{"vulnerability": "CVE-2023-2827", "sightings": [{"uuid": "e650af1b-f337-47a1-bad5-7be661090fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28272", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html", "content": "", "creation_timestamp": "2024-04-18T16:45:00.000000Z"}, {"uuid": "02ddac0a-1717-45ad-82da-333a8cbee8d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28271", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html", "content": "", "creation_timestamp": "2024-04-18T16:45:00.000000Z"}, {"uuid": "5551f343-a904-4976-92b9-b736497914b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28271", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/04/the-windows-registry-adventure-6-kernel.html", "content": "", "creation_timestamp": "2025-04-16T19:34:14.680000Z"}, {"uuid": "0c41eb63-c9ac-49b3-a97d-7dcda98367b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2827", "type": "seen", "source": "https://t.me/kasperskyb2b/696", "content": "\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043c\u043d\u043e\u0433\u0438\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u0441\u0438\u0434\u0435\u0442\u044c \u043d\u0430 \ud83d\udd29 SAP, \u043f\u043e\u043a\u0430 \u041c\u0438\u043d\u0446\u0438\u0444\u0440\u044b \u043d\u0435 \u0437\u0430\u043f\u0440\u0435\u0442\u0438\u0442 \u043d\u0435 \u043d\u0430\u0439\u0434\u0443\u0442\u0441\u044f \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u043d\u0430 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0439 \u043f\u0440\u043e\u0435\u043a\u0442 \u0438\u043c\u043f\u043e\u0440\u0442\u043e\u0437\u0430\u043c\u0435\u0449\u0435\u043d\u0438\u044f, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u0441 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043e\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0437\u0430 \u0418\u0411-\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043d\u0435\u043c\u0435\u0446\u043a\u043e\u0433\u043e \u0433\u0438\u0433\u0430\u043d\u0442\u0430.\n\u0412\u0447\u0435\u0440\u0430 \u0431\u044b\u043b \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u0438\u044e\u043d\u044c\u0441\u043a\u0438\u0439 \u043d\u0430\u0431\u043e\u0440 \u043f\u0430\u0442\u0447\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0439 8 \u043d\u043e\u0432\u044b\u0445 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0438 5 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043a \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u043c. \u0417\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b  SAP Knowledge Warehouse, UI5 Variant Management, SAP Plant Connectivity, SAP S/4HANA, NetWeaver, BusinessObjects  \u0438 SAP CRM.\n\n\ud83d\udc69\u200d\ud83d\udcbb \u0418\u0437 \u043d\u043e\u0432\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b \u0434\u0432\u0435 \u2014 XSS \u0432 UI5 Variant Management (CVE-2023-33991, CVSS 8.2) \u0438 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 SAP Plant Connectivity \u0438  Production Connector for SAP (CVE-2023-2827, CVSS 7.9). \u041e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0438\u043c\u0435\u044e\u0442 \u043d\u0438\u0437\u043a\u0443\u044e \u0438 \u0441\u0440\u0435\u0434\u043d\u044e\u044e \u0441\u0442\u0435\u043f\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2023-06-14T15:31:37.000000Z"}, {"uuid": "5cba2813-c451-4e8e-8c96-a5dd03840801", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28271", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T05:00:00.000000Z"}, {"uuid": "75cd486e-c1b0-431d-8f01-2d215034f5c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28272", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T05:00:00.000000Z"}, {"uuid": "cbb7c7c3-e8a1-44cd-aa4c-d95041c39747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28278", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1658", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28278\n\ud83d\udd39 Description: Windows DNS Server Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:55.604Z\n\ud83d\udccf Modified: 2025-01-14T23:57:18.618Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28278", "creation_timestamp": "2025-01-15T00:16:32.000000Z"}, {"uuid": "913109a3-b5e5-468c-a14f-897bbfe0f737", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28275", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1664", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28275\n\ud83d\udd39 Description: Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:52.414Z\n\ud83d\udccf Modified: 2025-01-14T23:57:14.791Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28275", "creation_timestamp": "2025-01-15T00:18:34.000000Z"}, {"uuid": "716f86b0-8e88-41d1-8502-de994196c2ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28276", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1662", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28276\n\ud83d\udd39 Description: Windows Group Policy Security Feature Bypass Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:53.487Z\n\ud83d\udccf Modified: 2025-01-14T23:57:15.964Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28276", "creation_timestamp": "2025-01-15T00:17:58.000000Z"}, {"uuid": "84252b86-f5bc-442a-85f5-af093c34fd9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28277", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1660", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28277\n\ud83d\udd39 Description: Windows DNS Server Information Disclosure Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:54.540Z\n\ud83d\udccf Modified: 2025-01-14T23:57:17.343Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28277", "creation_timestamp": "2025-01-15T00:17:13.000000Z"}, {"uuid": "10b83fdb-9020-490a-a340-e46bee3f435c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28272", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T07:05:54.874000Z"}, {"uuid": "bd6feb89-b583-4898-9082-f880da2ddd86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28271", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T07:05:54.874000Z"}, {"uuid": "66586d99-29bb-4a30-8a3d-655f3bee4eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28272", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1669", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28272\n\ud83d\udd39 Description: Windows Kernel Elevation of Privilege Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:49.221Z\n\ud83d\udccf Modified: 2025-01-14T23:57:11.749Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28272", "creation_timestamp": "2025-01-15T00:20:22.000000Z"}, {"uuid": "6a9734c1-28e0-4375-a747-6077093cccf5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28273", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1667", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28273\n\ud83d\udd39 Description: Windows Clip Service Elevation of Privilege Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:50.830Z\n\ud83d\udccf Modified: 2025-01-14T23:57:12.979Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28273", "creation_timestamp": "2025-01-15T00:19:53.000000Z"}, {"uuid": "9fc7d46e-4db9-4dc0-9651-c916880bc945", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28274", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1666", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28274\n\ud83d\udd39 Description: Windows Win32k Elevation of Privilege Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:51.361Z\n\ud83d\udccf Modified: 2025-01-14T23:57:13.610Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28274", "creation_timestamp": "2025-01-15T00:19:33.000000Z"}, {"uuid": "ffec5df4-8109-4e69-91f5-f0a2dce8a2d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28271", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1670", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-28271\n\ud83d\udd39 Description: Windows Kernel Memory Information Disclosure Vulnerability\n\ud83d\udccf Published: 2023-04-11T19:13:48.698Z\n\ud83d\udccf Modified: 2025-01-14T23:57:11.125Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-28271", "creation_timestamp": "2025-01-15T00:20:35.000000Z"}, {"uuid": "64bf73f1-f36a-4b3f-b59b-13d8b153a3cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28274", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11481", "content": "#exploit\n\"Win32k Vulnerability Dead?\nTaking win32k Exploitation To The Next Level\", 2024.\n\n// CVE-2021-41357, CVE-2023-28274, CVE-2022-21882, CVE-2022-26914, CVE-2022-41113", "creation_timestamp": "2024-11-25T22:22:32.000000Z"}, {"uuid": "43687d06-ee00-4935-ac45-32e7aeacdb19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2827", "type": "seen", "source": "https://t.me/true_secator/4505", "content": "SAP \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u044e\u043d\u044c\u0441\u043a\u0438\u0439 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0438\u0439 8 \u043d\u043e\u0432\u044b\u0445 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0438 5 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043a \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u043c. \n\nSAP\u00a0\u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u043e\u0448\u0438\u0431\u043a\u0443 \u0445\u0440\u0430\u043d\u0438\u043c\u043e\u0433\u043e \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u043e\u0433\u043e \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f (XSS) \u0432 UI5 Variant Management. \n\n\u041e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2023-33991 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 8,2), \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043a \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044e \u0438 \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u0438.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u2014 \u044d\u0442\u043e \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 Plant Connectivity and Production Connector \u0434\u043b\u044f \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2023-2827 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 7,9).\n\n\u041e\u0448\u0438\u0431\u043a\u0443 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c\u0443 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044e \u0431\u0435\u0437 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u0442\u043e\u043a\u0435\u043d\u0430 JSON (JWT).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Onapsis, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0431\u0430 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b, \u0430 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043f\u043e\u0434\u043f\u0438\u0441\u0438 JWT \u0434\u043e\u043b\u0436\u043d\u0430 \u0431\u044b\u0442\u044c \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u0430 \u0432 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430\u0445 Cloud Connector.\n\n\u041d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 SAP \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0430 \u0434\u0432\u0435 \u0437\u0430\u043c\u0435\u0442\u043a\u0438 \u0434\u043b\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043e\u0448\u0438\u0431\u043e\u043a \u0432 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0435 \u0437\u043d\u0430\u043d\u0438\u0439 (CVE-2021-42063) \u0438 SAPUI5 (CVE-2023-30743).\n\n\u0418\u0437 \u0432\u043e\u0441\u044c\u043c\u0438 \u043d\u043e\u0432\u044b\u0445 \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u043d\u0438\u0439 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0448\u0435\u0441\u0442\u044c \u043a\u0430\u0441\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 XSS \u0432 NetWeaver, CRM ABAP (Grantor Management), CRM (\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0439 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 WebClient) \u0438 BusinessObjects.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 \u0437\u0430\u043c\u0435\u0442\u043a\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u043e\u0448\u0438\u0431\u043a\u0443 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 S/4HANA \u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f SQL \u0432 Master Data Synchronization.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u043d\u0438\u0435 \u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0438\u0437\u043a\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043e\u0442\u043a\u0430\u0437\u0430 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 (DoS) \u0432 NetWeaver (Change and Transport System).", "creation_timestamp": "2023-06-15T16:30:05.000000Z"}, {"uuid": "57441e67-875d-4083-9099-21ea2142f6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28271", "type": "seen", "source": "https://t.me/cibsecurity/61950", "content": "\u203c CVE-2023-28271 \u203c\n\nWindows Kernel Memory Information Disclosure Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-12T00:29:54.000000Z"}, {"uuid": "404c44c8-88a6-43b4-b883-14773312ceb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28278", "type": "seen", "source": "https://t.me/cibsecurity/61940", "content": "\u203c CVE-2023-28278 \u203c\n\nWindows DNS Server Remote Code Execution Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-12T00:29:39.000000Z"}, {"uuid": "9731ef71-7eae-42f9-a4b8-14d116a6338c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-28274", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/5242", "content": "#exploit\n\"Win32k Vulnerability Dead?\nTaking win32k Exploitation To The Next Level\", 2024.\n\n// CVE-2021-41357, CVE-2023-28274, CVE-2022-21882, CVE-2022-26914, CVE-2022-41113", "creation_timestamp": "2024-11-25T13:03:20.000000Z"}]}