{"vulnerability": "CVE-2020-16040", "sightings": [{"uuid": "bd20ffbe-6767-41b2-8267-4ef3be010c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "MISP/d657465f-27fc-40f3-ae3c-e915ef6c12f6", "content": "", "creation_timestamp": "2024-11-14T06:08:58.000000Z"}, {"uuid": "1655b491-4a76-44ee-a2ae-15ed24b0ec8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "b0f5f1b7-817c-49ea-ad92-fdb588d801e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:25.000000Z"}, {"uuid": "41d50749-2288-4c9e-8258-ba70d8d9d3f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lq7lsj5xcs2m", "content": "", "creation_timestamp": "2025-05-28T06:39:22.423100Z"}, {"uuid": "8a4c9e65-94be-4c1f-b196-cbd00a72b13e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2020-16040", "type": "seen", "source": "https://gist.github.com/cyberriman/6c2fa14e75180fb2521c4bf93afa8bd2", "content": "", "creation_timestamp": "2025-11-01T12:11:02.000000Z"}, {"uuid": "5a6eb558-f867-4dfb-a81b-87c477932ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mdj6ccer5w24", "content": "", "creation_timestamp": "2026-01-28T21:02:59.121337Z"}, {"uuid": "927e23fa-d13b-43af-89f6-3666bffcd9bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/browser/chrome_simplifiedlowering_overflow.rb", "content": "", "creation_timestamp": "2021-04-08T21:25:19.000000Z"}, {"uuid": "58add1af-a830-491e-8d4a-2de4a806d877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://t.me/arpsyndicate/1851", "content": "#ExploitObserverAlert\n\nCVE-2020-16040\n\nDESCRIPTION: Exploit Observer has 34 entries related to CVE-2020-16040. Insufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\nFIRST-EPSS: 0.261320000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2023-12-17T22:04:54.000000Z"}, {"uuid": "c16657f7-2f56-4c73-9af3-bf795839ba56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2450", "content": "#Threat_Research\n1. Analyzing CVE-2020-16040 - A V8 JIT Compiler Bug (PoC)\nhttps://faraz.faith/2021-01-07-cve-2020-16040-analysis\n2. Analysis of VMware Workstation and ESXI Using Debug Symbols from Flings\nhttps://www.zerodayinitiative.com/blog/2021/1/6/mindshare-analysis-of-vmware-workstation-and-esxi-using-debug-symbols-from-flings", "creation_timestamp": "2021-01-08T12:07:02.000000Z"}, {"uuid": "ae827417-e377-40d7-9662-4a7f6e40c751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3104", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 5-11)\nCVE-2021-26855 - ProxyLogon MS Exchange Srv RCE\nhttps://t.me/cybersecuritytechnologies/2835\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-3129 - Laravel debug RCE\nhttps://t.me/cybersecuritytechnologies/2557\nCVE-2021-26708 - LPE in the Linux kernel &lt;5.10.x\nhttps://github.com/jordan9001/vsock_poc\nCVE-2020-16040 - V8 JIT Compiler Bug\nhttps://t.me/cybersecuritytechnologies/2450\nCVE-2021-21982 - SSRF in VMWare\nhttps://t.me/cybersecuritytechnologies/3039\nCVE-2021-21402 - UAF read in Jellyfin\nhttps://t.me/cybersecuritytechnologies/3064\nCVE-2021-29154 - BPF JIT bug\nhttps://www.openwall.com/lists/oss-security/2021/04/08/1", "creation_timestamp": "2021-04-12T11:01:12.000000Z"}, {"uuid": "71c6a144-41fd-4351-8fda-2df04f7f6c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-16040", "type": "seen", "source": "https://t.me/cibsecurity/21851", "content": "\u203c CVE-2020-16040 \u203c\n\nInsufficient data validation in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-08T22:41:59.000000Z"}]}