{"vulnerability": "CVE-2023-50868", "sightings": [{"uuid": "3e5b0e38-654a-45f8-bebc-108be042690c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-08", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "a271c843-4ec5-4dc6-8488-9d17014961bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "c4e27662-8e02-4274-b3c9-5f6e262d11a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1308", "content": "", "creation_timestamp": "2024-06-12T04:00:00.000000Z"}, {"uuid": "1c41af40-55fe-42be-91a6-89e695c27244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/200", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:33:59.000000Z"}, {"uuid": "553055a7-efd0-4582-8d0a-3503ed613284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/arpsyndicate/4656", "content": "#ExploitObserverAlert\n\nCVE-2023-50868\n\nDESCRIPTION: Exploit Observer has 37 entries in 8 file formats related to CVE-2023-50868. The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the \"NSEC3\" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.\n\nFIRST-EPSS: 0.000460000\nARPS-EXPLOITABILITY: 0.7531041", "creation_timestamp": "2024-04-13T13:04:10.000000Z"}, {"uuid": "c3c032e8-c79b-4b96-b302-bfb8838cfca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/kasperskyb2b/1300", "content": "\ud83e\ude79\ud83e\ude79\ud83e\ude79 \u0418\u044e\u043d\u044c\u0441\u043a\u0438\u0439 Patch Tuesday: \u0431\u0435\u0437 \u0447\u0443\u0434\u0435\u0441\n\n\u0421\u0432\u0435\u0436\u0438\u0439 \u0432\u044b\u043f\u0443\u0441\u043a \u0437\u0430\u043f\u043b\u0430\u0442\u043e\u043a \u0438\u0437 \u0420\u0435\u0434\u043c\u043e\u043d\u0434\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 58 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 (\u0432\u043a\u043b\u044e\u0447\u0430\u044f 7 \u0432 Chromium/Edge), \u043d\u0438 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e. \u0422\u043e\u043b\u044c\u043a\u043e \u043e\u0434\u043d\u0430 CVE \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439, \u0435\u0449\u0451 38 \u0438\u043c\u0435\u044e\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0438 12 - \u0441\u0440\u0435\u0434\u043d\u0438\u0439.\n\n\u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u0437\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0447\u0438\u0441\u043b\u043e \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 EoP \u043e\u043f\u0435\u0440\u0435\u0434\u0438\u043b\u043e \u0432\u0441\u0435 \u043f\u0440\u043e\u0447\u0438\u0435. \u041e\u0431\u0449\u0438\u0439 \u0441\u0447\u0451\u0442 \u0442\u0430\u043a\u043e\u0432: EoP - 25, RCE - 18, DoS - 5, \u0435\u0449\u0451 3 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f CVE-2023-50868, \u0430\u0442\u0430\u043a\u0430 Keytrap, \u043f\u0430\u0440\u0430\u043b\u0438\u0437\u0443\u044e\u0449\u0430\u044f \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 DNSSEC. \u041d\u0435\u0432\u0437\u0438\u0440\u0430\u044f \u043d\u0430 \u043c\u0435\u0434\u0438\u0439\u043d\u044b\u0439 \u0440\u0435\u0437\u043e\u043d\u0430\u043d\u0441, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0439 \u0434\u044b\u0440\u044b \u043f\u043e\u043a\u0430 \u043d\u0435 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u043e.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2024-30080, CVSS 9.8) \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 MSMQ, \u043e\u043d\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a RCE. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e MSMQ \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0451\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e, \u0440\u0438\u0441\u043a \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u0432\u044b\u0441\u043e\u043a.\n\n\u0421\u0440\u0435\u0434\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0442\u0435\u0440\u0435\u0441 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442 CVE-2024-30064 \u0438 -30068, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043a EoP \u0432 \u044f\u0434\u0440\u0435 \u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 \u043a\u043e\u0434\u0443 \u0441\u043e\u0432\u0435\u0440\u0448\u0430\u0442\u044c \u043f\u043e\u0431\u0435\u0433 \u0438\u0437 \u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043e\u0432 \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0440\u0435\u0434. \u0414\u0440\u0443\u0433\u0430\u044f \u043e\u043f\u0430\u0441\u043d\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0449\u0430\u044f RCE - CVE-2024-30103 \u0432 Outlook, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0430\u044f \u0438\u0437 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 DLL \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n #\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2024-06-13T10:33:43.000000Z"}, {"uuid": "ef027dcb-3784-4c32-ad5b-cba52403a16c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/GrayHatsHack/7986", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:34:50.000000Z"}, {"uuid": "9e5def7f-00e9-4847-927a-972ca6357060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3316", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:33:42.000000Z"}, {"uuid": "ecb9b908-2fff-4524-8749-96f36989e6c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/infoinspect/758", "content": "#\u0442\u0435\u0445\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430\n\n\ud83e\ude9f \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Windows: \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043a\u0438\u0431\u0435\u0440\u0433\u0438\u0433\u0438\u0435\u043d\u044b\n\n\ud83d\udcc4 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435, \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u044e\u0449\u0435\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Wi-Fi, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0443\u044e \u043e\u0446\u0435\u043d\u043a\u0443 8.8 \u043f\u043e 10-\u0431\u0430\u043b\u043b\u044c\u043d\u043e\u0439 \u0448\u043a\u0430\u043b\u0435. \u041e\u0448\u0438\u0431\u043a\u0430 CVE-2024-30078 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435 \u0447\u0435\u0440\u0435\u0437 \u0434\u0440\u0430\u0439\u0432\u0435\u0440 Wi-Fi. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c Windows \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435.\n\n\u2139\ufe0f \u0422\u0430\u043a\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430 \u0447\u0435\u0440\u0435\u0437 Microsoft Message Queuing. \u042d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043e\u0446\u0435\u043d\u0435\u043d\u043d\u0430\u044f \u043d\u0430 9.8, \u043c\u043e\u0433\u043b\u0430 \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0440\u0435\u0448\u0435\u043d\u0430 \u043f\u0430\u0442\u0447\u0435\u043c CVE-2024-30080.\n\n\ud83c\udd98 \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434 \u043d\u043e\u043c\u0435\u0440\u043e\u043c CVE-2023-50868 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0447\u0435\u0440\u0435\u0437 \u043f\u0435\u0440\u0435\u0433\u0440\u0443\u0437\u043a\u0443 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0434\u043e\u043c\u0435\u043d\u043d\u044b\u0445 \u0438\u043c\u0435\u043d. \u042d\u0442\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0438 \u043c\u0435\u043d\u044c\u0448\u0435 \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0434\u043e\u043c\u0430\u0448\u043d\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\ud83d\udcbb \u041f\u0430\u0442\u0447\u0438 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b \u0434\u043b\u044f Windows 10 \u0438 11 \u043f\u043e\u0434 \u043d\u043e\u043c\u0435\u0440\u043e\u043c KB5039214 \u0434\u043b\u044f \u0441\u0431\u043e\u0440\u043e\u043a 14393.7070, 22621.3737 \u0438 22631.3737.\n\n\u2754 \u041a\u0430\u043a \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432\u0430\u0448\u0435\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b?\n \u2196\ufe0f \u041f\u0435\u0440\u0435\u0439\u0434\u0438\u0442\u0435 \u0432 \"\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Windows\" \u0432 \"\u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430\u0445\" \u0438\u043b\u0438 \"\u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u0430\u0445\".\n\u2196\ufe0f \u0423\u0431\u0435\u0434\u0438\u0442\u0435\u0441\u044c, \u0447\u0442\u043e \u043e\u0442\u043e\u0431\u0440\u0430\u0436\u0430\u0435\u0442\u0441\u044f \u043d\u0430\u0434\u043f\u0438\u0441\u044c \"\u0423 \u0432\u0430\u0441 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b \u0432\u0441\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\".\n\u2196\ufe0f \u041d\u0430\u0436\u043c\u0438\u0442\u0435 \u043a\u043d\u043e\u043f\u043a\u0443 \"\u041f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439\", \u0447\u0442\u043e\u0431\u044b \u0443\u0431\u0435\u0434\u0438\u0442\u044c\u0441\u044f, \u0447\u0442\u043e \u0432\u0441\u0435 \u043f\u0430\u0442\u0447\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b.\n\n\u2139\ufe0f \u0414\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u0430 \u0433\u043e\u0432\u043e\u0440\u0438\u0442, \u0447\u0442\u043e \u0432\u0441\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u044b, \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435, \u043d\u043e \u0435\u0449\u0435 \u043d\u0435 \u0437\u0430\u0433\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u043f\u0430\u0442\u0447\u0438.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e\n\n\u26a0\ufe0f \u041d\u0415 \u0420\u0415\u041a\u041e\u041c\u0415\u041d\u0414\u0423\u0415\u0422\u0421\u042f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u044e \"\u041f\u043e\u043b\u0443\u0447\u0430\u0439\u0442\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u043d\u0438 \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\". \u041b\u0443\u0447\u0448\u0435 \u0432\u0440\u0443\u0447\u043d\u0443\u044e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u041f\u041e \u043d\u0430 \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0440\u0430\u0437 \u0432 \u043c\u0435\u0441\u044f\u0446, \u043f\u0440\u0438\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044f\u0441\u044c \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u0432\u044b\u0447\u0435\u043a \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u041f\u043e\u0434\u043f\u0438\u0441\u0430\u0442\u044c\u0441\u044f \u043d\u0430 \u043a\u0430\u043d\u0430\u043b \u2705", "creation_timestamp": "2024-06-30T12:52:04.000000Z"}, {"uuid": "d7eef646-2be0-43be-adf8-3d7591983784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6752", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:34:50.000000Z"}, {"uuid": "311c4204-8320-4b91-9bdc-f49b7a3b7478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/MrVGunz/1206", "content": "\ud83d\udccd\u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0631\u0627\u06cc pdns-recursor: \u0631\u0641\u0639 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\n\n\u062f\u0631 19 \u0641\u0648\u0631\u06cc\u0647 2024\u060c \u062f\u0628\u06cc\u0627\u0646 \u0627\u0632 \u0648\u062c\u0648\u062f \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc CVE-2023-50387 \u0648 CVE-2023-50868 \u062f\u0631 pdns-recursor \u062e\u0628\u0631 \u062f\u0627\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u0646\u062f \u0645\u0646\u062c\u0631 \u0628\u0647 \u062d\u0645\u0644\u0627\u062a DoS \u0634\u0648\u0646\u062f. \u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644\u0627\u062a \u0628\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632 CVSS 7.5 \u062f\u0631 \u0646\u0633\u062e\u0647 4.8.6-1 \u0628\u0631\u0627\u06cc \u062a\u0648\u0632\u06cc\u0639 \u067e\u0627\u06cc\u062f\u0627\u0631 \u062f\u0628\u06cc\u0627\u0646 (bookworm) \u0631\u0641\u0639 \u0634\u062f\u0647\u200c\u0627\u0646\u062f. \u06a9\u0627\u0631\u0628\u0631\u0627\u0646 \u0628\u0627\u06cc\u062f \u0628\u0633\u062a\u0647\u200c\u0647\u0627\u06cc pdns-recursor \u062e\u0648\u062f \u0631\u0627 \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u06a9\u0646\u0646\u062f.\n\n\ud83d\udd17 \u062c\u0647\u062a \u0645\u0637\u0627\u0644\u0639\u0647 \u0627\u062f\u0627\u0645\u0647 \u0645\u0642\u0627\u0644\u0647: \u0644\u06cc\u0646\u06a9\n\n\ud83d\udccd Security Update for pdns-recursor: Addressing Serious Vulnerabilities\n\nOn February 19, 2024, Debian announced the presence of vulnerabilities CVE-2023-50387 and CVE-2023-50868 in pdns-recursor. These vulnerabilities can lead to DoS attacks. The issues, with a CVSS score of 7.5, have been resolved in version 4.8.6-1 for the stable Debian distribution (bookworm). Users are advised to update their pdns-recursor packages promptly.\n\n\ud83d\udd17 For more information, please visit: Link", "creation_timestamp": "2024-07-16T17:05:20.000000Z"}, {"uuid": "40930ec0-b74e-49c5-84f0-a0152ba87adc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/ctinow/201478", "content": "https://ift.tt/uWUBvzy\nCVE-2023-50868 | DNS Protocol Closest Encloser Proof resource consumption (DLA 3736-1)", "creation_timestamp": "2024-03-06T16:16:29.000000Z"}, {"uuid": "a1da76c9-3162-41b2-ab96-eed0effea65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/true_secator/5848", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b \u0438\u044e\u043d\u044c\u0441\u043a\u0438\u0439 PatchTuesday \u043e\u0442 Microsoft \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 51 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 18 RCE \u0438 0-day, \u0430 \u0442\u0430\u043a\u0436\u0435 7 - \u0432 Chromium/Edge.\n\n\u041a \u0443\u0434\u0438\u0432\u043b\u0435\u043d\u0438\u044e, \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430 CVE \u0432 Microsoft Message Queuing \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439, \u0435\u0449\u0451 38 \u0438\u043c\u0435\u044e\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 \u0438 12 - \u0441\u0440\u0435\u0434\u043d\u0438\u0439, \u0430 \u0432 \u0440\u0430\u0441\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0438 \u043f\u043e \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044f\u043c \u043f\u0440\u0435\u0432\u0430\u043b\u0438\u0440\u0443\u0435\u0442 EoP - 25 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0435\u043c \u0443\u0436\u0435 18 - RCE, 5 - DoS \u0438 3 - \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b \u043d\u0443\u043b\u044c - CVE-2023-50868 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 DNS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u0430\u0442\u0430\u043a\u0443 Keytrap, \u043f\u043e \u043f\u043e\u0432\u043e\u0434\u0443 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u043e \u043c\u043d\u043e\u0433\u043e \u0448\u0443\u043c\u0438\u0445\u0438, \u043d\u043e \u0434\u043e \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u043f\u043b\u043e\u0441\u043a\u043e\u0441\u0442\u0438 \u0442\u0430\u043a \u0438 \u043d\u0435 \u0434\u043e\u0448\u043b\u043e.\n\n\u041e\u0442\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2024-30080 \u0441 CVSS 9.8) \u0432 MSMQ \u043d\u0435 \u0433\u0440\u043e\u0437\u0438\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0451\u043d \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\n\u0414\u0440\u0443\u0433\u043e\u0439 \u0432\u0430\u0436\u043d\u044b\u0439 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a, CVE-2024-30103 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 8,8), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0447\u0435\u0440\u043d\u044b\u0435 \u0441\u043f\u0438\u0441\u043a\u0438 \u0440\u0435\u0435\u0441\u0442\u0440\u0430  Microsoft Outlook \u0438 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b DLL.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438 c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0438\u0437 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u043d\u0435\u0432\u0435\u043b\u0438\u043a\u0430 \u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u043e \u0441\u0435\u0442\u0438 \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0430 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043e\u0447\u0435\u043d\u044c \u043f\u0440\u043e\u0441\u0442\u043e.\n\n\u0412\u0441\u0451 \u044d\u0442\u043e \u0432 \u0441\u043e\u0432\u043e\u043a\u0443\u043f\u043d\u043e\u0441\u0442\u0438, \u043a\u0430\u043a \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b Morphisec, \u043f\u0440\u0435\u0434\u0432\u0435\u0449\u0430\u0435\u0442 \u043d\u0430\u0447\u0430\u043b\u043e \u043c\u0430\u0441\u0441\u043e\u0432\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 Microsoft Office \u0438 EoP-\u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u044f\u0434\u0440\u0435 Windows.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0441 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\u043c \u043a\u0430\u0436\u0434\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0430 \u0432\u043b\u0438\u044f\u0435\u0442, - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2024-06-13T13:47:26.000000Z"}, {"uuid": "bd405d0d-5d91-40ea-b544-4ce5f3e793ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/ctinow/202628", "content": "https://ift.tt/rWMQw7A\nCVE-2023-50868 ISC BIND Vulnerability in NetApp Products", "creation_timestamp": "2024-03-07T18:32:26.000000Z"}, {"uuid": "afb6c70f-55bb-4a53-b95e-b221bd05bad8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/ctinow/185352", "content": "https://ift.tt/y30NwtU\nCVE-2023-50868 | Unbound up to 1.19.0 NSEC3 RRSET Response denial of service", "creation_timestamp": "2024-02-15T09:16:35.000000Z"}, {"uuid": "6455dd97-656b-4b89-905b-76caa3c45906", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "seen", "source": "https://t.me/ctinow/184835", "content": "https://ift.tt/GDRlEHv\nCVE-2023-50868", "creation_timestamp": "2024-02-14T17:26:56.000000Z"}]}