{"vulnerability": "CVE-2023-26369", "sightings": [{"uuid": "81584aec-af40-4abc-8dd4-ff21864fef2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-09-14T18:10:02.000000Z"}, {"uuid": "327e5770-8353-443b-a097-dea35d405be6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971882", "content": "", "creation_timestamp": "2024-12-24T20:35:12.333329Z"}, {"uuid": "0143280c-8de0-44db-b34b-8980e7b0d746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:46.000000Z"}, {"uuid": "0723a988-fb9b-4a37-aaeb-ccecd75a304f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1108", "content": "", "creation_timestamp": "2023-09-13T04:00:00.000000Z"}, {"uuid": "09ea24d9-fc70-49a6-8881-5ab936e457b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/47", "content": "1. CVE-2023-26369:\nAdobe PDF Reader RCE when processing TTF fonts\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html\n\n2. CVE-2023-2729:\nSynology NAS DSM Account Takeover\nhttps://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure\n\n3. CVE-2021-44168:\nDownload of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS &lt;7.0.3\nhttps://github.com/0xhaggis/CVE-2021-44168", "creation_timestamp": "2023-10-19T03:53:43.000000Z"}, {"uuid": "07aa83f7-e27a-48b4-be0d-4b268dcbe4cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-26369", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/56e1812c-5ce8-4e96-b3bb-d0c056c232f3", "content": "", "creation_timestamp": "2026-02-02T12:26:50.740754Z"}, {"uuid": "a9d1de50-819b-4b8a-9095-32cf7c604401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/ap_security/19", "content": "\ud83c\udf10\u0412 Adobe Acrobat \u0438 Reader \u043d\u0430\u0448\u043b\u0438\n0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\n\n\u2714\ufe0f\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-26369 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0437\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0431\u0443\u0444\u0435\u0440\u0430\n\n\u2714\ufe0fCVE \u043e\u0446\u0435\u043d\u0435\u043d\u0430 \u0432 7,8 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS \u0438 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u0434\u043b\u044f Windows \u0438 macOS \u0432\u0435\u0440\u0441\u0438\u0439\n\n\u2714\ufe0f\u0410\u0442\u0430\u043a\u0430\u043c \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438: Acrobat 23.003.20284 \u0438 \u043d\u0438\u0436\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 Acrobat \u0432\u0435\u0440\u0441\u0438\u0439 20.005.30514 \u0438 \u043d\u0438\u0436\u0435 \u0434\u043b\u044f Windows \u0438 20.005.30516 \u0434\u043b\u044f macOS\n\n#infosec #itnews #cve #0day", "creation_timestamp": "2023-09-14T12:29:54.000000Z"}, {"uuid": "6d3e3611-d033-47d3-9481-46cca4d54cbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/ctinow/137224", "content": "https://ift.tt/FupGs28\nAdobe Acrobat and Reader Arbitrary Code Execution Vulnerability (CVE-2023-26369) Notification - Security Boulevard", "creation_timestamp": "2023-09-15T10:22:12.000000Z"}, {"uuid": "3b74e47d-e0cb-4d14-ac7f-cbc86882ca17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/ap_security/97", "content": "\ud83c\udf10\u0412 Adobe Acrobat \u0438 Reader \u043d\u0430\u0448\u043b\u0438\n0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\n\n\u2714\ufe0f\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-26369 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0437\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432 \u043f\u0430\u043c\u044f\u0442\u0438 \u0431\u0443\u0444\u0435\u0440\u0430\n\n\u2714\ufe0fCVE \u043e\u0446\u0435\u043d\u0435\u043d\u0430 \u0432 7,8 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS \u0438 \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u0430 \u0434\u043b\u044f Windows \u0438 macOS \u0432\u0435\u0440\u0441\u0438\u0439\n\n\u2714\ufe0f\u0410\u0442\u0430\u043a\u0430\u043c \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0435\u0440\u0441\u0438\u0438: Acrobat 23.003.20284 \u0438 \u043d\u0438\u0436\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 Acrobat \u0432\u0435\u0440\u0441\u0438\u0439 20.005.30514 \u0438 \u043d\u0438\u0436\u0435 \u0434\u043b\u044f Windows \u0438 20.005.30516 \u0434\u043b\u044f macOS\n\n#infosec #itnews #cve #0day", "creation_timestamp": "2023-09-14T12:29:54.000000Z"}, {"uuid": "470439a0-a20e-42d7-939f-af8bc254f987", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/ctinow/137219", "content": "https://ift.tt/FupGs28\nAdobe Acrobat and Reader Arbitrary Code Execution Vulnerability (CVE-2023-26369) Notification", "creation_timestamp": "2023-09-15T09:46:44.000000Z"}, {"uuid": "1b59d900-95eb-461b-b7f0-1e604f84be66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/ctinow/136491", "content": "https://ift.tt/n43CVzw\nMicrosoft, Adobe fix zero-days exploited by attackers (CVE-2023-26369, CVE-2023-36761, CVE-2023-36802)", "creation_timestamp": "2023-09-12T22:17:21.000000Z"}, {"uuid": "7676ac73-a976-4a6c-8c5c-782f308f5b1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "exploited", "source": "https://t.me/KomunitiSiber/780", "content": "Update Adobe Acrobat and Reader to Patch Actively Exploited Vulnerability\nhttps://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html\n\nAdobe's\u00a0Patch Tuesday update\u00a0for September 2023 comes with a patch for a critical actively exploited security flaw in Acrobat and Reader that could permit an attacker to execute malicious code on susceptible systems.\nThe vulnerability, tracked as CVE-2023-26369, is rated 7.8 for severity on the CVSS scoring system and impacts both Windows and macOS versions of Acrobat DC, Acrobat Reader DC,", "creation_timestamp": "2023-09-13T05:33:11.000000Z"}, {"uuid": "e3b57089-5170-4f49-a060-89c466ea53c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "exploited", "source": "Telegram/v2L53nn0goMpbF_22orBAQxmj43iw7FdrV9mvsEqxGQJrQ", "content": "", "creation_timestamp": "2023-09-13T05:28:54.000000Z"}, {"uuid": "50c7967e-7912-4217-80bf-25ad2ad123eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/true_secator/4841", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0435 PatchTuesday, \u0430 \u0432\u0441\u0435 \u0441 \u043d\u0438\u043c\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 0-day \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c \u041f\u041e \u043e\u0442 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432.\n\nMicrosoft \u043f\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0430 2 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 0-day \u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 59 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445: 3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 - \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 24 - RCE (5 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435), 9 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 3 - DoS, 5 - \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0430, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 Edge - 5 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Chromium.\n\n\u0418\u0437 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e  \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430.\n\n\u041f\u0435\u0440\u0432\u0430\u044f CVE-2023-36802 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0441\u043b\u0443\u0436\u0431\u044b \u043f\u043e\u0442\u043e\u043a\u043e\u0432\u043e\u0439 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 Microsoft, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u0415\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 DBAPPSecurity WeBin Lab, IBM X-Force, Microsoft Threat Intelligence \u0438 Microsoft Security Response Center.\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2023-36761 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Microsoft Word \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0421 \u0435\u0435 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043c\u043e\u0436\u043d\u043e \u043a\u0440\u0430\u0441\u0442\u044c NTLM-\u0445\u0435\u0448\u0438 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u0417\u0430\u0442\u0435\u043c \u0445\u044d\u0448\u0438 NTLM \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 NTLM Relay \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438. \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u043d\u0430\u0448\u0438 \u0432 Microsoft Threat Intelligence.\n\n\u041f\u043e\u043b\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0430 \u0432\u043b\u0438\u044f\u0435\u0442, \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0437\u0434\u0435\u0441\u044c.\n\n\u0412\u0441\u043b\u0435\u0434 \u0437\u0430 Google \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 Mozilla, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e 0-day \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Firefox \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0435 Thunderbird.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u00a0CVE-2023-4863 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u043a\u043e\u0434\u0430 WebP (libwebp) \u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u044c \u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c \u043d\u0435\u0433\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 RCE.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 WebP \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0434\u043e\u0432\u043e\u0434\u044f\u0442\u0441\u044f \u0434\u043e \u0448\u0438\u0440\u043e\u043a\u043e\u0439 \u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u043e \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441\u043e spyware.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Firefox \u0438 Thunderbird.\n\nAdobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f 0-day \u0432 Acrobat \u0438 Reader, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445 \u0435\u0449\u0435 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e 0-day \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b \u043a\u0430\u043a \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows, \u0442\u0430\u043a \u0438 macOS, \u0430 \u0430\u0442\u0430\u043a\u0438 \u043d\u043e\u0441\u0438\u043b\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u0439 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440.\n\nCVE-2023-26369 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f RCE \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u041d\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043b\u0438\u0448\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u0418 \u0432\u0441\u0435 \u0436\u0435 Adobe \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435, \u0432 \u0438\u0434\u0435\u0430\u043b\u0435 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 72 \u0447\u0430\u0441\u043e\u0432.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043d\u0435\u0435 Adobe \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0432 Connect (CVE-2023-29305 \u0438 CVE-2023-29306) \u0438 Experience Manager (CVE-2023-38214 \u0438 CVE-2023-38215), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 XSS-\u0430\u0442\u0430\u043a.", "creation_timestamp": "2023-09-13T12:00:23.000000Z"}, {"uuid": "8ed83006-7697-43c0-8e4c-cfe57106164f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "exploited", "source": "https://t.me/CyberSecurityIL/27520", "content": "\u05d7\u05d1\u05e8\u05ea Adobe \u05de\u05e4\u05e8\u05e1\u05de\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05d7\u05d9\u05e8\u05d5\u05dd \u05dc\u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1-Adobe reader \u05d5-Acrobat \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\"\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2023-26369 \u05de\u05e9\u05e4\u05d9\u05e2\u05d4 \u05d2\u05dd \u05d1\u05de\u05e2\u05e8\u05db\u05d5\u05ea \u05d4\u05e4\u05e2\u05dc\u05d4 Windows \u05d5\u05d2\u05dd \u05d1-Mac \u05d5\u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05e1\u05d5\u05d2\u05e8 \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d6\u05de\u05d9\u05df \u05db\u05e2\u05ea \u05dc\u05d4\u05d5\u05e8\u05d3\u05d4 \u05d1\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05d4\u05d1\u05d0\u05d5\u05ea:\n\n- Acrobat Reader DC - 23.006.20320\n\n- Acrobat Reader -20.005.30524\n\n\u05ea\u05d5\u05d3\u05d4 \u05dc\u05d7\u05d1\u05e8\u05ea ShalevSoft \u05e9\u05d4\u05e4\u05e0\u05ea\u05d4 \u05d0\u05ea \u05ea\u05e9\u05d5\u05de\u05ea \u05dc\u05d9\u05d1\u05d9 \u05dc\u05e0\u05d5\u05e9\u05d0.\n\nhttps://t.me/CyberSecurityIL/3710\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2023-09-13T18:47:35.000000Z"}, {"uuid": "9c9bba43-1aa6-4143-b9ed-2b8b943ff181", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "Telegram/mP701LI7mOOAZ1_NjkEmPxtkwSrNddxkoacgi2hVhjJCSnY", "content": "", "creation_timestamp": "2023-10-25T03:06:53.000000Z"}, {"uuid": "5754cb52-b55c-4e53-8288-1260e3045e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "published-proof-of-concept", "source": "Telegram/JeMnVQ3VYzkBQko5SmdrD4gJ3DcmqA46hwQzSQydDTzZxBE", "content": "", "creation_timestamp": "2023-11-16T09:43:18.000000Z"}, {"uuid": "b5be7aa1-0468-460f-bedf-68591718e97d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/jokerplstaeen/20960", "content": "\u200f\ud83d\udea8 \u0634\u0631\u0643\u0629 \u200e#Adobe \u062a\u0648\u0635\u064a \u0628\u0634\u0643\u0644 \u0639\u0627\u062c\u0644 \u0628\u062a\u062d\u062f\u064a\u062b \u0628\u0631\u0646\u0627\u0645\u062c Adobe Acrobat \u0648 Reader \u0648\u0630\u0644\u0643 \u0628\u0633\u0628\u0628 \u062b\u063a\u0631\u0629 CVE-2023-26369 \u062a\u0645\u0643\u0646 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0645\u0646 \u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629 \u0639\u0646 \u0628\u0639\u062f\u060c \u0644\u0645 \u062a\u0635\u0631\u062d \u0627\u062f\u0648\u0628\u064a \u0628\u0639\u062f \u0639\u0646 \u0627\u0644\u0627\u0646\u0638\u0645\u0629 \u0627\u0644\u0645\u0633\u062a\u0647\u062f\u0641\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0629.\n\u200e#\u0627\u0644\u0627\u0645\u0646_\u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \n\u200e", "creation_timestamp": "2023-09-19T11:19:22.000000Z"}, {"uuid": "03ac8b7e-7fe8-4808-9ccf-866d213053c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9224", "content": "#exploit\n1. CVE-2023-26369:\nAdobe PDF Reader RCE when processing TTF fonts\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html\n\n2. CVE-2023-2729:\nSynology NAS DSM Account Takeover\nhttps://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure\n\n3. CVE-2021-44168:\nDownload of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS &lt;7.0.3\nhttps://github.com/0xhaggis/CVE-2021-44168", "creation_timestamp": "2023-10-19T11:01:11.000000Z"}, {"uuid": "1a352ce5-36eb-4b34-972b-78221e3b32f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "exploited", "source": "https://t.me/thehackernews/3861", "content": "\u26a0\ufe0f Urgent: Adobe's September 2023 update addresses a new zero-day vulnerability (CVE-2023-26369) in Acrobat and Reader that attackers are exploiting in the wild. \n \nRead: https://thehackernews.com/2023/09/update-adobe-acrobat-and-reader-to.html", "creation_timestamp": "2023-09-13T05:24:29.000000Z"}, {"uuid": "eb4065da-4534-457a-af53-29b6830d577f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1316", "content": "https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html", "creation_timestamp": "2023-10-19T05:23:39.000000Z"}, {"uuid": "7a773703-49c7-498a-b66d-797d4cb27947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "seen", "source": "https://t.me/cibsecurity/70372", "content": "\u203c CVE-2023-26369 \u203c\n\nAcrobat Reader versions 23.003.20284 (and earlier), 20.005.30516 (and earlier) and 20.005.30514 (and earlier) are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-13T12:37:51.000000Z"}, {"uuid": "285c47e3-9407-4770-bb99-f7a60283f506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-26369", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1414", "content": "#exploit\n1. CVE-2023-26369:\nAdobe PDF Reader RCE when processing TTF fonts\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-26369.html\n\n2. CVE-2023-2729:\nSynology NAS DSM Account Takeover\nhttps://claroty.com/team82/research/synology-nas-dsm-account-takeover-when-random-is-not-secure\n\n3. CVE-2021-44168:\nDownload of code without integrity check vulnerability in the \"execute restore src-vis\" command of FortiOS &lt;7.0.3\nhttps://github.com/0xhaggis/CVE-2021-44168", "creation_timestamp": "2024-08-16T08:34:06.000000Z"}]}