{"vulnerability": "CVE-2023-3306", "sightings": [{"uuid": "e7bcb8e8-2326-41df-b665-e3e912763916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33063", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-12-05T18:10:03.000000Z"}, {"uuid": "857be3ef-e65b-4b67-b97e-7d8ed72de56c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33063", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971932", "content": "", "creation_timestamp": "2024-12-24T20:35:48.274846Z"}, {"uuid": "7a9eb9a2-8134-4008-92cf-ce7dcd7ee3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33063", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:50.000000Z"}, {"uuid": "98358f81-e5c6-4f94-9947-c138704ae965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-33063", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/af9442cf-bf6a-4a3a-95e0-e90cda3e76be", "content": "", "creation_timestamp": "2026-02-02T12:26:45.015926Z"}, {"uuid": "0ef5ffc9-41a5-4bdb-9326-0a078a7c60ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5470", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1a\u9510\u6377RG-EW1200G\u767b\u5f55\u7ed5\u8fc7(CVE-2023-4415)\nURL\uff1ahttps://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-17T16:52:19.000000Z"}, {"uuid": "3b638e2d-1281-4185-a625-b6ea012e6eda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33068", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15787", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-33068\n\ud83d\udd25 CVSS Score: 6.7 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Memory corruption in Audio while processing IIR config data from AFE calibration block.\n\ud83d\udccf Published: 2024-02-06T05:47:08.274Z\n\ud83d\udccf Modified: 2025-05-09T16:30:15.436Z\n\ud83d\udd17 References:\n1. https://www.qualcomm.com/company/product-security/bulletins/february-2024-bulletin", "creation_timestamp": "2025-05-09T17:25:50.000000Z"}, {"uuid": "20a76fda-4ac3-4621-aaf2-ae6adf76ca0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/374", "content": "CVE-2023-4415\n\n#PentestGithub Ruijie Network RG-EW1200G Login Bypass\n\n\ud83d\udd17 https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415\n\n\ud83d\udcda ZeroEthical Course \ud83d\udc8e", "creation_timestamp": "2024-06-11T23:43:39.000000Z"}, {"uuid": "0490a228-1b80-46a3-a98d-afe3f2def979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/H-LUGS1vDc-v3WbEPcrrEeNZXrpB7Z8cJpI2_DXD1ZHD", "content": "", "creation_timestamp": "2023-10-22T23:10:42.000000Z"}, {"uuid": "f64131ac-6b32-43cb-81f6-a6ebb36891e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/4vjB-1Yh5QCz9nwhmj8EOfN-TTX_1FdXhXEcgdandg0L", "content": "", "creation_timestamp": "2023-10-22T17:46:15.000000Z"}, {"uuid": "125b5992-f37c-4995-af97-71ffae13a9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/40323", "content": "CVE-2023-4415\n\n#PentestGithub Ruijie Network RG-EW1200G Login Bypass\n\n https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "creation_timestamp": "2024-09-11T13:43:11.000000Z"}, {"uuid": "eb0d7060-a0aa-4a1e-bca5-3f2ee623d2ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/75vd624ybwr64p07ptUVTjietXigOntp4HG_RbadCWCohKE", "content": "", "creation_timestamp": "2024-07-13T01:34:04.000000Z"}, {"uuid": "9e78f616-6a4b-4bcd-92d6-bb07f3a19728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/3lvtpibS62oqfCL7Eo2rhIDUudhu8cbSt8JXNXbrV0GKkqMM", "content": "", "creation_timestamp": "2025-01-19T06:00:36.000000Z"}, {"uuid": "6f2e7260-9d01-49c3-b2de-221364092c77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/bAZNqwD6oRMclDEtcjDzZJLkwE3o_A7ENKuP3b-sT-KWH2e5", "content": "", "creation_timestamp": "2025-01-13T00:35:36.000000Z"}, {"uuid": "b4d2bab6-aa28-4567-b6cf-70e72cc5e503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/NvYtNR1LjJ1cL4yb-iyxCN6230a1b726sHAZcxVGrN-HyN3d", "content": "", "creation_timestamp": "2025-01-07T06:14:40.000000Z"}, {"uuid": "bf3d6f1d-a8f2-4331-9d16-9f7687093285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/GkzSDdDrkOfPTNBdDKye-TaMZYbtpQzKFoG6t_IZAiahllI", "content": "", "creation_timestamp": "2024-07-13T01:34:03.000000Z"}, {"uuid": "c8c961e2-47d0-4990-854a-f7bcd728f9ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/ID7p59RKd-6E3X-fh29I1EvOzHt-vwAGTNqCBbdlcTQNQt6k", "content": "", "creation_timestamp": "2024-11-12T01:17:04.000000Z"}, {"uuid": "653445ad-1c16-488e-a7ec-ee762966be64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/iC4w1nJgm40kE6QWVW1VwY2xLqtYU82CkF0gQ6odDMDWzcA", "content": "", "creation_timestamp": "2024-09-11T13:42:39.000000Z"}, {"uuid": "bf553aaa-5aa8-4806-88dd-0275b144e9b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/-0o3WJcqT_MG5jNnJY93XpVePqcJHI-jDpB5bqN2nAIgnyEb", "content": "", "creation_timestamp": "2024-12-20T10:39:20.000000Z"}, {"uuid": "ce68b5ec-e1ad-4a0d-8841-d5337512a330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/FM2x9mDUs9H36rhH_YJwqbkZz2BVZsku7Z3AAwYgGV_tNL8", "content": "", "creation_timestamp": "2024-07-13T17:07:38.000000Z"}, {"uuid": "bab47394-d156-4f56-9674-5a463c322eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/yXzprNJ74X0FdHFLGA4qgRDciLvai9qlVR4iLCcESNR7I5Y", "content": "", "creation_timestamp": "2024-07-13T17:07:39.000000Z"}, {"uuid": "75e70b37-4893-4622-893d-3fb04de9c08a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/3LeuXRvI94_7gzYlBGKCtqWdMWs9b32PbXi3owari2y_KwE", "content": "", "creation_timestamp": "2024-07-13T01:34:04.000000Z"}, {"uuid": "07a69663-61e7-461c-b982-5412cce72e20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/02GhcNy0qdjHA-_DA8_ubujA9998cXmSRJSFnGiJAI_KImKE", "content": "", "creation_timestamp": "2025-01-13T00:35:32.000000Z"}, {"uuid": "81ae5a81-df90-40f2-bbb5-75c44e26f302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/5EBmvKkOnn4Ezx57PZvkyWn9hqR_3NUJpNO-3JoCXLV2m-42", "content": "", "creation_timestamp": "2024-12-20T10:39:16.000000Z"}, {"uuid": "38561818-4a77-49bd-a14f-b19cc2dd8812", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33062", "type": "seen", "source": "https://t.me/cibsecurity/74154", "content": "\u203c\ufe0fCVE-2023-33062\u203c\ufe0f\n\nTransient DOS in WLAN Firmware while parsing a BTM request.\n\n\ud83d\udcd6 Read more\n\nVia \"National Vulnerability Database\"", "creation_timestamp": "2024-01-03T01:33:26.000000Z"}, {"uuid": "cca5a953-1bad-4cc6-9bc9-0e513f295a60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/tjf8PwbZUGZdmmzSGyW-2ZyF0OEe63Rb87jGAaUcM9ZGyYE", "content": "", "creation_timestamp": "2024-09-11T13:42:39.000000Z"}, {"uuid": "f12f328b-9f08-4346-8dc3-6036932cabb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/SyPdlnxI4UH9Ve4mBfzqRBiDRHpo5DI_sKdjVM-0ErKpAAgv", "content": "", "creation_timestamp": "2024-11-12T01:17:06.000000Z"}, {"uuid": "9c430ed6-fa7f-4667-81d7-52d0e230440d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/OFczm0FEkX3pmXbV61_dNdj4AWpVvK_tUUEa7DAkoAyzw3ie", "content": "", "creation_timestamp": "2025-01-19T06:00:37.000000Z"}, {"uuid": "bd644369-b4f0-4038-8734-2a078d8ed57b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "Telegram/2FKpfj-aBk6IcWB2jOpumakJ5fpADlg4IN1-R4ubjF_SqkSR", "content": "", "creation_timestamp": "2025-01-07T06:14:37.000000Z"}, {"uuid": "8a3375a6-f4ca-40f3-a108-72f4a08cbe6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33063", "type": "seen", "source": "Telegram/Aa2S6d-4frJmlOWLinLoLgvxlenNWPaSIISorRj7DUbwFQ", "content": "", "creation_timestamp": "2023-12-06T09:07:04.000000Z"}, {"uuid": "f551adb5-b586-4519-9bd4-cdd0f4c9cd41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "https://t.me/AnonymousEgypt/29087", "content": "CVE-2023-4415\n\n#PentestGithub Ruijie Network RG-EW1200G Login Bypass\n\n https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "creation_timestamp": "2024-09-11T13:42:29.000000Z"}, {"uuid": "e2028ed1-2fef-438c-a232-b46b085b4088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "https://t.me/LockBitRaasRansomware/44397", "content": "CVE-2023-4415\n\n#PentestGithub Ruijie Network RG-EW1200G Login Bypass\n\n https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "creation_timestamp": "2024-07-13T17:07:20.000000Z"}, {"uuid": "fdb2ac97-1310-4e23-ae4f-d7b3cc24ea2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "published-proof-of-concept", "source": "https://t.me/LockBitRaasRansomware/44358", "content": "CVE-2023-4415\n\n#PentestGithub Ruijie Network RG-EW1200G Login Bypass\n\n https://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "creation_timestamp": "2024-07-13T01:34:04.000000Z"}, {"uuid": "5d5feee2-c8c3-4f8e-a251-fb8b46adb3a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33063", "type": "seen", "source": "https://t.me/KomunitiSiber/1171", "content": "Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks\nhttps://thehackernews.com/2023/12/qualcomm-releases-details-on-chip.html\n\nChipmaker Qualcomm has released more information about three high-severity security flaws that it said came under \"limited, targeted exploitation\" back in October 2023.\nThe\u00a0vulnerabilities\u00a0are as follows -\n\nCVE-2023-33063\u00a0(CVSS score: 7.8) - Memory corruption in DSP Services during a remote call from HLOS to DSP.\nCVE-2023-33106\u00a0(CVSS score: 8.4) - Memory corruption in", "creation_timestamp": "2023-12-06T06:47:45.000000Z"}, {"uuid": "a6f35716-6c75-40f5-b7d3-31d5408f757a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33063", "type": "seen", "source": "https://t.me/true_secator/4924", "content": "Qualcomm \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 \u0434\u0432\u0443\u0445 \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0442\u0440\u0438 0-day \u0432 \u0441\u0432\u043e\u0438\u0445 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430\u0445 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 \u0438 Compute DSP, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c\u0438 spyware.\n\n\u041e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u0443\u044e \u0446\u0435\u043b\u0435\u0432\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e CVE-2023-33106, CVE-2023-33107, CVE-2022-22071 \u0438 CVE-2023-33063 \u0437\u0430\u043c\u0435\u0442\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Google (TAG) \u0438 Project Zero, \u043e \u0447\u0435\u043c \u043f\u0440\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043b\u0438 Qualcomm.\n\n\u041f\u0440\u0438\u0447\u0435\u043c CVE-2022-22071 (CVSS v3.1: 8.4) \u0431\u044b\u043b\u0430\u00a0\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0435\u0449\u0435 \u0432 \u043c\u0430\u0435 2022 \u0433\u043e\u0434\u0430 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u0442\u0430\u043a\u0438\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0447\u0438\u043f\u044b, \u043a\u0430\u043a SD855, SD865 5G \u0438 SD888 5G.\n\n\u041f\u043e \u0434\u0440\u0443\u0433\u0438\u043c \u0438\u0437 \u043d\u0438\u0445 Qualcomm \u043d\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439, \u043e\u0431\u0435\u0449\u0430\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0432 \u0441\u0432\u043e\u0435\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u0437\u0430 \u0434\u0435\u043a\u0430\u0431\u0440\u044c 2023 \u0433\u043e\u0434\u0430.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0442\u0430\u043a\u0436\u0435 \u0431\u044b\u043b\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0442\u0440\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e:\n\n- CVE-2023-24855: \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u043c\u043e\u0434\u0435\u043c\u0430 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e (CVSS v3.1: 9.8);\n\n- CVE-2023-28540: \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u043c\u043e\u0434\u0435\u043c\u0430 \u0434\u0430\u043d\u043d\u044b\u0445, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0430\u044f \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0432\u044f\u0437\u0438 TLS (CVSS v3.1: 9.1);\n\n- CVE-2023-33028: \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 WLAN, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0435\u0435 \u043f\u0440\u0438 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 \u043a\u044d\u0448-\u043f\u0430\u043c\u044f\u0442\u0438 pmk \u0431\u0435\u0437 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 (CVSS v3.1: 9.8).\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0445 Qualcomm \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 13 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0438 \u0435\u0449\u0435 \u0442\u0440\u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0435\u0435 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0430\u043c\u0438.\n\n\u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043d\u0438\u0445 \u0432\u043b\u0438\u044f\u044e\u0442 \u043d\u0430 \u043c\u043e\u0434\u0435\u043c\u044b, \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443 WLAN \u0438 \u0430\u0432\u0442\u043e\u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u0438 \u0431\u044b\u043b\u0438 \u043e\u043f\u0438\u0441\u0430\u043d\u044b \u043a\u0430\u043a \u043e\u0448\u0438\u0431\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u041e\u0448\u0438\u0431\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE \u0438\u043b\u0438 DoS.\n\n\u041f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u0432 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 OEM-\u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0436\u0435, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0434\u043e\u043b\u0436\u043d\u044b \u0440\u0435\u0442\u0440\u0430\u043d\u0441\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u0435\u0439 \u0447\u0435\u0440\u0435\u0437 OEM-\u043a\u0430\u043d\u0430\u043b\u044b.", "creation_timestamp": "2023-10-04T13:13:09.000000Z"}, {"uuid": "2f617e23-669a-4792-81a0-0ee4d1e4c18f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33067", "type": "seen", "source": "https://t.me/ctinow/196838", "content": "https://ift.tt/jO5tm1S\nCVE-2023-33067 | Qualcomm 7c+ Gen 3 Compute Audio memory corruption", "creation_timestamp": "2024-02-29T17:26:33.000000Z"}, {"uuid": "70b0f24c-521a-4e53-af14-73ceebe5876c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33060", "type": "seen", "source": "https://t.me/ctinow/196837", "content": "https://ift.tt/EMvL3Pe\nCVE-2023-33060 | Qualcomm 7c Compute Platform SC7180-AC DDR Memory initialization", "creation_timestamp": "2024-02-29T17:26:32.000000Z"}, {"uuid": "cdb10a53-ce98-40c7-a01a-32e03ed194d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33065", "type": "seen", "source": "https://t.me/ctinow/196812", "content": "https://ift.tt/kD6NBLf\nCVE-2023-33065 | Qualcomm 7c+ Gen 3 Compute AVCS Service information disclosure", "creation_timestamp": "2024-02-29T16:57:08.000000Z"}, {"uuid": "8861c35f-c8c7-442b-a618-8e6a71946af0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33066", "type": "seen", "source": "https://t.me/ctinow/199193", "content": "https://ift.tt/MWYKAUk\nCVE-2023-33066", "creation_timestamp": "2024-03-04T12:32:02.000000Z"}, {"uuid": "6bba5ef7-bc5c-4a2b-8f6f-e67d7c6bf592", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33068", "type": "seen", "source": "https://t.me/ctinow/179791", "content": "https://ift.tt/ACuMKOw\nCVE-2023-33068", "creation_timestamp": "2024-02-06T07:26:36.000000Z"}, {"uuid": "f17f3f79-46ed-4ff4-8376-166d6238f43e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33067", "type": "seen", "source": "https://t.me/ctinow/179790", "content": "https://ift.tt/6qXT3e2\nCVE-2023-33067", "creation_timestamp": "2024-02-06T07:26:35.000000Z"}, {"uuid": "7b0c488f-f1ef-40fd-b51d-c4bd7ebf5dc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33065", "type": "seen", "source": "https://t.me/ctinow/179789", "content": "https://ift.tt/Otfw57C\nCVE-2023-33065", "creation_timestamp": "2024-02-06T07:26:34.000000Z"}, {"uuid": "50f4b1df-6adf-4561-81f3-26eefd0d21e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33064", "type": "seen", "source": "https://t.me/ctinow/179788", "content": "https://ift.tt/oCqew04\nCVE-2023-33064", "creation_timestamp": "2024-02-06T07:26:33.000000Z"}, {"uuid": "1a76d621-746a-4c16-86d0-4be6a15aa37f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33060", "type": "seen", "source": "https://t.me/ctinow/179787", "content": "https://ift.tt/HxAyR7E\nCVE-2023-33060", "creation_timestamp": "2024-02-06T07:26:32.000000Z"}, {"uuid": "7c17cd4a-5b56-4e60-b6f7-1a06d2ecbdc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33069", "type": "seen", "source": "https://t.me/ctinow/179792", "content": "https://ift.tt/iw8hDM0\nCVE-2023-33069", "creation_timestamp": "2024-02-06T07:26:37.000000Z"}, {"uuid": "e9408016-4a16-416d-a113-72ad240fab4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33062", "type": "seen", "source": "https://t.me/ctinow/161528", "content": "https://ift.tt/J7E8d60\nCVE-2023-33062", "creation_timestamp": "2024-01-02T07:27:08.000000Z"}, {"uuid": "bb968aa1-37ee-4193-975c-f36eef5d1b12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-3306", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/9230", "content": "#exploit\n1. CVE-2023-38600:\nApple Safari copyWithin gone (way) outside\nhttps://www.zerodayinitiative.com/blog/2023/10/17/cve-2023-38600-story-of-an-innocent-apple-safari-copywithin-gone-way-outside\n\n2. CVE-2023-36803:\nWindows Kernel OOB Reads/Mem.Disclosure\nhttps://packetstormsecurity.com/files/175109\n\n3. CVE-2023-4169:\nRuijie RG-EW1200G - Administrator Password/API/SYS/SET_PASSWD/ACCESS CONTROL\nhttps://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "creation_timestamp": "2023-10-20T11:06:20.000000Z"}]}