{"vulnerability": "CVE-2024-8068", "sightings": [{"uuid": "51be65d2-0c54-40f9-ac44-3200a33ec479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113476070561952671", "content": "", "creation_timestamp": "2024-11-13T14:17:04.973295Z"}, {"uuid": "4a997c01-af01-4c13-8af6-c1157f071d71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113470897346004162", "content": "", "creation_timestamp": "2024-11-12T16:21:28.031414Z"}, {"uuid": "633afb07-44fd-408f-8092-05572fcf904e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/113472082802025796", "content": "", "creation_timestamp": "2024-11-12T21:23:09.337958Z"}, {"uuid": "8c3f9cc9-dc46-440a-ae0a-a03252a28cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113472508475397870", "content": "", "creation_timestamp": "2024-11-12T23:11:11.791631Z"}, {"uuid": "eced8e31-1013-4d2d-95ad-3d08fae9d24b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113521297765325676", "content": "", "creation_timestamp": "2024-11-21T13:58:57.379379Z"}, {"uuid": "4fc6177f-713d-476b-9fab-64b60a1cf464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113584511246645504", "content": "", "creation_timestamp": "2024-12-02T17:54:58.785726Z"}, {"uuid": "4097c273-d2cc-488b-a9f8-2b118d1890ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "dd6d9bd6-838a-428a-b0ce-11abfc2756fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:15.000000Z"}, {"uuid": "9b815d76-32fc-4842-a55e-5963a3dc5116", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lxaxynuxgs2i", "content": "", "creation_timestamp": "2025-08-25T21:46:34.985323Z"}, {"uuid": "a5310865-e16d-45ca-a158-1a5166030b94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115090539180631962", "content": "", "creation_timestamp": "2025-08-25T17:17:41.484413Z"}, {"uuid": "18a1b0c8-3fc6-49df-a0b9-a8924790b2d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://bsky.app/profile/infosecindustry.bsky.social/post/3lxaogpeudr2b", "content": "", "creation_timestamp": "2025-08-25T18:55:29.421332Z"}, {"uuid": "09f9944a-c1a4-4bb1-8599-eac33a8bea05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://thehackernews.com/2025/08/cisa-adds-three-exploited.html", "content": "", "creation_timestamp": "2025-08-26T03:55:00.000000Z"}, {"uuid": "21fb84cb-c4ea-426a-b16f-92b9e4b6081a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lxasaqtnw327", "content": "", "creation_timestamp": "2025-08-25T20:03:44.197883Z"}, {"uuid": "a3362f82-457a-4aa0-a33d-b9ba2f4b9065", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/4612624", "content": "", "creation_timestamp": "2025-08-25T21:01:08.147940Z"}, {"uuid": "0b3121d2-1db0-4e82-b04a-6eec0c6acaf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-8068", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/13602b50-7adf-4f57-a59a-f00a36fd57f4", "content": "", "creation_timestamp": "2026-02-02T12:25:54.377738Z"}, {"uuid": "7b29625a-f938-401b-abe0-1e255cddfa7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/3896", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-8068\n\ud83c\udfe2 Vendor: Citrix\n\ud83d\udda5\ufe0f Product: Citrix Session Recording\n\ud83d\udd39 Description: Privilege escalation to NetworkService Account access in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain\n\ud83d\udccf Published: 2024-11-12T00:00:00Z\n\ud83d\udd17 References:\n1. https://infosec.exchange/@shadowserver/113471909797234133\n2. https://isc.sans.edu/diary/31446", "creation_timestamp": "2025-02-08T23:20:43.000000Z"}, {"uuid": "e9965b8c-496f-4dcb-84be-e3debf1f72a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://t.me/hackyourmom/12469", "content": "CISA \u0434\u043e\u0434\u0430\u043b\u0430 3\ufe0f\u20e3 \u043d\u0435\u0431\u0435\u0437\u043f\u0435\u0447\u043d\u0456 \u0443\u0440\u0430\u0437\u043b\u0438\u0432\u043e\u0441\u0442\u0456 \u0434\u043e KEV. \u0414\u0432\u0456 \u0441\u0442\u043e\u0441\u0443\u044e\u0442\u044c\u0441\u044f Citrix Session Recording (CVE-2024-8068, CVE-2024-8069) \u0456 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442\u044c \u043f\u0456\u0434\u0432\u0438\u0449\u0435\u043d\u043d\u044f \u043f\u0440\u0438\u0432\u0456\u043b\u0435\u0457\u0432 \u0442\u0430 \u0432\u0438\u043a\u043e\u043d\u0430\u043d\u043d\u044f \u043a\u043e\u0434\u0443. \u0422\u0440\u0435\u0442\u044f \u2014 CVE-2025-48384 \u0443 Git \u0456\u0437 CVSS 8.1, \u043c\u043e\u0436\u0435 \u043f\u0440\u0438\u0437\u0432\u0435\u0441\u0442\u0438 \u0434\u043e \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u0448\u043a\u0456\u0434\u043b\u0438\u0432\u043e\u0433\u043e \u043a\u043e\u0434\u0443 \u043f\u0456\u0434 \u0447\u0430\u0441 \u043a\u043b\u043e\u043d\u0443\u0432\u0430\u043d\u043d\u044f \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0456\u0457\u0432 \ud83d\udc7e\ud83d\udcbb \u0411\u0456\u043b\u044c\u0448\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u0438\u0446\u044c \ud83d\udc48 #cybernews", "creation_timestamp": "2025-08-26T09:12:04.000000Z"}, {"uuid": "022d9627-4f25-4c70-a706-ecdaad3e69ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "exploited", "source": "Telegram/I4K7Qf70bjDqJXogbfec1xVEckmsYZ0_ncMZ0Xge0lgM_Q", "content": "", "creation_timestamp": "2025-08-26T10:31:03.000000Z"}, {"uuid": "b986c3fc-7bbc-44de-bd7e-5d904c807a87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "published-proof-of-concept", "source": "https://t.me/BABATATASASA/7236", "content": "CVE-2024-8068,\u00a0 8069: Vulnerability in Citrix Virtual Apps Allows RCE Attack Via MSMQ Misconfiguration\n\nCitrix Virtual Apps and Desktops \u2014 Unauthenticated RCE\n\nThis vulnerability in Citrix Virtual Apps and Desktops enables unauthorized users to achieve remote code execution through a misconfigured Microsoft Message Queuing (MSMQ) service accessible over HTTP. The issue stems from using an outdated BinaryFormatter for data deserialization, allowing attackers to run commands with SYSTEM privileges on the Citrix server.\n\n\ud83d\udd17 Research:\nhttps://labs.watchtowr.com/visionaries-at-citrix-have-democratised-remote-network-access-citrix-virtual-apps-and-desktops-cve-unknown/\n\n\ud83d\udd17 Source:\nhttps://github.com/watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit", "creation_timestamp": "2024-11-28T11:22:48.000000Z"}, {"uuid": "a8ec7148-4361-4704-aff2-2df611c98bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "exploited", "source": "https://t.me/kasperskyb2b/1513", "content": "\ud83c\udfaf \u041d\u0435\u0434\u0435\u043b\u044f \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u043d\u0430 \u0440\u0430\u0434\u0438\u043e Infosec\n\n\u041c\u0438\u043d\u0443\u0432\u0448\u0430\u044f \u043d\u0435\u0434\u0435\u043b\u044f \u043f\u0440\u0438\u043d\u0435\u0441\u043b\u0430 \u0442\u0430\u043a \u043c\u043d\u043e\u0433\u043e \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438  patch soon, \u0447\u0442\u043e \u043f\u0440\u0438\u0448\u043b\u043e\u0441\u044c \u0437\u0430\u0432\u0435\u0441\u0442\u0438 \u0434\u043b\u044f \u043d\u0438\u0445 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442.\n\nPanOS: \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u044d\u043a\u0440\u0430\u043d\u044b Palo Alto \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0438\u0441\u044c \u0444\u0438\u043a\u0441\u0430\u043c\u0438 \u0434\u043b\u044f CVE-2024-0012 \u0438 CVE-2024-9474, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u0434\u043e \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u0438\u0445. \u041a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0441 18 \u043d\u043e\u044f\u0431\u0440\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u043f\u043e \u043e\u0446\u0435\u043d\u043a\u0430\u043c Shadowserver \u043f\u043e\u0440\u0430\u0436\u0435\u043d\u043e \u043e\u043a\u043e\u043b\u043e 2000 \u041c\u0421\u042d.\n\nmacOS: \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043e \u0434\u0432\u0430 \u0437\u0438\u0440\u043e\u0434\u0435\u044f \u0432 JavascriptCore \u0438 WebKit, CVE-2024-44308, CVE-2024-44309, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a XSS \u0438 RCE \u043d\u0430 \u041c\u0430\u043a\u0430\u0445 \u0441 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430\u043c\u0438 Intel. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432\u0436\u0438\u0432\u0443\u044e \u2014 \u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u043d\u0435 \u0433\u043e\u0432\u043e\u0440\u044f\u0442 \u043a\u0435\u043c, \u043d\u043e \u0441\u0443\u0434\u044f \u043f\u043e \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u043d\u043e\u0441\u0442\u044f\u043c Google TAG \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u044d\u0442\u043e \u0447\u0442\u043e-\u0442\u043e \u0438\u0437 \u0430\u0440\u0441\u0435\u043d\u0430\u043b\u0430 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0445 APT.\n\nUbuntu: \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043e \u043f\u044f\u0442\u044c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 \u0441\u0435\u0440\u0432\u0438\u0441\u0435 needrestart, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 Ubuntu-\u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0434\u043e root \u0431\u0435\u0437 \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u0437\u0430\u043b\u043e\u0433\u0438\u043d\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \n\u0418\u043d\u043e\u0433\u0434\u0430 needrestart \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u0438 \u0432 \u0434\u0440\u0443\u0433\u0438\u0445 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430\u0445 Linux, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u0438\u0442\u044c \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0441\u0435\u0440\u0432\u0438\u0441\u0430 \u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0435\u0433\u043e \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 3.8.\n\n7-zip: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-11477 \u0432 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0435  Zstandard decompression \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0430\u0440\u0445\u0438\u0432\u0430\u0442\u043e\u0440 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u0431\u043e\u0440\u043a\u0430\u0445 Linux, \u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u0432 WinRAR \u0441\u0442\u0430\u043b\u0430 \u0442\u043e\u043f\u043e\u0432\u044b\u043c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0430\u0442\u0430\u043a \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u043c\u044b \u0431\u044b \u043d\u0435 \u0437\u0430\u0442\u044f\u0433\u0438\u0432\u0430\u043b\u0438 \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c.\n\nCitrix: \u0414\u0432\u0430 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u0445 \u0447\u0443\u0442\u044c \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430\u0437\u0430\u0434  \u0434\u0435\u0444\u0435\u043a\u0442\u0430, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a RCE, CVE-2024-8068  \u0438 -8069, \u043d\u0430\u0447\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u041f\u043e\u0441\u043b\u0435 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u0430\u0443\u0437\u044b Citrix \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0445\u043e\u0442\u0444\u0438\u043a\u0441.\n\n\u0427\u0442\u043e\u0431\u044b \u0437\u0430\u043a\u043e\u043d\u0447\u0438\u0442\u044c \u043d\u0430 \u043c\u0435\u043d\u0435\u0435 \u043d\u0435\u0440\u0432\u043d\u043e\u0439 \u0438 \u0434\u0430\u0436\u0435 \u0433\u0434\u0435-\u0442\u043e \u043f\u043e\u0437\u0438\u0442\u0438\u0432\u043d\u043e\u0439 \u043d\u043e\u0442\u0435, Google \u043e\u0442\u0447\u0438\u0442\u0430\u043b\u0438\u0441\u044c, \u0447\u0442\u043e \u043f\u0440\u0438\u043a\u0440\u0443\u0442\u0438\u043b\u0438 \u0418\u0418 \u043a \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u0443 \u0438 \u043d\u0430\u0448\u043b\u0438 26 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0432 \u0441\u043e\u0444\u0442\u0435 open source, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0434\u0438\u043d (\u044d\u043a\u0437\u043e\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439) \u0431\u0430\u0433 \u0432 \u043f\u0440\u0435\u043a\u0440\u0430\u0441\u043d\u043e \u043e\u0442\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 OpenSSL. LLM  \u0441\u043e \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u0430\u0432\u0442\u043e\u043d\u043e\u043c\u043d\u043e\u0441\u0442\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043d\u0430 \u0432\u0441\u0435\u0445 \u044d\u0442\u0430\u043f\u0430\u0445 \u2014 \u043e\u0442 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u044f \u0443\u0447\u0430\u0441\u0442\u043a\u0430 \u043a\u043e\u0434\u0430 \u0434\u043b\u044f \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u0430 \u0434\u043e \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u043e\u0439 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u0441\u043f\u0440\u043e\u0432\u043e\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0444\u0430\u0437\u0437\u0438\u043d\u0433\u043e\u043c \u0441\u0431\u043e\u0435\u0432.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-11-23T09:01:40.000000Z"}, {"uuid": "5455416f-d65c-41a7-b0b7-fbb9a679a99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "seen", "source": "https://t.me/cvedetector/10675", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8068 - Citrix Session Recording Unauthenticated Domain Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-8068 \nPublished : Nov. 12, 2024, 6:15 p.m. | 21\u00a0minutes ago \nDescription : Privilege escalation to NetworkService Account access\u00a0in Citrix Session Recording when an attacker is an authenticated user in the same Windows Active Directory domain as the session recording server domain \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-12T19:44:07.000000Z"}, {"uuid": "e4083742-363e-4c39-b703-52f2e6b26847", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/2110", "content": "WatchTowr POCs:\nCVE-2024-8068 &amp; CVE-2024-8069 : Citrix Virtual Apps and Desktops (XEN) $versions - Unauthenticated Remote Code execution (Chain) \nPOC/AN : https://github.com/watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit\nCVE-2024-47575 : Fortinet FortiManager 'Fgfmsd' $versions Unauthenticated Remote Code Execution (AKA FortiJump)\nPOC/AN : https://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\nCVE-2024-0012 &amp; CVE-2024-9474 : PAN-OS $versions - Authentication Bypass LPE Root Command Injection (AKA Sslvpn _ Chain)\nPOC/AN : https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012/\n\n\ud83d\udd34 Share &amp; Support Us \ud83d\udd34\n\u26a1\ufe0f Channel : @ZeroEthical_Course", "creation_timestamp": "2024-12-03T00:18:01.000000Z"}, {"uuid": "0be94799-95ef-4c54-9104-ca39e445a241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "published-proof-of-concept", "source": "https://t.me/Leak_DBMS/1524", "content": "WatchTowr POCs:\nCVE-2024-8068 &amp; CVE-2024-8069 : Citrix Virtual Apps and Desktops (XEN) $versions - Unauthenticated Remote Code execution (Chain) \nPOC/AN : https://github.com/watchtowrlabs/Citrix-Virtual-Apps-XEN-Exploit\nCVE-2024-47575 : Fortinet FortiManager 'Fgfmsd' $versions Unauthenticated Remote Code Execution (AKA FortiJump)\nPOC/AN : https://github.com/watchtowrlabs/Fortijump-Exploit-CVE-2024-47575\nCVE-2024-0012 &amp; CVE-2024-9474 : PAN-OS $versions - Authentication Bypass LPE Root Command Injection (AKA Sslvpn _ Chain)\nPOC/AN : https://github.com/watchtowrlabs/palo-alto-panos-cve-2024-0012/\n@APTIRAN", "creation_timestamp": "2024-11-29T13:06:54.000000Z"}, {"uuid": "a8c3a55c-6dae-49e1-b376-e2a15843c345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "exploited", "source": "https://t.me/true_secator/6453", "content": "\u041a\u0430\u043a \u043c\u044b \u0438 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f SANS ISC \u0430\u043a\u0442\u0438\u0432\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Citrix Virtual Apps and Desktops \u0438\u043c\u0435\u044e\u0442 \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438, \u043d\u0435\u0436\u0435\u043b\u0438 \u043f\u0440\u0438\u0441\u0432\u043e\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0435\u0449\u0435 \u043a \u0442\u043e\u043c\u0443 \u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437 \u0434\u043e\u043b\u0436\u043d\u043e\u0433\u043e \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u044f.\n\n\u041e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2024-8068 \u0438 CVE-2024-8069) \u0431\u044b\u043b\u0438\u00a0\u0440\u0430\u0441\u043a\u0440\u044b\u0442\u044b\u00a0\u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 watchTowr Labs \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u043d\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0443\u0436\u0435 \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0438\u0441\u044c PoC \u0438 \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u043d\u0430 \u043d\u0438\u0445 \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438.\n\n\u0410 \u0432 Citrix \u0432\u0441\u0435\u0433\u043e \u043b\u0438\u0448\u044c 5.1, \u043f\u043e\u043b\u0435\u0442 \u043d\u043e\u0440\u043c\u0430\u043b\u044c\u043d\u044b\u0439.", "creation_timestamp": "2024-11-20T17:30:05.000000Z"}, {"uuid": "c804e59f-8259-48ef-94b1-23aaf1cb3459", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8068", "type": "exploited", "source": "https://t.me/true_secator/6426", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 watchTowr Labs \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043d\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0435 \u043d\u0430 Citrix Virtual Apps and Desktop, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c Citrix \u0437\u0430\u043f\u0438\u0441\u044c \u0441\u0435\u0430\u043d\u0441\u043e\u0432 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u0440\u0430\u0431\u043e\u0447\u0438\u0445 \u0441\u0442\u043e\u043b\u043e\u0432 \u0434\u043b\u044f \u0446\u0435\u043b\u0435\u0439 \u0430\u0443\u0434\u0438\u0442\u0430 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043d\u0435\u043f\u043e\u043b\u0430\u0434\u043e\u043a.\n\n\u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u044e \u0438\u0437 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u00a0MSMQ\u00a0\u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c\u0438 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 BinaryFormatter, \u043a \u043a\u043e\u0442\u043e\u0440\u043e\u043c\u0443 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u0441 \u043b\u044e\u0431\u043e\u0433\u043e \u0445\u043e\u0441\u0442\u0430 \u043f\u043e HTTP \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e RCE.\n\n\u041e\u0431\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a:\n\n- CVE-2024-8068\u00a0(CVSS: 5.1, \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 NetworkService);\n- CVE-2024-8069\u00a0(CVSS: 5,1, \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u043e\u0435 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0435\u0439 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 NetworkService).\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 HTTP \u043d\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u0443\u044e \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 Citrix, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0431\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u044e \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u0435\u0430\u043d\u0441\u0430.\n\nCitrix, \u043f\u043e\u0445\u043e\u0436\u0435, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043d\u0435 \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u0432 \u0434\u043e\u043b\u0436\u043d\u044b\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\u041f\u043e \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0430\u043c \u0441\u0432\u043e\u0438\u0445 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0439 Citrix \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0434\u043e\u043b\u0436\u0435\u043d \u0431\u044b\u0442\u044c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0432 \u0442\u043e\u043c \u0436\u0435 \u0434\u043e\u043c\u0435\u043d\u0435 Windows Active Directory, \u0447\u0442\u043e \u0438 \u0434\u043e\u043c\u0435\u043d \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u0435\u0430\u043d\u0441\u0430, \u0438 \u0432 \u0442\u043e\u0439 \u0436\u0435 \u0438\u043d\u0442\u0440\u0430\u0441\u0435\u0442\u0438, \u0447\u0442\u043e \u0438 \u0441\u0435\u0440\u0432\u0435\u0440 \u0437\u0430\u043f\u0438\u0441\u0438 \u0441\u0435\u0430\u043d\u0441\u0430.\n\n\u0412 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0432 watchTowr \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u043d\u0430\u0441\u0442\u0430\u0438\u0432\u0430\u0442\u044c \u043d\u0430 \u0442\u043e\u043c, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439, \u0430 Citrix \u043f\u0440\u0435\u0443\u043c\u0435\u043d\u044c\u0448\u0430\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u044c \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u0440\u0438\u0434\u0430\u0432\u0430\u044f \u0435\u0439 \u0441\u0440\u0435\u0434\u043d\u0438\u0439 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442, \u043a\u043e\u0433\u0434\u0430 \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 \u044d\u0442\u043e point-click-full-takeover.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043d\u0430 GitHub PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \n\n\u041f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e Shadowserver Foundation \u0443\u0436\u0435 \u0437\u0430\u0434\u0435\u0442\u0435\u043a\u0442\u0438\u043b\u0430 \u0438 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u0442 \u0437\u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043f\u043e\u043f\u044b\u0442\u043a\u0430\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u043d\u0430 \u043e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0422\u0435\u043f\u0435\u0440\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u0443\u044e\u0442 \u0445\u0430\u043a\u0435\u0440\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u044b\u043d\u0435\u0441\u0443\u0442 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435  \u0442\u043e\u0447\u043d\u044b\u0439 \u0432\u0435\u0440\u0434\u0438\u043a\u0442 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e CVSS.\n\n\u0411\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "creation_timestamp": "2024-11-13T17:00:06.000000Z"}]}