{"vulnerability": "cve-2013-2000", "sightings": [{"uuid": "94a4ee4d-202d-4046-80ec-0123078036fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-20003", "type": "seen", "source": "https://t.me/cibsecurity/36895", "content": "\u203c CVE-2013-20003 \u203c\n\nZ-Wave devices from Sierra Designs (circa 2013) and Silicon Labs (using S0 security) may use a known, shared network key of all zeros, allowing an attacker within radio range to spoof Z-Wave traffic.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-05T02:42:29.000000Z"}, {"uuid": "9165cf15-b03a-432a-89eb-d3f4f721390d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-20001", "type": "seen", "source": "https://t.me/cibsecurity/23568", "content": "\u203c CVE-2013-20001 \u203c\n\nAn issue was discovered in OpenZFS through 2.0.3. When an NFS share is exported to IPv6 addresses via the sharenfs feature, there is a silent failure to parse the IPv6 address data, and access is allowed to everyone. IPv6 restrictions from the configuration are not applied.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-02-12T22:43:49.000000Z"}, {"uuid": "1733f7e4-b0b7-496b-801d-e0ea017d6dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-20002", "type": "seen", "source": "https://t.me/cibsecurity/25527", "content": "\u203c CVE-2013-20002 \u203c\n\nElemin allows remote attackers to upload and execute arbitrary PHP code via the Themify framework (before 1.2.2) wp-content/themes/elemin/themify/themify-ajax.php file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-06-17T20:41:11.000000Z"}, {"uuid": "839b4475-ba6e-4f97-b039-cdab481189e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-20003", "type": "seen", "source": "https://t.me/VulnerabilityNews/26524", "content": "The Z-Wave specification requires that S2 security can be downgraded to S0 or other less secure protocols, allowing an attacker within radio range during pairing to downgrade and then exploit a different vulnerability (CVE-2013-20003) to intercept and spoof traffic.\nPublished at: February 05, 2022 at 12:15AM\nView on website", "creation_timestamp": "2022-02-05T02:42:52.000000Z"}]}