{"vulnerability": "CVE-2023-5091", "sightings": [{"uuid": "25c4ec09-f641-46df-a214-0959ebad220f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50913", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113601933958929717", "content": "", "creation_timestamp": "2024-12-05T19:45:47.993044Z"}, {"uuid": "809a36f8-b1bd-473d-a791-34445c329ec7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "9cf54d44-526a-4ef4-b687-383a2f1087a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:58.000000Z"}, {"uuid": "9fafd515-8942-452a-a5dd-93a482dae3fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "fc5579c4-f69f-4dce-8fc4-82460ae34463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:58.000000Z"}, {"uuid": "7031fde4-7ffd-4749-b3ee-e2822a2c67f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/glinet_unauth_rce_cve_2023_50445.rb", "content": "", "creation_timestamp": "2024-01-23T20:16:11.000000Z"}, {"uuid": "18cda409-3528-43ce-9404-6b29394406ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "369abac3-823f-4bd0-a160-94bf2e2c8e8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "e4bba7fb-0c6b-4ff4-9f99-4498cc8d725a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/42521e67-5c8d-4b16-a114-e0db686c91a7", "content": "", "creation_timestamp": "2026-02-19T10:22:00.000000Z"}, {"uuid": "36177f85-2162-4126-b86a-6549fe39a19b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/majordomo_cmd_inject_cve_2023_50917.rb", "content": "", "creation_timestamp": "2024-01-19T22:26:22.000000Z"}, {"uuid": "d9ee46b5-6940-4a82-b4ac-1013d1c44ccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m3iopgxmwh2q", "content": "", "creation_timestamp": "2025-10-18T21:02:27.572024Z"}, {"uuid": "aa95c6ea-9524-4343-b969-a1bf9b92dfa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ly226rag7m23", "content": "", "creation_timestamp": "2025-09-04T21:02:26.828309Z"}, {"uuid": "1b7603ba-b775-4667-b59d-8cf58c7d3204", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6219", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aMajorDoMo Unauthenticated RCE: Deep Dive &amp; Exploitation Techniques\nURL\uff1ahttps://github.com/Chocapikk/CVE-2023-50917\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-12-18T01:20:19.000000Z"}, {"uuid": "96b89304-dd67-46a7-978f-91fe6020180e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://t.me/ctinow/156650", "content": "https://ift.tt/ScwfoUv\nDisclosure of CVE-2023-50917: RCE Vulnerability in MajorDoM", "creation_timestamp": "2023-12-19T23:23:25.000000Z"}, {"uuid": "90277f19-413b-43e5-b221-0cd43df25228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/HelangMerahGroup/208", "content": "\u26a0\ufe0f Attention Kyocera &amp; QNAP users: \n\nKyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes. \n\nRead details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html", "creation_timestamp": "2024-01-09T15:22:53.000000Z"}, {"uuid": "88da84af-f1d3-48b4-a9ac-caad26b736b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50915", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9462", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-50915\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An issue exists in GalaxyClientService.exe in GOG Galaxy (Beta) 2.0.67.2 through 2.0.71.2 that could allow authenticated users to overwrite and corrupt critical system files via a combination of an NTFS Junction and an RPC Object Manager symbolic link and could result in a denial of service.\n\ud83d\udccf Published: 2024-04-30T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-28T19:28:13.541Z\n\ud83d\udd17 References:\n1. https://support.gog.com/hc/en-us/categories/201553005-Downloads-Installing?product=gog\n2. https://github.com/anvilsecure/gog-galaxy-app-research\n3. https://github.com/anvilsecure/gog-galaxy-app-research/blob/main/advisories/CVE-2023-50915%20-%20DoS.md", "creation_timestamp": "2025-03-28T20:29:08.000000Z"}, {"uuid": "6225b005-33be-4ecd-998f-d86a575dfa75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/HelangMerahGroup/1139", "content": "\u26a0\ufe0f Attention Kyocera &amp; QNAP users: \n\nKyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes. \n\nRead details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html", "creation_timestamp": "2024-01-09T15:22:53.000000Z"}, {"uuid": "f78798e6-b499-4097-b982-81cbea5fee57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50913", "type": "seen", "source": "https://t.me/cvedetector/12139", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-50913 - Oxide control plane software before 5 allows SSRF.\", \n  \"Content\": \"CVE ID : CVE-2023-50913 \nPublished : Dec. 5, 2024, 8:15 p.m. | 41\u00a0minutes ago \nDescription : Oxide control plane software before 5 allows SSRF. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"05 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-05T22:03:21.000000Z"}, {"uuid": "8ba85618-84b2-4e22-8d9c-9d15060f863f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "seen", "source": "https://t.me/arpsyndicate/2051", "content": "#ExploitObserverAlert\n\nCVE-2023-50917\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-50917. MajorDoMo (aka Major Domestic Module) before 0662e5e allows command execution via thumb.php shell metacharacters. NOTE: this is unrelated to the Majordomo mailing-list manager.\n\nFIRST-EPSS: 0.000420000", "creation_timestamp": "2023-12-20T15:46:03.000000Z"}, {"uuid": "89000745-d594-4388-aae6-2d10efd170b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "Telegram/XLot49RvtY4rpuiqiwISomStKGkWZTLY0D8ABalYd2R3Yw", "content": "", "creation_timestamp": "2024-03-01T07:47:43.000000Z"}, {"uuid": "626cc594-ad80-4fc9-8695-f32e7548b5f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3089", "content": "\u26a0\ufe0f Attention Kyocera &amp; QNAP users: \n\nKyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes. \n\nRead details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html", "creation_timestamp": "2024-01-09T15:29:06.000000Z"}, {"uuid": "e2baea46-a275-4e67-9600-55e50ecced0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "https://t.me/ctinow/177987", "content": "https://ift.tt/vHrQGoN\nCVE-2023-50919 | GL.iNet B1300 Nginx improper authentication (Issue 176708)", "creation_timestamp": "2024-02-02T09:06:42.000000Z"}, {"uuid": "81355ba6-dd6a-4347-8bed-dd3ad55d0b2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/261", "content": "\u26a0\ufe0f Attention Kyocera &amp; QNAP users: \n\nKyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes. \n\nRead details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html", "creation_timestamp": "2024-01-09T15:29:06.000000Z"}, {"uuid": "28aae34a-dda9-4475-b390-a43c568c4091", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3823", "content": "#exploit \n1. Capturing the First Flag in Google's New v8CTF \nhttps://www.madstacks.dev/posts/Start-Your-Engines-Capturing-the-First-Flag-in-Google's-New-v8CTF \n \n2. CVE-2023-50916: \nAuthentication Coercion Vulnerability in Kyocera Device Manager \nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-50916-authentication-coercion-vulnerability-in-kyocera-device-manager \n \n3. CVE-2023-20573: \nA privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests... \nhttps://github.com/Freax13/cve-2023-20573-poc", "creation_timestamp": "2024-01-11T07:31:05.000000Z"}, {"uuid": "04a3b105-7a54-4d2d-b38d-c9d861698513", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/ctinow/166104", "content": "https://ift.tt/lkE9264\nCVE-2023-50916", "creation_timestamp": "2024-01-10T20:29:03.000000Z"}, {"uuid": "09981226-5f34-4d75-b8e9-26a193c3204d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "https://t.me/ctinow/170095", "content": "https://ift.tt/YgUOtZE\nCVE-2023-50919 Exploit", "creation_timestamp": "2024-01-19T08:17:07.000000Z"}, {"uuid": "42dff3b6-fab3-494a-bbb0-10a6f80d07c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "seen", "source": "https://t.me/ctinow/167149", "content": "https://ift.tt/y6YehPf\nCVE-2023-50919", "creation_timestamp": "2024-01-12T09:26:42.000000Z"}, {"uuid": "667bf152-cea7-4013-b012-b4300100b7fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/ctinow/175000", "content": "https://ift.tt/FP0AfKg\nCVE-2023-50916 | Kyocera Device Manager prior 3.1.1213.0 UNC path traversal", "creation_timestamp": "2024-01-28T19:01:30.000000Z"}, {"uuid": "13bd9694-188e-4210-a19f-33edec06af3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/ctinow/170402", "content": "https://ift.tt/h9CDInd\nCVE-2023-50916 Exploit", "creation_timestamp": "2024-01-19T21:16:23.000000Z"}, {"uuid": "d7499527-0ece-4bb1-93fe-5fb80b0cf09c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5091", "type": "seen", "source": "https://t.me/ctinow/173371", "content": "https://ift.tt/KSBZXGY\nCVE-2023-5091 | Arm Valhall GPU Kernel Driver up to r40p0 use after free", "creation_timestamp": "2024-01-25T10:46:10.000000Z"}, {"uuid": "8b121524-0e01-4cc0-9324-b288729574e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50918", "type": "seen", "source": "https://t.me/ctinow/166625", "content": "https://ift.tt/hluxp1g\nCVE-2023-50918 | MISP up to 2.4.181 Audit Log ACL AuditLogsController.php Privilege Escalation", "creation_timestamp": "2024-01-11T16:31:43.000000Z"}, {"uuid": "efb314e6-3744-4556-bdfc-91b8583f6dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50915", "type": "published-proof-of-concept", "source": "https://t.me/cultofwire/1253", "content": "Galactical Bug Hunting: How we discovered new issues in CD Projekt Red\u2019s Gaming Platform\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Anvil Secure \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0441\u043f\u043e\u0441\u043e\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u043c GOG Galaxy 2.0 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0441 \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0438 \u043c\u0435\u0436\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043d\u044b\u043c \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435\u043c (IPC) \u043c\u0435\u0436\u0434\u0443 \u0441\u0432\u043e\u0438\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u0438\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u043e\u0439. \u042d\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044e \u0434\u0432\u0443\u0445 \u043d\u043e\u0432\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u043d\u043e\u043c\u0435\u0440 CVE-2023-50915, \u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0435 \u043d\u043e\u043c\u0435\u0440 CVE-2023-50914.\n\n\u041d\u0430 \u0442\u0435\u043a\u0443\u0449\u0438\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043d\u0435 \u044f\u0441\u043d\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u043b\u0438 CD Projekt \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, 90 \u0434\u043d\u0435\u0439 \u043f\u0440\u043e\u0448\u043b\u043e, \u0430 \u0432\u043d\u044f\u0442\u043d\u043e\u0433\u043e \u043e\u0442\u0432\u0435\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438.\n\u0422\u0430\u043a\u0436\u0435 \u043d\u0435\u0442 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e CVE \u0432 MITRE/NIST.\n\n\u0414\u0435\u043c\u043e \u0438 Po\u0421 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043d\u0430 Github: github.com/anvilsecure/gog-galaxy-app-research", "creation_timestamp": "2024-04-10T10:16:39.000000Z"}, {"uuid": "8405f4ce-0db1-48a7-9e6b-368be35eca5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5091", "type": "seen", "source": "https://t.me/ctinow/164287", "content": "https://ift.tt/P34mcUg\nCVE-2023-5091", "creation_timestamp": "2024-01-08T11:26:21.000000Z"}, {"uuid": "ec6766b6-ddfb-40a4-86e2-a6c6e416611c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "seen", "source": "https://t.me/thehackernews/4372", "content": "\u26a0\ufe0f Attention Kyocera &amp; QNAP users: \n \nKyocera addresses dangerous CVE-2023-50916 flaw, preventing unauthorized access. QNAP tackles CVE-2023-39296, safeguarding against crashes. \n \nRead details here: https://thehackernews.com/2024/01/alert-new-vulnerabilities-discovered-in.html", "creation_timestamp": "2024-01-09T14:34:43.000000Z"}, {"uuid": "e65d6080-b9e2-4a20-be9b-6fef1ec535ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50914", "type": "published-proof-of-concept", "source": "https://t.me/cultofwire/1253", "content": "Galactical Bug Hunting: How we discovered new issues in CD Projekt Red\u2019s Gaming Platform\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Anvil Secure \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0441\u043f\u043e\u0441\u043e\u0431, \u043a\u043e\u0442\u043e\u0440\u044b\u043c GOG Galaxy 2.0 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0441 \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0438 \u043c\u0435\u0436\u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043d\u044b\u043c \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435\u043c (IPC) \u043c\u0435\u0436\u0434\u0443 \u0441\u0432\u043e\u0438\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u0438\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u043b\u0443\u0436\u0431\u043e\u0439. \u042d\u0442\u043e \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044e \u0434\u0432\u0443\u0445 \u043d\u043e\u0432\u044b\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u043d\u043e\u043c\u0435\u0440 CVE-2023-50915, \u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0435 \u043d\u043e\u043c\u0435\u0440 CVE-2023-50914.\n\n\u041d\u0430 \u0442\u0435\u043a\u0443\u0449\u0438\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043d\u0435 \u044f\u0441\u043d\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u043b\u0438 CD Projekt \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, 90 \u0434\u043d\u0435\u0439 \u043f\u0440\u043e\u0448\u043b\u043e, \u0430 \u0432\u043d\u044f\u0442\u043d\u043e\u0433\u043e \u043e\u0442\u0432\u0435\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438.\n\u0422\u0430\u043a\u0436\u0435 \u043d\u0435\u0442 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043e CVE \u0432 MITRE/NIST.\n\n\u0414\u0435\u043c\u043e \u0438 Po\u0421 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043d\u0430 Github: github.com/anvilsecure/gog-galaxy-app-research", "creation_timestamp": "2024-04-10T10:16:39.000000Z"}, {"uuid": "9904a52c-9ffb-482d-9f7d-7a11a2b9298b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9846", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024 -20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-01-25T12:47:06.000000Z"}, {"uuid": "9f3c6dc2-6df2-4e7e-bf51-8bbd65e51d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9620", "content": "#exploit\n1. CVE-2023-50917:\nMajorDoMo Unauthenticated RCE\nhttps://github.com/Chocapikk/CVE-2023-50917\n\n2. CVE-2023-41772:\nUIFuckUp exploit to gain system privileges as user on Windows 10 (&gt;=1809) and 11\nhttps://github.com/R41N3RZUF477/CVE-2023-41772\n\n3. CVE-2023-49786:\nAsterisk 20.1.0 - DoS via DTLS\nhttps://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "creation_timestamp": "2023-12-20T11:00:39.000000Z"}, {"uuid": "14c350c0-a40d-445c-8ce6-bdd0c5e9e98f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9765", "content": "#exploit\n1. Capturing the First Flag in Google's New v8CTF\nhttps://www.madstacks.dev/posts/Start-Your-Engines-Capturing-the-First-Flag-in-Google's-New-v8CTF\n\n2. CVE-2023-50916:\nAuthentication Coercion Vulnerability in Kyocera Device Manager\nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-50916-authentication-coercion-vulnerability-in-kyocera-device-manager\n\n3. CVE-2023-20573:\nA privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests...\nhttps://github.com/Freax13/cve-2023-20573-poc", "creation_timestamp": "2024-01-12T01:36:25.000000Z"}, {"uuid": "684dcddf-cef1-4f33-9ae8-fa2f6ed28631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50915", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/10295", "content": "#exploit\nCVE-2023-50914, CVE-2023-50915:\nPrivilege Escalation via Insecure Inter-Process Communication/DoS in CD Projekt Red\u2019s Gaming Platform\nhttps://www.anvilsecure.com/blog/galactical-bug-hunting-how-we-discovered-new-issues-in-cd-projekt-reds-gaming-platform.html", "creation_timestamp": "2024-05-02T04:09:16.000000Z"}, {"uuid": "749e0484-d081-472b-87b6-e0fca38a3d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50914", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/10295", "content": "#exploit\nCVE-2023-50914, CVE-2023-50915:\nPrivilege Escalation via Insecure Inter-Process Communication/DoS in CD Projekt Red\u2019s Gaming Platform\nhttps://www.anvilsecure.com/blog/galactical-bug-hunting-how-we-discovered-new-issues-in-cd-projekt-reds-gaming-platform.html", "creation_timestamp": "2024-05-02T04:09:16.000000Z"}, {"uuid": "6b5bbe47-b23a-49ee-bb0c-6354d1942ddb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50917", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2301", "content": "#exploit\n1. CVE-2023-50917:\nMajorDoMo Unauthenticated RCE\nhttps://github.com/Chocapikk/CVE-2023-50917\n\n2. CVE-2023-41772:\nUIFuckUp exploit to gain system privileges as user on Windows 10 (&gt;=1809) and 11\nhttps://github.com/R41N3RZUF477/CVE-2023-41772\n\n3. CVE-2023-49786:\nAsterisk 20.1.0 - DoS via DTLS\nhttps://packetstormsecurity.com/files/176251/Asterisk-20.1.0-Denial-Of-Service.html", "creation_timestamp": "2024-08-16T08:57:35.000000Z"}, {"uuid": "64f02d79-c099-4f5a-a6b6-f9e0bb5cb2ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50919", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2568", "content": "#exploit\n1. CVE-2023-45185:\nRCE via insecure deserialisation in IBM i Access Client Solutions &lt; 1.1.9\nhttps://github.com/afine-com/CVE-2023-45185\n\n2. CVE-2023-50445/CVE-2023-50919:\nGL.iNet Unauthenticated RCE\nhttps://packetstormsecurity.com/files/176708/GL.iNet-Unauthenticated-Remote-Command-Execution.html\n\n3. CVE-2024-20698:\nWindows Kernel EoP\nhttps://github.com/RomanRybachek/CVE-2024-20698", "creation_timestamp": "2024-08-16T09:02:40.000000Z"}, {"uuid": "40f4fe36-2c52-4ff2-920c-b1c0acba66ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50916", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2480", "content": "#exploit\n1. Capturing the First Flag in Google's New v8CTF\nhttps://www.madstacks.dev/posts/Start-Your-Engines-Capturing-the-First-Flag-in-Google's-New-v8CTF\n\n2. CVE-2023-50916:\nAuthentication Coercion Vulnerability in Kyocera Device Manager\nhttps://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-50916-authentication-coercion-vulnerability-in-kyocera-device-manager\n\n3. CVE-2023-20573:\nA privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests...\nhttps://github.com/Freax13/cve-2023-20573-poc", "creation_timestamp": "2024-08-16T09:01:21.000000Z"}]}