{"vulnerability": "CVE-2023-3079", "sightings": [{"uuid": "1ba91e15-8ffb-42ec-935c-f0ec6793279e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "b9602cfd-4eaa-4c00-b78e-6f94760baa60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971829", "content": "", "creation_timestamp": "2024-12-24T20:34:34.377767Z"}, {"uuid": "daab5f50-6754-4579-ae80-d51bac8ef46b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lgazjvb7rm2p", "content": "", "creation_timestamp": "2025-01-21T14:05:49.213833Z"}, {"uuid": "9ed275da-2afd-4fff-8a76-b2c259aed8c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:42.000000Z"}, {"uuid": "c3821c60-60ea-4af4-99a9-f59947dcaaac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/418e040b-e593-47c7-9d0a-9595a5b0611e", "content": "", "creation_timestamp": "2026-02-02T12:26:57.758358Z"}, {"uuid": "78a96623-4235-41fd-a896-717390a61e51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "77b8ed0f-ef65-48a8-8a19-9a70a32b2a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1034", "content": "", "creation_timestamp": "2023-06-06T04:00:00.000000Z"}, {"uuid": "427133b1-96b7-4d6f-8547-5a9f33295210", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1035", "content": "", "creation_timestamp": "2023-06-07T04:00:00.000000Z"}, {"uuid": "fd74d6c9-4d8b-46d5-ae4a-409583f8724e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/mikrotik_rus/300", "content": "\ud83d\udea8 CVE-2023-30799", "creation_timestamp": "2023-07-20T11:10:28.000000Z"}, {"uuid": "82902fb3-df76-41b8-b622-cc758e7e978a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/itsec_news/3741", "content": "\u200b\u26a1\ufe0f\u042d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Google Chrome \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0448\u0435\u0441\u0442\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 2023 \u0433\u043e\u0434\u0443\n\n\ud83d\udcac Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Chrome, \u0447\u0442\u043e\u0431\u044b \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0441\u0435\u043c\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u0430\u044f \u043a\u0430\u043a CVE-2023-6345, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0439 \u0431\u0430\u0433 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0432 Skia, \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 2D \u0433\u0440\u0430\u0444\u0438\u043a\u0438. \u0415\u0451 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0411\u0435\u043d\u0443\u0430 \u0421\u0435\u0432\u0435\u043d\u0441 \u0438 \u041a\u043b\u0435\u043c\u0430\u043d \u041b\u0435\u0441\u0438\u043d\u044c \u0438\u0437 \u0413\u0440\u0443\u043f\u043f\u044b \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u0433\u0440\u043e\u0437 Google (TAG) 24 \u043d\u043e\u044f\u0431\u0440\u044f 2023 \u0433\u043e\u0434\u0430.\n\nGoogle \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b, \u0447\u0442\u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f CVE-2023-6345, \u043d\u043e \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438\u043b\u0438 \u0443\u0433\u0440\u043e\u0437\u0430\u0445, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0435\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c.\n\n\u041e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 2023 \u0433\u043e\u0434\u0430 Google \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u043b \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0432 Skia (CVE-2023-2136), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c. \u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c, \u0447\u0442\u043e CVE-2023-6345 \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u044d\u0442\u043e\u0442 \u043f\u0430\u0442\u0447.\n\nCVE-2023-2136 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443, \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0432\u0448\u0435\u043c\u0443 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433\u0430, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c \u043f\u043e\u0431\u0435\u0433 \u0438\u0437 \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0447\u0435\u0440\u0435\u0437 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e HTML-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u0433\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0441\u0435\u043c\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Chrome, \u0432\u043a\u043b\u044e\u0447\u0430\u044f:\n\nCVE-2023-2033 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8.8) - \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 V8,\nCVE-2023-2136 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9.6) - \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0432 Skia,\nCVE-2023-3079 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8.8) - \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 V8,\nCVE-2023-4762 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8.8) - \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 V8,\nCVE-2023-4863 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8.8) - \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 WebP,\nCVE-2023-5217 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8.8) - \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u043a\u0435 vp8 \u0432 libvpx.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 Chrome 119.0.6045.199/.200 \u0434\u043b\u044f Windows \u0438 119.0.6045.199 \u0434\u043b\u044f macOS \u0438 Linux, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0433\u0440\u043e\u0437\u044b. \u0422\u0430\u043a\u0436\u0435 \u0441\u043e\u0432\u0435\u0442\u0443\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 \u043d\u0430 \u0431\u0430\u0437\u0435 Chromium, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Microsoft Edge, Brave, Opera \u0438 Vivaldi, \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u0441\u0442\u0430\u043d\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-11-30T11:12:53.000000Z"}, {"uuid": "098ecb58-7128-438b-9fec-16f753e34918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/itsec_news/3885", "content": "\u200b\u26a1\ufe0fCVE-2023-7024: \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 0-day \u0432 Chrome \u0443\u0433\u0440\u043e\u0436\u0430\u0435\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432\n\n\ud83d\udcac \u0412\u0447\u0435\u0440\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Chrome, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0443\u0440\u043e\u0432\u043d\u0435\u0432\u0443\u044e zero-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0443\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 CVE-2023-7024 , \u043e\u043f\u0438\u0441\u0430\u043d\u0430 \u043a\u0430\u043a \u043e\u0448\u0438\u0431\u043a\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 WebRTC. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0431\u043e\u044f\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438\u043b\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u043e \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0435 \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0435. \u0412 Google \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2023-7024 \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0441\u0442\u0430\u043b\u0430 \u0432\u043e\u0441\u044c\u043c\u043e\u0439 \u043f\u043e \u0441\u0447\u0451\u0442\u0443 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u00abzero-day\u00bb \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 Chrome \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u0433\u043e\u0434\u0430.\n\n\u041a \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u043c \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f:\n\nCVE-2023-2033 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 8.8) \u2014 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 V8;\n\nCVE-2023-2136 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 9.6) \u2014 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0446\u0435\u043b\u043e\u0433\u043e \u0447\u0438\u0441\u043b\u0430 \u0432 Skia;\n\nCVE-2023-3079 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 8.8) \u2014 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 V8;\n\nCVE-2023-4762 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 8.8) \u2014 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 V8;\n\nCVE-2023-4863 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 8.8) \u2014 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 WebP;\n\nCVE-2023-5217 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 8.8) \u2014 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 vp8 \u0432 libvpx;\n\nCVE-2023-6345 (CVSS \u043e\u0446\u0435\u043d\u043a\u0430: 9.6) \u2014 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0446\u0435\u043b\u043e\u0433\u043e \u0447\u0438\u0441\u043b\u0430 \u0432 Skia.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u0441\u0430\u043c\u044b\u043c\u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u043c\u0438 \u0442\u0438\u043f\u0430\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 2023 \u0433\u043e\u0434\u0443 \u0441\u0442\u0430\u043b\u0438: \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430, \u043e\u0431\u0445\u043e\u0434 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u043e\u043c, \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435 \u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0432\u0432\u043e\u0434\u0430.\n\n\u0412\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Chrome \u043d\u0430 \u043b\u044e\u0431\u044b\u0445 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043d\u044b\u0445 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430\u0445 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u044e \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 \u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f. \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f \u0432\u0435\u0440\u0441\u0438\u044f 120.0.6099.129 \u0438 \u0441\u0432\u0435\u0436\u0435\u0435.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432, \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 Chromium, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Microsoft Edge, Brave, Opera, Vivaldi \u0438 \u042f\u043d\u0434\u0435\u043a\u0441 \u0411\u0440\u0430\u0443\u0437\u0435\u0440, \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u043d\u0438 \u0441\u0442\u0430\u043d\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-12-21T10:17:35.000000Z"}, {"uuid": "c25a6997-55db-43a5-8562-ce8d1d0c7913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/itsec_news/2654", "content": "\u200b\u26a1\ufe0fGoogle \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Chrome.\n\n\ud83d\udcac \u0412\u0447\u0435\u0440\u0430 Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Chrome, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2023-3079 , \u0431\u044b\u043b\u0430 \u043e\u043f\u0438\u0441\u0430\u043d\u0430 \u043a\u0430\u043a \u043e\u0448\u0438\u0431\u043a\u0430 \u00abType Confusion\u00bb (\u00ab\u041f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432\u00bb) \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 JavaScript V8. \u0421\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0438\u0437 \u0433\u0440\u0443\u043f\u043f\u044b \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u0433\u0440\u043e\u0437 Google TAG \u0441\u043e\u043e\u0431\u0449\u0438\u043b \u043e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435 1 \u0438\u044e\u043d\u044f \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0430\u043d\u043d\u044b\u043c NIST, \u043e\u0448\u0438\u0431\u043a\u0430 \u0432\u0432\u043e\u0434\u0430 V8 \u0432 Google Chrome \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 114.0.5735.110 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u00abHeap Corruption\u00bb (\u00ab\u041f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043a\u0443\u0447\u0438\u00bb) \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u0443\u044e HTML-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0433\u0438\u0433\u0430\u043d\u0442, \u043a\u0430\u043a \u044d\u0442\u043e \u043e\u0431\u044b\u0447\u043d\u043e \u0431\u044b\u0432\u0430\u0435\u0442, \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043e \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u0435 \u0430\u0442\u0430\u043a, \u043d\u043e \u043e\u0442\u043c\u0435\u0442\u0438\u043b, \u0447\u0442\u043e \u0435\u043c\u0443 \u00ab\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2023-3079 \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 (ITW)\u00bb.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Google \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u0443\u0436\u0435 \u0442\u0440\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Chrome \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430. \u041a \u0432\u044b\u0448\u0435\u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u043e\u0439 \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0432\u0441\u043f\u043e\u043c\u043d\u0438\u0442\u044c \u043e \u0434\u0432\u0443\u0445 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445:\nCVE-2023-2033 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 8,8) \u2014 Type Confusion \u0432 V8;\nCVE-2023-2136 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9,6) \u2014 Integer Overflow \u0432 Skia.\n\n\u0412\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f, \u0435\u0441\u043b\u0438 \u044d\u0442\u043e\u0433\u043e \u0435\u0449\u0451 \u043d\u0435 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u043e \u0432 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435, \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c Chrome \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 114.0.5735.110 \u0434\u043b\u044f Windows \u0438 114.0.5735.106 \u0434\u043b\u044f macOS \u0438 Linux \u0434\u043b\u044f \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437. \u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 \u043d\u0430 \u0431\u0430\u0437\u0435 Chromium, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Microsoft Edge, Brave, Opera \u0438 Vivaldi, \u0442\u0430\u043a\u0436\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e \u043c\u0435\u0440\u0435 \u0435\u0433\u043e \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-06-06T16:01:52.000000Z"}, {"uuid": "af6dcd2b-f248-4666-b38c-7ec4c295ea89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/I0hAgnRYYTC1y9bgXOtEEdG8u60nbzDCQqcUKiA5izDmWJ90", "content": "", "creation_timestamp": "2023-07-19T22:24:29.000000Z"}, {"uuid": "a93b27b6-9e5c-4dfa-91da-8628e63998e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/habr_com_news/19909", "content": "\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0438\u0437 VulnCheck \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0431\u0430\u0433 (\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-30799) \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e \u00ab\u0421\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0430\u00bb (Super Admin) \u0441\u0442\u0430\u0432\u0438\u0442 \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u0443 926 \u0442\u044b\u0441. \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 MikroTik \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n#\u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c #\u0442\u0435\u0445\u043d\u0438\u043a\u0430", "creation_timestamp": "2023-07-27T07:01:38.000000Z"}, {"uuid": "74049b94-883e-4c61-8fa4-fc4b148a4e6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/YrKlEtmqZ5dizKgm6CMZIS4BN_YtiV82x3-igcBpPL-XNqk5", "content": "", "creation_timestamp": "2025-05-05T00:13:37.000000Z"}, {"uuid": "d56ff1d1-8605-4a2c-8e30-6f4f4d729423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/OD0yNlme-8efGxd5jmPzuvO9mTtKhRFaBfS7YTBiC8nHvE1e", "content": "", "creation_timestamp": "2023-07-19T19:15:21.000000Z"}, {"uuid": "6764b247-35cf-4fbe-b57f-e560bda97a91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/RoFsdx_vYq372Swfks-cvrvAknaBTT04-fcH0qeCogBlCl2Y", "content": "", "creation_timestamp": "2025-02-19T08:07:04.000000Z"}, {"uuid": "9c68b592-3a5a-4794-a8c9-f798570d3925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/poxek/2965", "content": "\ud83d\udd25CVE-2023-3079(bug id: 1450481) -  Type Confusion in V8\n( 0-day, may have been actively exploited/ITW )\nReviewed here: 4584248 \"[ic] Fix store handler selection for arguments objects\"", "creation_timestamp": "2023-06-07T07:02:55.000000Z"}, {"uuid": "5aa99b7d-355a-4515-8f02-c64fd418dda7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/kasperskyb2b/694", "content": "\ud83d\udee1 \u0418\u044e\u043d\u044c\u0441\u043a\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439, \u043a\u0430\u0436\u0435\u0442\u0441\u044f, \u043f\u0440\u043e\u0448\u0451\u043b \u0441\u043f\u043e\u043a\u043e\u0439\u043d\u043e\n\n\u0412\u0447\u0435\u0440\u0430 \u0432\u0435\u0447\u0435\u0440\u043e\u043c \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043f\u0430\u043a\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0439 78 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 32 RCE. \u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u044d\u0442\u0438 \u0433\u0440\u043e\u0437\u043d\u044b\u0435 \u0446\u0438\u0444\u0440\u044b, \u0442\u043e\u043b\u044c\u043a\u043e \u0448\u0435\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043c\u0435\u0447\u0435\u043d\u044b  \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435, \u0438 \u043d\u0438 \u043e\u0434\u043d\u0430, \u043f\u043e\u0445\u043e\u0436\u0435, \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c\u0438 (\u043f\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u0438 \u043d\u0435 \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u0435\u043c \u0430\u043f\u0434\u0435\u0439\u0442\u044b Edge/Chromium, \u0442\u0430\u043c \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 CVE-2023-3079). \n\u0418\u0437 6 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0442\u0440\u0438 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043e\u0431\u044b\u0447\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u043e\u043c\u0443 Pragmatic General Multicast (PGM). \n\n\u0412\u0441\u0435\u0433\u043e  \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043e 18 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439,  10 \u2014 \u043a \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, 32 \u2014 \u043a \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 2 \u2014 \u043a \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\u0421\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043d\u0440\u0430\u0432\u0438\u0442\u044c\u0441\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c, \u043e\u0442\u043c\u0435\u0442\u0438\u043c:\n\ud83d\udfe0\u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 SharePoint (CVE-2023-29357, CVSS 9.8);\n\ud83d\udfe0RCE \u0432 Exchange Server \u0434\u043b\u044f \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 (CVE-2023-32031, CVSS 8.8);\n\ud83d\udfe0RCE \u0432 Outlook \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u044f (CVE-2023-33131, CVSS 8.8) \u0438 \u043f\u043e\u0445\u043e\u0436\u0438\u0435 RCE \u0432 Excel ( -33133 \u0438 -33137);\n\ud83d\udfe0Spoofing \u0432 OneNote (CVE-2023-33140, CVSS 6.5).\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2023-06-14T10:24:46.000000Z"}, {"uuid": "1f6426de-cff3-47f1-b2d2-2f545e0ebe13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/road_to_oscp/244", "content": "\u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043c\u0435\u0442\u043e\u0434\u043e\u043c \u043f\u0435\u0440\u0435\u0431\u043e\u0440\u0430 \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u0440\u044e, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 MikroTik RouterOS 6.x.\n\nhttps://github.com/j-baines/even-you-brutus\n\n\u0421\u043a\u0440\u0438\u043f\u0442, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0438\u0442\u044c \u0432\u0430\u043b\u0438\u0434\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 MikroTik RouterOS, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u0443\u044e \u0441\u0445\u0435\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Winbox. \u0414\u043b\u044f \u0435\u0433\u043e \u0440\u0430\u0431\u043e\u0442\u044b \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u0440\u0442 8291 \u0431\u044b\u043b \u043e\u0442\u043a\u0440\u044b\u0442.\n\nhttps://gist.github.com/j-baines/c484fc2988123bc4626efea74c316615\n\n\u0412\u0437\u044f\u0442\u043e \u0438\u0437 \u0441\u0442\u0430\u0442\u044c\u0438: \"Exploiting MikroTik RouterOS Hardware with CVE-2023-30799\"", "creation_timestamp": "2023-07-27T15:17:40.000000Z"}, {"uuid": "6ce8df7d-37fd-40ce-8874-2fd2c1aaeb04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/sanspie_notes/343", "content": "#mikrotik #cve\n\nRemote and authenticated attackers can use the vulnerability to get a root shell on the router. (CVE-2023-30799)\n\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-08-03T14:13:44.000000Z"}, {"uuid": "6027df63-ed5c-40ea-ad11-eed3f1c6d300", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "exploited", "source": "https://t.me/kasperskyb2b/769", "content": "\ud83d\udcf6 \u0421 \u043c\u0435\u0441\u0442 \u0440\u0430\u043f\u043e\u0440\u0442\u0443\u044e\u0442 \u043e \u043d\u043e\u0432\u043e\u0439-\u0441\u0442\u0430\u0440\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 MikroTik. CVE-2023-30799 (CVSS 9.2) \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0432\u0441\u0435 \u043c\u043e\u0434\u0435\u043b\u0438 \u0441 RouterOS \u0432\u043f\u043b\u043e\u0442\u044c \u0434\u043e 6.49.6.  \u041f\u0430\u0442\u0447 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 RouterOS stable 6.49.7, \u0430 \u0441\u0435\u0439\u0447\u0430\u0441 \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u0434\u043b\u044f RouterOS Long-term 6.49.8.  \n\n\u0411\u0430\u0433 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e, \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043a\u0430\u043a \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440, \u043f\u043e\u0434\u043d\u044f\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0441\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0430.  \u042d\u0442\u0438 \u043f\u0440\u0430\u0432\u0430 \u043d\u0435 \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u044b \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0432\u043d\u043e\u0441\u0438\u0442\u044c \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0430\u0432\u0442\u043e\u0440 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0441\u043f\u0440\u0430\u0432\u0435\u0434\u043b\u0438\u0432\u043e \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u0441\u0432\u043e\u0439 PoC remote jailbreak.  \u0412\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0441\u044c \u0442\u0430\u043a\u0438\u043c\u0438 \u043f\u0440\u0430\u0432\u0430\u043c\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043d\u0430 \u0440\u043e\u0443\u0442\u0435\u0440\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e \u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u0435\u0433\u043e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u043e\u0442 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430. \u041a \u0441\u043e\u0436\u0430\u043b\u0435\u043d\u0438\u044e, \u044d\u0442\u043e\u0439 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043a\u0430\u043a \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0441\u0435\u0442\u044c \u0438\u0437 SOCKS proxy  \u0434\u043b\u044f \u0441\u0434\u0430\u0447\u0438 \u0432 \u0430\u0440\u0435\u043d\u0434\u0443), \u0442\u0430\u043a \u0438 APT (\u0437\u0430\u043c\u0435\u0442\u0430\u0442\u044c \u0441\u043b\u0435\u0434\u044b).\n\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 \u043d\u0435 \u043c\u0430\u043b\u0430, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0447\u0442\u043e \u0440\u043e\u0443\u0442\u0435\u0440\u044b MikroTik \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0441\u043e \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u043c \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u043e\u043c admin, \u043d\u0435 \u0437\u0430\u0449\u0438\u0449\u0430\u044e\u0442 \u043e\u0442 \u043f\u0435\u0440\u0435\u0431\u043e\u0440\u0430 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u044e\u0442 \u043f\u0440\u0438\u043c\u0438\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438, \u0430 \u0434\u043e 2021 \u0433\u043e\u0434\u0430 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u043f\u0430\u0440\u043e\u043b\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0431\u044b\u043b \u0432\u043e\u043e\u0431\u0449\u0435 \u043f\u0443\u0441\u0442\u044b\u043c. \u0421\u0442\u043e\u0438\u0442 \u0443\u0447\u0435\u0441\u0442\u044c, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u043a\u0430\u043a \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441, \u0442\u0430\u043a \u0438 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0440\u043c\u0435\u043d\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u043c\u0435\u043d\u0435\u0434\u0436\u043c\u0435\u043d\u0442\u0430 Winbox. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u044e\u0442 \u0447\u0438\u0441\u043b\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432 \u0432 900 000.\n\n\u0412\u044b\u0432\u043e\u0434\u044b \u0434\u043b\u044f \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432 \u043f\u0440\u043e\u0441\u0442\u044b: \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0439\u0442\u0435 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438, \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0439\u0442\u0435 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441 \u043d\u0435\u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u043c \u0438\u043c\u0435\u043d\u0435\u043c \u0438 \u0441\u043b\u043e\u0436\u043d\u044b\u043c \u043f\u0430\u0440\u043e\u043b\u0435\u043c, \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 admin \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0439\u0442\u0435.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2023-07-26T11:46:30.000000Z"}, {"uuid": "bf2bc771-a339-4e01-9153-91f13fdc2947", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/ctinow/126385", "content": "https://ift.tt/4DuXcQe\nMikroTik vulnerability could be used to hijack 900,000 routers (CVE-2023-30799)", "creation_timestamp": "2023-07-26T16:18:28.000000Z"}, {"uuid": "e950d0c0-659f-428c-a339-dc1370891515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30790", "type": "seen", "source": "Telegram/hbhkVLHn8Z2v4uRfOTwrOteRDb0ln3EG8HnnnnxvE5H3hCTq", "content": "", "creation_timestamp": "2025-02-06T02:40:19.000000Z"}, {"uuid": "a8d56a0f-24b3-4b17-9d2d-ca5ef15daa0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/ctinow/116546", "content": "https://ift.tt/5PtC9Tr\nExploited zero-day patched in Chrome (CVE-2023-3079)", "creation_timestamp": "2023-06-07T12:56:54.000000Z"}, {"uuid": "e0be31d3-ebca-499e-a032-8cc34ecab388", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "Telegram/J5e0ymwMuElFk6tzqcIsxZ9vMNLR3XO22TaPZ7Iucboy", "content": "", "creation_timestamp": "2023-10-24T13:30:49.000000Z"}, {"uuid": "8b4f16ec-7648-47e8-9cc3-11709f9bf40a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/Shade_Black_Hacker/469", "content": "Exploiting MikroTik RouterOS Hardware with CVE-2023-30799 - Blog - VulnCheck\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-08-05T07:42:12.000000Z"}, {"uuid": "ccea04b9-8162-4133-a560-06c2a944cc73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/-Vw6YO9mtulx_zggb-I5Df5J_Tz-2D6t4AOBAu49ATGU", "content": "", "creation_timestamp": "2024-12-08T19:26:54.000000Z"}, {"uuid": "0b27b04d-1227-466b-ab95-6b88ae050dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/Shade_Black_Hacker/688", "content": "\ud83d\udc7eHookBot Android Malware Leak : https://system32.ink/hookbot-android-malware-leak/\n\n\ud83d\udd30CVE-2023-3079 Exploit : https://system32.ink/cve-2023-3079-exploit/\n\n\ud83d\udca5Smoothie King Data Leak : https://system32.ink/smoothie-king-data-leak/\n\n\u26a1Padna Compressor Company Data Leak : https://system32.ink/padna-compressor-company-data-leak/", "creation_timestamp": "2023-09-30T20:01:41.000000Z"}, {"uuid": "d5b589bf-d0e7-40ec-b910-af404ef1a33c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "Telegram/qToAS4YEOS1iBIZgbHN8NlAVkce_RQNjVb47UoaEUJiuqvw", "content": "", "creation_timestamp": "2023-06-07T14:23:11.000000Z"}, {"uuid": "a842c1bb-1a8e-489e-848d-fb921076fa2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "Telegram/JjtTWPiWWiM54f76TC6itB0IIg6sRGB4Pcu226OO1yPzT10", "content": "", "creation_timestamp": "2023-06-14T19:45:13.000000Z"}, {"uuid": "11808221-3f1a-40c5-b49e-6b7bc68df7ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "Telegram/lVInuV1J34_1YwD69mHjJnlTrHyUsxo_GgjOPmkgKEZnug", "content": "", "creation_timestamp": "2023-06-06T12:57:36.000000Z"}, {"uuid": "61ae7313-ff40-4e4d-9a6b-a1446cceb2a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/mPDS4HnOSLOxKMX1Qzp_m8dfcOJ3JdLDxYcV7g3s6jQaNg", "content": "", "creation_timestamp": "2023-07-26T08:44:24.000000Z"}, {"uuid": "16b2cb69-7952-4ae5-a31f-0a9873d83df8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/KomunitiSiber/547", "content": "Critical MikroTik RouterOS Vulnerability Exposes Over Half a Million Devices to Hacking\nhttps://thehackernews.com/2023/07/critical-mikrotik-routeros.html\n\nA severe privilege escalation issue impacting MikroTik RouterOS could be weaponized by remote malicious actors to execute arbitrary code and seize full control of vulnerable devices.\nCataloged as\u00a0CVE-2023-30799\u00a0(CVSS score: 9.1), the shortcoming is expected to put approximately 500,000 and 900,000 RouterOS systems at risk of exploitation via their web and/or Winbox interfaces, respectively,", "creation_timestamp": "2023-07-26T07:52:41.000000Z"}, {"uuid": "cd68372c-2da7-4072-a8ac-ef4ea53dd4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/hunter4good/226", "content": "https://twitter.com/HunterMapping/status/1684141511565516800\n\ud83d\udea8Alert\ud83d\udea8 CVE-2023-30799 #MikroTik #RouterOS privilege escalation\n\ud83e\uddf7https://hunter.how/list?searchValue=product.name%3D%22MikroTik%20RouterOS%22\n\n\ud83d\udc47\ud83c\udffb Other Dorks \ud83d\udc47\ud83c\udffb\nFOFA app=\"MIKROTIK-Router\"\nShodan os:\"MikroTik RouterOS\"\n\nRefer to \ud83d\udcbb:\nhttps://thehackernews.com/2023/07/critical-mikrotik-routeros.html\n#EXP \ud83d\udd27: https://github.com/MarginResearch/FOISted\n#Infosys #infosec #informationsecurity", "creation_timestamp": "2023-07-26T12:47:24.000000Z"}, {"uuid": "e9feec82-282f-4299-b05d-a3301c244af5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/2436", "content": "CVE-2023-3079(bug id: 1450481) -  Type Confusion in V8\n( 0-day, may have been actively exploited/ITW )\nReviewed here: 4584248 \"[ic] Fix store handler selection for arguments objects\"", "creation_timestamp": "2023-06-07T07:20:45.000000Z"}, {"uuid": "de3212b4-18bc-44bf-9201-380fa7b57591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/KomunitiSiber/317", "content": "Zero-Day Alert: Google Issues Patch for New Chrome Vulnerability - Update Now!\nhttps://thehackernews.com/2023/06/zero-day-alert-google-issues-patch-for.html\n\nGoogle on Monday released security updates to patch a high-severity flaw in its Chrome web browser that it said is being actively exploited in the wild.\nTracked as\u00a0CVE-2023-3079, the vulnerability has been described as a type confusion bug in the V8 JavaScript engine. Clement Lecigne of Google's Threat Analysis Group (TAG) has been credited with reporting the issue on June 1, 2023.\n\"Type", "creation_timestamp": "2023-06-06T13:17:20.000000Z"}, {"uuid": "5031e82a-ddaf-4a6e-8fbf-7d799c306259", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/proxy_bar/1684", "content": "CVE-2023-3079 google chrome\n*\nexploit", "creation_timestamp": "2023-08-23T14:13:57.000000Z"}, {"uuid": "46092214-1b4d-4d17-974e-a0b918cb5108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "Telegram/3WYRH0bo2MNDLrhSCITnoWDcs0p_0YvqrjhvEwMZJoDzpA", "content": "", "creation_timestamp": "2023-08-20T18:48:05.000000Z"}, {"uuid": "9b3cee77-90f5-45f8-b060-c4c8e75bf39e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "Telegram/5y_JnMS3EjNnSkOxeqFuAT49dxAZP02DAynaZHhPQlGz2g", "content": "", "creation_timestamp": "2023-08-18T18:47:42.000000Z"}, {"uuid": "4fde6daf-234f-4a52-8062-cbf445fb134a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/breachdetector/321273", "content": "{\n  \"Source\": \"https://www.turkhackteam.org/\",\n  \"Content\": \"CVE-2023-3079 le Taray\u0131c\u0131 A\u00e7\u0131\u011f\u0131 Nedir ?\", \n  \"author\": \" (SerasZen)\",\n  \"Detection Date\": \"21 Aug 2023\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2023-08-21T21:17:37.000000Z"}, {"uuid": "a6a72a25-70d8-4353-9d2b-6b2d9d1126d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/JerusalemElectronicArmy/633", "content": "#\u0623\u062e\u0628\u0627\u0631_\u0627\u0644\u0633\u0627\u064a\u0628\u0631\n\u062a\u062d\u062f\u064a\u062b \u0623\u0645\u0646\u064a \u0639\u0627\u062c\u0644 \u0644\u0645\u062a\u0635\u0641\u062d  Google Chrome \u064a\u0648\u0645 \u0627\u0644\u0623\u0631\u0628\u0639\u0627\u0621 \u064a\u0647\u062f\u0641 \u0627\u0644\u062a\u062d\u062f\u064a\u062b  \u0644\u0625\u0635\u0644\u0627\u062d\u0627\u062a \u0644\u0645\u0639\u0627\u0644\u062c\u0629 \u062b\u063a\u0631\u0627\u062a \u062e\u0637\u064a\u0631\u0629  \u062a\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0628\u0634\u0643\u0644 \u0646\u0634\u0637 \u0641\u064a \u0627\u0644\u0645\u062a\u0635\u0641\u062d.\n\u062a\u0645 \u0623\u0636\u0627\u0641\u0629 \u0631\u0642\u0645 \u062a\u062a\u0628\u0639 \u0644\u0644\u062b\u063a\u0631\u0629 : \"CVE-2023-5217-heap-based buffer overflow\" \n\u0627\u0631\u062a\u0641\u0639 \u0639\u062f\u062f \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0648\u0627\u0633\u062a\u063a\u0644\u0627\u0644\u0647\u0627 \u0641\u064a \u0645\u062a\u0635\u0641\u062d \u062c\u0648\u062c\u0644 \u0643\u0631\u0648\u0645 \u0625\u0644\u0649 5 \u062b\u063a\u0631\u0627\u062a \u0647\u0630\u0627 \u0627\u0644\u0639\u0627\u0645. \nCVE-2023-2033 (CVSS score: 8.8) - Type confusion in V8\nCVE-2023-2136 (CVSS score: 9.6) - Integer overflow in Skia\nCVE-2023-3079 (CVSS score: 8.8) - Type confusion in V8\nCVE-2023-4863 (CVSS score: 8.8) - Heap buffer overflow in WebP\n\u0644\u0645\u0632\u064a\u062f \u0645\u0646 \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644: \u0623\u0646\u0642\u0631 \u0647\u0646\u0627 \n#\u062c\u064a\u0634_\u0627\u0644\u0642\u062f\u0633_\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a", "creation_timestamp": "2023-09-28T11:50:41.000000Z"}, {"uuid": "694a7ff9-0833-41e6-a3f2-c0260a9b3fa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "Telegram/XULQ1z3mVPfXxGp-jl7OkKzevhkAnDt89Vg70kUreoH08wg", "content": "", "creation_timestamp": "2024-08-28T18:13:43.000000Z"}, {"uuid": "b4c732f6-dfb0-4177-811a-626fb4f1104a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "Telegram/AAYJThObwzx3ltMwj4pSUFMVRbjEiDNB-rsDZFFJVxXSPhM", "content": "", "creation_timestamp": "2023-08-18T10:29:41.000000Z"}, {"uuid": "deca0459-61da-4c98-9999-4ef0ebabe6d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/CyberSecurityIL/23959", "content": "\u05e9\u05d1\u05d5\u05e2 \u05d0\u05d7\u05e8\u05d9 \u05d4\u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05e7\u05d5\u05d3\u05dd \u05d2\u05d5\u05d2\u05dc \u05de\u05e9\u05d7\u05e8\u05e8\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05e0\u05d5\u05e1\u05e3 \u05dc\u05db\u05e8\u05d5\u05dd \u05dc\u05e1\u05d2\u05d5\u05e8 \u05d7\u05d5\u05dc\u05e9\u05ea Zero Day \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\"\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05d4\u05d7\u05d3\u05e9\u05d4- CVE-2023-3079 \u05de\u05d5\u05d2\u05d3\u05e8\u05ea \u05d1\u05e8\u05de\u05ea \u05e1\u05d9\u05db\u05d5\u05df \u05d2\u05d1\u05d5\u05d4\u05d4 \u05d0\u05da \u05d1\u05e9\u05dc\u05d1 \u05d6\u05d4 \u05dc\u05d0 \u05e4\u05d5\u05e8\u05e1\u05de\u05d5 \u05e4\u05e8\u05d8\u05d9\u05dd \u05d8\u05db\u05e0\u05d9\u05d9\u05dd \u05e0\u05d5\u05e1\u05e4\u05d9\u05dd.\n\n\u05de\u05d3\u05d5\u05d1\u05e8 \u05d1\u05d7\u05d5\u05dc\u05e9\u05ea Zero-Day \u05d4\u05e9\u05dc\u05d9\u05e9\u05d9\u05ea \u05d0\u05d5\u05ea\u05d4 \u05de\u05ea\u05e7\u05e0\u05ea \u05d2\u05d5\u05d2\u05dc \u05de\u05ea\u05d7\u05d9\u05dc\u05ea \u05d4\u05e9\u05e0\u05d4.\n\n\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05e2\u05d3\u05db\u05e0\u05d9\u05d5\u05ea:\n114.0.5735.106 (Mac, Linux)\n114.0.5735.110 (Windows)\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 \u05e4\u05d5\u05e8\u05e1\u05de\u05d4 \u05d1\u05e4\u05d9\u05d3 \u05d4\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea \u05d4\u05d6\u05de\u05d9\u05df \u05dc\u05d0\u05dc\u05d5 \u05d4\u05ea\u05d5\u05de\u05db\u05d9\u05dd \u05d1\u05e2\u05e8\u05d5\u05e5 \u05d0\u05ea\u05de\u05d5\u05dc \u05d1\u05dc\u05d9\u05dc\u05d4.\n\nhttps://t.me/CyberSecurityIL/3219\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2023-06-06T16:13:56.000000Z"}, {"uuid": "9e14b7fe-8050-46dc-851b-5238082453a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/1001", "content": "\u0633\u0631\u062f\u0631\u06af\u0645\u06cc \u062a\u0627\u06cc\u067e \u062f\u0631 V8 \u062f\u0631 Google Chrome \u0642\u0628\u0644 \u0627\u0632 114.0.5735.110 \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0627\u062f \u062a\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u06cc\u06a9 \u0635\u0641\u062d\u0647 HTML \u062f\u0633\u062a\u06a9\u0627\u0631\u06cc \u0634\u062f\u0647 \u0628\u0647 \u0637\u0648\u0631 \u0628\u0627\u0644\u0642\u0648\u0647 \u0627\u0632 \u062e\u0631\u0627\u0628\u06cc \u067e\u0634\u062a\u0647 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0646\u062f.  (\u0634\u062f\u062a \u0627\u0645\u0646\u06cc\u062a\u06cc \u06a9\u0631\u0648\u0645: \u0628\u0627\u0644\u0627)\n\nCVE-2023-3079 :\u00a0 Type confusion in V8 in Google Chrome &lt;= 114.0.5735.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. \nPOC : https://github.com/mistymntncop/CVE-2023-3079\nseverity: High", "creation_timestamp": "2024-02-01T11:43:01.000000Z"}, {"uuid": "5a459bab-8764-4c36-91c9-524f7dde9841", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/true_secator/4836", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f 0-day \u0432 Chrome 116.\n\nCVE-2023-4863, \u0438\u043c\u0435\u044e\u0449\u0430\u044f \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 WebP, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u0441\u0431\u043e\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\nWebP - \u044d\u0442\u043e \u0444\u043e\u0440\u043c\u0430\u0442 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u043d\u043e\u0435 \u0441\u0436\u0430\u0442\u0438\u0435 \u0438 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u043e \u043f\u043e \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044e \u0441 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0444\u043e\u0440\u043c\u0430\u0442\u0430\u043c\u0438 JPEG \u0438 PNG \u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u0432\u0441\u0435\u043c\u0438 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u043c\u0438 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430\u043c\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Chrome, Firefox, Safari, Edge \u0438 Opera.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u044f\u043c Google, \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f CVE-2023-4863 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u041e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e 6 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f \u043f\u043e\u0441\u043b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f Apple Security Engineering and Architecture (SEAR) \u0438 Citizen Lab, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043a\u0430\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043d\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0438 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 spyware.\n\n\u041a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e, Google \u0432\u043e\u0437\u0434\u0435\u0440\u0436\u0430\u043b\u0430\u0441\u044c \u043e\u0442 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0431\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u043c\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u041d\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0437\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0441\u0442\u043e\u044f\u043b\u0438 SEAR \u0438 Citizen Lab, \u0441 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u0434\u043e\u043b\u0435\u0439 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0433\u043e \u041f\u041e.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043f\u0430\u0442\u0447 Google Chrome \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a Apple \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u0430 \u043e\u0431 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438\u00a00-day \u0432 iOS \u0438 macOS, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 Citizen Lab \u0432 \u0445\u043e\u0434\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441\u043e \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u0438\u043c \u041f\u041e Pegasus \u043e\u0442 NSO Group.\n\nCVE-2023-4863\u00a0- \u044d\u0442\u043e \u0443\u0436\u0435 \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u0430\u044f 0-day, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f Google \u0432 Chrome \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u043f\u043e\u0441\u043b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f CVE-2023-3079\u00a0(\u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8) \u0432 \u0438\u044e\u043d\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 CVE-2023-2033\u00a0(\u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0442\u0438\u043f\u043e\u0432 \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8) \u0438\u00a0CVE-2023-2136 (\u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0432 Skia) \u0432 \u0430\u043f\u0440\u0435\u043b\u0435.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0432\u0435\u0440\u0441\u0438\u044f Chrome \u0442\u0435\u043f\u0435\u0440\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043a\u0430\u043a 116.0.5845.187 \u0434\u043b\u044f macOS \u0438 Linux \u0438 \u043a\u0430\u043a \u0432\u0435\u0440\u0441\u0438\u0438 116.0.5845.187/.188 \u0434\u043b\u044f Windows.", "creation_timestamp": "2023-09-12T14:01:05.000000Z"}, {"uuid": "b0605fca-e0cb-462d-9a4f-40e911953a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/true_secator/4657", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u0435\u0442 \u0440\u0438\u0441\u043a\u0443 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0431\u043e\u043b\u0435\u0435 900 000 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 MikroTik RouterOS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0441\u043a\u0440\u044b\u0442\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u043e\u0442\u0447\u0435\u0442\u0443 VulnCheck, CVE-2023-30799\u00a0\u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u044c\u044e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0441\u0443\u043f\u0435\u0440-\u0430\u0434\u043c\u0438\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 Winbox \u0438\u043b\u0438 HTTP.\n\n\u042d\u0441\u043a\u0430\u043b\u0438\u0440\u0443\u044f \u0434\u043e \u0441\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 RouteOS.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u043c\u0430\u0441\u0441\u043e\u0432\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u0443\u0434\u0435\u0442 \u043d\u0435 \u0442\u0430\u043a \u0442\u0440\u0438\u0432\u0438\u0430\u043b\u044c\u043d\u0430, \u0432 \u0432\u0438\u0434\u0443 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0447\u0442\u043e \u0432\u043f\u043e\u043b\u043d\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u043c\u043e, \u0432\u0435\u0434\u044c Mikrotik RouterOS \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0431\u0440\u0443\u0442\u0430 \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0441 \u0434\u0435\u0444\u043e\u043b\u0442\u043d\u044b\u043c admin.\n\nCVE-2023-30799 \u0431\u044b\u043b\u0430 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0431\u0435\u0437 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u0430 \u0432 \u0438\u044e\u043d\u0435 2022 \u0433\u043e\u0434\u0430, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 \u0442\u043e\u0433\u043e \u0436\u0435 \u0433\u043e\u0434\u0430 \u0432 RouterOS v6.49.7 \u0438 v6.49.8 (\u0434\u043e\u043b\u0433\u043e\u0441\u0440\u043e\u0447\u043d\u0430\u044f \u0432\u0435\u043a\u0430).\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0430\u043b\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043e\u043d\u0438 VulnCheck \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u043d\u043e\u0432\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u043c\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u043d\u0430 MikroTik.\n\n\u0417\u0430 \u043e\u0441\u043d\u043e\u0432\u0443 \u0431\u044b\u043b \u0432\u0437\u044f\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 FOISted RouterOS \u043e\u0442 Margin Research.\n\n\u041d\u043e\u0432\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0442 VulnCheck \u043e\u0431\u0445\u043e\u0434\u0438\u0442 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0430 FTP, \u0438 \u043d\u0430 \u043d\u0435\u0433\u043e \u043d\u0435 \u0432\u043b\u0438\u044f\u0435\u0442 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0430 \u0438\u043b\u0438 \u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u044f \u0431\u0438\u043d\u0434\u0448\u0435\u043b\u043b\u043e\u0432, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043e\u043d \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u0435\u0431-\u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441 RouterOS \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u041f\u043e \u0438\u0442\u043e\u0433\u0443 \u0432\u0441\u0435\u0445 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u043d\u0438\u0439 \u0441 ROP \u0438 \u0432\u044b\u0437\u043e\u0432\u043e\u043c dlopen, \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u0448\u0438\u0440\u043e\u043a\u0443\u044e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 OS.\n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e Shodan \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u0442 \u0431\u043e\u043b\u0435\u0435 474 000 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 (\u0430 \u0435\u0441\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0447\u0435\u0440\u0435\u0437 Winbox - \u043e\u043a\u043e\u043b\u043e 926 000), \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 VulnCheck \u0440\u0435\u0448\u0438\u043b\u0438 \u043d\u0435 \u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u0442\u044c PoC, \u043f\u043e\u043b\u0430\u0433\u0430\u044f \u043f\u0440\u043e\u0441\u0442\u043e\u0442\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438 \u0432\u044b\u0441\u043e\u043a\u0438\u0435 \u0440\u0438\u0441\u043a\u0438 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a.\n\n\u0412\u0435\u0434\u044c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 MikroTik \u043c\u043d\u043e\u0433\u043e \u0440\u0430\u0437 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u0442\u0430\u043a\u0430\u043c \u0438 \u043d\u0435\u043f\u0440\u0435\u0434\u043d\u0430\u043c\u0435\u0440\u0435\u043d\u043d\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044e \u0432\u043d\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 DDoS-\u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0430\u043a\u043e\u0439 \u043a\u0430\u043a M\u0113ris.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f RouterOS, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0447\u0438\u0441\u043b\u043e \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0430\u0442\u0430\u043a, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0432\u043e\u0437\u0440\u0430\u0441\u0442\u0435\u0442.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044e\u0442 \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u044b \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430, \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0438\u0432\u0430\u0442\u044c IP-\u0430\u0434\u0440\u0435\u0441\u0430 \u0434\u043b\u044f \u0432\u0445\u043e\u0434\u0430 \u0441\u043f\u0438\u0441\u043a\u043e\u043c \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u0439, \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c Winbox \u0432 \u043f\u043e\u043b\u044c\u0437\u0443 SSH.", "creation_timestamp": "2023-07-26T11:07:06.000000Z"}, {"uuid": "b0c5fa0c-65c4-4167-929d-53c93d8f1341", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "exploited", "source": "https://t.me/true_secator/4470", "content": "Google \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0442\u0440\u0435\u0442\u0438\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0439 \u0437\u0430 \u044d\u0442\u043e\u0442 \u0433\u043e\u0434 0-day, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Chrome 114.\n\n\u041f\u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0432\u0435\u0440\u0441\u0438\u044f Chrome \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0434\u0432\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435\u00a0CVE-2023-3079, \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u044b \u0442\u0438\u043f\u043e\u0432, \u0432\u043b\u0438\u044f\u044e\u0449\u0443\u044e \u043d\u0430 \u0434\u0432\u0438\u0436\u043e\u043a JavaScript V8.\n\n\u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u0433\u0438\u0433\u0430\u043d\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u043b, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f 1 \u0438\u044e\u043d\u044f, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u043e \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u043b \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0431\u0430\u0433\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0435\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u041a\u043b\u0435\u043c\u0435\u043d\u0442\u043e\u043c \u041b\u0435\u0441\u0438\u043d\u0435\u043c \u0438\u0437 Google TAG, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e CVE-2023-3079, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u044b\u043b\u0430 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0430 \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0433\u043e \u041f\u041e.\n\nGoogle \u0443\u0436\u0435 \u043d\u0435 \u0440\u0430\u0437 \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0430, \u043a\u0430\u043a \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445\u00a0\u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0438 spyware\u00a0\u0438\u043d\u0442\u0435\u0433\u0440\u0438\u0440\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Chrome \u0432 \u0441\u043b\u043e\u0436\u043d\u044b\u0435 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Android.\n\n\u041f\u0440\u0438\u0447\u0435\u043c, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0435 \u0441\u043e\u0432\u043f\u0430\u043b\u043e \u0441 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 Google \u043e \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0438 \u043f\u0440\u0430\u0439\u0441\u0430 \u0434\u043e 180 000 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0441\u0432\u043e\u0435\u0439 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u0439\u00a0\u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043e\u043a \u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 \u043f\u043e\u043b\u043d\u043e\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0432\u044b\u0445\u043e\u0434\u0443 \u0438\u0437 \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0432 Chrome.\n\n\u041a\u0441\u0442\u0430\u0442\u0438, \u0432 2022 \u0433\u043e\u0434\u0443 Google \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0435\u0432\u044f\u0442\u044c 0-day \u0432 Chrome, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043f\u044f\u0442\u044c, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0435\u0435 \u0433\u0440\u0443\u043f\u043f\u043e\u0439 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u0433\u0440\u043e\u0437.\n\n\u041f\u0430\u0434\u0435\u043d\u0438\u0435 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0438, \u043d\u0430 \u043f\u0435\u0440\u0432\u044b\u0439 \u0432\u0437\u0433\u043b\u044f\u0434, \u043a\u0430\u0436\u0435\u0442\u0441\u044f \u0445\u043e\u0440\u043e\u0448\u0438\u043c \u043f\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430, \u043e\u0434\u043d\u0430\u043a\u043e, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u044d\u0442\u043e \u0434\u0430\u043b\u0435\u043a\u043e \u043e\u0442 \u043f\u0440\u0430\u0432\u0434\u044b.\n\n\u0413\u043b\u044f\u0434\u0438\u0448\u044c, \u043a \u043a\u043e\u043d\u0446\u0443 \u0433\u043e\u0434\u0430 \u0434\u043e\u0431\u0435\u0440\u0443\u0442 \u0447\u0438\u0441\u043b\u043e. \u0415\u0441\u043b\u0438 \u043d\u0435\u0442, \u0442\u043e \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 \u0410\u0420\u0422 \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u043c\u043e\u0433\u0443\u0442.", "creation_timestamp": "2023-06-06T17:05:05.000000Z"}, {"uuid": "88f85c96-80a4-481f-852f-3bf8de91f29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4162", "content": "\ud83d\udc7eHookBot Android Malware Leak : https://system32.ink/hookbot-android-malware-leak/\n\n\ud83d\udd30CVE-2023-3079 Exploit : https://system32.ink/cve-2023-3079-exploit/\n\n\ud83d\udca5Smoothie King Data Leak : https://system32.ink/smoothie-king-data-leak/\n\n\u26a1Padna Compressor Company Data Leak : https://system32.ink/padna-compressor-company-data-leak/", "creation_timestamp": "2023-08-20T18:46:58.000000Z"}, {"uuid": "1eddaa4a-9779-45f7-8219-12cc83d7cd59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30795", "type": "seen", "source": "https://t.me/cibsecurity/67954", "content": "\u203c CVE-2023-30795 \u203c\n\nA vulnerability has been identified in JT Open (All versions &lt; V11.4), JT Utilities (All versions &lt; V13.4), Parasolid V34.0 (All versions &lt; V34.0.253), Parasolid V34.1 (All versions &lt; V34.1.243), Parasolid V35.0 (All versions &lt; V35.0.177), Parasolid V35.1 (All versions &lt; V35.1.073). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T14:14:31.000000Z"}, {"uuid": "a7e81d4e-4bd4-497a-be87-ab7d6702b568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4148", "content": "\ud83d\udc7eHookBot Android Malware Leak : https://system32.ink/hookbot-android-malware-leak/\n\n\ud83d\udd30CVE-2023-3079 Exploit : https://system32.ink/cve-2023-3079-exploit/\n\n\ud83d\udca5Smoothie King Data Leak : https://system32.ink/smoothie-king-data-leak/\n\n\u26a1Padna Compressor Company Data Leak : https://system32.ink/padna-compressor-company-data-leak/", "creation_timestamp": "2023-08-18T18:46:30.000000Z"}, {"uuid": "38a2abcf-7100-42d4-bea1-81333247031c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/4190", "content": "\ud83d\udc7eHookBot Android Malware Leak : https://system32.ink/hookbot-android-malware-leak/\n\n\ud83d\udd30CVE-2023-3079 Exploit : https://system32.ink/cve-2023-3079-exploit/\n\n\ud83d\udca5Smoothie King Data Leak : https://system32.ink/smoothie-king-data-leak/\n\n\u26a1Padna Compressor Company Data Leak : https://system32.ink/padna-compressor-company-data-leak/", "creation_timestamp": "2023-08-25T05:33:28.000000Z"}, {"uuid": "fc06e2fd-0211-43eb-b12f-f3308fc282c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/cibsecurity/67006", "content": "\u203c CVE-2023-30799 \u203c\n\nMikroTik RouterOS stable before 6.49.7 and long-term through 6.48.6 are vulnerable to a privilege escalation issue. A remote and authenticated attacker can escalate privileges from admin to super-admin on the Winbox or HTTP interface. The attacker can abuse this vulnerability to execute arbitrary code on the system.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-19T18:21:48.000000Z"}, {"uuid": "2aaf1beb-84ed-4c6d-b725-f844f3d5f558", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30796", "type": "seen", "source": "https://t.me/cibsecurity/67956", "content": "\u203c CVE-2023-30796 \u203c\n\nA vulnerability has been identified in JT Open (All versions &lt; V11.4), JT Utilities (All versions &lt; V13.4). The affected applications contain an out of bounds read past the end of an allocated structure while parsing specially crafted JT files. This could allow an attacker to execute code in the context of the current process.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-08T14:14:38.000000Z"}, {"uuid": "0ef6cc04-3b7f-4a65-9f29-e6098f0c475b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30791", "type": "seen", "source": "https://t.me/cibsecurity/66774", "content": "\u203c CVE-2023-30791 \u203c\n\nPlane version 0.7.1-dev allows an attacker to change the avatar of his profile, which allows uploading files with HTML extension that interprets both HTML and JavaScript.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T22:13:23.000000Z"}, {"uuid": "474a07ab-4413-4c04-a5a7-fe694df2593b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30798", "type": "seen", "source": "https://t.me/cibsecurity/62623", "content": "\u203c CVE-2023-30798 \u203c\n\nThere MultipartParser usage in Encode's Starlette python framework before versions 0.25.0 allows an unauthenticated and remote attacker to specify any number of form fields or files which can cause excessive memory usage resulting in denial of service of the HTTP service.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-04-21T20:38:33.000000Z"}, {"uuid": "8b4056c5-6cf5-4f11-a427-0e396e5eae46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30790", "type": "seen", "source": "https://t.me/cibsecurity/63502", "content": "\u203c CVE-2023-30790 \u203c\n\nMonicaHQ version 4.0.0 allows an authenticated remote attacker to execute malicious code in the application via CSTI in the `people:id/relationships` endpoint and first_name and last_name parameter.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-05-09T00:47:59.000000Z"}, {"uuid": "0a7f01ca-050b-467f-b0a0-ea48f8e36ef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/information_security_channel/50052", "content": "Google Patches Third Chrome Zero-Day of 2023\nhttps://www.securityweek.com/google-patches-third-chrome-zero-day-of-2023/\n\nGoogle has released a Chrome 114 security update that patches CVE-2023-3079, the third zero-day vulnerability patched in the browser in 2023.\nThe post Google Patches Third Chrome Zero-Day of 2023 (https://www.securityweek.com/google-patches-third-chrome-zero-day-of-2023/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-06-06T11:57:59.000000Z"}, {"uuid": "bea0028f-8a37-447b-8fa9-9dbe724ada48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/thehackernews/3647", "content": "\ud83d\udea8 Heads up, network admins! \n \nMikroTik RouterOS vulnerability (CVE-2023-30799) exposes 500,000+ systems to potential exploitation!   \n \nRead: https://thehackernews.com/2023/07/critical-mikrotik-routeros.html \n \nUpgrade to RouterOS 6.49.8 or 7.x ASAP!", "creation_timestamp": "2023-07-26T07:06:26.000000Z"}, {"uuid": "4e478106-12c1-4fd7-a80b-f253aceb86f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/kuRtP95_bwqTzj7s5jrSfYah8B2nN-WlVBQbtzHXXkRid4vWgw", "content": "", "creation_timestamp": "2025-04-09T04:24:46.000000Z"}, {"uuid": "c182ba9d-0cf6-4a9a-93a3-a6cc7da03d2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7571", "content": "Exploiting MikroTik RouterOS Hardware with CVE-2023-30799\n\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-07-25T20:27:23.000000Z"}, {"uuid": "5390adfb-985d-40b2-8a7f-c0af57a267ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/964", "content": "https://github.com/mistymntncop/CVE-2023-3079\n#github", "creation_timestamp": "2023-08-30T09:31:26.000000Z"}, {"uuid": "66587b5d-ae4d-4754-aa98-6cc4f2436b4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "Telegram/R3dmg75m21qRaKQfqNH2xrWXCFHtj6HG2HSZ-XRnjPpnmv0", "content": "", "creation_timestamp": "2023-07-20T01:14:05.000000Z"}, {"uuid": "336e2cac-e25f-43dd-900d-3765f6ce1fb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8735", "content": "#Hardware_Security\n1. Zenbleed - vulnerability of AMD Zen2 processors (CVE-2023-20593)\nhttps://lock.cmpxchg8b.com/zenbleed.html\n2. Exploiting MikroTik RouterOS Hardware with CVE-2023-30799\nhttps://vulncheck.com/blog/mikrotik-foisted-revisited", "creation_timestamp": "2023-07-26T11:00:30.000000Z"}, {"uuid": "965b19a0-7626-4a31-9cc0-1ee2a3afea1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8865", "content": "#exploit\n1. CVE-2023-3079:\nType confusion in V8 in Google Chrome\nhttps://github.com/mistymntncop/CVE-2023-3079\n\n2. CVE-2023-38836:\nExploit for file upload vulnerability in BoidCMS &lt;=2.0.0\nhttps://github.com/1337kid/CVE-2023-38836", "creation_timestamp": "2023-08-17T12:25:33.000000Z"}, {"uuid": "bf6f52cd-7a12-482a-ad6c-d605b88d4298", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "published-proof-of-concept", "source": "Telegram/EIFxJITUDV8gcMx7pqF7TgzjgxOMYFmvaCKm6RSR5pXseFs", "content": "", "creation_timestamp": "2023-07-26T11:38:46.000000Z"}, {"uuid": "836543a8-790f-490d-b8c5-100032102597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-30799", "type": "seen", "source": "https://t.me/secmedia/1266", "content": "\u0420\u043e\u0443\u0442\u0435\u0440\u044b \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0430 MikroTik \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u043e\u0439 \u0438\u0437-\u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2023-30799 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u0442\u0430\u043a \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u043e\u0433\u043e \u00ab\u0441\u0443\u043f\u0435\u0440\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u00bb, \u0442\u043e \u0435\u0441\u0442\u044c \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e\u043c.", "creation_timestamp": "2023-07-27T09:20:03.000000Z"}, {"uuid": "83c78e37-bf6a-4a9c-8257-44c6114bedf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3079", "type": "seen", "source": "https://t.me/secmedia/1164", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0441 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2023-3079 \u0434\u043b\u044f \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Google Chrome. \u0412 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0443\u0442\u043e\u0447\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u0443\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b \u0441\u043b\u0443\u0447\u0430\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0434\u043d\u0430\u043a\u043e \u043d\u0435 \u0441\u0442\u0430\u043b\u0438 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0435 \u0434\u0435\u0442\u0430\u043b\u0438.", "creation_timestamp": "2023-06-08T15:06:38.000000Z"}]}