{"vulnerability": "CVE-2023-33106", "sightings": [{"uuid": "8c3c8976-8ab2-47d8-82bc-04e9e4ca4077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-12-05T18:10:03.000000Z"}, {"uuid": "fea702c5-dfec-43bb-9688-1ee1093018c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971933", "content": "", "creation_timestamp": "2024-12-24T20:35:48.950102Z"}, {"uuid": "7c37e3a2-1710-43c4-9971-dbfd6ef0a045", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/BabukLockerGroups/56197", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE  TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE  \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE  TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation  TBD\nIceWarp Mail Server Pre-auth RCE  TBD\nLinux 6.1.0, 6.8.0 LPE  TBD\nFortinet FortiSIEM RCE  TBD\nFortinet FortiWeb Authentication Bypass  TBD\nWindows 10/11/2016/2019/2022 Logic LPE  \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE  \nLinux LPE 0day (up to 6.1.81)  \n\nChrome RCE 1day (Feb 6, 2024)  \nFirefox Chain 1day (up to 126)  \nSamsung S22/23 1day LPE (CVE-2023-33106)  \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE  \nChrome Android/Windows RCE  \nChrome Android RCE  \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX  \nWindows Low to Medium LPE  \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-11T17:11:51.000000Z"}, {"uuid": "5c03d1d8-97b1-4ca8-9862-0309a04fbfc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:50.000000Z"}, {"uuid": "af016dc9-326b-4692-a1cb-0074b8075ff6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-33106", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/a3cfb216-1cbc-4369-81a8-b02bcdd2e83b", "content": "", "creation_timestamp": "2026-02-02T12:26:44.908368Z"}, {"uuid": "bbbfb095-9003-49da-a258-14c388b2711a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/BabukLockerGroups/57682", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE  TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE  \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE  TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation  TBD\nIceWarp Mail Server Pre-auth RCE  TBD\nLinux 6.1.0, 6.8.0 LPE  TBD\nFortinet FortiSIEM RCE  TBD\nFortinet FortiWeb Authentication Bypass  TBD\nWindows 10/11/2016/2019/2022 Logic LPE  \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE  \nLinux LPE 0day (up to 6.1.81)  \n\nChrome RCE 1day (Feb 6, 2024)  \nFirefox Chain 1day (up to 126)  \nSamsung S22/23 1day LPE (CVE-2023-33106)  \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE  \nChrome Android/Windows RCE  \nChrome Android RCE  \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX  \nWindows Low to Medium LPE  \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-22T19:43:07.000000Z"}, {"uuid": "2391e11b-046a-43bc-b04d-378dee943967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/RFrepoV1Chat/423482", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE  TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE  \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE  TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation  TBD\nIceWarp Mail Server Pre-auth RCE  TBD\nLinux 6.1.0, 6.8.0 LPE  TBD\nFortinet FortiSIEM RCE  TBD\nFortinet FortiWeb Authentication Bypass  TBD\nWindows 10/11/2016/2019/2022 Logic LPE  \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE  \nLinux LPE 0day (up to 6.1.81)  \n\nChrome RCE 1day (Feb 6, 2024)  \nFirefox Chain 1day (up to 126)  \nSamsung S22/23 1day LPE (CVE-2023-33106)  \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE  \nChrome Android/Windows RCE  \nChrome Android RCE  \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX  \nWindows Low to Medium LPE  \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-11T17:12:00.000000Z"}, {"uuid": "db55965f-6bc5-47fb-955c-2a93c82e51ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/BabukLockerGroups/56634", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE\u00a0 TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE\u00a0 \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE\u00a0 TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation\u00a0 TBD\nIceWarp Mail Server Pre-auth RCE\u00a0 TBD\nLinux 6.1.0, 6.8.0 LPE\u00a0 TBD\nFortinet FortiSIEM RCE\u00a0 TBD\nFortinet FortiWeb Authentication Bypass\u00a0 TBD\nWindows 10/11/2016/2019/2022 Logic LPE\u00a0 \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE\u00a0 \nLinux LPE 0day (up to 6.1.81)\u00a0 \n\nChrome RCE 1day (Feb 6, 2024)\u00a0 \nFirefox Chain 1day (up to 126)\u00a0 \nSamsung S22/23 1day LPE (CVE-2023-33106)\u00a0 \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE\u00a0 \nChrome Android/Windows RCE\u00a0 \nChrome Android RCE\u00a0 \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX\u00a0 \nWindows Low to Medium LPE\u00a0 \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-14T11:19:49.000000Z"}, {"uuid": "bc12863a-2f06-4ffe-aeec-59e417a17cee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/BabukLockerGroups/56141", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE  TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE  \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE  TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation  TBD\nIceWarp Mail Server Pre-auth RCE  TBD\nLinux 6.1.0, 6.8.0 LPE  TBD\nFortinet FortiSIEM RCE  TBD\nFortinet FortiWeb Authentication Bypass  TBD\nWindows 10/11/2016/2019/2022 Logic LPE  \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE  \nLinux LPE 0day (up to 6.1.81)  \n\nChrome RCE 1day (Feb 6, 2024)  \nFirefox Chain 1day (up to 126)  \nSamsung S22/23 1day LPE (CVE-2023-33106)  \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE  \nChrome Android/Windows RCE  \nChrome Android RCE  \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX  \nWindows Low to Medium LPE  \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-11T17:10:54.000000Z"}, {"uuid": "50199c63-85c2-449e-825c-e54dd7953733", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/RFrepoV1Chat/424974", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE  TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE  \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE  TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation  TBD\nIceWarp Mail Server Pre-auth RCE  TBD\nLinux 6.1.0, 6.8.0 LPE  TBD\nFortinet FortiSIEM RCE  TBD\nFortinet FortiWeb Authentication Bypass  TBD\nWindows 10/11/2016/2019/2022 Logic LPE  \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE  \nLinux LPE 0day (up to 6.1.81)  \n\nChrome RCE 1day (Feb 6, 2024)  \nFirefox Chain 1day (up to 126)  \nSamsung S22/23 1day LPE (CVE-2023-33106)  \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE  \nChrome Android/Windows RCE  \nChrome Android RCE  \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX  \nWindows Low to Medium LPE  \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-22T19:42:39.000000Z"}, {"uuid": "a20d031c-1682-4994-9845-9a4077e94f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/RFrepoV1Chat/423426", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE  TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE  \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE  TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation  TBD\nIceWarp Mail Server Pre-auth RCE  TBD\nLinux 6.1.0, 6.8.0 LPE  TBD\nFortinet FortiSIEM RCE  TBD\nFortinet FortiWeb Authentication Bypass  TBD\nWindows 10/11/2016/2019/2022 Logic LPE  \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE  \nLinux LPE 0day (up to 6.1.81)  \n\nChrome RCE 1day (Feb 6, 2024)  \nFirefox Chain 1day (up to 126)  \nSamsung S22/23 1day LPE (CVE-2023-33106)  \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE  \nChrome Android/Windows RCE  \nChrome Android RCE  \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX  \nWindows Low to Medium LPE  \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-11T17:10:59.000000Z"}, {"uuid": "0ba96f8a-6d9c-4d5d-b6af-e89da5744f37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/RFrepoV1Chat/423914", "content": "REMOTE/\nFirefox RCE\nWindows Low IL to SYSTEM LPE\nSafari RCE\nSamsung Exynos/QMI/QRTR Baseband RCE\niOS 17.4-17.7 Full Chain\niOS 18.0+ Zero-day Full Chain\nAndroid Chrome Full Chain\nAndroid 0-Click RCE via Samsung Messenger\n\n2024:\nFortinet NAC Pre-auth RCE\nClamAV Arbitrary File Upload\nBitdefender Safepay RCE\nRocketChat 1-click RC\nSamsung NVR Pre-auth RCE\nLacie NAS Pre-auth RCE\nSonicWall GMS Pre-auth RCE\nMeta Platforms Inc Identity Spoofing\nTrend Micro Worry Free Pre-auth RCE\nWindows 11 KASLR Bypass\nVMware Workstation VME\nJuniper Firewall/VPN (JunOS) Pre-auth RCE\nMacOS Disk Utility LPE\nMS Word RCE via SMB/WebDAV\nAdobe Reader / Acrobat Pro RCE via SMB/WebDAV\nPHP Pre-auth RCE\nMS Word RCE (via LPE)\nMS Word RCE (via indirect execution)\nMS Word RCE\nKKThai Internet Management System Pre-auth RCE\nCloudPanel Pre-auth RCE\nSonicWall SMA 1000 Series Pre-auth RCE\nFoxit Reader/Editor RCE\nLinksys LRT224/LRT214 Business Router Pre-auth RCE\nnginx RCE\u00a0 TBD\nWindows 10/2016/2019/2022 Low IL to SYSTEM LPE\u00a0 \nWindows LPE+SBX\nCloudPanel 2 Pre-auth RCE\u00a0 TBD\nWindows Medium to SYSTEM LPE\nvBulletin Pre-auth RCE\nWindows Medium to SYSTEM Logic LPE\nWindows Medium to SYSTEM Race Condition LPE\nTor Relay Node Impersonation\u00a0 TBD\nIceWarp Mail Server Pre-auth RCE\u00a0 TBD\nLinux 6.1.0, 6.8.0 LPE\u00a0 TBD\nFortinet FortiSIEM RCE\u00a0 TBD\nFortinet FortiWeb Authentication Bypass\u00a0 TBD\nWindows 10/11/2016/2019/2022 Logic LPE\u00a0 \nOracle Agile PLM Pre-auth RCE\nBusyBox Pre-auth RCE\u00a0 \nLinux LPE 0day (up to 6.1.81)\u00a0 \n\nChrome RCE 1day (Feb 6, 2024)\u00a0 \nFirefox Chain 1day (up to 126)\u00a0 \nSamsung S22/23 1day LPE (CVE-2023-33106)\u00a0 \nAndroid Linux Kernel 5.10-5.15 LPE \nOutlook RCE\u00a0 \nChrome Android/Windows RCE\u00a0 \nChrome Android RCE\u00a0 \niOS 1day Full Chain \nTor Browser/Firefox RCE+SBX\u00a0 \nWindows Low to Medium LPE\u00a0 \nFortinet FortiManager Pre-auth 1day RCE", "creation_timestamp": "2025-08-14T11:20:49.000000Z"}, {"uuid": "195e363b-9007-435f-8067-1d4a85fe4e75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/arpsyndicate/2147", "content": "#ExploitObserverAlert\n\nCVE-2023-33106\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-33106. Memory corruption while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.\n\nFIRST-EPSS: 0.000640000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-12-24T03:50:39.000000Z"}, {"uuid": "9818b54e-2d52-4170-b92c-344ffc36121c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "exploited", "source": "https://t.me/kasperskyb2b/917", "content": "\ud83d\udcf1 Android patch week \ud83d\udcf1 \n\n\u0412 \u043e\u043a\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u043e\u043c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 Android \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b 54 \u0443\u044f\u0432\u0437\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435. \u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 \u2014 \u0443\u0436\u0435 \u0445\u043e\u0440\u043e\u0448\u043e \u0437\u043d\u0430\u043a\u043e\u043c\u0430\u044f \u043d\u0430\u043c CVE-2023-4863 \u0432  libwebp, \u0430 \u0432\u0442\u043e\u0440\u0430\u044f \u2014 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-4211 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430\u0445 ARM Mali GPU, \u0434\u0435\u0442\u0430\u043b\u0438 \u043f\u0440\u043e \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u044e\u0442\u0441\u044f.\n\n\u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043a \u044d\u0442\u043e\u043c\u0443 \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0438 \u0441\u0432\u043e\u0438 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u044b \u0432 Qualcomm, \u0437\u0430\u043a\u0440\u044b\u0432 \u0442\u0440\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0437\u0438\u0440\u043e\u0434\u0435\u044f (CVE-2023-33106, -33107, -33063) \u0438 \u0443\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0443\u044e CVE-2022-22071. \u0414\u0435\u0442\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 \ud83d\ude0f. \u041f\u043e\u043a\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e, \u0447\u0442\u043e \u0434\u044b\u0440\u044b \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430\u0445 Adreno GPU \u0438 Compute DSP.  \u0422\u0430\u043a\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0442\u0440\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 13 \u0432\u0430\u0436\u043d\u044b\u0445, \u044d\u0442\u0438 \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n\u041a\u0430\u043a \u0432\u043e\u0434\u0438\u0442\u0441\u044f, \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u044b Google Pixel \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441 AOSP (\u0432\u0435\u0440\u0441\u0438\u0438 \u0441 11 \u043f\u043e 13) \u0443\u0436\u0435 \u043c\u043e\u0433\u0443\u0442 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0436\u0434\u0443\u0442, \u043f\u043e\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0438 \u0440\u0430\u0437\u0440\u043e\u0434\u044f\u0442\u0441\u044f \u0438\u0445 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u043e\u0432.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2023-10-04T10:12:19.000000Z"}, {"uuid": "c3d0075e-33bd-4d81-bc21-bb7dbd44820f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "exploited", "source": "Telegram/Rxu4zo-zqPtpxwJhXuMIjF4FHa6_XqkwC7R1LNZHIISepQ", "content": "", "creation_timestamp": "2023-10-03T19:17:46.000000Z"}, {"uuid": "fd0bd32c-f35b-45ce-9696-a3185fd551ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "Telegram/Aa2S6d-4frJmlOWLinLoLgvxlenNWPaSIISorRj7DUbwFQ", "content": "", "creation_timestamp": "2023-12-06T09:07:04.000000Z"}, {"uuid": "47b17fe1-adb4-4524-b30e-bb647909400c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/ctinow/158829", "content": "https://ift.tt/iGXKIe1\nCVE-2023-33106 | Qualcomm 4 Gen 1 Mobile Platform IOCTL_KGSL_GPU_AUX_COMMAND memory corruption", "creation_timestamp": "2023-12-23T14:41:34.000000Z"}, {"uuid": "8ad6e9f4-dfd3-4c69-b0c4-e955acd68e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/KomunitiSiber/1171", "content": "Qualcomm Releases Details on Chip Vulnerabilities Exploited in Targeted Attacks\nhttps://thehackernews.com/2023/12/qualcomm-releases-details-on-chip.html\n\nChipmaker Qualcomm has released more information about three high-severity security flaws that it said came under \"limited, targeted exploitation\" back in October 2023.\nThe\u00a0vulnerabilities\u00a0are as follows -\n\nCVE-2023-33063\u00a0(CVSS score: 7.8) - Memory corruption in DSP Services during a remote call from HLOS to DSP.\nCVE-2023-33106\u00a0(CVSS score: 8.4) - Memory corruption in", "creation_timestamp": "2023-12-06T06:47:45.000000Z"}, {"uuid": "b969c997-57ab-4468-9343-09c9f6278d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "seen", "source": "https://t.me/true_secator/4924", "content": "Qualcomm \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 \u0434\u0432\u0443\u0445 \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0442\u0440\u0438 0-day \u0432 \u0441\u0432\u043e\u0438\u0445 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430\u0445 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 \u0438 Compute DSP, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c\u0438 spyware.\n\n\u041e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u0443\u044e \u0446\u0435\u043b\u0435\u0432\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e CVE-2023-33106, CVE-2023-33107, CVE-2022-22071 \u0438 CVE-2023-33063 \u0437\u0430\u043c\u0435\u0442\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Google (TAG) \u0438 Project Zero, \u043e \u0447\u0435\u043c \u043f\u0440\u043e\u0438\u043d\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043b\u0438 Qualcomm.\n\n\u041f\u0440\u0438\u0447\u0435\u043c CVE-2022-22071 (CVSS v3.1: 8.4) \u0431\u044b\u043b\u0430\u00a0\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0435\u0449\u0435 \u0432 \u043c\u0430\u0435 2022 \u0433\u043e\u0434\u0430 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044f \u0442\u0430\u043a\u0438\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0447\u0438\u043f\u044b, \u043a\u0430\u043a SD855, SD865 5G \u0438 SD888 5G.\n\n\u041f\u043e \u0434\u0440\u0443\u0433\u0438\u043c \u0438\u0437 \u043d\u0438\u0445 Qualcomm \u043d\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439, \u043e\u0431\u0435\u0449\u0430\u044f \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0432 \u0441\u0432\u043e\u0435\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u0437\u0430 \u0434\u0435\u043a\u0430\u0431\u0440\u044c 2023 \u0433\u043e\u0434\u0430.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0442\u0430\u043a\u0436\u0435 \u0431\u044b\u043b\u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0442\u0440\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e:\n\n- CVE-2023-24855: \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u043c\u043e\u0434\u0435\u043c\u0430 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\u044e (CVSS v3.1: 9.8);\n\n- CVE-2023-28540: \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u043c\u043e\u0434\u0435\u043c\u0430 \u0434\u0430\u043d\u043d\u044b\u0445, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0430\u044f \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0432\u044f\u0437\u0438 TLS (CVSS v3.1: 9.1);\n\n- CVE-2023-33028: \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0435 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 WLAN, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0449\u0435\u0435 \u043f\u0440\u0438 \u043a\u043e\u043f\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0438 \u043a\u044d\u0448-\u043f\u0430\u043c\u044f\u0442\u0438 pmk \u0431\u0435\u0437 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 (CVSS v3.1: 9.8).\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0445 Qualcomm \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 13 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u0432 \u0438 \u0435\u0449\u0435 \u0442\u0440\u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0435\u0435 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u0430\u043c\u0438.\n\n\u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043d\u0438\u0445 \u0432\u043b\u0438\u044f\u044e\u0442 \u043d\u0430 \u043c\u043e\u0434\u0435\u043c\u044b, \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0443 WLAN \u0438 \u0430\u0432\u0442\u043e\u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b, \u0438 \u0431\u044b\u043b\u0438 \u043e\u043f\u0438\u0441\u0430\u043d\u044b \u043a\u0430\u043a \u043e\u0448\u0438\u0431\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438. \u041e\u0448\u0438\u0431\u043a\u0438 \u043f\u0430\u043c\u044f\u0442\u0438, \u043a\u0430\u043a \u043f\u0440\u0430\u0432\u0438\u043b\u043e, \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE \u0438\u043b\u0438 DoS.\n\n\u041f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u0432 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0445 OEM-\u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0436\u0435, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0434\u043e\u043b\u0436\u043d\u044b \u0440\u0435\u0442\u0440\u0430\u043d\u0441\u043b\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0434\u043e \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u0435\u0439 \u0447\u0435\u0440\u0435\u0437 OEM-\u043a\u0430\u043d\u0430\u043b\u044b.", "creation_timestamp": "2023-10-04T13:13:09.000000Z"}, {"uuid": "a845b311-9f83-42a5-9d7f-a33c6a7e212c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "exploited", "source": "https://t.me/KomunitiSiber/881", "content": "Qualcomm Releases Patch for 3 new Zero-Days Under Active Exploitation\nhttps://thehackernews.com/2023/10/qualcomm-releases-patch-for-3-new-zero.html\n\nChipmaker Qualcomm has released security updates to address 17 vulnerabilities in various components, while warning that three other zero-days have come under active exploitation.\nOf the 17 flaws, three are rated Critical, 13 are rated High, and one is rated Medium in severity.\n\"There are indications from Google Threat Analysis Group and Google Project Zero that CVE-2023-33106, CVE-2023-33107,", "creation_timestamp": "2023-10-03T19:23:21.000000Z"}, {"uuid": "024e50f6-0542-4215-a30e-819027c65884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9456", "content": "#exploit\n1. CVE-2023-4207:\nLinux kernel net/sched/cls_fw.c - UaF\nhttps://github.com/nidhi7598/linux-4.19.72_net_CVE-2023-4207\n\n2. CVE-2023-49103:\nownCloud graphapi GetPhpInfo.php - information disclosure\nhttps://github.com/creacitysec/CVE-2023-49103\n\n3. CVE-2023-33106/CVE-2023-33107:\nQualcomm Adreno GPU OOB/Integer overflow\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-33106.html\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-33107.html", "creation_timestamp": "2023-11-24T13:41:56.000000Z"}, {"uuid": "9db63d92-901b-427c-a6e8-3bb34dab300f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-33106", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2037", "content": "#exploit\n1. CVE-2023-4207:\nLinux kernel net/sched/cls_fw.c - UaF\nhttps://github.com/nidhi7598/linux-4.19.72_net_CVE-2023-4207\n\n2. CVE-2023-49103:\nownCloud graphapi GetPhpInfo.php - information disclosure\nhttps://github.com/creacitysec/CVE-2023-49103\n\n3. CVE-2023-33106/CVE-2023-33107:\nQualcomm Adreno GPU OOB/Integer overflow\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-33106.html\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-33107.html", "creation_timestamp": "2024-08-16T08:51:13.000000Z"}]}