{"vulnerability": "CVE-2020-1604", "sightings": [{"uuid": "bd20ffbe-6767-41b2-8267-4ef3be010c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "MISP/d657465f-27fc-40f3-ae3c-e915ef6c12f6", "content": "", "creation_timestamp": "2024-11-14T06:08:58.000000Z"}, {"uuid": "dfdc45d8-4f11-4120-b5a1-1fbba3032b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16041", "type": "seen", "source": "MISP/6db773e9-6b6b-496c-b537-53121d3925be", "content": "", "creation_timestamp": "2024-11-14T06:08:55.000000Z"}, {"uuid": "1655b491-4a76-44ee-a2ae-15ed24b0ec8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "b0f5f1b7-817c-49ea-ad92-fdb588d801e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:25.000000Z"}, {"uuid": "41d50749-2288-4c9e-8258-ba70d8d9d3f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lq7lsj5xcs2m", "content": "", "creation_timestamp": "2025-05-28T06:39:22.423100Z"}, {"uuid": "ecfaecad-0b47-4a03-91f3-83f86bc5e65a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16045", "type": "seen", "source": "https://t.me/arpsyndicate/2701", "content": "#ExploitObserverAlert\n\nCVE-2020-16045\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2020-16045. Use after Free in Payments in Google Chrome on Android prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\nFIRST-EPSS: 0.001610000\nNVD-IS: 6.0\nNVD-ES: 2.8", "creation_timestamp": "2024-01-09T01:54:27.000000Z"}, {"uuid": "927e23fa-d13b-43af-89f6-3666bffcd9bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/chrome_simplifiedlowering_overflow.rb", "content": "", "creation_timestamp": "2021-04-08T21:25:19.000000Z"}, {"uuid": "5a6eb558-f867-4dfb-a81b-87c477932ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdj6ccer5w24", "content": "", "creation_timestamp": "2026-01-28T21:02:59.121337Z"}, {"uuid": "8a4c9e65-94be-4c1f-b196-cbd00a72b13e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2020-16040", "type": "seen", "source": "https://gist.github.com/cyberriman/6c2fa14e75180fb2521c4bf93afa8bd2", "content": "", "creation_timestamp": "2025-11-01T12:11:02.000000Z"}, {"uuid": "27384c62-d6ad-4c6b-98b0-5f285a099e84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16042", "type": "seen", "source": "https://t.me/cibsecurity/21860", "content": "\u203c CVE-2020-16042 \u203c\n\nUninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T22:42:10.000000Z"}, {"uuid": "58add1af-a830-491e-8d4a-2de4a806d877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://t.me/arpsyndicate/1851", "content": "#ExploitObserverAlert\n\nCVE-2020-16040\n\nDESCRIPTION: Exploit Observer has 34 entries related to CVE-2020-16040. Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\nFIRST-EPSS: 0.261320000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2023-12-17T22:04:54.000000Z"}, {"uuid": "be3f619d-e7fa-439b-b9e0-c1cbf6853b0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16048", "type": "seen", "source": "https://t.me/cibsecurity/31676", "content": "\u203c CVE-2020-16048 \u203c\n\nOut of bounds read in ANGLE allowed a remote attacker to obtain sensitive data via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-03T01:23:19.000000Z"}, {"uuid": "1904f4de-d752-4396-aebe-8eb50a710767", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-1604", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3387", "content": "#Whitepaper\n\"Chrome Exploitation:\nEXPLOIT OF CVE-2020-1604[0|1]\", 2021.", "creation_timestamp": "2021-05-17T12:09:01.000000Z"}, {"uuid": "71c6a144-41fd-4351-8fda-2df04f7f6c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://t.me/cibsecurity/21851", "content": "\u203c CVE-2020-16040 \u203c\n\nInsufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T22:41:59.000000Z"}, {"uuid": "8dc2c58f-6244-4b21-a6c8-2c2869398f25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16043", "type": "seen", "source": "https://t.me/cibsecurity/21862", "content": "\u203c CVE-2020-16043 \u203c\n\nInsufficient data validation in networking in Google Chrome prior to 87.0.4280.141 allowed a remote attacker to bypass discretionary access control via malicious network traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T22:42:12.000000Z"}, {"uuid": "c16657f7-2f56-4c73-9af3-bf795839ba56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2450", "content": "#Threat_Research\n1. Analyzing CVE-2020-16040 - A V8 JIT Compiler Bug (PoC)\nhttps://faraz.faith/2021-01-07-cve-2020-16040-analysis\n2. Analysis of VMware Workstation and ESXI Using Debug Symbols from Flings\nhttps://www.zerodayinitiative.com/blog/2021/1/6/mindshare-analysis-of-vmware-workstation-and-esxi-using-debug-symbols-from-flings", "creation_timestamp": "2021-01-08T12:07:02.000000Z"}, {"uuid": "79fcb1dd-f27c-4e4b-a719-6b16a7a6bf6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16045", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2930", "content": "#exploit \n1. CVE-2021-27076:\nA Replay-style Deserialization Attack Against SharePoint (PoC)\nhttps://www.zerodayinitiative.com/blog/2021/3/17/cve-2021-27076-a-replay-style-deserialization-attack-against-sharepoint\n\n2. CVE-2020-16045:\nChrome sandbox escape\nhttps://securitylab.github.com/research/one_day_short_of_a_fullchain_sbx\n]-&gt; full exploit:\nhttps://github.com/github/securitylab/tree/main/SecurityExploits/Chrome/SandboxEscape/GHSL-2020-165", "creation_timestamp": "2021-11-30T03:27:09.000000Z"}, {"uuid": "ae827417-e377-40d7-9662-4a7f6e40c751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3104", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 5-11)\nCVE-2021-26855 - ProxyLogon MS Exchange Srv RCE\nhttps://t.me/cybersecuritytechnologies/2835\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-3129 - Laravel debug RCE\nhttps://t.me/cybersecuritytechnologies/2557\nCVE-2021-26708 - LPE in the Linux kernel &lt;5.10.x\nhttps://github.com/jordan9001/vsock_poc\nCVE-2020-16040 - V8 JIT Compiler Bug\nhttps://t.me/cybersecuritytechnologies/2450\nCVE-2021-21982 - SSRF in VMWare\nhttps://t.me/cybersecuritytechnologies/3039\nCVE-2021-21402 - UAF read in Jellyfin\nhttps://t.me/cybersecuritytechnologies/3064\nCVE-2021-29154 - BPF JIT bug\nhttps://www.openwall.com/lists/oss-security/2021/04/08/1", "creation_timestamp": "2021-04-12T11:01:12.000000Z"}, {"uuid": "c2430952-d3ac-4c8d-b8bf-49803a4ab8d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16045", "type": "seen", "source": "https://t.me/cibsecurity/22190", "content": "\u203c CVE-2020-16045 \u203c\n\nUse after Free in Payments in Google Chrome on Android prior to 87.0.4280.66 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-15T00:50:41.000000Z"}, {"uuid": "e56c11dc-a165-41bb-9f96-9e63aab400b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16046", "type": "seen", "source": "https://t.me/cibsecurity/22188", "content": "\u203c CVE-2020-16046 \u203c\n\nScript injection in iOSWeb in Google Chrome on iOS prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-15T00:50:39.000000Z"}, {"uuid": "1ab6f96a-31ac-4b7d-8742-027a12782a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16044", "type": "seen", "source": "https://t.me/arvin_club/3308", "content": "\ud83d\udd3a\u0622\u0698\u0627\u0646\u0633 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0648 \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a (CISA) \u0627\u0632 \u06a9\u0627\u0631\u06a9\u0646\u0627\u0646  \u0645\u0631\u0648\u0631\u06af\u0631 Firefox  \u062e\u0648\u0627\u0633\u062a \u06a9\u0647 \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0631\u0627 \u067e\u0686 \u06a9\u0646\u0646\u062f \u060c\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0639\u0646\u0648\u0627\u0646 CVE-2020-16044 \u0646\u0627\u0645 \u06af\u0630\u0627\u0631\u06cc  \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0647  \u0646\u062d\u0648\u0647 \u0628\u0631\u062e\u0648\u0631\u062f Firefox \u0628\u0627 \u06a9\u0648\u06a9\u06cc \u0647\u0627\u06cc \u0645\u0631\u0648\u0631\u06af\u0631 \u0645\u0631\u062a\u0628\u0637 \u0627\u0633\u062a \u0648 \u0628\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u0645\u06a9\u0627\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0631\u0627\u06cc\u0627\u0646\u0647 \u0648  \u062a\u0644\u0641\u0646 \u0631\u0627 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632  \u0645\u0631\u0648\u0631\u06af\u0631 \u0645\u06cc \u062f\u0647\u062f.\n\n\ud83d\udd3a\u067e\u0631\u0648\u062a\u06a9\u0644  SCTP \u0645\u062e\u0641\u0641 Stream Control Transmission Protocol \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u0631\u0627\u06cc\u0627\u0646\u0647 \u0627\u06cc \u0628\u0631\u0627\u06cc \u0628\u0631\u0642\u0631\u0627\u0631\u06cc \u0627\u0631\u062a\u0628\u0627\u0637 \u062f\u0627\u062f\u0647 \u0647\u0627\u06cc \u067e\u0631\u0648\u062a\u06a9\u0644 \u062f\u0631 \u0644\u0627\u06cc\u0647 Transport   \u0627\u06cc\u0646\u062a\u0631\u0646\u062a \u06cc\u0627 TCP / IP \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f. \u0627\u06cc\u0646 \u0627\u0634\u06a9\u0627\u0644 \u0628\u0647 \u0646\u062d\u0648\u0647 \u0645\u062f\u06cc\u0631\u06cc\u062a \u062f\u0627\u062f\u0647 \u0647\u0627\u06cc \u06a9\u0648\u06a9\u06cc \u062a\u0648\u0633\u0637 SCTP \u0645\u0631\u0628\u0648\u0637 \u0627\u0633\u062a.\n\n\ud83d\udd3a\u0647\u0631 \u0628\u0633\u062a\u0647 \u0648\u0631\u0648\u062f\u06cc SCTP \u0634\u0627\u0645\u0644 \u06cc\u06a9 \u0642\u0633\u0645\u062a \u06a9\u0648\u06a9\u06cc \u0627\u0633\u062a \u06a9\u0647 \u067e\u0627\u0633\u062e \u0645\u062a\u0646\u0627\u0638\u0631 \u0627\u0632 \u06a9\u0648\u06a9\u06cc \u0645\u0631\u0648\u0631\u06af\u0631 \u0631\u0627 \u0633\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u062f. \u0642\u0637\u0639\u0647 COOKIE ECHO \u0642\u0637\u0639\u0647 \u0627\u06cc \u0627\u0632 \u062f\u06cc\u062a\u0627 \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0647\u0646\u06af\u0627\u0645 \u0631\u0627\u0647 \u0627\u0646\u062f\u0627\u0632\u06cc \u0627\u0648\u0644\u06cc\u0647 \u0627\u062a\u0635\u0627\u0644 SCTP\u060c \u0628\u0627 \u0645\u0631\u0648\u0631\u06af\u0631 \u0627\u0631\u0633\u0627\u0644 \u0645\u06cc \u0634\u0648\u062f.\n\n\ud83d\udd3a\u0637\u0628\u0642 \u06af\u0641\u062a\u0647 \u0645\u0648\u0632\u06cc\u0644\u0627 \u060c \u06cc\u06a9 \u0647\u06a9\u0631  \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u06cc\u06a9 \u0642\u0637\u0639\u0647 \u0645\u062e\u0631\u0628 COOKIE-ECHO \u0631\u0627 \u0627\u06cc\u062c\u0627\u062f \u06a9\u0646\u062f \u062a\u0627 \u062d\u0627\u0641\u0638\u0647 \u0645\u0631\u0648\u0631\u06af\u0631 \u0631\u0627 \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u062f\u0647\u062f. \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc use-after-free  \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0627\u062f\u0631\u0633\u062a \u0627\u0632 \u062d\u0627\u0641\u0638\u0647 \u062f\u0627\u06cc\u0646\u0627\u0645\u06cc\u06a9  \u062f\u0631 \u062d\u06cc\u0646 \u06a9\u0627\u0631 \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u0633\u062a. \u0627\u06af\u0631 \u067e\u0633 \u0627\u0632 \u0622\u0632\u0627\u062f \u06a9\u0631\u062f\u0646 \u0645\u06a9\u0627\u0646 \u062d\u0627\u0641\u0638\u0647 \u060c \u0628\u0631\u0646\u0627\u0645\u0647 \u0627\u06cc \u0646\u0634\u0627\u0646\u0647 \u06af\u0631 \u06cc\u0627 \u0647\u0645\u0627\u0646 \u067e\u0648\u06cc\u0646\u062a\u0631  \u062d\u0627\u0641\u0638\u0647 \u0631\u0627 \u067e\u0627\u06a9 \u0646\u06a9\u0646\u062f \u060c \u06cc\u06a9 \u0647\u06a9\u0631  \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u062e\u0637\u0627 \u0628\u0631\u0646\u0627\u0645\u0647 \u0631\u0627 \u0647\u06a9 \u06a9\u0646\u062f.\n\n\ud83c\udd94 @Arvin_club", "creation_timestamp": "2021-01-08T16:12:54.000000Z"}, {"uuid": "ba2906f2-abe9-4c22-a61e-0baf43a0ba6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16044", "type": "seen", "source": "https://t.me/arvin_club/3307", "content": "\ud83d\udca2 \u0645\u0631\u0648\u0631\u06af\u0631\u0647\u0627\u06cc \u0627\u0635\u0644\u06cc \u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0627\u0634\u06a9\u0627\u0644\u0647\u0627\u06cc\u06cc \u06a9\u0647  \u0627\u0645\u06a9\u0627\u0646 \u062d\u0645\u0644\u0627\u062a \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0631\u0627 \u0641\u0631\u0627\u0647\u0645 \u0645\u06cc \u06a9\u0646\u0646\u062f \u060c \u0628\u0647 \u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0634\u062f\u0647 \u0627\u0646\u062f \u060c \u06a9\u0647 \u0628\u0647 \u0637\u0648\u0631 \u0628\u0627\u0644\u0642\u0648\u0647 \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062f\u0633\u062a\u06af\u0627\u0647\u0647\u0627\u06cc \u0647\u062f\u0641 \u0631\u0627 \u0628\u0647 \u062f\u0633\u062a \u0628\u06af\u06cc\u0631\u0646\u062f.\n\n\n\ud83d\udd3a\u0633\u0627\u0632\u0646\u062f\u06af\u0627\u0646 \u0645\u0631\u0648\u0631\u06af\u0631\u0647\u0627\u06cc Chrome \u060c Firefox \u0648 Edge \u0627\u0632 \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0645\u06cc \u062e\u0648\u0627\u0647\u0646\u062f \u06a9\u0647 \u0645\u0631\u0648\u0631\u06af\u0631 \u0647\u0627\u06cc \u062e\u0648\u062f\u0631\u0627 \u0622\u067e\u062f\u06cc\u062a \u06a9\u0646\u0646\u062f \u062a\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u06cc\u0646  \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0627\u0633\u0627\u0633\u06cc  \u0645\u0648\u0631\u062f \u0633\u0648 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u0646\u06af\u06cc\u0631\u0646\u062f . \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0628\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0628\u0647 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc\u06cc  \u06a9\u0647 \u0627\u0632 \u0627\u06cc\u0646 \u0645\u0631\u0648\u0631\u06af\u0631 \u0647\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u0646\u062f \u060c\u0646\u0641\u0648\u0630  \u06a9\u0631\u062f\u0647 \u0648 \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0622\u0646 \u0631\u0627 \u0628\u062f\u0632\u062f\u0646\u062f.\n\n\ud83d\udd3a\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u0648\u0632\u06cc\u0644\u0627 \u0641\u0627\u06cc\u0631\u0641\u0627\u06a9\u0633 (CVE-2020-16044)  \u0627\u0632 \u0627\u0634\u06a9\u0627\u0644\u0627\u062a\u06cc \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u0645\u0648\u062a\u0648\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 Google Chromium  \u0647\u0645 \u06af\u0632\u0627\u0631\u0634 \u0634\u062f\u0647 \u0627\u0633\u062a \u060c \u0627\u06cc\u0646 \u0645\u0648\u062a\u0648\u0631 \u062f\u0631 \u0645\u0631\u0648\u0631\u06af\u0631 Google Chrome \u0648  \u0645\u0631\u0648\u0631\u06af\u0631 Edge  \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f.\n\n\ud83c\udd94 @Arvin_club", "creation_timestamp": "2021-01-08T16:05:03.000000Z"}]}