{"vulnerability": "CVE-2020-2763", "sightings": [{"uuid": "76e3dc49-99e0-4a0f-a070-849f52c55612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27632", "type": "seen", "source": "https://t.me/ics_cert/398", "content": "\u0622\u0633\u064a\u0628\u200c\u067e\u0630\u064a\u0631\u064a \u062f\u0631 SIMATIC MV\u06f4\u06f0\u06f0\n\u0622\u0633\u064a\u0628\u200c\u067e\u0630\u064a\u0631\u064a CVE-\u06f2\u06f0\u06f2\u06f0-\u06f2\u06f7\u06f6\u06f3\u06f2 \u062f\u0631 \u0646\u0633\u062e\u0647 \u0647\u0627\u064a \u0642\u0628\u0644 \u0627\u0632 v\u06f7,\u06f0.\u06f6\u060c \u0628\u0631\u0627\u064a SIMATIC MV\u06f4\u06f0\u06f0 \u0627\u0645\u0643\u0627\u0646 \u0633\u0631\u0642\u062a \u0646\u0634\u0633\u062a \u0631\u0627 \u0628\u0631\u0627\u064a \u0645\u0647\u0627\u062c\u0645 \u0641\u0631\u0627\u0647\u0645 \u0645\u064a \u0643\u0646\u062f.\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2021-03-17T14:10:51.000000Z"}, {"uuid": "deffa368-7009-4a15-bd21-559ee009fcb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27633", "type": "seen", "source": "https://t.me/cibsecurity/71966", "content": "\u203c CVE-2020-27633 \u203c\n\nIn FNET 4.6.3, TCP ISNs are improperly random.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T20:16:47.000000Z"}, {"uuid": "fc354c61-4671-4b20-904e-5e9737bc5e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27631", "type": "seen", "source": "https://t.me/cibsecurity/71977", "content": "\u203c CVE-2020-27631 \u203c\n\nIn Oryx CycloneTCP 1.9.6, TCP ISNs are improperly random.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-10-10T20:16:59.000000Z"}, {"uuid": "a4aa3b51-4c39-4486-8807-3c7130d9e499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27632", "type": "seen", "source": "https://t.me/cibsecurity/24719", "content": "\u203c CVE-2020-27632 \u203c\n\nIn SIMATIC MV400 family versions prior to v7.0.6, the ISN generator is initialized with a constant value and has constant increments. An attacker could predict and hijack TCP sessions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-03-10T20:53:18.000000Z"}, {"uuid": "8d0a03e1-467e-4c65-bb75-de6b6725f2e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27637", "type": "seen", "source": "https://t.me/cibsecurity/21919", "content": "\u203c CVE-2020-27637 \u203c\n\nThe R programming language\u00e2\u20ac\u2122s default package manager CRAN is affected by a path traversal vulnerability that can lead to server compromise. This vulnerability affects packages installed via the R CMD install cli command or the install.packages() function from the interpreter. Update to version 4.0.3\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-01-12T07:46:17.000000Z"}, {"uuid": "84e8e04f-8d27-4f3f-bcf7-d18f12d857db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27639", "type": "seen", "source": "https://t.me/cibsecurity/21061", "content": "\u203c CVE-2020-27639 \u203c\n\nThe Bluetooth handset of Mitel MiVoice 6873i, 6930, and 6940 SIP phones with firmware before 5.1.0.SP6 could allow an unauthenticated attacker within Bluetooth range to pair a rogue Bluetooth device when a phone handset loses connection, due to an improper pairing mechanism. A successful exploit could allow an attacker to eavesdrop on conversations.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-18T12:46:55.000000Z"}, {"uuid": "fb3f25cc-6cd0-4f33-991b-6ac9eea8db2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-27638", "type": "seen", "source": "https://t.me/cibsecurity/15520", "content": "\u203c CVE-2020-27638 \u203c\n\nreceive.c in fastd before v21 allows denial of service (assertion failure) when receiving packets with an invalid type code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-22T16:52:17.000000Z"}]}