{"vulnerability": "CVE-2024-4761", "sightings": [{"uuid": "ec3d3f52-b9b7-46ea-91c9-ca8d2e26bfd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-05-16T18:10:04.000000Z"}, {"uuid": "d943795b-eb7b-4253-93a8-609aad26ef46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47615", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}, {"uuid": "99a49cf6-d4df-4062-abd3-2c8dfebdf77a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47613", "type": "seen", "source": "https://github.blog/security/vulnerability-research/uncovering-gstreamer-secrets/", "content": "", "creation_timestamp": "2024-12-17T12:51:51.000000Z"}, {"uuid": "478a9ccc-95f5-41b5-9c38-1742c763d8d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47619", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lphg7icdpc2c", "content": "", "creation_timestamp": "2025-05-18T15:55:22.956886Z"}, {"uuid": "88b28976-0c3d-4581-9f6f-93e83fdf3fc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:54.000000Z"}, {"uuid": "cf9c3745-f33b-45fa-93c8-62c97ca364e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47619", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114467343284596625", "content": "", "creation_timestamp": "2025-05-07T15:50:46.492903Z"}, {"uuid": "1442b9d7-0851-4105-84c3-3d46284f4f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47619", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lolzkdsgfb2p", "content": "", "creation_timestamp": "2025-05-07T18:26:58.226294Z"}, {"uuid": "77464a76-c4ee-418f-a6ca-410c2ffc7462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3m5y3zaqi622o", "content": "", "creation_timestamp": "2025-11-19T11:00:55.666368Z"}, {"uuid": "a3bb8f44-f82f-4e3f-83af-a43eabfea7d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-47611", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0315/", "content": "", "creation_timestamp": "2026-03-18T00:00:00.000000Z"}, {"uuid": "9a57dd23-1544-40bb-90b1-12e06e0e9e66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47619", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-06", "content": "", "creation_timestamp": "2026-02-12T11:00:00.000000Z"}, {"uuid": "217f0143-edbd-4fa9-8638-5b012e32368a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:26.000000Z"}, {"uuid": "dc4e2569-d898-46bc-9933-2a4e60b0e665", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1288", "content": "", "creation_timestamp": "2024-05-14T04:00:00.000000Z"}, {"uuid": "b35e9ed8-7d40-4ee9-ac94-38dd4d638510", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1291", "content": "", "creation_timestamp": "2024-05-16T04:00:00.000000Z"}, {"uuid": "bd28f07b-d339-46d2-9b05-d0ced02f41b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7308", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aHigh CVE-2024-4761 Exploit \nURL\uff1ahttps://github.com/michredteam/CVE-2024-4761\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-14T17:48:08.000000Z"}, {"uuid": "aa3424c2-7088-437b-a6f5-a7e146742e38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-47619", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1763", "content": "", "creation_timestamp": "2026-02-13T04:00:00.000000Z"}, {"uuid": "285a158b-5828-4b1a-8947-e6194c2152ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/565c352e-b9bd-4547-9741-be031a761c39", "content": "", "creation_timestamp": "2026-02-02T12:26:36.723711Z"}, {"uuid": "3c668142-2641-4453-a40a-ad7439f46b7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "Telegram/c93m7xCSwb6iKPJnQ7Z4oxzLyO9CSqXEgThymG0zgD8j3ZE", "content": "", "creation_timestamp": "2024-05-14T17:09:31.000000Z"}, {"uuid": "a9922606-ea34-42e4-9d79-f2bfcdff2299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/itsec_news/4426", "content": "\u200b\u26a1\ufe0f\u042d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 0day: Google \u0437\u0430\u0449\u0438\u0442\u0438\u043b\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Chrome \u043e\u0442 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445\n\n\ud83d\udcac Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Chrome, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-4761 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u0433\u0440\u0430\u043d\u0438\u0446 (out-of-bounds) \u0432 JavaScript-\u0434\u0432\u0438\u0436\u043a\u0435 V8, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0442\u0432\u0435\u0447\u0430\u0435\u0442 \u0437\u0430 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 JavaScript-\u043a\u043e\u0434\u0430 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435. \u041f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0430\u0435\u0442\u0441\u044f \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u043e\u0433\u043e \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0438\u043b\u0438 \u0431\u0443\u0444\u0435\u0440\u0430, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u043a \u0434\u0430\u043d\u043d\u044b\u043c, \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0441\u0431\u043e\u044f\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b. Google \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0435\u0439 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0434\u043b\u044f CVE-2024-4761.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Chrome 124.0.6367.207/.208 \u0434\u043b\u044f Mac \u0438 Windows \u0438 124.0.6367.207 \u0434\u043b\u044f Linux. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0443\u0434\u0443\u0442 \u043f\u043e\u0441\u0442\u0435\u043f\u0435\u043d\u043d\u043e \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c\u0441\u044f \u0441\u0440\u0435\u0434\u0438 \u0432\u0441\u0435\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u0434\u043d\u0438 \u0438 \u043d\u0435\u0434\u0435\u043b\u0438. \u0414\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043a\u0430\u043d\u0430\u043b\u0430 Extended Stable \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0432 \u0432\u0435\u0440\u0441\u0438\u0438 124.0.6367.207 \u0434\u043b\u044f Mac \u0438 Windows.\n\nChrome \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u043d\u043e\u0432\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u0443\u0431\u0435\u0434\u0438\u0442\u044c\u0441\u044f, \u0447\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u0432\u0435\u0440\u0441\u0438\u044e, \u043f\u0435\u0440\u0435\u0439\u0434\u044f \u0432 \u0440\u0430\u0437\u0434\u0435\u043b \u041d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 &gt; \u041e \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Chrome, \u0434\u043e\u0436\u0434\u0430\u0432\u0448\u0438\u0441\u044c \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043d\u0430\u0436\u0430\u0432 \u043d\u0430 \u043a\u043d\u043e\u043f\u043a\u0443 \u041f\u0435\u0440\u0435\u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0434\u043b\u044f \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-05-14T11:47:02.000000Z"}, {"uuid": "b48313de-cd4c-4048-8fd5-8d885e56a899", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/itsec_news/4434", "content": "\u200b\u26a1\ufe0fCVE-2024-4947: Google \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0435\u0449\u0451 \u043e\u0434\u043d\u0443 0day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Chrome\n\n\ud83d\udcac \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0435\u0432\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Chrome, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u043e\u0432\u0443\u044e zero-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-4947 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 Type Confusion \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 JavaScript V8 \u0438 WebAssembly.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u2014 \u0412\u0430\u0441\u0438\u043b\u0438\u0435\u043c \u0411\u0435\u0440\u0434\u043d\u0438\u043a\u043e\u0432\u044b\u043c \u0438 \u0411\u043e\u0440\u0438\u0441\u043e\u043c \u041b\u0430\u0440\u0438\u043d\u044b\u043c 13 \u043c\u0430\u044f 2024 \u0433\u043e\u0434\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Type Confusion \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u043f\u044b\u0442\u0430\u0435\u0442\u0441\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0441 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u043c \u0442\u0438\u043f\u043e\u043c. \u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c, \u0442\u0430\u043a\u0438\u043c \u043a\u0430\u043a \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 (Memory Out-of-bounds), \u0441\u0431\u043e\u0438 \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u042d\u0442\u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441\u0442\u0430\u043b \u0442\u0440\u0435\u0442\u044c\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 Google \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u043d\u0435\u0434\u0435\u043b\u044e, \u043f\u043e\u0441\u043b\u0435 CVE-2024-4671 \u0438 CVE-2024-4761. \u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u044e\u0442\u0441\u044f, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0434\u043d\u0430\u043a\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u0435\u0439 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0438 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0434\u043b\u044f CVE-2024-4947 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0421 \u0443\u0447\u0451\u0442\u043e\u043c CVE-2024-4947, \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u0433\u043e\u0434\u0430 Google \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0441\u0435\u043c\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Chrome:\n\nCVE-2024-0519 \u2014 \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 V8;\nCVE-2024-2886 \u2014 Use-After-Free \u0432 WebCodecs;\nCVE-2024-2887 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0442\u0438\u043f\u0430 confusion \u0432 WebAssembly;\nCVE-2024-3159 \u2014 \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 V8;\nCVE-2024-4671 \u2014 Use-After-Free \u0432 Visuals;\nCVE-2024-4761 \u2014 \u0437\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0432 V8.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Chrome \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 125.0.6422.60/.61, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0433\u0440\u043e\u0437\u044b. \u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f, \u043a\u0430\u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0434\u0440\u0443\u0433\u0438\u0445 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 \u043d\u0430 \u0431\u0430\u0437\u0435 Chromium, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Edge, Brave, Opera \u0438 Vivaldi \u2014 \u0441\u0442\u043e\u0438\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443, \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u043d\u0438 \u0441\u0442\u0430\u043d\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-05-16T15:41:15.000000Z"}, {"uuid": "fd0b0124-e75e-4ba0-a255-f69703703e3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47619", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/15314", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-47619\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N)\n\ud83d\udd39 Description: syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue.\n\ud83d\udccf Published: 2025-05-07T15:12:02.118Z\n\ud83d\udccf Modified: 2025-05-07T15:12:02.118Z\n\ud83d\udd17 References:\n1. https://github.com/syslog-ng/syslog-ng/security/advisories/GHSA-xr54-gx74-fghg\n2. https://github.com/syslog-ng/syslog-ng/commit/dadfdbecde5bfe710b0a6ee5699f96926b3f9006\n3. https://github.com/syslog-ng/syslog-ng/blob/b0ccc8952d333fbc2d97e51fddc0b569a15e7a7d/lib/transport/tls-verifier.c#L78-L110\n4. https://github.com/syslog-ng/syslog-ng/releases/tag/syslog-ng-4.8.2", "creation_timestamp": "2025-05-07T15:22:27.000000Z"}, {"uuid": "c3a742b4-d606-499d-8d78-707d657ce7fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/cibsecurity/77165", "content": "\ud83d\udd8b\ufe0f New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation \ud83d\udd8b\ufe0f\n\nGoogle on Monday shipped emergency fixes to address a new zeroday flaw in the Chrome web browser that has come under active exploitation in the wild. The highseverity vulnerability,\u00a0tracked as\u00a0CVE20244761, is an outofbounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024. Outofbounds write bugs\u00a0could be typically.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2024-05-14T16:32:34.000000Z"}, {"uuid": "b7347f39-381e-46ba-a93e-0b1b065aaf30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/kasperskyb2b/1256", "content": "\u0421\u043d\u043e\u0432\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u2014 \u0442\u0440\u0435\u0442\u0438\u0439 0day \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e \ud83d\ude33\n\nGoogle \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 5.0.6422.60/.61 \u0434\u043b\u044f Windows \u0438 125.0.6422.60 \u0434\u043b\u044f Linux.\n\u041a\u043b\u044e\u0447\u0435\u0432\u044b\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u043c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2024-4947 \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8. \u041e \u043d\u0435\u0439 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u0438 \u043e\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u0412\u0440\u0435\u043c\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f!\n\n\u0414\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u043d\u0435\u0434\u0435\u043b\u044e \u043d\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u043b\u0441\u044f \ud83d\udc7f, \u0437\u0430\u043e\u0434\u043d\u043e \u0431\u0443\u0434\u0443\u0442 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0434\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0445 0day, \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0435 \u0440\u0430\u043d\u0435\u0435:  CVE-2024-4671 \u0438 CVE-2024-4761.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-05-16T16:16:04.000000Z"}, {"uuid": "faed493d-107f-43c3-ba35-e27ee8d9763d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47610", "type": "seen", "source": "https://t.me/cvedetector/7276", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47610 - InvenTree Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-47610 \nPublished : Oct. 7, 2024, 9:15 p.m. | 36\u00a0minutes ago \nDescription : InvenTree is an Open Source Inventory Management System. In affected versions of InvenTree it is possible for a registered user to store javascript in markdown notes fields, which are then displayed to other logged in users who visit the same page and executed. The vulnerability has been addressed as follows: 1. HTML sanitization has been enabled in the front-end markdown rendering library - `easymde`. 2. Stored markdown is also validated on the backend, to ensure that malicious markdown is not stored in the database. These changes are available in release versions 0.16.5 and later. All users are advised to upgrade. There are no workarounds, an update is required to get the new validation functions. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-08T00:19:37.000000Z"}, {"uuid": "78360e78-7af6-4e96-9490-3a678c17a400", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47612", "type": "seen", "source": "https://t.me/cvedetector/6831", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47612 - DataDump Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47612 \nPublished : Oct. 2, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : DataDump is a MediaWiki extension that provides dumps of wikis. Several interface messages are unescaped (more specifically, (datadump-table-column-queued), (datadump-table-column-in-progress), (datadump-table-column-completed), (datadump-table-column-failed)). If these messages are edited (which requires the (editinterface) right by default), anyone who can view Special:DataDump (which requires the (view-dump) right by default) can be XSSed. This vulnerability is fixed with 601688ee8e8808a23b102fa305b178f27cbd226d. \nSeverity: 3.5 | LOW \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-02T18:02:00.000000Z"}, {"uuid": "dc4ffb7d-3696-4b3d-ad8e-141bf72c4b39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "Telegram/NTbxgqKuUgpPV1Ir1opBzZdvk7Z5ZqrAZVdknmWbdIE1jw", "content": "", "creation_timestamp": "2024-05-14T19:42:55.000000Z"}, {"uuid": "f5e70e4d-4cc4-4626-998e-d96113e720d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47617", "type": "seen", "source": "https://t.me/cvedetector/6900", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47617 - Sulu CMS SuluMediaBundle Reflected Cross-Site Scripting (XSS)\", \n  \"Content\": \"CVE ID : CVE-2024-47617 \nPublished : Oct. 3, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Sulu is a PHP content management system. This vulnerability allows an attacker to inject arbitrary HTML/JavaScript code through the media download URL in Sulu CMS. It affects the SuluMediaBundle component. The vulnerability is a Reflected Cross-Site Scripting (XSS) issue, which could potentially allow attackers to steal sensitive information, manipulate the website's content, or perform actions on behalf of the victim. This vulnerability is fixed in 2.6.5 and 2.5.21. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T18:17:22.000000Z"}, {"uuid": "25f685ad-7c05-4492-b1f7-e0b4f8124cae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47614", "type": "seen", "source": "https://t.me/cvedetector/6899", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47614 - Async-GraphQL Excessive Directives Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47614 \nPublished : Oct. 3, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : async-graphql is a GraphQL server library implemented in Rust. async-graphql before 7.0.10 does not limit the number of directives for a field. This can lead to Service Disruption, Resource Exhaustion, and User Experience Degradation. This vulnerability is fixed in 7.0.10. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T18:17:19.000000Z"}, {"uuid": "113e55dd-31dd-4fd1-bf55-46dbf3038880", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47618", "type": "seen", "source": "https://t.me/cvedetector/6895", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47618 - Sulu Cross-Site Scripting (XSS) via Media SVG File Upload\", \n  \"Content\": \"CVE ID : CVE-2024-47618 \nPublished : Oct. 3, 2024, 3:15 p.m. | 38\u00a0minutes ago \nDescription : Sulu is a PHP content management system. Sulu is vulnerable against XSS whereas a low privileged user with access to the \u201cMedia\u201d section can upload an SVG file with a malicious payload. Once uploaded and accessed, the malicious javascript will be executed on the victims\u2019 (other users including admins) browsers. This issue is fixed in 2.6.5. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T18:17:15.000000Z"}, {"uuid": "6575e506-c780-40d6-b720-a2f14bb3e3ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47616", "type": "seen", "source": "https://t.me/cvedetector/6884", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47616 - \"Pomerium Databroker Incomplete JWT Validation Leaves Services Open to Abuse\"\", \n  \"Content\": \"CVE ID : CVE-2024-47616 \nPublished : Oct. 2, 2024, 10:15 p.m. | 24\u00a0minutes ago \nDescription : Pomerium is an identity and context-aware access proxy. The Pomerium databroker service is responsible for managing all persistent Pomerium application state. Requests to the databroker service API are authorized by the presence of a JSON Web Token (JWT) signed by a key known by all Pomerium services in the same deployment. However, incomplete validation of this JWT meant that some service account access tokens would incorrectly be treated as valid for the purpose of databroker API authorization. Improper access to the databroker API could allow exfiltration of user info, spoofing of user sessions, or tampering with Pomerium routes, policies, and other settings. A Pomerium deployment is susceptible to this issue if all of the following conditions are met, you have issued a service account access token using Pomerium Zero or Pomerium Enterprise, the access token has an explicit expiration date in the future, and the core Pomerium databroker gRPC API is not otherwise secured by network access controls. This vulnerability is fixed in 0.27.1. \nSeverity: 6.8 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-03T00:43:47.000000Z"}, {"uuid": "70854f02-ff32-4a5f-acda-a7ae13a61635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47611", "type": "seen", "source": "https://t.me/cvedetector/6832", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47611 - XZ Utils Windows Command Line Argument Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47611 \nPublished : Oct. 2, 2024, 3:15 p.m. | 41\u00a0minutes ago \nDescription : XZ Utils provide a general-purpose data-compression library plus command-line tools. When built for native Windows (MinGW-w64 or MSVC), the command line tools from XZ Utils 5.6.2 and older have a command line argument injection vulnerability. If a command line contains Unicode characters (for example, filenames) that don't exist in the current legacy code page, the characters are converted to similar-looking characters with best-fit mapping. Some best-fit mappings result in ASCII characters that change the meaning of the command line, which can be exploited with malicious filenames to do argument injection or directory traversal attacks. This vulnerability is fixed in 5.6.3. Command line tools built for Cygwin or MSYS2 are unaffected. liblzma is unaffected. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-02T18:02:01.000000Z"}, {"uuid": "9785c713-afc2-416e-93f4-ecda16e76c20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "Telegram/VuiRXiEWFzZct4MNyxcJW4C5KbCrb2HPcaeAS5B4lkfKiZ4", "content": "", "creation_timestamp": "2024-05-15T04:55:44.000000Z"}, {"uuid": "38f8e2ed-c392-4097-8648-e1097e7475bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/7618", "content": "The Hacker News\nNew Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation\n\nGoogle on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active exploitation in the wild.\nThe high-severity vulnerability,&nbsp;tracked as&nbsp;CVE-2024-4761, is an out-of-bounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024.\nOut-of-bounds write bugs&nbsp;could be typically", "creation_timestamp": "2024-05-14T19:42:55.000000Z"}, {"uuid": "bd6b0a36-ac2f-43a7-86d7-f2ea9c6ca991", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1423", "content": "The Hacker News\nNew Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation\n\nGoogle on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active exploitation in the wild.\nThe high-severity vulnerability,&nbsp;tracked as&nbsp;CVE-2024-4761, is an out-of-bounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024.\nOut-of-bounds write bugs&nbsp;could be typically", "creation_timestamp": "2024-05-14T19:42:55.000000Z"}, {"uuid": "bda72412-6ff7-470a-af11-101025ed3062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "Telegram/hXBVtq_vQALtVQeIFAgKK-S2hj8k3D51My4YiCPF4vPfe-M", "content": "", "creation_timestamp": "2024-05-14T22:53:21.000000Z"}, {"uuid": "fe9eb681-8b01-4d1c-94a1-e37de89891b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "Telegram/wKdQIZoD5aOmKQIcpr-QL0r4Cl4z79Rj-ZWseRtqenGXCPE", "content": "", "creation_timestamp": "2024-05-14T22:34:05.000000Z"}, {"uuid": "14c0a9b4-ffce-440b-bb29-0683dfe898df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "https://t.me/HackingInsights/407", "content": "\u200aCVE-2024-4761: Zero-Day Vulnerability Patched in Google Chrome\n\nhttps://securityonline.info/cve-2024-4761-zero-day-vulnerability-patched-in-google-chrome/", "creation_timestamp": "2024-05-14T14:35:15.000000Z"}, {"uuid": "03e39878-c5f7-456e-b740-6f4147cb5571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/HackingInsights/925", "content": "\u200aCVE-2024\u20134761: Exploiting Chrome\u2019s JavaScript Engine Highly Exploited (PoC presented)\n\nhttps://infosecwriteups.com/cve-2024-4761-exploiting-chromes-javascript-engine-highly-exploited-poc-presented-dcf9cab95c00?source=rss----7b722bfd1b8d---4", "creation_timestamp": "2024-05-25T15:54:36.000000Z"}, {"uuid": "e443609a-b6c3-44be-a24e-0344680412dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "Telegram/qUeEv9EXn4Smr-Wk7sbCzvftf4pUV-9bCUev-oW02Ahw8g", "content": "", "creation_timestamp": "2024-05-14T19:29:02.000000Z"}, {"uuid": "d78094da-bd5c-41c1-9d48-d9f134e16143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/KomunitiSiber/1938", "content": "New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation\nhttps://thehackernews.com/2024/05/new-chrome-zero-day-vulnerability-cve.html\n\nGoogle on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under active exploitation in the wild.\nThe high-severity vulnerability,\u00a0tracked as\u00a0CVE-2024-4761, is an out-of-bounds write bug impacting the V8 JavaScript and WebAssembly engine. It was reported anonymously on May 9, 2024.\nOut-of-bounds write bugs\u00a0could be typically", "creation_timestamp": "2024-05-14T16:34:49.000000Z"}, {"uuid": "6ff283e7-f65a-44d7-aaca-bca729adedd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "https://t.me/true_secator/5729", "content": "\u041d\u0435 \u043f\u0440\u043e\u0448\u043b\u043e \u0438 \u043d\u0435\u0434\u0435\u043b\u0438, \u043a\u0430\u043a Chrome \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0441\u044f \u043d\u043e\u0432\u043e\u0439 0-day, \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0421\u043f\u0443\u0441\u0442\u044f \u0442\u0440\u0438 \u0434\u043d\u044f \u0432\u0441\u043b\u0435\u0434 \u0437\u0430 \u043f\u044f\u0442\u044b\u043c \u043d\u0443\u043b\u0435\u043c CVE-2024-4671 \u0432 Visuals \u0441\u043f\u0438\u0441\u043e\u043a \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u0433\u043e\u0434\u0430 \u043f\u043e\u043f\u043e\u043b\u043d\u0438\u043b\u0441\u044f \u0448\u0435\u0441\u0442\u044b\u043c CVE-2024-4761. \u041d\u043e\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0434\u0432\u0438\u0436\u043e\u043a JavaScript Chrome V8 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0437\u0430\u043f\u0438\u0441\u0438 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446.\n\n\u041f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u043e \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u043e\u0433\u043e \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0438\u043b\u0438 \u0431\u0443\u0444\u0435\u0440\u0430, \u0447\u0442\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u043a \u0434\u0430\u043d\u043d\u044b\u043c, \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0441\u0431\u043e\u044f\u043c.\n\n\u0412 \u0441\u0432\u043e\u0435\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 Google \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0438 \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u044d\u043a\u0441\u043f\u043e\u0440\u0442\u0430 \u0434\u043b\u044f CVE-2024-4761, \u043d\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 \u0432\u0435\u0440\u0441\u0438\u0438 124.0.6367.207/.208 \u0434\u043b\u044f Mac/Windows \u0438 124.0.6367.207 \u0434\u043b\u044f Linux. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u0434\u043d\u0438.", "creation_timestamp": "2024-05-14T12:13:04.000000Z"}, {"uuid": "35d50781-8280-4586-ad06-c3562bff5bf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/CyberSecurityIL/45051", "content": "\u05d7\u05d5\u05dc\u05e9\u05ea Zero-Day \u05e9\u05d9\u05e9\u05d9\u05ea \u05de\u05ea\u05d7\u05d9\u05dc\u05ea \u05d4\u05e9\u05e0\u05d4 - \u05d2\u05d5\u05d2\u05dc \u05de\u05e9\u05d7\u05e8\u05e8\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05dc\u05db\u05e8\u05d5\u05dd \u05d4\u05e1\u05d5\u05d2\u05e8 \u05d7\u05d5\u05dc\u05e9\u05d4 \u05d1\u05e8\u05de\u05ea \u05e1\u05d9\u05db\u05d5\u05df \u05d2\u05d1\u05d5\u05d4\u05d4 \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\"\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2024-4761 \u05ea\u05d5\u05e7\u05e0\u05d4 \u05d1\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05d4\u05d1\u05d0\u05d5\u05ea:\n\n- 124.0.6367.207/.208 for Mac and Windows\n- 124.0.6367.207 for Linux\n\nhttps://t.me/CyberSecurityIL/5137\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-05-14T14:15:15.000000Z"}, {"uuid": "01244751-2784-4fbf-8495-18eab9cb632e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/information_security_channel/52180", "content": "Google Patches Second Chrome Zero-Day in One Week\nhttps://www.securityweek.com/google-patches-second-chrome-zero-day-in-one-week/\n\nGoogle has patched CVE-2024-4761, the second exploited vulnerability addressed by the company within one week. \nThe post Google Patches Second Chrome Zero-Day in One Week (https://www.securityweek.com/google-patches-second-chrome-zero-day-in-one-week/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-05-14T15:43:56.000000Z"}, {"uuid": "11469197-3142-46bc-b06e-39b5b20fc62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "exploited", "source": "https://t.me/ctinow/217184", "content": "https://ift.tt/txnl6Lf\nNew Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation", "creation_timestamp": "2024-05-14T16:39:48.000000Z"}, {"uuid": "c4e63c79-52ea-4f07-97d2-e6b538ebbc9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2488", "content": "https://docs.google.com/document/d/e/2PACX-1vSpCvBik81OppzMXbPjb0uRlWTdn4I1kttNSlbHtNMCT3xZJJiyKAsCcUxzNBimlBdXoKxrktlgJjOZ/pub\n\nCVE-2024-4761: Out of bounds write in V8. Reported by Anonymous on 2024-05-09\n#\u5206\u6790 #poc", "creation_timestamp": "2024-05-14T16:26:59.000000Z"}, {"uuid": "3f9924c9-3bd7-47ee-907b-07ac06f6d7e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-47619", "type": "seen", "source": "https://t.me/cvedetector/24716", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-47619 - Syslog-ng TLS Wildcard Certificate Matching Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-47619 \nPublished : May 7, 2025, 4:15 p.m. | 25\u00a0minutes ago \nDescription : syslog-ng is an enhanced log daemo. Prior to version 4.8.2, `tls_wildcard_match()` matches on certificates such as `foo.*.bar` although that is not allowed. It is also possible to pass partial wildcards such as `foo.a*c.bar` which glib matches but should be avoided / invalidated. This issue could have an impact on TLS connections, such as in man-in-the-middle situations. Version 4.8.2 contains a fix for the issue. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"07 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-07T19:00:37.000000Z"}, {"uuid": "d359c083-7e8c-4174-b734-632d91bfc494", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4761", "type": "seen", "source": "https://t.me/sysodmins/21966", "content": "\u0417\u0430 \u044d\u0442\u0443 \u043d\u0435\u0434\u0435\u043b\u044e Google \u043f\u0430\u0442\u0447\u0438\u0442 \u0443\u0436\u0435 \u0442\u0440\u0435\u0442\u044c\u044e  0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Chrome \ud83d\udda5\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f Chrome, \u0447\u0442\u043e\u0431\u044b \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u0442\u0440\u0435\u0442\u044c\u044e \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u0414\u043b\u044f CVE-2024-4947 \u0443\u0436\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d \u0441\u0442\u0430\u0442\u0443\u0441 \u0432\u044b\u0441\u043e\u043a\u043e\u0440\u0438\u0441\u043a\u043e\u0432\u043e\u0439.\n\n\u0420\u0430\u043d\u0435\u0435 \u0438\u043d\u0436\u0435\u043d\u0435\u0440\u044b Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0441\u0440\u043e\u0447\u043d\u044b\u0435 \u043f\u0430\u0442\u0447\u0438 \u0434\u043b\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c CVE-2024-4671 \u0438 CVE-2024-4761.\n\n\u0412 2024 \u0433\u043e\u0434\u0443 \u0432 Chrome \u0443\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0441\u0435\u043c\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f.\n\n\u0422\u0438\u043f\u0438\u0447\u043d\u044b\u0439 \ud83e\udd78 \u0421\u0438\u0441\u0430\u0434\u043c\u0438\u043d", "creation_timestamp": "2024-05-17T03:33:37.000000Z"}]}