "content": "", "creation_timestamp": "2020-11-04T13:01:05.000000Z"}, {"uuid": "e95577c6-0231-48ab-b6cf-88d28aa8df7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-16013", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/4695e378-f07f-46e4-9b23-9ac8f98f88a2", "content": "", "creation_timestamp": "2026-02-02T12:28:44.977793Z"}, {"uuid": "3d2ebfe2-1962-4929-a004-665466c8283e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-16017", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9d4cbc3b-2b12-4834-bdf1-acec6b108472", "content": "", "creation_timestamp": "2026-02-02T12:28:44.569605Z"}, {"uuid": "d2add490-eb0b-4662-aaad-9e387a888d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-16010", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/b5db12cd-d642-4411-8fa1-e58c3a0cc189", "content": "", "creation_timestamp": "2026-02-02T12:28:44.273764Z"}, {"uuid": "f547ae1c-48b8-4276-8290-4e15b18eb079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "exploited", "source": "https://t.me/cKure/2775", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 #Zeroday: Two New Chrome #0days Under Active Attacks \u2013 Update Your Browser.\n\nTracked as CVE-2020-16013\n and CVE-2020-16017, the flaws were discovered and reported to Google by \"anonymous\" sources.\n\nhttps://thehackernews.com/2020/11/two-new-chrome-0-days-under-active.html", "creation_timestamp": "2020-11-12T05:47:55.000000Z"}, {"uuid": "65599e1b-176a-40c9-93e0-ed6a97c52e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "exploited", "source": "https://t.me/cKure/2775", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 #Zeroday: Two New Chrome #0days Under Active Attacks \u2013 Update Your Browser.\n\nTracked as CVE-2020-16013\n and CVE-2020-16017, the flaws were discovered and reported to Google by \"anonymous\" sources.\n\nhttps://thehackernews.com/2020/11/two-new-chrome-0-days-under-active.html", "creation_timestamp": "2020-11-12T05:47:55.000000Z"}, {"uuid": "f8ff3168-be24-40e1-ab04-59e58ada3322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "seen", "source": "https://t.me/cyberbannews_ir/2058", "content": "\ud83d\uded1\u0631\u0641\u0639 \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631 \u062f\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 \u06a9\u0631\u0648\u0645\n\n\u0634\u0631\u06a9\u062a \u06af\u0648\u06af\u0644 \u0628\u0647\u200c\u062a\u0627\u0632\u06af\u06cc \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0631\u0648\u0631\u06af\u0631 \u06a9\u0631\u0648\u0645 \u0631\u0627 \u06a9\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u06cc\u200c\u06a9\u0631\u062f\u0646\u062f\u060c \u0628\u0631\u0637\u0631\u0641 \u06a9\u0631\u062f. \n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u06a9\u0647 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc \u00abCVE-2020-16013\u00bb \u0648 \u00abCVE-2020-16017\u00bb \u0634\u0646\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f\u060c \u0686\u0647\u0627\u0631\u0645\u06cc\u0646 \u0648 \u067e\u0646\u062c\u0645\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0632\u06cc\u0631\u0648\u062f\u06cc \u0647\u0633\u062a\u0646\u062f \u06a9\u0647 \u0637\u06cc \u0686\u0646\u062f \u0647\u0641\u062a\u0647 \u06af\u0630\u0634\u062a\u0647 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u200c\u0634\u062f\u0647\u200c\u0627\u0646\u062f. \n\n\u0646\u0642\u0635\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0630\u06a9\u0648\u0631 \u06a9\u0647 \u062f\u0631 \u0646\u0633\u062e\u0647 86.0.4240.198 \u06a9\u0631\u0648\u0645 \u0628\u0631\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632\u060c \u0645\u06a9 \u0648 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0631\u0637\u0631\u0641 \u0634\u062f\u0647\u200c\u0627\u0646\u062f\u060c \u0628\u0631\u062e\u0644\u0627\u0641 \u0633\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u067e\u06cc\u0634\u06cc\u0646 \u062a\u0648\u0633\u0637 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 Google Project Zero \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0634\u062f\u0647\u200c\u0627\u0646\u062f \u0648 \u0645\u062d\u0642\u0642\u0627\u0646 \u0646\u0627\u0634\u0646\u0627\u0633 \u0622\u0646\u200c\u0647\u0627 \u0631\u0627 \u062a\u0634\u062e\u06cc\u0635 \u0648 \u06af\u0632\u0627\u0631\u0634 \u062f\u0627\u062f\u0647\u200c\u0627\u0646\u062f. \n\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u00abCVE-2020-16013\u00bb \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0645\u0648\u062a\u0648\u0631 V8 \u062c\u0647\u062a \u0631\u0646\u062f\u0631 \u06a9\u0631\u062f\u0646 \u062c\u0627\u0648\u0627 \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 9 \u0646\u0648\u0627\u0645\u0628\u0631 2020 \u062f\u0631 \u0645\u0648\u0631\u062f \u0622\u0646 \u0628\u0647 \u06af\u0648\u06af\u0644 \u06af\u0632\u0627\u0631\u0634\u200c\u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0646\u0642\u0635 \u0627\u0645\u0646\u06cc\u062a\u06cc \u00abCVE-2020-16009\u00bb \u0646\u06cc\u0632 \u06a9\u0647 \u0627\u062e\u06cc\u0631\u0627\u064b \u0648\u0635\u0644\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0645\u0648\u062a\u0648\u0631 V8 \u0628\u0648\u062f\u0647 \u0648 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u06a9\u062f \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f. \n\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u00abCVE-2020-16017\u00bb \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u062e\u062a\u0644\u0627\u0644 \u062f\u0631 \u062d\u0627\u0641\u0638\u0647 \u0648 \u0627\u0632 \u0646\u0648\u0639 UAF \u0627\u0633\u062a \u06a9\u0647 7 \u0646\u0648\u0627\u0645\u0628\u0631 \u062f\u0631 \u0645\u0648\u0631\u062f \u0622\u0646 \u0628\u0647 \u0634\u0631\u06a9\u062a \u0627\u0637\u0644\u0627\u0639\u200c\u0631\u0633\u0627\u0646\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n#\u06af\u0648\u06af\u0644\n\n@cyberbannews_ir", "creation_timestamp": "2020-11-16T11:06:45.000000Z"}, {"uuid": "46cff94f-a6ad-46d5-ae86-b2f72d6a39c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "https://t.me/cyberbannews_ir/2058", "content": "\ud83d\uded1\u0631\u0641\u0639 \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631 \u062f\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 \u06a9\u0631\u0648\u0645\n\n\u0634\u0631\u06a9\u062a \u06af\u0648\u06af\u0644 \u0628\u0647\u200c\u062a\u0627\u0632\u06af\u06cc \u062f\u0648 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0631\u0648\u0631\u06af\u0631 \u06a9\u0631\u0648\u0645 \u0631\u0627 \u06a9\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u0632 \u0622\u0646\u200c\u0647\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u06cc\u200c\u06a9\u0631\u062f\u0646\u062f\u060c \u0628\u0631\u0637\u0631\u0641 \u06a9\u0631\u062f. \n\n\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u06a9\u0647 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647\u200c\u0647\u0627\u06cc \u00abCVE-2020-16013\u00bb \u0648 \u00abCVE-2020-16017\u00bb \u0634\u0646\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u0646\u062f\u060c \u0686\u0647\u0627\u0631\u0645\u06cc\u0646 \u0648 \u067e\u0646\u062c\u0645\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u0632\u06cc\u0631\u0648\u062f\u06cc \u0647\u0633\u062a\u0646\u062f \u06a9\u0647 \u0637\u06cc \u0686\u0646\u062f \u0647\u0641\u062a\u0647 \u06af\u0630\u0634\u062a\u0647 \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc\u200c\u0634\u062f\u0647\u200c\u0627\u0646\u062f. \n\n\u0646\u0642\u0635\u200c\u0647\u0627\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0630\u06a9\u0648\u0631 \u06a9\u0647 \u062f\u0631 \u0646\u0633\u062e\u0647 86.0.4240.198 \u06a9\u0631\u0648\u0645 \u0628\u0631\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632\u060c \u0645\u06a9 \u0648 \u0644\u06cc\u0646\u0648\u06a9\u0633 \u0628\u0631\u0637\u0631\u0641 \u0634\u062f\u0647\u200c\u0627\u0646\u062f\u060c \u0628\u0631\u062e\u0644\u0627\u0641 \u0633\u0647 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u067e\u06cc\u0634\u06cc\u0646 \u062a\u0648\u0633\u0637 \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 Google Project Zero \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0646\u0634\u062f\u0647\u200c\u0627\u0646\u062f \u0648 \u0645\u062d\u0642\u0642\u0627\u0646 \u0646\u0627\u0634\u0646\u0627\u0633 \u0622\u0646\u200c\u0647\u0627 \u0631\u0627 \u062a\u0634\u062e\u06cc\u0635 \u0648 \u06af\u0632\u0627\u0631\u0634 \u062f\u0627\u062f\u0647\u200c\u0627\u0646\u062f. \n\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u00abCVE-2020-16013\u00bb \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0645\u0648\u062a\u0648\u0631 V8 \u062c\u0647\u062a \u0631\u0646\u062f\u0631 \u06a9\u0631\u062f\u0646 \u062c\u0627\u0648\u0627 \u0627\u0633\u06a9\u0631\u06cc\u067e\u062a \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 9 \u0646\u0648\u0627\u0645\u0628\u0631 2020 \u062f\u0631 \u0645\u0648\u0631\u062f \u0622\u0646 \u0628\u0647 \u06af\u0648\u06af\u0644 \u06af\u0632\u0627\u0631\u0634\u200c\u0634\u062f\u0647 \u0627\u0633\u062a.\n\n\u0646\u0642\u0635 \u0627\u0645\u0646\u06cc\u062a\u06cc \u00abCVE-2020-16009\u00bb \u0646\u06cc\u0632 \u06a9\u0647 \u0627\u062e\u06cc\u0631\u0627\u064b \u0648\u0635\u0644\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u0646\u0627\u062f\u0631\u0633\u062a \u0645\u0648\u062a\u0648\u0631 V8 \u0628\u0648\u062f\u0647 \u0648 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u06a9\u062f \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f. \n\n\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 \u00abCVE-2020-16017\u00bb \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u062e\u062a\u0644\u0627\u0644 \u062f\u0631 \u062d\u0627\u0641\u0638\u0647 \u0648 \u0627\u0632 \u0646\u0648\u0639 UAF \u0627\u0633\u062a \u06a9\u0647 7 \u0646\u0648\u0627\u0645\u0628\u0631 \u062f\u0631 \u0645\u0648\u0631\u062f \u0622\u0646 \u0628\u0647 \u0634\u0631\u06a9\u062a \u0627\u0637\u0644\u0627\u0639\u200c\u0631\u0633\u0627\u0646\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a.\n\n#\u06af\u0648\u06af\u0644\n\n@cyberbannews_ir", "creation_timestamp": "2020-11-16T11:06:45.000000Z"}, {"uuid": "e9afb20a-d586-480e-97e6-e0e8e51de197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "exploited", "source": "https://t.me/CyberGovIL/926", "content": "[\u05e2\u05d3\u05db\u05d5\u05df] \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea ZeroDay \u05d1\u05d3\u05e4\u05d3\u05e4\u05df \u05db\u05e8\u05d5\u05dd \u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05d1\u05e2\u05d5\u05dc\u05dd | Com1523\n\n\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05e4\u05e8\u05e1\u05de\u05d4 \u05d2\u05d5\u05d2\u05dc \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05d3\u05e4\u05d3\u05e4\u05df \u05db\u05e8\u05d5\u05dd \u05e2\u05d1\u05d5\u05e8 \u05de\u05e1\u05e4\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05e1\u05d9\u05db\u05d5\u05df \u05d2\u05d1\u05d5\u05d4.\n\n\u05d0\u05d7\u05ea \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d9\u05d0 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea ZeroDay (\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e9\u05dc\u05d0 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05d9\u05d3\u05d5\u05e2\u05d4 \u05dc\u05d9\u05e6\u05e8\u05df) \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n[\u05e2\u05d3\u05db\u05d5\u05df] \u05e4\u05d5\u05e8\u05e1\u05dd \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea ZeroDay \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea (CVE-2020-15999\u05d5-CVE-2020-16009).\n\n[\u05e2\u05d3\u05db\u05d5\u05df] \u05d2\u05d5\u05d2\u05dc \u05e4\u05e8\u05e1\u05de\u05d4 \u05e9\u05ea\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea zero-day \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea (CVE-2020-16013 \u05d5-CVE-2020-16017).\n\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d1\u05d7\u05d5\u05df \u05d5\u05dc\u05e2\u05d3\u05db\u05df \u05d4\u05d3\u05e4\u05d3\u05e4\u05df \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9.", "creation_timestamp": "2020-11-12T11:41:01.000000Z"}, {"uuid": "44f1c9b9-8e84-46f0-9aca-6671dc51d2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "exploited", "source": "https://t.me/CyberGovIL/926", "content": "[\u05e2\u05d3\u05db\u05d5\u05df] \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea ZeroDay \u05d1\u05d3\u05e4\u05d3\u05e4\u05df \u05db\u05e8\u05d5\u05dd \u05de\u05e0\u05d5\u05e6\u05dc\u05d5\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05d1\u05e2\u05d5\u05dc\u05dd | Com1523\n\n\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05e4\u05e8\u05e1\u05de\u05d4 \u05d2\u05d5\u05d2\u05dc \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05d3\u05e4\u05d3\u05e4\u05df \u05db\u05e8\u05d5\u05dd \u05e2\u05d1\u05d5\u05e8 \u05de\u05e1\u05e4\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05e1\u05d9\u05db\u05d5\u05df \u05d2\u05d1\u05d5\u05d4.\n\n\u05d0\u05d7\u05ea \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d9\u05d0 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea ZeroDay (\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e9\u05dc\u05d0 \u05d4\u05d9\u05d9\u05ea\u05d4 \u05d9\u05d3\u05d5\u05e2\u05d4 \u05dc\u05d9\u05e6\u05e8\u05df) \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n[\u05e2\u05d3\u05db\u05d5\u05df] \u05e4\u05d5\u05e8\u05e1\u05dd \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea ZeroDay \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea (CVE-2020-15999\u05d5-CVE-2020-16009).\n\n[\u05e2\u05d3\u05db\u05d5\u05df] \u05d2\u05d5\u05d2\u05dc \u05e4\u05e8\u05e1\u05de\u05d4 \u05e9\u05ea\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea zero-day \u05e0\u05d5\u05e1\u05e4\u05d5\u05ea (CVE-2020-16013 \u05d5-CVE-2020-16017).\n\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d1\u05d7\u05d5\u05df \u05d5\u05dc\u05e2\u05d3\u05db\u05df \u05d4\u05d3\u05e4\u05d3\u05e4\u05df \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9.", "creation_timestamp": "2020-11-12T11:41:01.000000Z"}, {"uuid": "6a25d692-04f9-485a-ade8-b5786042c2ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "https://t.me/thesammymove/2824", "content": "Be prepared to update your chrome browsers once again\ud83d\udea8\n\nChannel:@thesammymove\n#thesammymovenews \n\n\n\ud83d\udc68\u200d\ud83d\udcbbIs Chrome further safe to use? \n-This is the third report on safety vulnerability by @thesammymove.\nFirst: t.me/thesammymove/1077\nSecond: t.me/thesammymove/946\n \n\ud83d\udea8This disclosure brings to five the total number of actively exploited flaws found in Chrome within the last three weeks.\n\n\ud83d\udea8Google is asking Chrome desktop users to prepare to update their browsers once again as two more zero-day vulnerabilities have been identified in the software.\n\n1. CVE-2020-16017 is described by Google as a \u201cuse-after-free in site isolation,\u201d which is the Chrome component that isolates the data of different sites from each other.\n-To exploit it, a remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system,\u00a0according to researchers\u00a0at Czech firm Cybersecurity Help.\n\n2. CVE-2020-16013 meanwhile is an \u201cimproperly implemented security check for standard\u201d bug, which is a type of flaw where\u00a0 the software does not implement or incorrectly implements one or more security-relevant checks. \n-In this particular case, Google described the bug as an \u201cinappropriate implementation in V8,\u201d which is an open-source component of Chrome that handles JavaScript and WebAssembly.\n-To exploit it, a remote attacker can also create a specially crafted web page, trick the victim into visiting it and then be able to compromise the system, Cybersecurity Help noted.\n\n3. Another zero-day that Google\u00a0patched earlier\u00a0this month, CVE-2020-16009, also was due to an inappropriate implementation of V8, but it\u2019s unknown whether the two flaws are related.\n\n-Google typically refrains from providing specific details about vulnerabilities until well after they are patched.\n\nRead also,\n\u2705HOW TO GET FREE N1,000 WITHDRAWABLE TO YOUR BANK\nCLICK \ud83d\udc49HERE\ud83d\udc48", "creation_timestamp": "2020-11-13T13:41:34.000000Z"}, {"uuid": "71ffb62c-cc74-4ec6-8c3e-7d0ed10b102f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "seen", "source": "https://t.me/thesammymove/2824", "content": "Be prepared to update your chrome browsers once again\ud83d\udea8\n\nChannel:@thesammymove\n#thesammymovenews \n\n\n\ud83d\udc68\u200d\ud83d\udcbbIs Chrome further safe to use? \n-This is the third report on safety vulnerability by @thesammymove.\nFirst: t.me/thesammymove/1077\nSecond: t.me/thesammymove/946\n \n\ud83d\udea8This disclosure brings to five the total number of actively exploited flaws found in Chrome within the last three weeks.\n\n\ud83d\udea8Google is asking Chrome desktop users to prepare to update their browsers once again as two more zero-day vulnerabilities have been identified in the software.\n\n1. CVE-2020-16017 is described by Google as a \u201cuse-after-free in site isolation,\u201d which is the Chrome component that isolates the data of different sites from each other.\n-To exploit it, a remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system,\u00a0according to researchers\u00a0at Czech firm Cybersecurity Help.\n\n2. CVE-2020-16013 meanwhile is an \u201cimproperly implemented security check for standard\u201d bug, which is a type of flaw where\u00a0 the software does not implement or incorrectly implements one or more security-relevant checks. \n-In this particular case, Google described the bug as an \u201cinappropriate implementation in V8,\u201d which is an open-source component of Chrome that handles JavaScript and WebAssembly.\n-To exploit it, a remote attacker can also create a specially crafted web page, trick the victim into visiting it and then be able to compromise the system, Cybersecurity Help noted.\n\n3. Another zero-day that Google\u00a0patched earlier\u00a0this month, CVE-2020-16009, also was due to an inappropriate implementation of V8, but it\u2019s unknown whether the two flaws are related.\n\n-Google typically refrains from providing specific details about vulnerabilities until well after they are patched.\n\nRead also,\n\u2705HOW TO GET FREE N1,000 WITHDRAWABLE TO YOUR BANK\nCLICK \ud83d\udc49HERE\ud83d\udc48", "creation_timestamp": "2020-11-13T13:41:34.000000Z"}, {"uuid": "e11b40ed-abbb-4375-b4fb-1d4ff1b3a979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "Telegram/jKhDysBxbmp1gCUqIhtDfn0JzN_m9JwCxMT5NddDh2fRfswo", "content": "", "creation_timestamp": "2025-02-06T02:42:28.000000Z"}, {"uuid": "74f70b55-6685-496c-a5bc-a71325304933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "Telegram/MxitiaXCm8uV3UHYoANKCxle6bzpuVHaz9-QnaxfNPEgUHIC", "content": "", "creation_timestamp": "2025-02-06T02:41:38.000000Z"}, {"uuid": "0b6226ea-0ce1-4772-b4e2-fb8eea0b3f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16017", "type": "exploited", "source": "https://t.me/thesammymove/1143", "content": "Be prepared to update your chrome browsers once again\ud83d\udea8\n\nChannel:@thesammymove\n#thesammymovenews \n\n\n\ud83d\udc68\u200d\ud83d\udcbbIs Chrome further safe to use? \n-This is the third report on safety vulnerability by @thesammymove.\nFirst: t.me/thesammymove/1077\nSecond: t.me/thesammymove/946\n \n\ud83d\udea8This disclosure brings to five the total number of actively exploited flaws found in Chrome within the last three weeks.\n\n\ud83d\udea8Google is asking Chrome desktop users to prepare to update their browsers once again as two more zero-day vulnerabilities have been identified in the software.\n\n1. CVE-2020-16017 is described by Google as a \u201cuse-after-free in site isolation,\u201d which is the Chrome component that isolates the data of different sites from each other.\n-To exploit it, a remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system,\u00a0according to researchers\u00a0at Czech firm Cybersecurity Help.\n\n2. CVE-2020-16013 meanwhile is an \u201cimproperly implemented security check for standard\u201d bug, which is a type of flaw where\u00a0 the software does not implement or incorrectly implements one or more security-relevant checks. \n-In this particular case, Google described the bug as an \u201cinappropriate implementation in V8,\u201d which is an open-source component of Chrome that handles JavaScript and WebAssembly.\n-To exploit it, a remote attacker can also create a specially crafted web page, trick the victim into visiting it and then be able to compromise the system, Cybersecurity Help noted.\n\n3. Another zero-day that Google\u00a0patched earlier\u00a0this month, CVE-2020-16009, also was due to an inappropriate implementation of V8, but it\u2019s unknown whether the two flaws are related.\n\n-Google typically refrains from providing specific details about vulnerabilities until well after they are patched.\n\nRead also\ud83d\udea8\n-DEPOSIT N50 TO GET N550 trick\ud83d\udc47\nt.me/thesammymove/1514\n\n-EARN CRYPTO,AIRTIME,DATA AND CASH\ud83d\udc47\nt.me/thesammymove/1692\n\n- FREE N1,000 TRICK \ud83d\udc47\nt.me/thesammymove/999", "creation_timestamp": "2021-04-09T02:45:23.000000Z"}, {"uuid": "161e85fe-654b-4f30-ab6d-60888778e208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "exploited", "source": "https://t.me/thesammymove/1143", "content": "Be prepared to update your chrome browsers once again\ud83d\udea8\n\nChannel:@thesammymove\n#thesammymovenews \n\n\n\ud83d\udc68\u200d\ud83d\udcbbIs Chrome further safe to use? \n-This is the third report on safety vulnerability by @thesammymove.\nFirst: t.me/thesammymove/1077\nSecond: t.me/thesammymove/946\n \n\ud83d\udea8This disclosure brings to five the total number of actively exploited flaws found in Chrome within the last three weeks.\n\n\ud83d\udea8Google is asking Chrome desktop users to prepare to update their browsers once again as two more zero-day vulnerabilities have been identified in the software.\n\n1. CVE-2020-16017 is described by Google as a \u201cuse-after-free in site isolation,\u201d which is the Chrome component that isolates the data of different sites from each other.\n-To exploit it, a remote attacker can create a specially crafted web page, trick the victim into visiting it, trigger use-after-free error and execute arbitrary code on the target system,\u00a0according to researchers\u00a0at Czech firm Cybersecurity Help.\n\n2. CVE-2020-16013 meanwhile is an \u201cimproperly implemented security check for standard\u201d bug, which is a type of flaw where\u00a0 the software does not implement or incorrectly implements one or more security-relevant checks. \n-In this particular case, Google described the bug as an \u201cinappropriate implementation in V8,\u201d which is an open-source component of Chrome that handles JavaScript and WebAssembly.\n-To exploit it, a remote attacker can also create a specially crafted web page, trick the victim into visiting it and then be able to compromise the system, Cybersecurity Help noted.\n\n3. Another zero-day that Google\u00a0patched earlier\u00a0this month, CVE-2020-16009, also was due to an inappropriate implementation of V8, but it\u2019s unknown whether the two flaws are related.\n\n-Google typically refrains from providing specific details about vulnerabilities until well after they are patched.\n\nRead also\ud83d\udea8\n-DEPOSIT N50 TO GET N550 trick\ud83d\udc47\nt.me/thesammymove/1514\n\n-EARN CRYPTO,AIRTIME,DATA AND CASH\ud83d\udc47\nt.me/thesammymove/1692\n\n- FREE N1,000 TRICK \ud83d\udc47\nt.me/thesammymove/999", "creation_timestamp": "2021-04-09T02:45:23.000000Z"}, {"uuid": "4c54eee9-461b-4ace-8d23-6cdb67c6ee30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "exploited", "source": "https://t.me/true_secator/1109", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0434\u0435\u0441\u043a\u0442\u043e\u043f \u0432\u0435\u0440\u0441\u0438\u0438 Chrome, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 10 \u043e\u0448\u0438\u0431\u043e\u043a, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0434\u043d\u0430, CVE-2020-16009, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e.\n\n\u041f\u043e\u043a\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043d\u0435\u0442, \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0447\u0442\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e - \u043e\u0448\u0438\u0431\u043a\u0430 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u043e\u043c \u0434\u043b\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 JavaScript \u0438 \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0435\u0439 \u0433\u0440\u0443\u043f\u043f\u043e\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2020-16009 \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043a\u043e\u0434\u0430 (RCE). Google \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043d\u043e \u043e\u043f\u044f\u0442\u044c \u0436\u0435 \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u0434\u0435\u0442\u0430\u043b\u0435\u0439.\n\n\u0415\u0449\u0435 \u043e\u0434\u043d\u0430 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-16010 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 Google \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 Chrome \u0434\u043b\u044f Android. \u0422\u0430\u043a\u0436\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e \u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a RCE \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 - \u044d\u0442\u043e \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e, \u0442\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Chrome \u0441\u0440\u043e\u0447\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2020-11-03T10:17:17.000000Z"}, {"uuid": "9fd5bc79-1dcf-449a-ae0f-519a6c0fba77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "https://t.me/NeKaspersky/216", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0434\u0435\u0441\u043a\u0442\u043e\u043f \u0432\u0435\u0440\u0441\u0438\u0438 Chrome. \n\n\u0412 \u043d\u0435\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 10 \u043e\u0448\u0438\u0431\u043e\u043a, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0434\u043d\u0430, CVE-2020-16009, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e. \n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u0434\u0432\u0438\u0436\u043a\u0435, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u043e\u043c \u0434\u043b\u044f \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 JavaScript. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CVE-2020-16009 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 (RCE).  \u0415\u0449\u0451 \u043e\u0434\u043d\u0430 zero-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-16010 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 Chrome \u0434\u043b\u044f Android. \n\n#\u041d\u0435\u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u0438\u0439 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0442\u0435, \u0447\u0442\u043e \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u043e \u0432\u0441\u0435\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f\u0445 \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u0412\u044b \u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435\u0441\u044c. \u042d\u0442\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0435 \u043f\u0440\u0430\u0432\u0438\u043b\u043e \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u043d\u0441\u043d\u043e\u0441\u0442\u0438 \u0412\u0430\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.", "creation_timestamp": "2020-11-03T16:42:14.000000Z"}, {"uuid": "8e1b352d-a9f4-48c9-8da9-5d921fac9b57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16013", "type": "seen", "source": "https://t.me/cibsecurity/21848", "content": "\u203c CVE-2020-16013 \u203c\n\nInappropriate implementation in V8 in Google Chrome prior to 86.0.4240.198 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T22:41:57.000000Z"}, {"uuid": "c09c6113-d2d0-4532-bc87-6dd92d55b10f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16012", "type": "seen", "source": "https://t.me/cibsecurity/21864", "content": "\u203c CVE-2020-16012 \u203c\n\nSide-channel information leakage in graphics in Google Chrome prior to 87.0.4280.66 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T22:42:14.000000Z"}, {"uuid": "649c6a4c-038b-4867-9839-236b9d491e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16012", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2491", "content": "#Threat_Research\nLeaking Silhouettes of Cross-Origin Images\nhttps://blog.mozilla.org/attack-and-defense/2021/01/11/leaking-silhouettes-of-cross-origin-images\n]-&gt; PoC for CVE-2020-16012, a timing side channel in drawImage in Firefox/Chrome\nhttps://github.com/aleksejspopovs/cve-2020-16012", "creation_timestamp": "2021-01-14T11:04:01.000000Z"}, {"uuid": "30f4a149-8862-40da-8da9-a4643d879fd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2943", "content": "In-the-Wild Series: October 2020 0-day discovery for Android, Windows, iOS devices\nhttps://googleprojectzero.blogspot.com/2021/03/in-wild-series-october-2020-0-day.html\nPoCs:\nCVE-2020-15999\u00a0- Chrome Freetype heap buffer overflow\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2103\nCVE-2020-17087\u00a0- Windows heap buffer overflow in cng.sys\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2104\nCVE-2020-16009\u00a0- Chrome type confusion in V8\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2106\nCVE-2020-16010/16011\u00a0- Chrome heap buffer overflow\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2112\nCVE-2020-27930\u00a0- Safari arbitrary stack read/write\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2105\nCVE-2020-27950\u00a0- iOS XNU kernel memory disclosure\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2108\nCVE-2020-27932\u00a0- iOS kernel type confusion\nhttps://bugs.chromium.org/p/project-zero/issues/detail?id=2107", "creation_timestamp": "2022-06-03T18:52:35.000000Z"}, {"uuid": "00b7fba4-9029-4e75-8d4d-a4b224e43f98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16011", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2072", "content": "#exploit\nCVE-2020-16011:\nHeap buffer overflow in UI in Google Chrome on Windows &lt; 86.0.4240.183\nhttps://packetstormsecurity.com/files/cve/CVE-2020-16011", "creation_timestamp": "2024-09-28T17:38:38.000000Z"}, {"uuid": "4fc5b885-9201-4210-a8ad-9904ce2c0fe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16010", "type": "seen", "source": "https://t.me/cibsecurity/15799", "content": "\u203c CVE-2020-16010 \u203c\n\nHeap buffer overflow in UI in Google Chrome on Android prior to 86.0.4240.185 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-11-03T07:46:02.000000Z"}]}