{"vulnerability": "CVE-2023-52076", "sightings": [{"uuid": "b95952cb-e367-4be7-bd4b-3a4bff216559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "seen", "source": "https://t.me/ctinow/187279", "content": "https://ift.tt/PHiojx2\nCVE-2023-52076 | mate-desktop atril up to 1.26.1 on Linux Document path traversal (GHSA-6mf6-mxpc-jc37)", "creation_timestamp": "2024-02-18T15:41:19.000000Z"}, {"uuid": "aec50c22-fed9-438e-beb7-21e7606698c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3m7lgxebfdo2f", "content": "", "creation_timestamp": "2025-12-09T21:02:31.585785Z"}, {"uuid": "123c5922-65f2-461a-8af3-d3798bd82cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6442", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1a CVE-2023-44451, CVE-2023-52076: RCE Vulnerability affected popular Linux Distros including Mint, Kali, Parrot, Manjaro etc. EPUB File Parsing Directory Traversal Remote Code Execution\nURL\uff1ahttps://github.com/febinrev/slippy-book-exploit\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2025-05-25T05:54:06.000000Z"}, {"uuid": "71dd0f15-0557-4e44-986c-f989e73c433c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/2584", "content": "#exploit\n1. Win32k.sys LPE PoC\nhttps://github.com/Rootkitsmm-zz/MS15-061\n\n2. CVE-2023-44451, CVE-2023-52076:\nSlippy-book: EPUB File Parsing Directory Traversal RCE\nhttps://github.com/febinrev/slippy-book-exploit", "creation_timestamp": "2024-08-16T09:02:41.000000Z"}, {"uuid": "07621a27-44bf-4bf4-820f-8a6930412d09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1911", "content": "https://github.com/febinrev/slippy-book-exploit\n\nCVE-2023-44451, CVE-2023-52076: RCE Vulnerability affected popular Linux Distros including Mint, Kali, Parrot, Manjaro etc. EPUB File Parsing Directory Traversal Remote Code Execution\n\n#github #exploit", "creation_timestamp": "2024-01-27T08:06:46.000000Z"}, {"uuid": "4dab5288-7d86-429c-8715-9285fe3d2787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "seen", "source": "https://t.me/ctinow/178276", "content": "https://ift.tt/5XSiF7q\nCVE-2023-52076 Exploit", "creation_timestamp": "2024-02-02T21:16:48.000000Z"}, {"uuid": "d9af088b-9334-468e-aa96-7b3e7bea0565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "seen", "source": "https://t.me/ctinow/173595", "content": "https://ift.tt/dSu5Ikx\nCVE-2023-52076", "creation_timestamp": "2024-01-25T17:26:34.000000Z"}, {"uuid": "e0feec05-b07a-449e-b0ea-6d07905dcea8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/4445", "content": "Slippy-book: CVE-2023-44451 &amp; CVE-2023-52076\n\nDirectory Traversal -&gt; RCE \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0445 \u043a\u043d\u0438\u0433 EPUB. \u0417\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0435 DE Mate, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Mint, Kali, Parrot, Manjaro, Xubuntu.\n\n\ud83d\udd39 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430\u0445 Atril Document Viewer and Xreader Document Viewer, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u0434\u043b\u044f \u0447\u0442\u0435\u043d\u0438\u044f \u0444\u043e\u0440\u043c\u0430\u0442\u0430 EPUB.\n\n\ud83d\udd39 \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0441\u043e\u0437\u0434\u0430\u0435\u0442 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u0444\u0430\u0439\u043b \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u041d\u0430 \u0432\u0438\u0434\u0435\u043e \u043f\u0440\u0438\u043c\u0435\u0440 \u0437\u0430\u043f\u0438\u0441\u0438 .desktop \u0432 $HOME/.config/autostart, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442 \u043a\u0430\u043b\u044c\u043a\u0443\u043b\u044f\u0442\u043e\u0440 \u043f\u043e\u0441\u043b\u0435 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438.\n\n\ud83d\udd39Atril \u0438 Xreader \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442 \u0444\u043e\u0440\u043c\u0430\u0442\u044b PDF \u0438 EPUB. \u0415\u0441\u043b\u0438 \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 .epub \u043d\u0430 .pdf \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0435\u0433\u043e \u0446\u0435\u043b\u0438, \u043a\u043e\u0434 \u0432\u0441\u0435 \u0440\u0430\u0432\u043d\u043e \u0441\u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442.\n\n\ud83d\udd39 \u041c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0434\u043b\u044f \u043f\u0440\u043e\u043a\u0438\u0434\u044b\u0432\u0430\u043d\u0438\u044f \u0440\u0435\u0432\u0435\u0440\u0441-\u0448\u0435\u043b\u043b\u0430 \u0438\u043b\u0438 \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u0432\u043e\u0438\u0445 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0445 \u043a\u043b\u044e\u0447\u0435\u0439 \u0432 authorized_keys, \u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u043a \u043c\u0430\u0448\u0438\u043d\u0435 \u0447\u0435\u0440\u0435\u0437 SSH.", "creation_timestamp": "2024-01-26T13:59:57.000000Z"}, {"uuid": "8ddf2b08-5db5-422a-9f4b-4736c8d6a498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-52076", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9858", "content": "#exploit\n1. Win32k.sys LPE PoC\nhttps://github.com/Rootkitsmm-zz/MS15-061\n\n2. CVE-2023-44451, CVE-2023-52076:\nSlippy-book: EPUB File Parsing Directory Traversal RCE\nhttps://github.com/febinrev/slippy-book-exploit\n\n3. CVE-2024-0844:\nPath traversal in the popup-more WordPress plugin\nhttps://github.com/0x9567b/CVE-2024-0844", "creation_timestamp": "2024-01-27T19:05:02.000000Z"}]}