{"vulnerability": "cve-2020-2789", "sightings": [{"uuid": "dc4860cc-0007-4ebd-b338-730f4a089ded", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27894", "type": "seen", "source": "https://t.me/cibsecurity/17273", "content": "\u203c CVE-2020-27894 \u203c\n\nThe issue was addressed with additional user controls. This issue is fixed in macOS Big Sur 11.0.1. Users may be unable to remove metadata indicating where files were downloaded from.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-08T22:31:22.000000Z"}, {"uuid": "9b70b913-5c2e-4ff4-8c4d-6af352bf545d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27897", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/2267", "content": "#exploit\n1. CVE-2020-10977:\nGitLab Community/Enterprise Edition - File Read RCE\nhttps://packetstormsecurity.com/files/160441/gitlab_file_read_rce.rb.txt\n\n2. CVE-2020-27897:\nApple macOS Kernel OOB Write Privilege Escalation Vulnerability\nhttps://www.thezdi.com/blog/2020/12/9/cve-2020-27897-apple-macos-kernel-oob-write-privilege-escalation-vulnerability", "creation_timestamp": "2024-10-09T20:16:26.000000Z"}, {"uuid": "0f35ce1f-e850-4fd7-9ae5-4bb36ea08ce5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27895", "type": "seen", "source": "https://t.me/cibsecurity/17447", "content": "\u203c CVE-2020-27895 \u203c\n\nAn information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T07:34:46.000000Z"}, {"uuid": "e4aaff14-f64f-4d35-af35-99308395b20a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27895", "type": "seen", "source": "https://t.me/cibsecurity/17305", "content": "\u203c CVE-2020-27895 \u203c\n\nAn information disclosure issue existed in the transition of program state. This issue was addressed with improved state handling. This issue is fixed in iTunes 12.11 for Windows. A malicious application may be able to access local users Apple IDs.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-12-09T00:36:30.000000Z"}, {"uuid": "5c2ab293-fb50-440a-b9a5-8872712a43dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2020-27891", "type": "seen", "source": "https://t.me/cibsecurity/15644", "content": "\u203c CVE-2020-27891 \u203c\n\nThe Zigbee protocol implementation on Texas Instruments CC2538 devices with Z-Stack 3.0.1 does not properly process a ZCL Read Reporting Configuration Response message. It crashes in zclHandleExternal().\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2020-10-27T23:41:09.000000Z"}]}