{"vulnerability": "cve-2020-1060", "sightings": [{"uuid": "925c045e-4c58-498c-aacc-5e30a3fa5574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1060", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/2005", "content": "Multiple vulnerabilities\n(CVE-2020-27649, CVE-2020-27651, CVE-2020-27653, CVE-2020-27654, CVE-2020-1060, CVE-2020-1064, CVE-2020-27655, CVE-2020-27657, CVE-2020-27658)\nin Synology SRM (Synology Router Manager) (PoCs)\nhttps://blog.talosintelligence.com/2020/10/vulnerability-spotlight-multiple.html", "creation_timestamp": "2022-05-27T01:29:01.000000Z"}, {"uuid": "fb9bd0c4-08e9-490c-83ed-bb4ad83cc587", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10607", "type": "seen", "source": "https://t.me/cibsecurity/10808", "content": "ATENTION\u203c New - CVE-2020-10607\n\nIn Advantech WebAccess, Versions 8.4.2 and prior. A stack-based buffer overflow vulnerability caused by a lack of proper validation of the length of user-supplied data may allow remote code execution.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-03-30T09:47:32.000000Z"}, {"uuid": "b8268838-6e64-4a54-9f02-4201ec5161d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-1060", "type": "seen", "source": "https://t.me/cibsecurity/12229", "content": "ATENTION\u203c New - CVE-2020-1035\n\nA remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory, aka 'VBScript Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2020-1058, CVE-2020-1060, CVE-2020-1093.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-05-22T02:55:18.000000Z"}, {"uuid": "f6b08d4e-273f-47c8-972b-00d1d802b057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10609", "type": "seen", "source": "https://t.me/cibsecurity/13681", "content": "ATENTION\u203c New - CVE-2020-10609\n\nGrundfos CIM 500 v06.16.00 stores plaintext credentials, which may allow sensitive information to be read or allow modification to system settings by someone with access to the device.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-27T22:55:19.000000Z"}, {"uuid": "04ffaabe-35c3-45c6-af8d-3130fb6db8ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10604", "type": "seen", "source": "https://t.me/cibsecurity/13667", "content": "ATENTION\u203c New - CVE-2020-10604\n\nIn OSIsoft PI System multiple products and versions, a remote, unauthenticated attacker could crash PI Network Manager service through specially crafted requests. This can result in blocking connections and queries to PI Data Archive.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-25T07:55:12.000000Z"}, {"uuid": "7cb4aa97-105e-4b53-850e-807d57988dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10608", "type": "seen", "source": "https://t.me/cibsecurity/13662", "content": "ATENTION\u203c New - CVE-2020-10608\n\nIn OSIsoft PI System multiple products and versions, a local attacker can plant a binary and bypass a code integrity check for loading PI System libraries. This exploitation can target another local user of PI System software on the computer to escalate privilege and result in unauthorized information disclosure, deletion, or modification.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-25T02:55:12.000000Z"}, {"uuid": "5b36ab26-bfbc-4e29-8a5a-834263bda03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10606", "type": "seen", "source": "https://t.me/cibsecurity/13663", "content": "ATENTION\u203c New - CVE-2020-10606\n\nIn OSIsoft PI System multiple products and versions, a local attacker can exploit incorrect permissions set by affected PI System software. This exploitation can result in unauthorized information disclosure, deletion, or modification if the local computer also processes PI System data from other users, such as from a shared workstation or terminal server deployment.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-25T02:55:12.000000Z"}, {"uuid": "07584539-0ede-464b-a5d8-0ea3ebb76b2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-10602", "type": "seen", "source": "https://t.me/cibsecurity/13664", "content": "ATENTION\u203c New - CVE-2020-10602\n\nIn OSIsoft PI System multiple products and versions, an authenticated remote attacker could crash PI Network Manager due to a race condition. This can result in blocking connections and queries to PI Data Archive.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-07-25T02:55:13.000000Z"}]}