{"vulnerability": "CVE-2025-2982", "sightings": [{"uuid": "6e3a334e-5b03-4849-8d90-35313dad7fc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lmczp72twd2o", "content": "", "creation_timestamp": "2025-04-08T17:45:16.203272Z"}, {"uuid": "6221ee65-adfb-4751-a38c-ebc62e9cb6bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lsoh75bqab2p", "content": "", "creation_timestamp": "2025-06-28T15:17:16.730352Z"}, {"uuid": "fbc0c51a-9f9a-4a90-a3e7-d8b59c1dc867", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/serghei.bsky.social/post/3lmd6ltkeg22t", "content": "", "creation_timestamp": "2025-04-08T19:12:54.817659Z"}, {"uuid": "2b2f91fc-6643-428f-a18b-0e460a4999a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3lmd6pmt2zs2j", "content": "", "creation_timestamp": "2025-04-08T19:15:06.797401Z"}, {"uuid": "212b61f8-f1f2-4381-931f-8e5170cc93ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/defendopsdiaries.bsky.social/post/3lmd6q22jao2d", "content": "", "creation_timestamp": "2025-04-08T19:15:13.897013Z"}, {"uuid": "1e4d85ab-026a-42de-a674-49264beca3fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://infosec.exchange/users/zeljkazorz/statuses/114303948624272501", "content": "", "creation_timestamp": "2025-04-08T19:17:21.473814Z"}, {"uuid": "20defcef-6ea1-4443-b24c-73ed8e35ede7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lmd6k253acl2", "content": "", "creation_timestamp": "2025-04-08T19:17:57.103714Z"}, {"uuid": "6ff938be-f45d-4ca6-818f-8d2ac69abd7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmd6mvvxbpy2", "content": "", "creation_timestamp": "2025-04-08T19:19:40.184567Z"}, {"uuid": "f2361a9b-9f1d-4d10-9a98-3c4ffa1b9765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lmdeu6h7ap2x", "content": "", "creation_timestamp": "2025-04-08T21:04:54.520612Z"}, {"uuid": "df45d2ca-94ac-4510-8389-625464a5f5d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29822", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "6f5e4dee-6543-4a66-a445-2cdfeb5e2049", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3754816", "content": "", "creation_timestamp": "2025-04-08T21:30:06.168219Z"}, {"uuid": "c5a9416a-9a65-482e-a5d4-f16d7047829d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/feedly.com/post/3lmdhuiiczc23", "content": "", "creation_timestamp": "2025-04-08T21:58:50.775953Z"}, {"uuid": "4bead0ee-cb34-4ebe-a107-e014812ab084", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/feedly.com/post/3lmdhuku3t223", "content": "", "creation_timestamp": "2025-04-08T21:58:51.364412Z"}, {"uuid": "3f9972e5-bfc2-4f17-8ee0-7e38779e9f73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/xehpa.bsky.social/post/3lmdhxkqvxs2j", "content": "", "creation_timestamp": "2025-04-08T22:00:32.295489Z"}, {"uuid": "fe635a9f-b4dd-4f5d-b92b-9f039e7b3900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/Android.activitypub.awakari.com.ap.brid.gy/post/3lmdm62zs5ws2", "content": "", "creation_timestamp": "2025-04-08T23:16:17.816837Z"}, {"uuid": "29f945f6-7e4a-413c-b808-c3eb820e98c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lmdvmohqvg22", "content": "", "creation_timestamp": "2025-04-09T02:04:57.230348Z"}, {"uuid": "2846b8a6-f023-46b6-904d-7cef388b6e74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmggkjulyz2r", "content": "", "creation_timestamp": "2025-04-10T02:13:18.829740Z"}, {"uuid": "38066445-6554-4ac1-861b-37646a7e8318", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/solidot.bsky.social/post/3lmghl5cknn2r", "content": "", "creation_timestamp": "2025-04-10T02:31:31.843487Z"}, {"uuid": "a59b88a6-5691-445b-87c3-2493bd075dc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmdw3tpxyf2g", "content": "", "creation_timestamp": "2025-04-09T02:13:25.767778Z"}, {"uuid": "88956f3b-d7a5-4b25-a882-c906f5ff85c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lmdqbpdb6b2h", "content": "", "creation_timestamp": "2025-04-09T00:29:19.592325Z"}, {"uuid": "90adb8a0-c05f-4367-acfb-1b17925e9df1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/exposenews.xyz/post/3lmdzxadt6u24", "content": "", "creation_timestamp": "2025-04-09T03:22:25.873201Z"}, {"uuid": "b024e19e-7ccb-4cba-a35d-8374befe32c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "b9d7db8a-3bad-455d-a7b1-34aaa300456f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "8adde50c-a18f-4733-9626-f7dbc6b1bf8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29821", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0111", "content": "", "creation_timestamp": "2025-04-08T16:56:16.000000Z"}, {"uuid": "2a2db60f-38cf-48da-856d-32d43ffcac07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "da2577dd-d305-44a8-962d-603c3c2757e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-5e6d121a-1dac47ba0c4c95f6", "content": "", "creation_timestamp": "2025-04-09T05:51:32.590894Z"}, {"uuid": "43c516d6-9bb0-491d-966e-a690fed78402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-298215", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0111", "content": "", "creation_timestamp": "2025-04-08T16:56:16.000000Z"}, {"uuid": "650d4330-6c7e-457c-8a2c-221be0dda981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29822", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0107", "content": "", "creation_timestamp": "2025-04-08T16:50:53.000000Z"}, {"uuid": "0f696259-606c-4550-a40c-9ea74f4fed87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "b53f6d79-9c41-426a-843f-5ac68d1de9db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://krebsonsecurity.com/2025/04/patch-tuesday-april-2025-edition/", "content": "", "creation_timestamp": "2025-04-09T01:09:36.000000Z"}, {"uuid": "cca6e49f-7976-4e07-ab7c-6829c4602d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lmeg7vzpp22l", "content": "", "creation_timestamp": "2025-04-09T07:02:01.704029Z"}, {"uuid": "940cd7f4-e91b-4fc7-8aea-fa907902a3a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-45bed739-4cf70d274d3babdb", "content": "", "creation_timestamp": "2025-04-09T07:18:22.758526Z"}, {"uuid": "8c7818ba-bac5-4f3e-8ab4-2163347bb53a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-298207", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0107", "content": "", "creation_timestamp": "2025-04-08T16:50:53.000000Z"}, {"uuid": "8c8f8458-ef1d-4766-844a-865dd16e503f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/windowscult.com/post/3lmei46uz7c2j", "content": "", "creation_timestamp": "2025-04-09T07:35:50.723022Z"}, {"uuid": "24429f99-9790-4944-bf9f-7d1b798cc87e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/carstenspille.bsky.social/post/3lmemz2xrks2p", "content": "", "creation_timestamp": "2025-04-09T09:03:28.524570Z"}, {"uuid": "60875729-7479-465f-82e0-0575b42f7019", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lmepazskuy2o", "content": "", "creation_timestamp": "2025-04-09T09:43:43.983323Z"}, {"uuid": "4f98db40-6c42-466c-8780-e3f3f282c626", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-298227", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0107", "content": "", "creation_timestamp": "2025-04-08T16:50:53.000000Z"}, {"uuid": "da4d3bd0-7d86-4435-8385-8b032843ccff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29820", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "42ebd512-8839-48f0-9876-e792245707d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-298237", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0107", "content": "", "creation_timestamp": "2025-04-08T16:50:53.000000Z"}, {"uuid": "952ba1d4-8c81-4781-97db-f33e46715860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "1de27bbe-d216-40d2-b326-1fcacfa5728f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "c2397c64-40ca-4467-99c0-8bfd84fba73b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29821", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "7d3e2096-f5db-4d70-b75b-99254943b309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "dfcbda7c-5499-47fa-a684-9a061210aa9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114308740378364183", "content": "", "creation_timestamp": "2025-04-09T15:36:30.463781Z"}, {"uuid": "c0b642c2-0f11-4a0b-a399-415f7587631c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "28f2eda0-10f1-433e-8d95-7afbaed309a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114309438676836328", "content": "", "creation_timestamp": "2025-04-09T18:33:33.067476Z"}, {"uuid": "7286d165-b275-4dc5-bc9b-ec4343c56e55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "3d7be9dc-8c24-4558-8657-5d6772cadd45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmfwnkickv42", "content": "", "creation_timestamp": "2025-04-09T21:42:01.711044Z"}, {"uuid": "a6d85644-b9c2-4ef3-b48d-ccafd077b9d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "530f51b7-1fc2-47d2-9d49-5217b434cb0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "c9a30ce2-3f7d-4531-8f11-d382358d13b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29823", "type": "seen", "source": "https://www.thezdi.com/blog/2025/4/8/the-april-2025-security-update-review", "content": "", "creation_timestamp": "2025-04-08T16:14:25.000000Z"}, {"uuid": "8ec8f825-f49d-4f8e-a115-0824aa36e78a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmlhf4lzyt2g", "content": "", "creation_timestamp": "2025-04-12T02:11:28.710397Z"}, {"uuid": "d58cc090-8ff1-4112-b030-12cb2ca67fcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "363255a5-62f3-4b4e-9120-6fd9f90305a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lmhkslske22t", "content": "", "creation_timestamp": "2025-04-10T13:02:04.521048Z"}, {"uuid": "f96b9124-ce7c-4db3-b1d6-4521f2be68e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmhmnzzodc2y", "content": "", "creation_timestamp": "2025-04-10T13:35:20.687383Z"}, {"uuid": "84262c07-1c2e-4472-ba82-8af342c4d2e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmhmtxbqbk2y", "content": "", "creation_timestamp": "2025-04-10T13:38:38.424830Z"}, {"uuid": "1e2edbce-ccb6-4b1b-8a4a-53b49384c6b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmhn5fpnn22y", "content": "", "creation_timestamp": "2025-04-10T13:43:55.527260Z"}, {"uuid": "b9b0f29f-a88e-4a9b-94bb-7f4a37304ee1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmho77muk22y", "content": "", "creation_timestamp": "2025-04-10T14:02:48.571833Z"}, {"uuid": "5d552244-6f7d-420e-9ef3-6e16fce58649", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmhod7wfik2y", "content": "", "creation_timestamp": "2025-04-10T14:05:05.744485Z"}, {"uuid": "7faff56e-a98a-4db6-bbee-93ebc7688591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmnyvqnhhj2r", "content": "", "creation_timestamp": "2025-04-13T02:30:19.362916Z"}, {"uuid": "5694bf48-a5e6-4a83-ac48-4700ec0548ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3lmhsjlgp6m2j", "content": "", "creation_timestamp": "2025-04-10T15:20:11.257280Z"}, {"uuid": "fb221e7e-70b2-4fd4-8b90-c6c148d1007e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "8f0f32d6-ef3a-4ec0-a47c-14ab3b0feb89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/clustz.com/post/3lmhxxvvier2q", "content": "", "creation_timestamp": "2025-04-10T16:57:40.249901Z"}, {"uuid": "8594f2d2-f0c0-4a7e-a580-48ce0bc789b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/civati.bsky.social/post/3lmi44hc5zp2x", "content": "", "creation_timestamp": "2025-04-10T18:11:48.183744Z"}, {"uuid": "64563553-f1fa-49af-8563-6113c807400f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://threatintel.cc/2025/04/08/microsoft-security-advisory-april-monthly.html", "content": "", "creation_timestamp": "2025-04-08T23:56:24.000000Z"}, {"uuid": "a55c1b6a-dccd-4d67-bdd4-bd743e85d9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmiwzn44vy2n", "content": "", "creation_timestamp": "2025-04-11T02:13:23.746067Z"}, {"uuid": "a95c694f-145a-4d93-a1d5-b476ce361a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lmlssqjcj224", "content": "", "creation_timestamp": "2025-04-12T05:35:59.991956Z"}, {"uuid": "06a7d56c-b3eb-408e-a320-e86cbd9730a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lpwb4yxbcs25", "content": "", "creation_timestamp": "2025-05-24T13:34:27.806743Z"}, {"uuid": "f6a989ac-bd5c-497f-9af5-47e7162688f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmjh7cjqwhr2", "content": "", "creation_timestamp": "2025-04-11T07:03:38.914242Z"}, {"uuid": "177eee62-8588-418e-99ce-2643372c1238", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/soft-management.bsky.social/post/3lmjufk3i5o2y", "content": "", "creation_timestamp": "2025-04-11T10:59:01.782757Z"}, {"uuid": "3636bbeb-0a8a-46ed-aebb-82e833b3b6e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmjzbfuwwmo2", "content": "", "creation_timestamp": "2025-04-11T12:26:15.797798Z"}, {"uuid": "32828c8c-7403-4df9-b5f3-e7c90ede52be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmqil5ansl2q", "content": "", "creation_timestamp": "2025-04-14T02:16:06.172274Z"}, {"uuid": "b70c5d27-1407-4606-9b73-912a54d16e29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lmr3hougjvs2", "content": "", "creation_timestamp": "2025-04-14T07:54:14.105886Z"}, {"uuid": "9f072fbf-5380-4382-babf-1c6bb1ae7719", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lmrbdbfvzs2x", "content": "", "creation_timestamp": "2025-04-14T09:39:02.891416Z"}, {"uuid": "4ea59a35-7ef3-444b-a2b3-53811de99b9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lpwb4yxeak25", "content": "", "creation_timestamp": "2025-05-24T13:34:28.328697Z"}, {"uuid": "c14fe584-4997-4597-9d36-1fbde32eb30d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/mindknee.bsky.social/post/3lmvaht6b6224", "content": "", "creation_timestamp": "2025-04-15T23:34:24.201266Z"}, {"uuid": "de3c6b18-9c2f-42fa-910c-c05a53f43943", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cyberbessa.bsky.social/post/3lmu3fif22o2p", "content": "", "creation_timestamp": "2025-04-15T12:30:53.566393Z"}, {"uuid": "18f95060-0777-47c9-941d-9f9f1a8318d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29828", "type": "seen", "source": "https://www.thezdi.com/blog/2025/6/10/the-june-2025-security-update-review", "content": "", "creation_timestamp": "2025-06-10T15:24:53.000000Z"}, {"uuid": "b14a25bd-d8ae-4de6-b49b-82db5eda0ad3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/empist.bsky.social/post/3lmrmi2pkgs2p", "content": "", "creation_timestamp": "2025-04-14T12:58:36.860553Z"}, {"uuid": "5a36e6db-d0be-4fa1-b13b-2fb64a6d2870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmsyyq45fa2z", "content": "", "creation_timestamp": "2025-04-15T02:15:18.382018Z"}, {"uuid": "e28b6ccf-4a7c-477b-9697-4477a825734d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lmvjgvpaq32q", "content": "", "creation_timestamp": "2025-04-16T02:14:53.034874Z"}, {"uuid": "535cd262-5690-4c3e-afd8-0ccfccb8cccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/jimmyblake.bsky.social/post/3lnv6vk22eg2k", "content": "", "creation_timestamp": "2025-04-28T16:31:25.139737Z"}, {"uuid": "898cffa2-e65c-4135-ba4d-370aedc83676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cysecuritynews.bsky.social/post/3lmwpj4jqxx2k", "content": "", "creation_timestamp": "2025-04-16T13:36:09.650957Z"}, {"uuid": "8f924bff-e608-4ec7-81fb-e5ce1bdb6979", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lqrxk6hbyc2i", "content": "", "creation_timestamp": "2025-06-04T13:57:24.218103Z"}, {"uuid": "e02cceaa-737b-46a1-aaba-95da256e312b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogm4m2t", "content": "", "creation_timestamp": "2025-04-17T01:03:48.709663Z"}, {"uuid": "4a7e147d-964a-4a7e-bfb2-2dff631acc0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogsxe2t", "content": "", "creation_timestamp": "2025-04-17T01:03:51.895709Z"}, {"uuid": "2514842c-dd99-49ca-b014-cea4ae370990", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogtwm2t", "content": "", "creation_timestamp": "2025-04-17T01:03:55.008841Z"}, {"uuid": "bdca94dd-019e-4b95-aa0c-a3d4f5351ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogtwn2t", "content": "", "creation_timestamp": "2025-04-17T01:03:58.136926Z"}, {"uuid": "f4058e58-ea49-45e1-a710-247672759039", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwoguvv2t", "content": "", "creation_timestamp": "2025-04-17T01:04:01.248023Z"}, {"uuid": "98852165-5eb2-4150-8dee-e96cb0f22fbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogvv52t", "content": "", "creation_timestamp": "2025-04-17T01:04:04.336143Z"}, {"uuid": "2b8e5c8c-b401-45af-8079-be2dcfc0c8e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogvv62t", "content": "", "creation_timestamp": "2025-04-17T01:04:07.637275Z"}, {"uuid": "fed56aac-b97c-4de3-ae34-2bd9946a7e54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwuk2t", "content": "", "creation_timestamp": "2025-04-17T01:04:23.515480Z"}, {"uuid": "abaa3b9f-38a7-4a02-814f-657894682501", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogvv72t", "content": "", "creation_timestamp": "2025-04-17T01:04:10.789858Z"}, {"uuid": "68486b30-8cbd-4b1f-b072-16c288d94ea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwuh2t", "content": "", "creation_timestamp": "2025-04-17T01:04:14.028207Z"}, {"uuid": "b25d539c-0fd1-4f6d-a67a-639f0f02ef82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwui2t", "content": "", "creation_timestamp": "2025-04-17T01:04:17.163324Z"}, {"uuid": "4dcc5351-c420-4316-a075-23d4c9a8e54c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwuj2t", "content": "", "creation_timestamp": "2025-04-17T01:04:20.296606Z"}, {"uuid": "af089e3f-1ce6-4422-9555-17c4648e6284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogxtt2t", "content": "", "creation_timestamp": "2025-04-17T01:04:30.111709Z"}, {"uuid": "4570530d-d9ba-45e0-b5f8-7291b8ce618b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cybersecuritybrief.bsky.social/post/3lmxvwogwul2t", "content": "", "creation_timestamp": "2025-04-17T01:04:26.693307Z"}, {"uuid": "2c4986f9-fc6c-4258-8a84-b20787cfba08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3ln6bpciv7c2p", "content": "", "creation_timestamp": "2025-04-19T13:50:24.099810Z"}, {"uuid": "31caaeb1-7268-4373-b3b3-3b6f6f3de6ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/dasgeldco.bsky.social/post/3lr5l7zdd6x2q", "content": "", "creation_timestamp": "2025-06-09T04:48:54.064448Z"}, {"uuid": "bb735ae6-df01-4f39-a600-bdea3e3077eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/eldinerolat.bsky.social/post/3lr5laz6s5k2k", "content": "", "creation_timestamp": "2025-06-09T04:49:27.294661Z"}, {"uuid": "03345fcc-27e6-4239-95cd-e630da44e569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/114863108230231271", "content": "", "creation_timestamp": "2025-07-16T13:19:00.368481Z"}, {"uuid": "b6eb79dd-2d07-4882-bba3-e18c87aea074", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lnpwnme7ds24", "content": "", "creation_timestamp": "2025-04-26T14:20:31.362238Z"}, {"uuid": "20c63c89-6aa9-4ff3-969a-f6d6f1d91eb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/u2k25.bsky.social/post/3lpffzbu4g22y", "content": "", "creation_timestamp": "2025-05-17T20:46:35.329417Z"}, {"uuid": "2d16d3b5-648c-4289-a66d-4213fe463174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lo7kwyvfds2o", "content": "", "creation_timestamp": "2025-05-02T19:33:37.573072Z"}, {"uuid": "c1c70c6e-747f-45dc-a138-b661c1a00123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29825", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/114436423868001029", "content": "", "creation_timestamp": "2025-05-02T04:47:33.295501Z"}, {"uuid": "19c2be51-4284-4f3c-b78c-91563f20e401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lol5yq2e262t", "content": "", "creation_timestamp": "2025-05-07T10:13:53.125257Z"}, {"uuid": "93eeeb0a-c877-4ae9-9118-e5b50b14641c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/techit.bsky.social/post/3lolaldemxy2l", "content": "", "creation_timestamp": "2025-05-07T11:00:05.753066Z"}, {"uuid": "7391c2cc-4db1-4463-b1be-a58362c3c21c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/ninjaowl.ai/post/3lolamgl2xt2z", "content": "", "creation_timestamp": "2025-05-07T11:00:41.160715Z"}, {"uuid": "6e7bd22d-13c9-4791-b8df-d4b0f7393a76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/hackmanac.com/post/3lolasq4phk2u", "content": "", "creation_timestamp": "2025-05-07T11:04:16.341732Z"}, {"uuid": "6d4e4cf4-7e38-4144-bb10-100d37eba7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cryptobriefly.bsky.social/post/3lolatcliuj2u", "content": "", "creation_timestamp": "2025-05-07T11:04:31.934520Z"}, {"uuid": "37d109c0-86f5-41b3-b854-9c5a0228d698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lolavephne2z", "content": "", "creation_timestamp": "2025-05-07T11:05:40.844785Z"}, {"uuid": "84fcc6b8-95dd-4102-a89c-39664227d68e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lolfq37bpz22", "content": "", "creation_timestamp": "2025-05-07T12:32:12.370577Z"}, {"uuid": "d7763896-050e-490e-bd4f-c57b89fb9362", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/acirema.dev/post/3lolqal5wyc2q", "content": "", "creation_timestamp": "2025-05-07T15:40:24.191625Z"}, {"uuid": "312c6d2f-5967-4285-850d-f515b3487526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://thehackernews.com/2025/05/play-ransomware-exploited-windows-cve.html", "content": "", "creation_timestamp": "2025-05-07T08:44:00.000000Z"}, {"uuid": "457e76b6-252e-4071-9c75-adfa95a1e668", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lolss22mud2j", "content": "", "creation_timestamp": "2025-05-07T16:25:56.545884Z"}, {"uuid": "1714ee60-41d5-46ca-bbd8-d2e7d1d3ff7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lolzxreeas2i", "content": "", "creation_timestamp": "2025-05-07T18:34:26.779821Z"}, {"uuid": "04554977-19ff-4dc8-b077-3262253edc43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lom2kzhmwc2i", "content": "", "creation_timestamp": "2025-05-07T18:45:12.872181Z"}, {"uuid": "b0e64443-d475-4235-a090-fc72ec006ec9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomapri57wn2", "content": "", "creation_timestamp": "2025-05-07T20:40:43.793314Z"}, {"uuid": "fc613bb8-99ea-4b3b-950c-b51951938263", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3lombl24lcpv2", "content": "", "creation_timestamp": "2025-05-07T20:52:18.593077Z"}, {"uuid": "e64bd38f-f666-400e-a571-ee1c03f13d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lomekjl66k2j", "content": "", "creation_timestamp": "2025-05-07T21:43:52.099953Z"}, {"uuid": "e871c4cf-dd80-4131-aa7e-edb27b5ab716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lomk6k52dp2i", "content": "", "creation_timestamp": "2025-05-07T23:24:31.902448Z"}, {"uuid": "ec2ca302-7fee-43a1-b7dd-d7c86678bb94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/bettycjung.bsky.social/post/3lomqs6sjjk24", "content": "", "creation_timestamp": "2025-05-08T01:22:56.435805Z"}, {"uuid": "81a02c95-8735-41b2-b8b7-ecf7299e2574", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lomtv2durb2w", "content": "", "creation_timestamp": "2025-05-08T02:18:11.100651Z"}, {"uuid": "d4a1ec9c-868f-4de4-a041-da7f788fc29b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29825", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lomwwgae722g", "content": "", "creation_timestamp": "2025-05-08T03:12:38.644962Z"}, {"uuid": "4e60004b-9583-4e9c-a89d-b552bd905d20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lomyzp23ysf2", "content": "", "creation_timestamp": "2025-05-08T03:50:47.975592Z"}, {"uuid": "ec06ec5d-9dd1-44e0-bcc6-1d7638365cc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lonalpxtik2k", "content": "", "creation_timestamp": "2025-05-08T06:05:37.132606Z"}, {"uuid": "599a9dd5-53c8-4ddf-8151-e59b6200fb87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lonc25nels2k", "content": "", "creation_timestamp": "2025-05-08T06:31:34.702789Z"}, {"uuid": "a6bd4ffb-fefd-490e-a737-d437cd766cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lond3dbkx22k", "content": "", "creation_timestamp": "2025-05-08T06:50:07.916159Z"}, {"uuid": "b7fdd6ca-337f-4d87-bcf9-f04fbb7a3967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lonesknkws2t", "content": "", "creation_timestamp": "2025-05-08T07:21:01.417847Z"}, {"uuid": "706384b9-c704-499d-bd6f-980d0fe978bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/royans.bsky.social/post/3lonp52wnqm2n", "content": "", "creation_timestamp": "2025-05-08T10:25:51.567808Z"}, {"uuid": "a79bfece-16fd-4fd0-80c2-274cb8f819ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lorcowafzs25", "content": "", "creation_timestamp": "2025-05-09T20:53:53.170382Z"}, {"uuid": "3413d13d-cb29-4783-9022-573a38b88174", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3loo7cc2dxs2s", "content": "", "creation_timestamp": "2025-05-08T15:15:10.716155Z"}, {"uuid": "0b84416e-1a88-4b24-b363-99ff6fb68e49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3looafeiohr2j", "content": "", "creation_timestamp": "2025-05-08T15:34:43.963752Z"}, {"uuid": "d3c19316-d4eb-4244-972b-c92ae0eb3191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/meatmutts.bsky.social/post/3loohp37yhk2f", "content": "", "creation_timestamp": "2025-05-08T17:45:23.144863Z"}, {"uuid": "d697a8e6-f630-41f3-ac35-cf542a9326d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3loufha4sjx23", "content": "", "creation_timestamp": "2025-05-11T02:21:12.864369Z"}, {"uuid": "1815e81f-b8d9-42b9-b087-c5130a78564b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114474625505155153", "content": "", "creation_timestamp": "2025-05-08T22:42:44.450067Z"}, {"uuid": "b97a44a4-defd-4261-b6ed-f6069e9c404c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3looyappu2my2", "content": "", "creation_timestamp": "2025-05-08T23:15:53.801344Z"}, {"uuid": "3d46bc69-7b8e-4fd8-8dc8-494484677712", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3lop5dy4dmk2o", "content": "", "creation_timestamp": "2025-05-09T00:12:59.625048Z"}, {"uuid": "3b30a212-afda-48ef-85b6-07c400dbc649", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-19d312da-dd316f70fdc38ae8", "content": "", "creation_timestamp": "2025-05-09T00:24:29.371491Z"}, {"uuid": "2bd84a84-31f7-4d24-8c50-ce4fbf23b617", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lop6wwexzc2r", "content": "", "creation_timestamp": "2025-05-09T00:41:28.237883Z"}, {"uuid": "6d7b5544-4ac8-4e12-9290-94aa6ba3fff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lordo3bqqc25", "content": "", "creation_timestamp": "2025-05-09T21:11:18.045678Z"}, {"uuid": "320d1672-e8d0-4efc-bd82-f068b3841377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lore4asvn225", "content": "", "creation_timestamp": "2025-05-09T21:19:13.514199Z"}, {"uuid": "01eb8f8d-78c0-40f5-a2bb-8cfe2e4d670e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lorulqoaek2o", "content": "", "creation_timestamp": "2025-05-10T02:14:11.210071Z"}, {"uuid": "9e08e6b0-d805-467e-a25a-42edc75138e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/alphahunt.io/post/3lowhz5efns2l", "content": "", "creation_timestamp": "2025-05-11T22:12:22.413680Z"}, {"uuid": "b6643f64-0264-4170-8b9b-618943038fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/mrtechking.bsky.social/post/3loxaznyfy222", "content": "", "creation_timestamp": "2025-05-12T05:40:03.317211Z"}, {"uuid": "11274050-defd-4ba0-839e-728839429e95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/matricedigitale.bsky.social/post/3lwqdcjpcje2w", "content": "", "creation_timestamp": "2025-08-19T06:53:42.248677Z"}, {"uuid": "a82667d2-2ebf-4e4c-9e6a-37b89bd6edea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "931730c5-4065-45e6-98eb-760446cef6d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-298279", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0156", "content": "", "creation_timestamp": "2025-05-13T17:10:10.000000Z"}, {"uuid": "e84b5dec-cde3-41cc-a9b7-6992ca2692c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "7340c22d-84bc-42aa-a596-49d052195b4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29826", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "86da4bcb-2096-4330-bd79-0721bcf5861d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lua3roya6323", "content": "", "creation_timestamp": "2025-07-18T09:06:02.231821Z"}, {"uuid": "bb0a30b9-1e0f-4360-be01-2dc33b85e237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/geeknik.bsky.social/post/3ly6sjq5x6o2r", "content": "", "creation_timestamp": "2025-09-06T18:28:38.000317Z"}, {"uuid": "1ce804df-6f98-4e9d-9e95-1483e4699254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "0ca2eb65-3fdc-492e-b59a-366a21e9cd6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:16.000000Z"}, {"uuid": "d63f72d0-440f-469c-8c28-f8158e4492d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/threatintel.microsoft.com/post/3lwopl4ve4323", "content": "", "creation_timestamp": "2025-08-18T15:27:55.539708Z"}, {"uuid": "7190273e-2a7d-4e7d-bd47-76c8cca94718", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lworje26eh2e", "content": "", "creation_timestamp": "2025-08-18T16:02:43.649928Z"}, {"uuid": "4e0f6ec5-952c-4105-9683-b84c8d5b0c34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://infosec.exchange/users/tomcat/statuses/115050972405736480", "content": "", "creation_timestamp": "2025-08-18T17:35:19.715193Z"}, {"uuid": "8f02eac4-9039-41ba-bd9a-7b4710831d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3lwowpqg7ydf2", "content": "", "creation_timestamp": "2025-08-18T17:37:45.861591Z"}, {"uuid": "f9f569e7-0c95-465a-8f1d-1b7442980623", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html", "content": "", "creation_timestamp": "2025-08-18T14:03:00.000000Z"}, {"uuid": "6fed013e-0391-481a-9448-aab6919022e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29829", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "f3f6d03d-95ac-4cce-b8d1-38411206d750", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lystiz5qju2h", "content": "", "creation_timestamp": "2025-09-14T17:39:21.878185Z"}, {"uuid": "6a2861a9-3d76-4cb0-b1e2-3b1899710e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-cb641839-91aaef4e4120943c", "content": "", "creation_timestamp": "2025-08-18T09:44:29.445351Z"}, {"uuid": "4e4ae745-b37a-4c5f-9365-02ac48508cfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/LLMs.activitypub.awakari.com.ap.brid.gy/post/3lwo55k52wjp2", "content": "", "creation_timestamp": "2025-08-18T09:59:40.727131Z"}, {"uuid": "971791a5-41db-4fdc-9f8a-900359e2cd8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lwo5ymu3262z", "content": "", "creation_timestamp": "2025-08-18T10:13:21.783145Z"}, {"uuid": "546aa5b9-e343-4496-8621-5ab3177e6048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/115050341311656112", "content": "", "creation_timestamp": "2025-08-18T14:54:50.010147Z"}, {"uuid": "6511c142-f210-4b2c-bcc0-f04c60e70031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lwptuewahf2u", "content": "", "creation_timestamp": "2025-08-19T02:17:21.228292Z"}, {"uuid": "bcef7f86-8f50-4794-821c-dd65ae3255d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lwqkixnpd522", "content": "", "creation_timestamp": "2025-08-19T09:02:34.403905Z"}, {"uuid": "0fdcd19b-b4fb-4c45-b14c-f3b5d5e63017", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/malwhere.bsky.social/post/3lwqkkq2p6c2b", "content": "", "creation_timestamp": "2025-08-19T09:03:51.364291Z"}, {"uuid": "538adbd0-7546-45a0-8932-88ba981eee21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lwqs3mtz3f2u", "content": "", "creation_timestamp": "2025-08-19T11:18:16.324514Z"}, {"uuid": "c6ddad22-8fbe-4435-81b4-4ab133662dd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lwsne4pf6s2i", "content": "", "creation_timestamp": "2025-08-20T04:58:51.877721Z"}, {"uuid": "7f898063-214a-4b65-bb0d-2f15b9c25372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/technadu.com/post/3lwsxelxstk2w", "content": "", "creation_timestamp": "2025-08-20T07:58:15.940823Z"}, {"uuid": "277cc246-4f37-48b5-8a36-55ed36b0ea53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3lwrapvbabh24", "content": "", "creation_timestamp": "2025-08-19T15:40:09.606393Z"}, {"uuid": "9fb7eb2c-68ae-4cb8-96e1-3f4cb4106769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lwt7yrhgon25", "content": "", "creation_timestamp": "2025-08-20T10:32:32.716775Z"}, {"uuid": "3a44740f-18ee-4a8f-aba2-f468d48a75e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosecindustry.bsky.social/post/3lwrguxiyct2g", "content": "", "creation_timestamp": "2025-08-19T17:30:21.139656Z"}, {"uuid": "c3605fdc-6ff9-42ec-a681-5febdc43bea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lwrjvuhcf22b", "content": "", "creation_timestamp": "2025-08-19T18:24:32.521903Z"}, {"uuid": "09b2e1f2-60e2-4c2b-8930-c80a48547995", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-29824", "type": "seen", "source": "https://infosec.exchange/users/threatcodex/statuses/115062082282101688", "content": "", "creation_timestamp": "2025-08-20T16:40:43.005737Z"}, {"uuid": "42507194-382c-41ed-a1d6-18c6b8a33d49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://www.darkreading.com/threat-intelligence/pipemagic-backdoor-resurfaces-play-ransomware-attack-chain", "content": "", "creation_timestamp": "2025-08-19T15:16:22.000000Z"}, {"uuid": "f48e1ca3-46f0-4777-a348-9272bc33ee26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lwseanwnc52x", "content": "", "creation_timestamp": "2025-08-20T02:15:52.355884Z"}, {"uuid": "8ecb5672-3b55-424c-a77d-04b5d4eb3b91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lwu7w3bz2s25", "content": "", "creation_timestamp": "2025-08-20T20:03:44.515460Z"}, {"uuid": "64aee89b-713c-459f-b1c4-4fcfbb8549a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lwuaemoat225", "content": "", "creation_timestamp": "2025-08-20T20:11:51.848510Z"}, {"uuid": "f80a0845-22e8-43a4-b417-3c7c0385d26b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lwuuoepmx525", "content": "", "creation_timestamp": "2025-08-21T02:15:11.576376Z"}, {"uuid": "ff2bbfc2-9445-4671-bce1-2dfb94867338", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lwzvi26y5o2r", "content": "", "creation_timestamp": "2025-08-23T02:12:51.817505Z"}, {"uuid": "a7684cc5-9510-42a0-8dcc-a5e58a0cad35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/parliamodinews.bsky.social/post/3lx2mnzzirl2m", "content": "", "creation_timestamp": "2025-08-23T09:07:48.649412Z"}, {"uuid": "e96ea7e0-6502-411e-bb9b-cd3ee461461f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3m2yzvpk6so2o", "content": "", "creation_timestamp": "2025-10-12T15:40:11.714584Z"}, {"uuid": "7c27f355-5af0-489d-9684-3cb998823f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "MISP/2bceffac-02c3-4c54-a709-6e253b38ec76", "content": "", "creation_timestamp": "2025-09-09T20:56:47.000000Z"}, {"uuid": "e9e94fcd-a210-4ef0-9b40-0175ceac1e5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lx6wrlptoi2k", "content": "", "creation_timestamp": "2025-08-25T02:19:24.371942Z"}, {"uuid": "2d23b59a-7bc2-43d1-ae6f-79d89cd0421b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lx4gjn5bha2s", "content": "", "creation_timestamp": "2025-08-24T02:23:18.484639Z"}, {"uuid": "4087f4ef-1fec-4bf0-ac37-8562ccbab48d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-75a838d0-747e606e3473960b", "content": "", "creation_timestamp": "2025-11-21T21:07:44.420426Z"}, {"uuid": "254fcccd-e4e3-4aa2-970c-78b5d6be0cf8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lx7j5qf62k2e", "content": "", "creation_timestamp": "2025-08-25T07:48:23.513881Z"}, {"uuid": "d0c90288-af6b-4b3d-9fe6-c4525e2bc0e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://gist.github.com/bhargav-nebulock/a23897d2199bc16d9e67b777e001fda2", "content": "", "creation_timestamp": "2025-12-03T18:59:57.000000Z"}, {"uuid": "375b1b0e-1d4c-4104-8d0b-c1c1bf89bc43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1521", "content": "", "creation_timestamp": "2025-04-09T04:00:00.000000Z"}, {"uuid": "0e4ab7d0-7dda-4bb5-aa86-19735e9dd555", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2025-29822", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/77a1b8aa-f86f-4c74-af5b-7e082c7ae3de", "content": "", "creation_timestamp": "2025-04-10T11:32:21.060085Z"}, {"uuid": "822ee0f1-eb84-4afa-bc96-2b00587612fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/thedfirreport.bsky.social/post/3mf7tsremtw2s", "content": "", "creation_timestamp": "2026-02-19T14:51:46.079165Z"}, {"uuid": "867b8718-3e81-40be-b759-c5e7fbced6bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://bsky.app/profile/infosecbot.bsky.social/post/3mf7u7patkk2t", "content": "", "creation_timestamp": "2026-02-19T14:58:59.848219Z"}, {"uuid": "ee918de6-74e8-44d3-952e-f44289825658", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1a833880-8608-44ad-9e79-c0105aed3411", "content": "", "creation_timestamp": "2026-02-02T12:26:03.991296Z"}, {"uuid": "77f51ab9-29ea-4bff-8ec9-ab38ce39cfc7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2982", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9618", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2982\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N)\n\ud83d\udd39 Description: A vulnerability, which was classified as critical, was found in Legrand SMS PowerView 1.x. Affected is an unknown function. The manipulation of the argument redirect leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.\n\ud83d\udccf Published: 2025-03-31T07:31:04.028Z\n\ud83d\udccf Modified: 2025-03-31T07:31:04.028Z\n\ud83d\udd17 References:\n1. https://vuldb.com/?id.302034\n2. https://vuldb.com/?ctiid.302034", "creation_timestamp": "2025-03-31T08:30:26.000000Z"}, {"uuid": "c797afb5-39c7-4bad-92de-ff01023b307d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/CyberBulletin/10785", "content": "\u26a1\ufe0fPlay Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization.\n\n#CyberBulletin", "creation_timestamp": "2025-05-07T15:24:42.000000Z"}, {"uuid": "85e24365-26ec-4e54-9084-875d03fa1348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/CyberBulletin/10784", "content": "\u26a1\ufe0fZero-Day CLFS Vulnerability (CVE-2025-29824) Exploited in Ransomware Attacks.\n\n#CyberBulletin", "creation_timestamp": "2025-05-07T15:24:08.000000Z"}, {"uuid": "8e6f2eb0-393c-43dc-8081-7d0ecbdfcec6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/10042", "content": "\ud83d\udee1 79% \u0430\u0442\u0430\u043a \u0432 2024-\u043c \u2014 \u0431\u0435\u0437 \u0435\u0434\u0438\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430. \u041a\u0430\u043a \u0442\u0430\u043a\u043e\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e?\n\n\u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u044c: \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0443\u0436\u0435 \u0432\u043d\u0443\u0442\u0440\u0438 \u0441\u0435\u0442\u0438. EDR \u043c\u043e\u043b\u0447\u0438\u0442. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 \u043d\u0435 \u0432\u0438\u0434\u0438\u0442 \u0443\u0433\u0440\u043e\u0437\u044b. \u041d\u0430 \u0434\u0438\u0441\u043a \u043d\u0435 \u0443\u043f\u0430\u043b\u043e \u043d\u0438 \u043e\u0434\u043d\u043e\u0433\u043e \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c LSASS \u0443\u0436\u0435 \u0434\u0430\u043c\u043f\u0438\u0442\u0441\u044f, \u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441\u043f\u043e\u043a\u043e\u0439\u043d\u043e \u0434\u0432\u0438\u0433\u0430\u0435\u0442\u0441\u044f \u043f\u043e \u0441\u0435\u0442\u0438. \u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b? \u0418\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0442\u0435, \u0447\u0442\u043e Microsoft \u0441\u0430\u043c\u0430 \u043f\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0441 Windows.\n\n\u042d\u0442\u043e \u043d\u0435 \u0444\u0430\u043d\u0442\u0430\u0441\u0442\u0438\u043a\u0430. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c CrowdStrike Global Threat Report 2025, \u0438\u043c\u0435\u043d\u043d\u043e 79% \u0432\u0441\u0435\u0445 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u0432 2024 \u0433\u043e\u0434\u0443 \u043e\u0431\u043e\u0448\u043b\u0438\u0441\u044c \u0431\u0435\u0437 \u043c\u0430\u043b\u0432\u0430\u0440\u0438. \u0414\u043b\u044f \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044f: \u0432 2019-\u043c \u0442\u0430\u043a\u0438\u0445 \u0430\u0442\u0430\u043a \u0431\u044b\u043b\u043e 40%. Bitdefender \u043f\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0443 700 000 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0435\u0442: 84% \u0432\u044b\u0441\u043e\u043a\u043e\u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0442\u0435\u0445\u043d\u0438\u043a\u0443 Living off the Land.\n\n\ud83d\udd0d \u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 LOTL \u0438 \u043f\u043e\u0447\u0435\u043c\u0443 \u044d\u0442\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442\n\nLiving off the Land \u2014 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u044f, \u043f\u0440\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 \u0432\u0435\u0441\u044c kill chain \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438. \u041d\u0438\u043a\u0430\u043a\u043e\u0433\u043e \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430, \u043d\u0438\u043a\u0430\u043a\u043e\u0433\u043e RAT. \u0422\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 Microsoft \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u0438 \u2014 LOLBins.\n\n\u041f\u043e\u0447\u0435\u043c\u0443 \u044d\u0442\u043e \u0442\u0430\u043a \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e? \u0422\u0440\u0438 \u043f\u0440\u0438\u0447\u0438\u043d\u044b:\n\n\u2022 \u0414\u043e\u0432\u0435\u0440\u0438\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u2014 certutil.exe, mshta.exe, rundll32.exe \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u044b Microsoft, \u0441\u0438\u0434\u044f\u0442 \u0432 \u0431\u0435\u043b\u044b\u0445 \u0441\u043f\u0438\u0441\u043a\u0430\u0445 AppLocker \u0438 \u043d\u0435 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442 \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u043d\u0438\u0439 EPP.\n\u2022 \u041d\u0435\u0442 \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u0445 IOC \u2014 \u0445\u044d\u0448\u0438 \u0441\u043e\u0432\u043f\u0430\u0434\u0430\u044e\u0442 \u0441 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u043c\u0438. \u0421\u0438\u0433\u043d\u0430\u0442\u0443\u0440\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u0440\u043e\u0441\u0442\u043e \u0431\u0435\u0441\u0441\u0438\u043b\u0435\u043d.\n\u2022 \u0414\u0451\u0448\u0435\u0432\u043e \u0432 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0435 \u2014 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043f\u0438\u0441\u0430\u0442\u044c \u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0439.\n\n\u041f\u0440\u043e\u0435\u043a\u0442 LOLBAS \u043d\u0430 GitHub \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 200 Windows-\u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u043e\u0432 \u0441 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u043e\u043c \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f.\n\n\u2699\ufe0f \u0420\u0435\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u0438\u043c\u0435\u0440: certutil \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 2025 \u0433\u043e\u0434\u0430\n\n\u0412\u043e\u0437\u044c\u043c\u0451\u043c \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0439 \u043a\u0435\u0439\u0441. \u0413\u0440\u0443\u043f\u043f\u0430 Storm-2460 \u0432 2025-\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 certutil.exe \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u043d\u0430 \u0440\u0430\u043d\u043d\u0438\u0445 \u0441\u0442\u0430\u0434\u0438\u044f\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 PipeMagic. \u041f\u0430\u0440\u0430\u043b\u043b\u0435\u043b\u044c\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c CVE-2025-29824 \u2014 Use After Free \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows CLFS, CVSS 7.8 \u2014 \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u0426\u0435\u043b\u0438: \u0421\u0428\u0410, \u0418\u0441\u043f\u0430\u043d\u0438\u044f, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0430, \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u0430\u044f \u0410\u0440\u0430\u0432\u0438\u044f.\n\n\u0428\u0442\u0430\u0442\u043d\u0430\u044f \u0443\u0442\u0438\u043b\u0438\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430\u043c\u0438 \u0443\u043c\u0435\u0435\u0442 \u043a\u0430\u0447\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0438\u0437 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 (-urlcache -split -f) \u0438 \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u0442\u044c/\u0434\u0435\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u0442\u044c Base64 (-encode / -decode). \u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u043e \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442.\n\n\ud83d\uddfa \u041a\u0430\u0440\u0442\u0430 \u0442\u0435\u043c\u044b: \u0433\u0434\u0435 LOTL \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u0432 kill chain\n\nLOTL \u2014 \u043d\u0435 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0442\u0440\u044e\u043a, \u0430 \u0444\u0438\u043b\u043e\u0441\u043e\u0444\u0438\u044f \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f \u0432\u0441\u0435\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0430\u0442\u0430\u043a\u0438. \u0412 MITRE ATT&amp;CK \u044f\u0434\u0440\u043e \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u2014 T1218 System Binary Proxy Execution. \u041d\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u043e\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u044c\u0448\u0435:\n\n1. Execution \u2014 PowerShell, cmd.exe, WMI\n2. Lateral Movement \u2014 WMI, PSRemoting, DCOM\n3. Credential Access \u2014 \u0434\u0430\u043c\u043f LSASS \u0447\u0435\u0440\u0435\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u0435 \u0443\u0442\u0438\u043b\u0438\u0442\u044b\n4. Persistence \u2014 \u0440\u0435\u0435\u0441\u0442\u0440, \u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0449\u0438\u043a, COM-hijacking\n5. Defense Evasion \u2014 \u043e\u0431\u0445\u043e\u0434 AMSI, Defender, EDR\n\n\u041a\u0430\u0436\u0434\u044b\u0439 \u044d\u0442\u0430\u043f kill chain \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0436\u0435 \u0441\u0442\u043e\u044f\u0442 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0418\u043c\u0435\u043d\u043d\u043e \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u0440\u043e\u0438\u0433\u0440\u044b\u0432\u0430\u044e\u0442 \u2014 \u043e\u043d\u0438 \u0438\u0449\u0443\u0442 \u0447\u0443\u0436\u0435\u0440\u043e\u0434\u043d\u043e\u0435, \u0430 \u0437\u0434\u0435\u0441\u044c \u0432\u0441\u0451 \u00ab\u0441\u0432\u043e\u0451\u00bb.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043a\u043e\u043c\u0430\u043d\u0434, \u0442\u0435\u0445\u043d\u0438\u043a \u043e\u0431\u0445\u043e\u0434\u0430 EDR, BYOVD-\u0430\u0442\u0430\u043a \u0438 \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 COM-hijacking \u2014 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435 \u043d\u0438\u0436\u0435.\n\nhttps://codeby.net/threads/living-off-the-land-ataki-windows-polnoye-rukovodstvo-po-lolbas-obkhodu-edr-i-post-ekspluatatsii-bez-storonnikh-instrumentov.92849/", "creation_timestamp": "2026-04-26T14:57:13.000000Z"}, {"uuid": "75aeffb3-e698-446d-8a1f-f6f6139c0d97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/codeby_sec/10041", "content": "\ud83d\udee1 79% \u0430\u0442\u0430\u043a \u0432 2024-\u043c \u2014 \u0431\u0435\u0437 \u0435\u0434\u0438\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430. \u041a\u0430\u043a \u0442\u0430\u043a\u043e\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e?\n\n\u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u044c: \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0443\u0436\u0435 \u0432\u043d\u0443\u0442\u0440\u0438 \u0441\u0435\u0442\u0438. EDR \u043c\u043e\u043b\u0447\u0438\u0442. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441 \u043d\u0435 \u0432\u0438\u0434\u0438\u0442 \u0443\u0433\u0440\u043e\u0437\u044b. \u041d\u0430 \u0434\u0438\u0441\u043a \u043d\u0435 \u0443\u043f\u0430\u043b\u043e \u043d\u0438 \u043e\u0434\u043d\u043e\u0433\u043e \u043f\u043e\u0434\u043e\u0437\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c LSASS \u0443\u0436\u0435 \u0434\u0430\u043c\u043f\u0438\u0442\u0441\u044f, \u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0441\u043f\u043e\u043a\u043e\u0439\u043d\u043e \u0434\u0432\u0438\u0433\u0430\u0435\u0442\u0441\u044f \u043f\u043e \u0441\u0435\u0442\u0438. \u0418\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b? \u0418\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0442\u0435, \u0447\u0442\u043e Microsoft \u0441\u0430\u043c\u0430 \u043f\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0441 Windows.\n\n\u042d\u0442\u043e \u043d\u0435 \u0444\u0430\u043d\u0442\u0430\u0441\u0442\u0438\u043a\u0430. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c CrowdStrike Global Threat Report 2025, \u0438\u043c\u0435\u043d\u043d\u043e 79% \u0432\u0441\u0435\u0445 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u0432 2024 \u0433\u043e\u0434\u0443 \u043e\u0431\u043e\u0448\u043b\u0438\u0441\u044c \u0431\u0435\u0437 \u043c\u0430\u043b\u0432\u0430\u0440\u0438. \u0414\u043b\u044f \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044f: \u0432 2019-\u043c \u0442\u0430\u043a\u0438\u0445 \u0430\u0442\u0430\u043a \u0431\u044b\u043b\u043e 40%. Bitdefender \u043f\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0443 700 000 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u0435\u0442: 84% \u0432\u044b\u0441\u043e\u043a\u043e\u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0442\u0435\u0445\u043d\u0438\u043a\u0443 Living off the Land.\n\n\ud83d\udd0d \u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 LOTL \u0438 \u043f\u043e\u0447\u0435\u043c\u0443 \u044d\u0442\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442\n\nLiving off the Land \u2014 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u044f, \u043f\u0440\u0438 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u0442 \u0432\u0435\u0441\u044c kill chain \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u043c\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438. \u041d\u0438\u043a\u0430\u043a\u043e\u0433\u043e \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430, \u043d\u0438\u043a\u0430\u043a\u043e\u0433\u043e RAT. \u0422\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 Microsoft \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u0438 \u2014 LOLBins.\n\n\u041f\u043e\u0447\u0435\u043c\u0443 \u044d\u0442\u043e \u0442\u0430\u043a \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e? \u0422\u0440\u0438 \u043f\u0440\u0438\u0447\u0438\u043d\u044b:\n\n\u2022 \u0414\u043e\u0432\u0435\u0440\u0438\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u2014 certutil.exe, mshta.exe, rundll32.exe \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u044b Microsoft, \u0441\u0438\u0434\u044f\u0442 \u0432 \u0431\u0435\u043b\u044b\u0445 \u0441\u043f\u0438\u0441\u043a\u0430\u0445 AppLocker \u0438 \u043d\u0435 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442 \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u043d\u0438\u0439 EPP.\n\u2022 \u041d\u0435\u0442 \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u0445 IOC \u2014 \u0445\u044d\u0448\u0438 \u0441\u043e\u0432\u043f\u0430\u0434\u0430\u044e\u0442 \u0441 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u043c\u0438. \u0421\u0438\u0433\u043d\u0430\u0442\u0443\u0440\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u0440\u043e\u0441\u0442\u043e \u0431\u0435\u0441\u0441\u0438\u043b\u0435\u043d.\n\u2022 \u0414\u0451\u0448\u0435\u0432\u043e \u0432 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0435 \u2014 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043f\u0438\u0441\u0430\u0442\u044c \u0438 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0442\u044c \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u0440\u0438\u0439.\n\n\u041f\u0440\u043e\u0435\u043a\u0442 LOLBAS \u043d\u0430 GitHub \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 200 Windows-\u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a\u043e\u0432 \u0441 \u0437\u0430\u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u043e\u043c \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044f.\n\n\u2699\ufe0f \u0420\u0435\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u0438\u043c\u0435\u0440: certutil \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 2025 \u0433\u043e\u0434\u0430\n\n\u0412\u043e\u0437\u044c\u043c\u0451\u043c \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0439 \u043a\u0435\u0439\u0441. \u0413\u0440\u0443\u043f\u043f\u0430 Storm-2460 \u0432 2025-\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 certutil.exe \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u043d\u0430 \u0440\u0430\u043d\u043d\u0438\u0445 \u0441\u0442\u0430\u0434\u0438\u044f\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 PipeMagic. \u041f\u0430\u0440\u0430\u043b\u043b\u0435\u043b\u044c\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c CVE-2025-29824 \u2014 Use After Free \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows CLFS, CVSS 7.8 \u2014 \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u0426\u0435\u043b\u0438: \u0421\u0428\u0410, \u0418\u0441\u043f\u0430\u043d\u0438\u044f, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0430, \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u0430\u044f \u0410\u0440\u0430\u0432\u0438\u044f.\n\n\u0428\u0442\u0430\u0442\u043d\u0430\u044f \u0443\u0442\u0438\u043b\u0438\u0442\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u0430\u043c\u0438 \u0443\u043c\u0435\u0435\u0442 \u043a\u0430\u0447\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u0438\u0437 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 (-urlcache -split -f) \u0438 \u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u0442\u044c/\u0434\u0435\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u0442\u044c Base64 (-encode / -decode). \u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u043e \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442.\n\n\ud83d\uddfa \u041a\u0430\u0440\u0442\u0430 \u0442\u0435\u043c\u044b: \u0433\u0434\u0435 LOTL \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0435\u0442\u0441\u044f \u0432 kill chain\n\nLOTL \u2014 \u043d\u0435 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0442\u0440\u044e\u043a, \u0430 \u0444\u0438\u043b\u043e\u0441\u043e\u0444\u0438\u044f \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044f \u0432\u0441\u0435\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0430\u0442\u0430\u043a\u0438. \u0412 MITRE ATT&amp;CK \u044f\u0434\u0440\u043e \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u2014 T1218 System Binary Proxy Execution. \u041d\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u043e\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043a\u0443\u0434\u0430 \u0431\u043e\u043b\u044c\u0448\u0435:\n\n1. Execution \u2014 PowerShell, cmd.exe, WMI\n2. Lateral Movement \u2014 WMI, PSRemoting, DCOM\n3. Credential Access \u2014 \u0434\u0430\u043c\u043f LSASS \u0447\u0435\u0440\u0435\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u0435 \u0443\u0442\u0438\u043b\u0438\u0442\u044b\n4. Persistence \u2014 \u0440\u0435\u0435\u0441\u0442\u0440, \u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0449\u0438\u043a, COM-hijacking\n5. Defense Evasion \u2014 \u043e\u0431\u0445\u043e\u0434 AMSI, Defender, EDR\n\n\u041a\u0430\u0436\u0434\u044b\u0439 \u044d\u0442\u0430\u043f kill chain \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0436\u0435 \u0441\u0442\u043e\u044f\u0442 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0418\u043c\u0435\u043d\u043d\u043e \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b \u043f\u0440\u043e\u0438\u0433\u0440\u044b\u0432\u0430\u044e\u0442 \u2014 \u043e\u043d\u0438 \u0438\u0449\u0443\u0442 \u0447\u0443\u0436\u0435\u0440\u043e\u0434\u043d\u043e\u0435, \u0430 \u0437\u0434\u0435\u0441\u044c \u0432\u0441\u0451 \u00ab\u0441\u0432\u043e\u0451\u00bb.\n\n\u041f\u043e\u043b\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043a\u043e\u043c\u0430\u043d\u0434, \u0442\u0435\u0445\u043d\u0438\u043a \u043e\u0431\u0445\u043e\u0434\u0430 EDR, BYOVD-\u0430\u0442\u0430\u043a \u0438 \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 COM-hijacking \u2014 \u0432 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u043e \u0441\u0441\u044b\u043b\u043a\u0435 \u043d\u0438\u0436\u0435.\n\nhttps://codeby.net/threads/living-off-the-land-ataki-windows-polnoye-rukovodstvo-po-lolbas-obkhodu-edr-i-post-ekspluatatsii-bez-storonnikh-instrumentov.92849/", "creation_timestamp": "2026-04-26T14:01:05.000000Z"}, {"uuid": "4c5dd4fc-da46-49cd-a8dc-e84b74128c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "published-proof-of-concept", "source": "Telegram/gHA3pPqgIYqaOFfyav4WOSLnHgyQd03aYnJyGl8fZrE5Jmc", "content": "", "creation_timestamp": "2025-10-27T15:00:07.000000Z"}, {"uuid": "00b3497b-0492-4743-be32-a252f270a2b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "published-proof-of-concept", "source": "https://t.me/kasperskylab_ru/6586", "content": "\u2620 \u042d\u0432\u043e\u043b\u044e\u0446\u0438\u044f \u0431\u044d\u043a\u0434\u043e\u0440\u0430 PipeMagic\n \n\u0412 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u0432 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438 \u0438 \u0411\u0440\u0430\u0437\u0438\u043b\u0438\u0438 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u0438 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u044b, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b \u0437\u0430\u043c\u0435\u0448\u0430\u043d PipeMagic \u2014 \u0431\u044d\u043a\u0434\u043e\u0440, \u043f\u0435\u0440\u0435\u0434\u0430\u044e\u0449\u0438\u0439 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0447\u0435\u0440\u0435\u0437 \u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043a\u0430\u043d\u0430\u043b\u044b. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u043d\u0430\u0448\u0438 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0435\u0433\u043e \u0432 2022 \u0433\u043e\u0434\u0443 \u0432 \u042e\u0433\u043e-\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438. \u0412 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 \u0430\u0432\u0442\u043e\u0440\u044b \u0437\u043b\u043e\u0432\u0440\u0435\u0434\u0430 \u043d\u0430\u0447\u0430\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u043a\u043b\u0438\u0435\u043d\u0442 ChatGPT. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043f\u0440\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u0441\u0442\u0430\u043b\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-29824 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Microsoft.\n \n\u0422\u0430\u043a\u0436\u0435 \u0432 PipeMagic \u043f\u043e\u044f\u0432\u0438\u043b\u0438\u0441\u044c \u0443\u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0437\u043b\u043e\u0432\u0440\u0435\u0434\u0443 \u043d\u0430\u0434\u0451\u0436\u043d\u0435\u0435 \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u044f\u0442\u044c\u0441\u044f \u0432 \u0437\u0430\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0438 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0435 \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0435 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u043f\u043e \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u043c \u0441\u0435\u0442\u044f\u043c. \u041d\u0430\u043a\u043e\u043d\u0435\u0446, \u0432 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u0445 \u0441 \u043d\u0438\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u0442\u0438\u043b\u0438\u0442\u0443 ProcDump. \u041e\u043d\u0430 \u0441\u043e\u0445\u0440\u0430\u043d\u044f\u0435\u0442 \u0432 \u0444\u0430\u0439\u043b \u0434\u0430\u043c\u043f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 LSASS, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432 \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435.\n \n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u044e PipeMagic \u0432 \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u0435 \u043d\u0430 Securelist.", "creation_timestamp": "2025-09-01T12:09:59.000000Z"}, {"uuid": "d6afb4bf-9e73-4d84-8e13-22a446d62632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/10957", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29824\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-04-08T17:23:34.083Z\n\ud83d\udccf Modified: 2025-04-08T17:38:05.868Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29824", "creation_timestamp": "2025-04-08T17:46:24.000000Z"}, {"uuid": "419bd668-d744-4843-b233-ce31c1653aeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29825", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15634", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29825\n\ud83d\udd25 CVSS Score: 6.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network.\n\ud83d\udccf Published: 2025-05-02T01:01:03.624Z\n\ud83d\udccf Modified: 2025-05-08T22:17:23.483Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29825", "creation_timestamp": "2025-05-08T22:25:03.000000Z"}, {"uuid": "1962db38-80b4-4e6b-af18-ffe20e55848c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15632", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29827\n\ud83d\udd25 CVSS Score: 9.9 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L/E:P/RL:O/RC:C)\n\ud83d\udd39 Description: Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network.\n\ud83d\udccf Published: 2025-05-08T22:17:25.176Z\n\ud83d\udccf Modified: 2025-05-08T22:17:25.176Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29827", "creation_timestamp": "2025-05-08T22:25:00.000000Z"}, {"uuid": "37241b22-253b-4e5d-b92e-ddc8d8a403d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29829", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16187", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29829\n\ud83d\udd25 CVSS Score: 5.5 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use of uninitialized resource in Windows Trusted Runtime Interface Driver allows an authorized attacker to disclose information locally.\n\ud83d\udccf Published: 2025-05-13T16:58:56.323Z\n\ud83d\udccf Modified: 2025-05-13T18:09:50.339Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29829", "creation_timestamp": "2025-05-13T18:30:56.000000Z"}, {"uuid": "0520d6e9-f091-46c5-8fc6-457d9e6e3913", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "Telegram/y6TyDZs2BrIej0K2L7aPudxqUcgU2Bz6TAttQZm7RCwKB9A", "content": "", "creation_timestamp": "2025-10-01T06:23:22.000000Z"}, {"uuid": "8854b785-9be6-4c67-ba7e-189ab5f92219", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/2059", "content": "Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization \u2013 thehackernews.com\n\nWed, 07 May 2025 18:44:00", "creation_timestamp": "2025-05-07T12:04:13.000000Z"}, {"uuid": "3030873d-8c45-421a-a91d-610d350e8ac9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29823", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/17096", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-29823\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally.\n\ud83d\udccf Published: 2025-04-08T17:23:33.416Z\n\ud83d\udccf Modified: 2025-05-21T00:31:39.949Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-29823", "creation_timestamp": "2025-05-21T00:50:32.000000Z"}, {"uuid": "88ffa38a-0487-4623-969a-5bf8a1607789", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/HackerNewscyber/2350", "content": "\ud83d\udea8\u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0628\u0627\u06af \u0648\u06cc\u0646\u062f\u0648\u0632 \u0628\u0631\u0627\u06cc \u0627\u0646\u062a\u0634\u0627\u0631 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 PipeMagic\n\n\u26aa\ufe0f\u0645\u062d\u0642\u0642\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a\u06cc \u06af\u0632\u0627\u0631\u0634 \u062f\u0627\u062f\u0646\u062f \u06a9\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0628\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc CVE-2025-29824 \u062f\u0631 \u0648\u06cc\u0646\u062f\u0648\u0632\u060c \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 PipeMagic \u0631\u0627 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\u06cc RansomExx \u0628\u0647 \u06a9\u0627\u0631 \u06af\u0631\u0641\u062a\u0647\u200c\u0627\u0646\u062f.\n\n\u26aa\ufe0f\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0627\u06cc\u0646 \u062d\u0645\u0644\u0627\u062a \u0631\u0627 \u0628\u0647 \u06af\u0631\u0648\u0647 Storm-2460 \u0646\u0633\u0628\u062a \u062f\u0627\u062f\u0647 \u0627\u0633\u062a. \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f PipeMagic \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0631\u0648\u0634\u200c\u0647\u0627\u06cc\u06cc \u0645\u0627\u0646\u0646\u062f DLL Hijacking \u0648 \u0633\u0631\u0642\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0627\u0632 \u062d\u0627\u0641\u0638\u0647 LSASS\u060c \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0645\u0627\u0646\u062f\u06af\u0627\u0631\u06cc \u0648 \u062d\u0631\u06a9\u062a \u062f\u0631 \u0634\u0628\u06a9\u0647 \u0642\u0631\u0628\u0627\u0646\u06cc \u0631\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0627\u062f\u0647\u200c\u0627\u0646\u062f.\n\n\u26aa\ufe0f\u0627\u06cc\u0646 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0628\u0627 \u0645\u0639\u0645\u0627\u0631\u06cc \u0645\u0627\u0698\u0648\u0644\u0627\u0631 \u0648 \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a \u0631\u0645\u0632\u06af\u0630\u0627\u0631\u06cc\u200c\u0634\u062f\u0647\u060c \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0631\u0627 \u062f\u0634\u0648\u0627\u0631 \u06a9\u0631\u062f\u0647 \u0648 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0627\u062e\u06cc\u0631\u060c \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc\u06cc \u062f\u0631 \u0639\u0631\u0628\u0633\u062a\u0627\u0646\u060c \u0628\u0631\u0632\u06cc\u0644\u060c \u0622\u0645\u0631\u06cc\u06a9\u0627 \u0648 \u0627\u0631\u0648\u067e\u0627 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a\u0647\u200c\u0627\u0646\u062f.\n\n\ud83d\udc9c @HackerNewsCyber", "creation_timestamp": "2025-08-20T09:17:06.000000Z"}, {"uuid": "b10b31f6-3e6a-4055-9a78-df35a1cfec01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "Telegram/o-MCmWXt2bNrfMyLSO8Lg2s6Eh7kQ_ZaajbNBkzYltBUeg", "content": "", "creation_timestamp": "2025-08-18T17:05:28.000000Z"}, {"uuid": "a21dabf9-56d7-4d73-9cb1-d3a5b8531955", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/thehackernews/7359", "content": "\u26a0\ufe0f Hackers just weaponized a new Windows flaw (CVE-2025-29824) to drop the PipeMagic backdoor\u2014fueling RansomExx attacks.\n\nThe bait? Fake ChatGPT apps and Chrome updates.\nStill active. Still evolving.\n\nDetails here \u2192 https://thehackernews.com/2025/08/microsoft-windows-vulnerability.html", "creation_timestamp": "2025-08-18T16:16:33.000000Z"}, {"uuid": "9ddf0303-8314-4f07-8182-dcd8e2ed48ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/bizone_channel/2036", "content": "\ud83d\udd2b \u0412\u043c\u0435\u0441\u0442\u0435 \u0441 \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0435\u0439 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0438 CVE-2025-29824\n\n\u0412 \u0430\u043f\u0440\u0435\u043b\u0435 2025 \u0433\u043e\u0434\u0430 Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 121 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445. \u0421\u0440\u0435\u0434\u0438 \u043d\u0438\u0445 \u0431\u044b\u043b\u0430 CVE-2025-29824 \u2014 \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u0430\u044f, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0430 \u0442\u043e\u0442 \u043c\u043e\u043c\u0435\u043d\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u043a \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u0432\u043d\u0435\u0434\u0440\u0435\u043d \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e PipeMagic. \n\n\u0427\u0442\u043e\u0431\u044b \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \u0438\u0437\u0443\u0447\u0438\u0442\u044c \u044d\u0442\u0443 \u0442\u0435\u043c\u0443, \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435. \u041e\u043d\u043e \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0438\u0437 \u0434\u0432\u0443\u0445 \u0447\u0430\u0441\u0442\u0435\u0439:\n\n\ud83d\udd35\u041c\u044b \u043f\u0440\u043e\u0432\u0435\u043b\u0438 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0441\u0430\u043c\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-29824.\n\ud83d\udd35\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u043f\u0440\u043e\u0441\u043b\u0435\u0434\u0438\u043b\u0438 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 PipeMagic \u0438 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0442\u0430\u043a\u0442\u0438\u043a\u0430\u0445 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u044d\u0442\u043e\u0433\u043e \u041f\u041e.", "creation_timestamp": "2025-08-18T14:58:38.000000Z"}, {"uuid": "a43cf0b4-e667-49e2-9ea8-0960dc77361d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/579", "content": "Top Security News for Today\n\nHow Exposed TeslaMate Instances Leak Sensitive Tesla Data  \nhttps://www.reddit.com/r/netsec/comments/1msre41/how_exposed_teslamate_instances_leak_sensitive/\n\nHow Exposed TeslaMate Instances Leak Sensitive Tesla Data  \nhttps://www.reddit.com/r/netsec/comments/1msrpi6/how_exposed_teslamate_instances_leak_sensitive/\n\nLostMyPassword \u2013 Dual Use Password Recovery and Credential Dumping Tool  \nhttps://www.darknet.org.uk/2025/08/lostmypassword-dual-use-password-recovery-and-credential-dumping-tool/\n\nSecuring Agentic AI: Threat Modeling and Risk Analysis for Network Monitoring Agentic AI System  \nhttps://securelist.com/pipemagic/117270/\n\nA Rose by Any Other Name Would Smell as Sweet: Categorical Homotopy Theory for Large Language Models  \nhttps://arxiv.org/abs/2508.10043\n\nA2HCoder: An LLM-Driven Coding Agent for Hierarchical Algorithm-to-HDL Translation  \nhttps://arxiv.org/abs/2508.10903\n\nPersonaTwin: A Multi-Tier Prompt Conditioning Framework for Generating and Evaluating Personalized Digital Twins  \nhttps://arxiv.org/abs/2508.10904\n\nUncovering Latent Connections in Indigenous Heritage: Semantic Pipelines for Cultural Preservation in Brazil  \nhttps://arxiv.org/abs/2508.10906\n\nEvolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824  \nhttps://arxiv.org/abs/2508.10911\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-08-18T09:30:21.000000Z"}, {"uuid": "984cc774-df90-4c39-a4e3-c12f946a32cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/true_secator/7345", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 BI.ZONE \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u044b \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-29824, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043b\u0435\u0433\u043b\u0438 \u0432 \u043e\u0441\u043d\u043e\u0432\u0443 \u043e\u0431\u0449\u0435\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u0441 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0435\u0439 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e.\n\n\u041a\u0430\u043a \u043c\u044b \u0440\u0430\u043d\u0435\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438, \u041a\u0430\u0441\u043f\u0435\u0440\u044b \u043f\u0440\u043e\u0441\u043b\u0435\u0434\u0438\u043b\u0438 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 PipeMagic \u0438 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 TTPs \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u044d\u0442\u043e\u0433\u043e \u041f\u041e, \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0431\u044b\u043b \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u041e\u043d \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u043b\u0441\u044f \u0432\u00a0\u0430\u0434\u0440\u0435\u0441\u043d\u043e\u043c \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 dllhost.exe \u0438\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u043a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u043f\u043e\u0441\u0442\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n\u0414\u043b\u044f\u00a0\u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u0438\u0437 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u0430 \u044f\u0434\u0440\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u044f NtQuerySystemInformation, \u0430 \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439\u00a0- RtlSetAllBits \u0438\u0437\u043d\u0443\u0442\u0440\u0438 \u044f\u0434\u0440\u0430, \u0447\u0442\u043e\u0431\u044b \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0441\u0435\u00a0\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 \u043f\u0440\u0438 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0438 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b EPROCESS.\n\n\u0422\u0430\u043a \u043a\u0430\u043a \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043b\u043e\u0441\u044c \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u0441\u00a0\u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u043c\u00a0clfs.sys, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u043b\u0438 \u0444\u0430\u0439\u043b\u00a0C:\\ProgramData\\SkyPdf\\PDUDrv.blf.\n\n\u041f\u043e\u0441\u043b\u0435 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043f\u043e\u043b\u0435\u0437\u043d\u0430\u044f \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0430 \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0432\u043d\u0435\u0434\u0440\u044f\u043b\u0430\u0441\u044c \u0432\u00a0\u0430\u0434\u0440\u0435\u0441\u043d\u043e\u0435 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 winlogon.exe, \u043e\u0442\u0442\u0443\u0434\u0430 - \u0432 procdump.exe, \u0430 \u0437\u0430\u0442\u0435\u043c\u00a0- \u0432\u00a0\u0430\u0434\u0440\u0435\u0441\u043d\u043e\u0435 \u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0441\u0442\u0432\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430\u00a0dllhost.exe, \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u00a0\u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0439 \u043a\u043e\u043c\u0430\u043d\u0434\u044b:\n\nC:\\Windows\\system32\\dllhost.exe -accepteula -r -ma lsass.exe c:\\programdata\\[\u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u044f \u0438\u0437 \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u044b\u0445 \u0441\u0438\u043c\u0432\u043e\u043b\u043e\u0432]\n\n\u042d\u0442\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u044e\u0442\u0441\u044f \u0434\u043b\u044f\u00a0\u0442\u043e\u0433\u043e, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0442\u0435\u043c \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 LSASS \u0438\u0437\u00a0\u043f\u0430\u043c\u044f\u0442\u0438, \u0447\u0442\u043e\u00a0\u0432\u0435\u0434\u0435\u0442 \u043a\u00a0\u043a\u0440\u0430\u0436\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Windows.\n\n\u0421\u00a0\u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u043b\u043e\u0441\u044c \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u0430 RansomEXX, \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u043e\u0433\u043e \u0447\u0435\u0440\u0435\u0437\u00a0dllhost.exe:\n\nC:\\Windows\\system32\\dllhost.exe --do [\u043f\u0443\u0442\u044c \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 \u0444\u0430\u0439\u043b\u0443 RansomEXX]\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438, \u0432\u00a0\u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f\u00a0clfs.sys\u00a0\u043d\u0430\u0440\u044f\u0434\u0443 \u0441 afd.sys \u0438 win32k.sys\u00a0\u0441\u0442\u0430\u043b \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e \u0443\u00a0\u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u00a0\u043d\u0435\u043c \u0447\u0430\u0441\u0442\u043e \u0434\u0435\u0442\u0435\u043a\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432\u00a0\u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435 \u0432\u00a0\u0445\u043e\u0434\u0435 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0439.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u0430\u043c\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Microsoft Windows Common Log File System, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u044b\u043b\u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u044b \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435 BI.ZONE.", "creation_timestamp": "2025-08-19T18:00:07.000000Z"}, {"uuid": "68c78794-187b-4d03-aa69-0f160bdc4f2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/xakep_ru/17993", "content": "\u0411\u044d\u043a\u0434\u043e\u0440 PipeMagic \u0441\u043d\u043e\u0432\u0430 \u0430\u043a\u0442\u0438\u0432\u0435\u043d \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043d\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u0438 BI.ZONE \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0438 \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 PipeMagic. \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u044f \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430 \u0438 \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0442\u0430\u043a\u0442\u0438\u043a\u0430\u0445 \u0435\u0433\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432, \u0430 BI.ZONE \u043f\u0440\u043e\u0432\u0435\u043b\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-29824, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445.\n\nhttps://xakep.ru/2025/08/19/pipemagic-attacks/", "creation_timestamp": "2025-08-19T12:35:42.000000Z"}, {"uuid": "d22f4082-1a58-4247-a58d-717d5a48ef23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/kasperskyb2b/1867", "content": "\u2728 PipeMagic \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u0432\u0435\u0436\u0438\u0435 CVE\n\n\u0412\u041f\u041e PipeMagic, \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0435 \u043d\u0430\u043c\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u0430\u0437\u0438\u0430\u0442\u0441\u043a\u0438\u0435 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438  \u0432 2022 \u0433\u043e\u0434\u0443, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f \u0432 \u043d\u043e\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432 ransomware, \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0432\u0448\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438 \u0438 \u0411\u0440\u0430\u0437\u0438\u043b\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 CVE-2025-29824 \u043a\u0430\u043a \u0437\u0438\u0440\u043e\u0434\u0435\u0439 \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0421\u0417\u0418 \u0438 \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0435\u0442\u0438.  \u0425\u043e\u0442\u044f \u0432 \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u043c \u043e\u0442\u0447\u0451\u0442\u0435 Microsoft \u0441\u0440\u0430\u0437\u0443 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442\u0441\u044f \u0438\u0437 PipeMagic, \u0430\u0432\u0442\u043e\u0440\u044b \u0443\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u0437 \u0432\u0438\u0434\u0443, \u0447\u0442\u043e \u044d\u0442\u043e \u0443\u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0432\u0435\u0440\u0441\u0438\u044f \u0412\u041f\u041e, \u0438\u043c\u0435\u044e\u0449\u0430\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043b\u0430\u0433\u0438\u043d\u044b, \u043d\u043e\u0432\u044b\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u044b \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 LSASS \u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f (\u043a\u0430\u043a \u0436\u0435 \u0431\u0435\u0437 ChatGPT!) \n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043d\u043e\u0432\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u0412\u041f\u041e \u0447\u0438\u0442\u0430\u0439\u0442\u0435 \u043d\u0430 Securelist, \u0430 \u0434\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0441\u0430\u043c\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0432\u0435\u043b\u0438 \u043a\u043e\u043b\u043b\u0435\u0433\u0438 \u0438\u0437 Bi.Zone.\n\n#APT @\u041f2\u0422", "creation_timestamp": "2025-08-19T08:31:37.000000Z"}, {"uuid": "8831518d-3109-477c-834c-3b845d24ec1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/true_secator/7340", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0432 \u043d\u043e\u0432\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u043e\u0442\u0441\u043b\u0435\u0434\u0438\u043b\u0438 \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u044e \u0431\u044d\u043a\u0434\u043e\u0440\u0430 PipeMagic: \u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430 \u0441 RansomExx \u0434\u043e CVE-2025-29824, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u0432 \u0447\u0438\u0441\u043b\u0435 121, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 Microsoft  PatchTuesday.\n\n\u0421\u0442\u043e\u0438\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u043e\u0442\u0447\u0435\u0442 \u0441\u0442\u0430\u043b \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u043c \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u041b\u041a \u0441 \u0433\u0440\u0443\u043f\u043f\u043e\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 BI.ZONE. \n\n\u041a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 TTPs \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432 PipeMagic \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u044b, \u0430 \u0411\u0438\u0437\u043e\u043d\u044b, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043f\u0440\u043e\u0432\u0435\u043b\u0438 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0441\u0430\u043c\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-29824.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438 \u0432 \u0420\u0435\u0434\u043c\u043e\u043d\u0434\u0435, CVE-2025-29824 \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u043c\u043e\u043c\u0435\u043d\u0442 \u0432\u044b\u0445\u043e\u0434\u0430 \u043f\u0430\u0442\u0447\u0430, \u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043a \u043d\u0435\u0439 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u043b \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e\u00a0PipeMagic, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u041b\u041a \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 2022 \u0433\u043e\u0434\u0430 \u0432 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c RansomExx.\n\n\u0416\u0435\u0440\u0442\u0432\u0430\u043c\u0438 \u0430\u0442\u0430\u043a\u0438 \u0441\u0442\u0430\u043b\u0438 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u042e\u0433\u043e-\u0412\u043e\u0441\u0442\u043e\u0447\u043d\u043e\u0439 \u0410\u0437\u0438\u0438. \u0414\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2017-0144.\n\n\u0417\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u043b \u0441\u043e\u0431\u043e\u0439 \u0442\u0440\u043e\u044f\u043d\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 Rufus \u0434\u043b\u044f \u0444\u043e\u0440\u043c\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f USB-\u0434\u0438\u0441\u043a\u043e\u0432, \u0430 \u0441\u0430\u043c PipeMagic \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u043b \u0434\u0432\u0430 \u0440\u0435\u0436\u0438\u043c\u0430 \u0440\u0430\u0431\u043e\u0442\u044b: \u043f\u043e\u043b\u043d\u043e\u0446\u0435\u043d\u043d\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 \u0438 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0448\u043b\u044e\u0437 \u0434\u043b\u044f \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0448\u0438\u0440\u043e\u043a\u043e\u0433\u043e \u043d\u0430\u0431\u043e\u0440\u0430 \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u041f\u043e\u0437\u0436\u0435 \u0432 \u041b\u041a \u0437\u0430\u0434\u0435\u0442\u0435\u043a\u0442\u0438\u043b\u0438 \u0435\u0433\u043e \u0432\u043d\u043e\u0432\u044c \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438. \u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u044d\u0442\u043e \u0431\u044b\u043b\u0430 \u0442\u0430 \u0436\u0435 \u0432\u0435\u0440\u0441\u0438\u044f PipeMagic, \u0447\u0442\u043e \u0438 \u0432 2022 \u0433\u043e\u0434\u0443.\n\n\u0422\u043e\u0433\u0434\u0430 \u0434\u043b\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0440\u0438\u043c\u0430\u043d\u043a\u0438 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u043e\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435-\u043a\u043b\u0438\u0435\u043d\u0442 \u0434\u043b\u044f ChatGPT.\n\n\u041e\u043d\u043e \u0431\u044b\u043b\u043e \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043e \u043d\u0430 Rust \u0438\u00a0 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u043e \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0438 Tauri \u0434\u043b\u044f \u043e\u0442\u0440\u0438\u0441\u043e\u0432\u043a\u0438 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0438 Tokio \u0434\u043b\u044f \u0430\u0441\u0438\u043d\u0445\u0440\u043e\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0437\u0430\u0434\u0430\u0447.\n\n\u041d\u0438\u043a\u0430\u043a\u043e\u0439 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0432 \u043d\u0435\u043c \u043d\u0435 \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c. \u041f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u043b\u043e \u0438\u0437 \u0441\u0432\u043e\u0435\u0433\u043e \u043a\u043e\u0434\u0430 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 AES \u043c\u0430\u0441\u0441\u0438\u0432 \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c 105 615 \u0431\u0430\u0439\u0442, \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u044b\u0432\u0430\u043b\u043e \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u043b\u043e \u0435\u0433\u043e. \u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 - \u0448\u0435\u043b\u043b-\u043a\u043e\u0434, \u043e\u0442\u0432\u0435\u0447\u0430\u044e\u0449\u0438\u0439 \u0437\u0430 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430.\u00a0\n\n\u041e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0435\u0439 PipeMagic \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u0446\u0438\u044f \u0441\u043b\u0443\u0447\u0430\u0439\u043d\u043e\u0433\u043e \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0434\u043b\u0438\u043d\u043e\u0439 16 \u0431\u0430\u0439\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043a\u0430\u043d\u0430\u043b\u0430 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u0439.\n\n\u0414\u043b\u044f \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043a\u0430\u043d\u0430\u043b\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442\u043d\u044b\u0439 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441, \u0430 \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u043c\u043e\u0434\u0443\u043b\u0435\u0439 (PipeMagic \u043e\u0431\u044b\u0447\u043d\u043e \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u043b\u0430\u0433\u0438\u043d\u043e\u0432 \u0441 C2) \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442\u0441\u044f \u0434\u043e\u043c\u0435\u043d:\u00a0hxxp://aaaaabbbbbbb.eastus.cloudapp.azure[.]com.\n\n\u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0437\u043b\u043e\u0432\u0440\u0435\u0434\u0430, \u0432 2025 \u0433\u043e\u0434\u0443 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u043b\u0438 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u0432 \u0411\u0440\u0430\u0437\u0438\u043b\u0438\u0438 \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438.\n\n\u041f\u0440\u0438 \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0438 \u0431\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e \u043e\u0431\u0440\u0430\u0449\u0435\u043d\u0438\u0435 \u043a \u0434\u043e\u043c\u0435\u043d\u0443\u00a0hxxp://aaaaabbbbbbb.eastus.cloudapp.azure[.]com, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438 \u043d\u0430\u0432\u0435\u043b\u043e \u0440\u0435\u0441\u0435\u0447\u0440\u0435\u0440\u043e\u0432 \u043d\u0430 \u043c\u044b\u0441\u043b\u044c \u043e \u0441\u0432\u044f\u0437\u0438 \u044d\u0442\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u0441 PipeMagic. \n\n\u041f\u043e\u0437\u0436\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043d\u0430\u0448\u043b\u0438 \u0438 \u0441\u0430\u043c \u0431\u044d\u043a\u0434\u043e\u0440.\n\n\u0412 \u044d\u0442\u043e\u0439 \u0430\u0442\u0430\u043a\u0435 \u0432 \u0440\u043e\u043b\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u0430 \u0432\u044b\u0441\u0442\u0443\u043f\u0430\u043b \u0444\u0430\u0439\u043b \u0444\u043e\u0440\u043c\u0430\u0442\u0430 Microsoft Help Index File. \n\n\u0411\u044b\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u043e\u0431\u0440\u0430\u0437\u0446\u044b \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u0430 PipeMagic, \u0438\u043c\u0438\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043a\u043b\u0438\u0435\u043d\u0442 ChatGPT, \u043f\u043e\u0445\u043e\u0436\u0438\u0439 \u043d\u0430 \u0442\u043e\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438 \u0432 2024 \u0433\u043e\u0434\u0443.\n\n\u0423\u0434\u0430\u043b\u043e\u0441\u044c \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u0441\u043b\u0435\u0434\u0438\u0442\u044c \u0442\u0440\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u043b\u0430\u0433\u0438\u043d\u0430, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 2025 \u0433\u043e\u0434\u0430 \u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044e\u0449\u0438\u0445 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u0443\u044e \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u043d\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0443\u044e \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c \u0431\u044d\u043a\u0434\u043e\u0440\u0435.\n\n\u0412\u0441\u0435 \u043c\u043e\u0434\u0443\u043b\u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0434\u043b\u044f 32-\u0431\u0438\u0442\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Windows.\n\n\u0421\u0440\u0435\u0434\u0438 \u043d\u0438\u0445: \u043c\u043e\u0434\u0443\u043b\u044c \u0430\u0441\u0438\u043d\u0445\u0440\u043e\u043d\u043d\u043e\u0439 \u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0438, \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a (\u043e\u0442\u0432\u0435\u0447\u0430\u0435\u0442 \u0437\u0430 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432 \u043f\u0430\u043c\u044f\u0442\u044c \u0438 \u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435) \u0438 \u0438\u043d\u0436\u0435\u043a\u0442\u043e\u0440 (\u043e\u0442\u0432\u0435\u0447\u0430\u0435\u0442 \u0437\u0430 \u0437\u0430\u043f\u0443\u0441\u043a \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 - \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430, \u0438\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u043d\u0430\u043f\u0438\u0441\u0430\u043d\u043d\u043e\u0433\u043e \u043d\u0430 C# (.NET).\n\n\u041f\u043e\u0441\u043b\u0435 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0432\u044b\u0431\u0440\u0430\u043d\u043d\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u044b \u043f\u0435\u0440\u0435\u0434 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c\u0438 \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u0441\u043f\u0435\u043a\u0442\u0440 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0435\u0439 \u043f\u043e \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044e \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439.\n\n\u0412 \u0430\u0442\u0430\u043a\u0430\u0445 2025 \u0433\u043e\u0434\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u0442\u0438\u043b\u0438\u0442\u0443 ProcDump \u0434\u043b\u044f \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 LSASS - \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e \u043c\u0435\u0442\u043e\u0434\u0438\u043a\u0435, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u043e\u0439 Microsoft \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438  CVE-2025-29824.\n\n\u0410 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0443\u0436\u0435 \u043a\u043e\u043b\u043b\u0435\u0433\u0438 \u0438\u0437 Bi.ZONE \u0432\u043e\u00a0\u0432\u0442\u043e\u0440\u043e\u0439 \u0447\u0430\u0441\u0442\u0438 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f.", "creation_timestamp": "2025-08-18T18:00:08.000000Z"}, {"uuid": "09d3c93b-5386-421f-b8a8-2bfc90a87f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://t.me/ctinow/236626", "content": "Evolution of the PipeMagic backdoor: from the RansomExx incident to CVE-2025-29824\nhttps://ift.tt/zeLGt5j", "creation_timestamp": "2025-08-18T09:04:35.000000Z"}, {"uuid": "2f060218-080a-4749-910f-ce6080562fbb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "published-proof-of-concept", "source": "Telegram/C5Uti98yNMibrytNOYJF3eWZ7TSU5JhC3eF6W16W_xddRY4", "content": "", "creation_timestamp": "2025-07-30T15:00:07.000000Z"}, {"uuid": "2bc55ea7-e469-4a9b-b82b-fe3a2b2a4538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/DarkWebInformer_News/4241", "content": "\ud83d\udea8 News Alert!\n\nSource: The Hacker News\nTitle: Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization\nLink: https://thehackernews.com/2025/05/play-ransomware-exploited-windows-cve.html", "creation_timestamp": "2025-05-07T10:52:46.000000Z"}, {"uuid": "7a42c691-c3ab-48a4-918c-1ff6cdf28690", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-2982", "type": "seen", "source": "https://t.me/cvedetector/21563", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2982 - Legrand SMS PowerView Remote File Inclusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-2982 \nPublished : March 31, 2025, 8:15 a.m. | 32\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in Legrand SMS PowerView 1.x. Affected is an unknown function. The manipulation of the argument redirect leads to file inclusion. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"31 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-31T10:49:38.000000Z"}, {"uuid": "5e6251d9-f41e-4827-a413-bf352a1c0fdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29828", "type": "exploited", "source": "https://t.me/kasperskyb2b/1772", "content": "\ud83d\udcbb \u0418\u044e\u043d\u044c\u0441\u043a\u0438\u0439 Patch Tuesday: \u0434\u0432\u0430 \u0437\u0438\u0440\u043e\u0434\u0435\u044f, \u043e\u0434\u0438\u043d \u0431\u043e\u0435\u0432\u043e\u0439\n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u043b\u0435\u0442\u043d\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439 \u043e\u043a\u0430\u0437\u0430\u043b\u0441\u044f \u043d\u0435 \u043e\u0447\u0435\u043d\u044c \u043e\u0431\u044a\u0451\u043c\u043d\u044b\u043c \u2014 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043e 67 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0445 10 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0438 57 \u0432\u0430\u0436\u043d\u044b\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432. 26 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE, 13 \u2014 EoP, 3 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 6 \u2014 DoS, 17 \u2014 \u0443\u0442\u0435\u0447\u043a\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0417\u0438\u0440\u043e\u0434\u0435\u0438\n\u0412 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f CVE-2025-33053 (CVSS3.1 8.8) \u2014 RCE \u0432 WebDAV, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0439 \u043a \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0441 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445, \u043a\u043e\u0433\u0434\u0430 \u0436\u0435\u0440\u0442\u0432\u0430 \u043a\u043b\u0438\u043a\u043d\u0435\u0442 \u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0441\u044b\u043b\u043a\u0443. \u0414\u043b\u044f \u0440\u0430\u0437\u043d\u043e\u043e\u0431\u0440\u0430\u0437\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u0435\u0441\u0442\u044c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e \u0441\u0430\u043c\u043e\u0439 \u0430\u0442\u0430\u043a\u0435, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c APT Stealth Falcon \u043f\u0440\u043e\u0442\u0438\u0432 \u043c\u0438\u0448\u0435\u043d\u0435\u0439 \u043d\u0430 \u0411\u043b\u0438\u0436\u043d\u0435\u043c \u0412\u043e\u0441\u0442\u043e\u043a\u0435. \n\n\u0421\u043e \u0432\u0442\u043e\u0440\u044b\u043c 0day \u0434\u0435\u043b\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0435\u0435 \u2014 \u044d\u0442\u043e CVE-2025-33073 (8.8), EoP \u0432 SMB-\u043a\u043b\u0438\u0435\u043d\u0442\u0435, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0435\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e \u043f\u0440\u0438 \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0438 \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u043c\u0443 SMB-\u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c system \u043d\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0441\u043a\u043e\u0439 \u043c\u0430\u0448\u0438\u043d\u0435. \u0417\u0430 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f\u0442 \u0446\u0435\u043b\u0443\u044e \u0433\u0440\u0443\u043f\u043f\u0443 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439, \u043d\u043e \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044f\u043a\u043e\u0431\u044b \u043d\u0435\u0442.  \u0411\u0443\u0434\u0435\u043c \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0442\u044c \u0437\u0430 \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u0435\u043c \u0441\u043e\u0431\u044b\u0442\u0438\u0439.\n\n\u041e\u043f\u0430\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\u0426\u0435\u043b\u044b\u0439 \u0431\u0443\u043a\u0435\u0442 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 Office \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440 \u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f: CVE-2025-47162, -47164, -47167, -47953. \u0412\u0441\u0435 RCE, \u0443 \u0432\u0441\u0435\u0445 CVSS 8.4\n\nCVE-2025-33070 (8.4) \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Netlogon \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0430, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u043c\u0443 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0443.   \n\nCVE-2025-29828 (8.1) \u2014 RCE \u0432 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0430\u0445 Windows, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u043f\u0440\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0435 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0445 \u0444\u0440\u0430\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 TLS ClientHello.\n\n\u0422\u0430\u043a\u0436\u0435 \u0441\u0442\u043e\u044f\u0442 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f RCE \u0432 KDC Proxy Service (CVE-2025-33071, 8.1) \u0438 SharePoint (CVE-2025-47172, 8.8)\n\nCVE-2025-32713 (7.8) \u2014 \u0435\u0449\u0451 \u043e\u0434\u043d\u0430 EoP \u0432 CLFS, \u043b\u044e\u0431\u0438\u043c\u0430\u044f \u0440\u0430\u043d\u0441\u043e\u043c\u0432\u0430\u0440\u0449\u0438\u043a\u0430\u043c\u0438. \n\n\u041e\u0441\u043e\u0431\u043d\u044f\u043a\u043e\u043c \u0441\u0442\u043e\u0438\u0442 \u043d\u043e\u0432\u044b\u0439 \u043e\u0431\u0445\u043e\u0434 Secure boot, CVE-2025-3052. \u041a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0432 \u043f\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u0431\u0430\u0437\u044b \u043e\u0442\u043e\u0437\u0432\u0430\u043d\u043d\u044b\u0445 \u043c\u043e\u0434\u0443\u043b\u0435\u0439 UEFI, \u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u0430\u0442\u0430\u043a\u0430 \u043f\u043e\u0437\u0438\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u0430\u044f. \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043e\u0431\u0440\u0430\u0437\u044b \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u044b \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u043c 2011 \u0433\u043e\u0434\u0430, \u0438\u0441\u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0441\u043a\u043e\u0440\u043e \u0441\u043e\u0437\u0434\u0430\u0441\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0434\u043b\u044f \u043f\u043e\u0436\u0438\u043b\u044b\u0445 \u043f\u0430\u0440\u043a\u043e\u0432 \u0442\u0435\u0445\u043d\u0438\u043a\u0438.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2025-06-11T07:01:39.000000Z"}, {"uuid": "fe303e91-af83-431e-abbd-7f94b0124f95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/itsec_news/5751", "content": "\u200b\u26a1\ufe0fPatch Tuesday: Microsoft \u0437\u0430\u043b\u0430\u0442\u0430\u043b\u0430 134 \u0434\u044b\u0440\u044b, \u043d\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u0443\u0436\u0435 \u0443\u0441\u043f\u0435\u043b\u0438 \u043f\u0440\u043e\u043b\u0435\u0437\u0442\u044c \u0432 \u043e\u0434\u043d\u0443\n\n\ud83d\udcac \u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Patch Tuesday \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Microsoft \u0437\u0430\u043a\u0440\u044b\u043b\u0430 134 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0434\u043d\u0443 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u043d\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0438\u0445 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0432\u0430\u0436\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0439 \u0438 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b.\n\n\u0418\u0437 \u043e\u0431\u0449\u0435\u0433\u043e \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 11 \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u044b \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043e\u043f\u0430\u0441\u043d\u044b\u043c\u0438, \u0438 \u0432\u0441\u0435 \u043e\u043d\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430. \u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0431\u0435\u0437 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0438\u0445 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f.\n\n\u0420\u0430\u0441\u043a\u043b\u0430\u0434 \u043f\u043e \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044f\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439: 49 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 9 \u2014 \u0441 \u043e\u0431\u0445\u043e\u0434\u043e\u043c \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 31 \u2014 \u0441 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430, 17 \u2014 \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 14 \u2014 \u0441 \u043e\u0442\u043a\u0430\u0437\u043e\u043c \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438 3 \u2014 \u0441 \u043f\u043e\u0434\u043c\u0435\u043d\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0445. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0432 \u0441\u043f\u0438\u0441\u043e\u043a \u043d\u0435 \u0432\u043e\u0448\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0440\u0430\u043d\u0435\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0435 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Microsoft Edge \u0438 \u041e\u0421 Mariner.\n\n\u041e\u0441\u043e\u0431\u043e\u0435 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c \u043f\u0430\u043a\u0435\u0442\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-29824 , \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0434\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u0431\u044b\u043b\u0430 \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043a\u0430\u043a zero-day . \u041e\u043d\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Common Log File System \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435. \u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 RansomEXX \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 \u0446\u0435\u043b\u044c\u044e \u0437\u0430\u0445\u0432\u0430\u0442\u0430 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0430\u0432.\n\nMicrosoft \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043a\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f Windows Server \u0438 Windows 11. \u0412\u0435\u0440\u0441\u0438\u0438 \u0434\u043b\u044f Windows 10 \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u0432 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0438 \u0431\u0443\u0434\u0443\u0442 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u043f\u043e\u0437\u0436\u0435. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u043f\u043e\u043e\u0431\u0435\u0449\u0430\u043b\u0430 \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u0442\u044c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0447\u0435\u0440\u0435\u0437 \u0440\u0435\u0432\u0438\u0437\u0438\u044e \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u043e \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u043e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 Microsoft Threat Intelligence Center, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043e\u043a \u0438 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0440\u0435\u0430\u0433\u0438\u0440\u0443\u044e\u0442 \u043d\u0430 \u0441\u043b\u0443\u0447\u0430\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 zero-day. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432, \u0438\u043c\u0435\u043d\u043d\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0438 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u043c\u043e\u0433\u043b\u0438 \u043b\u043e\u043a\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0443\u0433\u0440\u043e\u0437\u0443 \u0434\u043e \u0435\u0451 \u0448\u0438\u0440\u043e\u043a\u043e\u0433\u043e \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, Microsoft \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f KB5055523 \u0438 KB5055528 \u0434\u043b\u044f Windows 11 \u0438 KB5055518 \u0434\u043b\u044f Windows 10, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u044f \u0441\u0442\u0430\u0431\u0438\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u041e\u0434\u043d\u0430\u043a\u043e \u043e\u043d\u0438 \u043d\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u044e\u0442\u0441\u044f \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u043e.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Windows \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0442\u0435\u043c, \u043a\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 Windows 11 \u0438\u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0435 \u0440\u0435\u0434\u0430\u043a\u0446\u0438\u0438 \u041e\u0421. \u0412 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445 \u0440\u043e\u0441\u0442\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u044c\u0449\u0438\u043a\u043e\u0432 \u0438 \u0430\u0442\u0430\u043a, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0441\u044f \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u043c \u0444\u0430\u043a\u0442\u043e\u0440\u043e\u043c \u043a\u0438\u0431\u0435\u0440\u0443\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-09T08:46:32.000000Z"}, {"uuid": "f9d2eab2-c22c-448d-a681-2613c1eb8ed4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://t.me/kasperskyb2b/1694", "content": "\ud83d\udd2c \u0410\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u0438\u0439 Patch Tuesday: \u043b\u0443\u0447\u0448\u0435\u0435, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0432\u043f\u0435\u0440\u0435\u0434\u0438!\n\nMicrosoft \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432 134 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 (\u0438\u0437 \u043d\u0438\u0445 10 \u2014 \u0432 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445). \u041e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 ransomware, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0440\u0430\u043d\u0435\u0435 \u043d\u0435 \u0431\u044b\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b. \u041d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u043e\u0439 \u043d\u043e\u0432\u0438\u043d\u043a\u043e\u0439 \u044d\u0442\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u0441\u0442\u0430\u043b\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f Windows 11, \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0443\u043a\u0430\u0437\u0430\u043d\u043e, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows 10 \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u00ab\u043f\u043e\u0437\u0436\u0435\u00bb.  \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Microsoft \u0434\u0430\u043b\u0430 \u0434\u043b\u044f \u043c\u043d\u043e\u0433\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043e\u0446\u0435\u043d\u043a\u0443 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u043e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u0430 CVSS3.1. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u043e\u043b\u044c\u0448\u0435 \u0447\u0435\u043c \u0432 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445 \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430\u0445 \u0441\u0434\u0435\u043b\u0430\u043d\u0430 \u043f\u043e\u043f\u0440\u0430\u0432\u043a\u0430 \u043d\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043b\u0438\u0448\u044c 11 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043e\u0446\u0435\u043d\u043a\u0443 critical, 2 \u2014 low, \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u2014 important. 49 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 31 \u2014 \u043a RCE, 17 \u2014 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 14 \u2014 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438, 9 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 3 \u2014  spoofing.\n\n\n\u0417\u0438\u0440\u043e\u0434\u0435\u0439 \u043d\u0430 \u0441\u043b\u0443\u0436\u0431\u0435 RansomEXX\nCVE-2025-29824 (7.8) \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 use after free \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e system.  \n\u0414\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0441\u0430\u043c\u043e\u0439 Microsoft \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 RansomEXX/Storm-2460, \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044f \u043d\u0430 \u043f\u043e\u0440\u0430\u0436\u0451\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0431\u044d\u043a\u0434\u043e\u0440 PipeMagic \u0438 \u043f\u043e\u0432\u044b\u0448\u0430\u044f \u0435\u0433\u043e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u0412\u043f\u0440\u043e\u0447\u0435\u043c, \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0432\u0438\u0434\u0438\u0442 \u043d\u0435\u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0446\u0435\u043b\u0435\u0432\u044b\u0435 \u0430\u0442\u0430\u043a\u0438. \u041c\u044b \u043f\u0438\u0441\u0430\u043b\u0438 \u043e\u0431 \u044d\u0442\u043e\u043c \u0412\u041f\u041e \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u0433\u043e\u0434\u0443, \u0430\u0442\u0430\u043a\u0438 \u0441 \u0435\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0438\u043c\u0435\u043b\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0432\u043e\u043b\u043d \u0432 \u0440\u0430\u0437\u043d\u044b\u0445 \u0441\u0442\u0440\u0430\u043d\u0430\u0445. \u0421\u0430\u043c\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f CLFS \u0438\u043c\u0435\u043d\u043d\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 \u2014 \u0445\u043e\u0440\u043e\u0448\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043d\u0430\u043c\u0438 \u0444\u0435\u043d\u043e\u043c\u0435\u043d, \u043c\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 5 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u043d\u0438\u0445 \u0432 Microsoft.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\u0425\u043e\u0442\u044f \u0443 \u043c\u043d\u043e\u0433\u0438\u0445 \u043e\u043f\u0430\u0441\u043d\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0449\u0438\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432 \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u043e\u0446\u0435\u043d\u0438\u043b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u043a\u0430\u043a \u043c\u0435\u043d\u0435\u0435 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u0443\u044e \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0431\u0435\u0434\u0438\u0442\u044c \u0432 \u0433\u043e\u043d\u043a\u0435 (race condition), \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0438 \u0441\u0435\u0440\u0432\u0438\u0441\u044b \u0438\u043b\u0438 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e.\nCVE-2025-26663/CVE-2025-26670 \u2014 RCE \u0432  Windows LDAP, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443. \nCVE-2025-29809 \u2014 \u0443\u0442\u0435\u0447\u043a\u0430 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 Kerberos \u0432 \u043e\u0431\u0445\u043e\u0434 Windows Defender Credential Guard. \u041a\u0440\u043e\u043c\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043f\u0430\u0442\u0447\u0430 \u043d\u0430\u0434\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u0438 \u0437\u0430\u043d\u043e\u0432\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438 VBS.\nCVE-2025-27480/CVE-2025-27482 \u2014 RCE \u0432 Remote Desktop Services, \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0434\u043e\u043b\u0436\u0435\u043d \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0438\u0442\u044c\u0441\u044f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u0432 \u0440\u043e\u043b\u0438 \u0448\u043b\u044e\u0437\u0430 Remote Desktop.\nCVE-2025-27740 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Active Directory Certificate Services, \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0430. \nCVE-2025-26686 \u2014 RCE TCP/IP. \u0416\u0435\u0440\u0442\u0432\u0430 \u0434\u043e\u043b\u0436\u043d\u0430 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u0441 \u043d\u0430 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 DHCPv6, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u0432 \u043e\u0442\u0432\u0435\u0442. \nCVE-2025-27752 / CVE-2025-29791 \u2014 RCE \u0432 Excel, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u0411\u043e\u043d\u0443\u0441\u043e\u043c \u2014 CVE-2025-27745, -27748, -27749, \u0432\u0441\u0435 \u0432 Office \u0431\u0435\u0437 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432, \u0442\u043e\u0436\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440.\n\n#\u043f\u0430\u0442\u0447\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2025-04-09T09:10:24.000000Z"}, {"uuid": "85bd5e1d-ea56-487c-bef6-8084e72f8b56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29827", "type": "seen", "source": "https://t.me/cvedetector/24878", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29827 - Azure Automation Unprivileged Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2025-29827 \nPublished : May 8, 2025, 11:15 p.m. | 27\u00a0minutes ago \nDescription : Improper Authorization in Azure Automation allows an authorized attacker to elevate privileges over a network. \nSeverity: 9.9 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-09T01:59:32.000000Z"}, {"uuid": "246be95e-8622-493a-8754-65232bb38dd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29822", "type": "seen", "source": "https://t.me/cvedetector/22508", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29822 - Microsoft Office OneNote Input Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-29822 \nPublished : April 8, 2025, 6:16 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : Incomplete list of disallowed inputs in Microsoft Office OneNote allows an unauthorized attacker to bypass a security feature locally. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:32.000000Z"}, {"uuid": "435581b2-f9a9-484f-8018-3a4070647ddc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://t.me/cvedetector/22510", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29824 - Windows Common Log File System Driver Use-After-Free Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29824 \nPublished : April 8, 2025, 6:16 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : Use after free in Windows Common Log File System Driver allows an authorized attacker to elevate privileges locally. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:33.000000Z"}, {"uuid": "bf9b191e-8bd7-44dc-8909-357829fa2c41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29823", "type": "seen", "source": "https://t.me/cvedetector/22509", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29823 - Microsoft Office Excel Use-After-Free Vulnerability Allows Local Code Execution\", \n  \"Content\": \"CVE ID : CVE-2025-29823 \nPublished : April 8, 2025, 6:16 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally. \nSeverity: 7.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Apr 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-04-08T22:22:33.000000Z"}, {"uuid": "2e9af2a0-dff1-46ba-9d0c-790c00742a5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/12530", "content": "Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization \u2013 thehackernews.com\n\nWed, 07 May 2025 18:44:00", "creation_timestamp": "2025-05-07T14:04:13.000000Z"}, {"uuid": "fb132363-39c5-4219-8e22-e1a92c3185cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/CyberBulletin/3216", "content": "\u26a1\ufe0fPlay Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization.\n\n#CyberBulletin", "creation_timestamp": "2025-05-07T17:24:42.000000Z"}, {"uuid": "7887de68-f18c-4345-9b49-cdf945821e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/CyberBulletin/3215", "content": "\u26a1\ufe0fZero-Day CLFS Vulnerability (CVE-2025-29824) Exploited in Ransomware Attacks.\n\n#CyberBulletin", "creation_timestamp": "2025-05-07T17:24:08.000000Z"}, {"uuid": "bb4b0b28-34a2-4860-a0d0-b24215a1f163", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/ton618cyber/3488", "content": "Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability\n\nMicrosoft patched 126 vulnerabilities including actively exploited CVE-2025-29824, leaving Windows 10 users exposed.\n\nThe Hacker News | thehackernews.com \u2022 Apr 9, 2025", "creation_timestamp": "2025-04-09T10:23:02.000000Z"}, {"uuid": "b3bad75d-24ad-444d-abd8-dee3ee77b9de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/ton618cyber/3489", "content": "PipeMagic Trojan Exploits Windows CLFS Zero-Day Vulnerability to Deploy Ransomware\n\nWindows zero-day CVE-2025-29824 exploited via PipeMagic malware escalated SYSTEM privileges, leading to targeted ransomware attacks.\n\nThe Hacker News | thehackernews.com \u2022 Apr 9, 2025", "creation_timestamp": "2025-04-09T10:23:02.000000Z"}, {"uuid": "21cbd1b4-f88f-43fc-bdc0-cf67a9c582aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/ton618cyber/8784", "content": "PipeMagic Trojan Exploits Windows CLFS Zero-Day Vulnerability to Deploy Ransomware\n\nWindows zero-day CVE-2025-29824 exploited via PipeMagic malware escalated SYSTEM privileges, leading to targeted ransomware attacks.\n\nThe Hacker News | thehackernews.com \u2022 Apr 9, 2025", "creation_timestamp": "2025-04-09T10:23:02.000000Z"}, {"uuid": "1a999cfa-56b3-4f60-81f1-35c919ef0dbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/ton618cyber/8783", "content": "Microsoft Patches 126 Flaws Including Actively Exploited Windows CLFS Vulnerability\n\nMicrosoft patched 126 vulnerabilities including actively exploited CVE-2025-29824, leaving Windows 10 users exposed.\n\nThe Hacker News | thehackernews.com \u2022 Apr 9, 2025", "creation_timestamp": "2025-04-09T10:23:02.000000Z"}, {"uuid": "210a8bec-317f-43d0-aa2c-13247443258e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/cibsecurity/84607", "content": "\ud83d\udd8b\ufe0f Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization \ud83d\udd8b\ufe0f\n\nThreat actors with links to the Play ransomware family exploited a recently patched security flaw in Microsoft Windows as a zeroday as part of an attack targeting an unnamed organization in the United States. The attack, per the Symantec Threat Hunter Team, part of Broadcom, leveraged CVE202529824, a privilege escalation flaw in the Common Log File System CLFS driver. It was patched by.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-05-07T16:35:22.000000Z"}, {"uuid": "f8605317-4b6c-483d-aca5-aead3c6607ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://t.me/ViralCyber/12219", "content": "\ud83d\udd34 \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a Patch Tuesday \u062e\u0648\u062f\u0634 \u0631\u0648 \u0628\u0631\u0627\u06cc \u0622\u0648\u0631\u06cc\u0644 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647 \u0648 \u062f\u0631 \u0627\u0648\u0646 121 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0631\u0648 \u062f\u0631 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0645\u062e\u062a\u0644\u0641\u0634 \u0627\u0635\u0644\u0627\u062d \u06a9\u0631\u062f\u0647. (\u062a\u0635\u0648\u06cc\u0631 \u0627\u0632 \u0633\u0627\u06cc\u062a Patchapalooza \u06af\u0631\u0641\u062a\u0647 \u0634\u062f\u0647.)\n\n\u0628\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc\u0647\u0627\u060c \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc 0Day \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2025-29824 \u0627\u0635\u0644\u0627\u062d \u0634\u062f\u0647 \u06a9\u0647 \u0627\u0645\u062a\u06cc\u0627\u0632 7.8 \u062f\u0627\u0631\u0647 \u0648 \u0627\u0632 \u0646\u0648\u0639 Use After Free \u0647\u0633\u062a\u0634 \u0648 \u0627\u0645\u06a9\u0627\u0646 \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u062a\u06cc\u0627\u0632 \u0628\u0647 SYSTEM \u0631\u0648 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u062f\u0647 \u0648 \u062f\u0631 \u062f\u0631\u0627\u06cc\u0648\u0631 Common Log File System (CLFS) \u0647\u0633\u062a\u0634.\n\n#\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a #\u0648\u06cc\u0646\u062f\u0648\u0632 #\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc_\u0627\u0645\u0646\u06cc\u062a\u06cc \n#Microsoft #CVE #0day #PatchTuesday\n\n\ud83c\udd94 @onhex_ir\n\u27a1\ufe0f ALL Link", "creation_timestamp": "2025-04-12T10:35:16.000000Z"}, {"uuid": "ff54ab2d-edd2-4482-b4f9-ba33bf6d7061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/3933", "content": "Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization \u2013 thehackernews.com\n\nWed, 07 May 2025 18:44:00", "creation_timestamp": "2025-05-07T14:04:13.000000Z"}, {"uuid": "a312787d-5e2b-4a84-95f3-8c4b16b944b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "Telegram/fuq5-ZKTXXl0RByyIaXpkbN_jP29surQQ5HOV2UBFalqYQ", "content": "", "creation_timestamp": "2025-04-10T21:48:20.000000Z"}, {"uuid": "11098e26-4e70-44f7-a683-fd73a9a2ed2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "Telegram/ZJgRIc20Wp1ZKO2MqrR906iN_cSPtuCxzf-eOrG9dv5_Ww", "content": "", "creation_timestamp": "2025-05-07T15:14:23.000000Z"}, {"uuid": "85171984-52fe-4434-a93f-f2c5996ecc13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/TengkorakCyberCrewzz/30719", "content": "Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization \u2013 thehackernews.com\n\nWed, 07 May 2025 18:44:00", "creation_timestamp": "2025-05-07T14:04:13.000000Z"}, {"uuid": "621287f2-73d6-402b-a982-afdfb0d52034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "Telegram/e_rrR7ym_LOknB8Gus94Ce6Cmw5DTi8sdkARLt1XxlDv4Vc", "content": "", "creation_timestamp": "2025-04-10T06:04:03.000000Z"}, {"uuid": "e748f7ce-ec76-4d03-984f-49fe53226ee3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/true_secator/7032", "content": "Microsoft \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u043c\u0430\u0439\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f PatchTuesday \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 78 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\u00a0\u0432\u043e \u0432\u0441\u0435\u0439 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 5 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n11 \u0438\u0437 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c, 66 - \u043a \u0432\u0430\u0436\u043d\u044b\u043c \u0438 \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438. 28 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE , 21 - EoP, \u0430 16 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438. \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0421\u0440\u0435\u0434\u0438 \u043d\u0443\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445:\n\n- CVE-2025-30397\u00a0(CVSS: 7,5): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 Scripting Engine;\n\n\u0412 Action1 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443 \u0438\u043b\u0438 \u0441\u043a\u0440\u0438\u043f\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u044b\u0439 \u0434\u0432\u0438\u0436\u043e\u043a \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0438\u043f\u044b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 RCE \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\u0415\u0441\u043b\u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0435\u0441\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438.\n\n- CVE-2025-30400\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Microsoft Desktop Window Manager (DWM), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\nCVE-2025-30400 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 DWM Core Library, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2023 \u0433\u043e\u0434\u0430. \n\n\u0413\u043e\u0434 \u043d\u0430\u0437\u0430\u0434 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2024-30051, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e QakBot (Qwaking Mantis).\n\n\u0413\u043e\u0434\u043e\u043c \u0440\u0430\u043d\u0435\u0435 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c CVE-2023-36033.\n\n- CVE-2025-32701\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043e\u0431\u0449\u0435\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u0430 Windows (CLFS), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n- CVE-2025-32706\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Common Log, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n\u041e\u0431\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0434\u044c\u043c\u0443\u044e \u0438 \u0432\u043e\u0441\u044c\u043c\u0443\u044e EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 2022 \u0433\u043e\u0434\u0430.\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043c\u0435\u0441\u044f\u0446 \u043d\u0430\u0437\u0430\u0434 \u0434\u0440\u0443\u0433\u0430\u044f CVE-2025-29824 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0421\u0428\u0410, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438 \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0431\u0430\u043d\u0434\u043e\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Play.\n\n- CVE-2025-32709\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Windows \u0434\u043b\u044f WinSock, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP.\n\n\u0410\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e, CVE-2025-32709 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Ancillary Function Driver for WinSock, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 CVE-2024-38193 (\u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b Lazarus) \u0438 CVE-2025-21418.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0435\u0440\u0432\u044b\u0445 \u0442\u0440\u0435\u0445 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Microsoft, CVE-2025-32706 - \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Google Threat Intelligence Group \u0438 CrowdStrike Advanced Research Team, \u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f - \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e.\n\n\u041d\u043e\u0432\u044b\u0439 Patch Tuesday \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f EoP-\u043e\u0448\u0438\u0431\u043a\u0438 \u0432 Microsoft Defender \u0434\u043b\u044f Endpoint \u0434\u043b\u044f Linux (CVE-2025-26684, CVSS: 6,7), \u043a\u043e\u0442\u043e\u0440\u0430\u044f  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438. \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Stratascale.\n\n\u0414\u0440\u0443\u0433\u0438\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0437\u0432\u0430\u0442\u044c CVE-2025-26685 (CVSS: 6,5) \u0432 Microsoft Defender for Identity, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u0441\u0435\u0434\u043d\u044e\u044e \u0441\u0435\u0442\u044c.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043d\u0435\u043b\u044c\u0437\u044f \u043d\u0435 \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044c \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 CVSS: 10,0 - CVE-2025-29813, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a EoP \u0432 Azure DevOps Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u043e \u0441\u0435\u0442\u0438.\n\nMicrosoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a, \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f.", "creation_timestamp": "2025-05-14T19:14:33.000000Z"}, {"uuid": "b8684c82-428a-401e-90e4-38538dd7156a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/true_secator/6927", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u0438\u0439 PatchTuesday \u043e\u0442 Microsoft \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 134 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0441\u043a\u0443\u043f\u0443\u044e \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u0443\u044e 0-day.\n\n\u0412 \u044d\u0442\u043e\u043c \u043f\u0430\u043a\u0435\u0442\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0437\u0430\u043a\u0440\u044b\u0442\u043e \u043e\u0434\u0438\u043d\u043d\u0430\u0434\u0446\u0430\u0442\u044c \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u0441\u0435 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 RCE, \u0430 \u0432 \u0446\u0435\u043b\u043e\u043c \u043f\u043e \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044f\u043c: 49 - EoP, 9 - \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 31 - RCE, 17 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 14 - DoS \u0438 3 - \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0430.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043d\u0438\u0445 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Mariner \u0438 13 - \u0432 Microsoft Edge.\n\n\u0415\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 0-day \u0432 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u043c PatchTuesday \u0441\u0442\u0430\u043b\u0430 CVE-2025-29824 - \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Common Log.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Microsoft, CVE-2025-29824 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441 \u043d\u0438\u0437\u043a\u0438\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c SYSTEM \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0435\u0439\u0447\u0430\u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u0434\u043b\u044f Windows Server \u0438 Windows 11, \u0430 \u0434\u043b\u044f Windows 10 Microsoft \u0432\u044b\u0439\u0434\u0443\u0442 \u043f\u043e\u0437\u0436\u0435.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0430\u0441\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439 \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u0434\u0430\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0431\u0430\u043d\u0434\u043e\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 RansomEXX, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043e\u043d\u0430 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u043a\u0430\u043a Storm-2460.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0426\u0435\u043d\u0442\u0440\u0443 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0443\u0433\u0440\u043e\u0437 Microsoft.\n\n\u0421\u043d\u0430\u0447\u0430\u043b\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e PipeMagic backdoor \u043d\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u043e\u0441\u044c \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 CVE-2025-29824, \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0437\u0430\u043f\u0438\u0441\u043e\u043a \u043e \u0432\u044b\u043a\u0443\u043f\u0435 !_READ_ME_REXX2_!.txt \u043f\u043e\u0441\u043b\u0435 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432.\n\n\u0426\u0435\u043b\u044f\u043c\u0438 \u0430\u0442\u0430\u043a \u0441\u0442\u0430\u043b\u0438 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0439 \u0438 \u043d\u0435\u0434\u0432\u0438\u0436\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0421\u0428\u0410, \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0439 \u0441\u0435\u043a\u0442\u043e\u0440 \u0432 \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0435, \u0438\u0441\u043f\u0430\u043d\u0441\u043a\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f-\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a \u041f\u041e \u0438 \u0441\u0435\u043a\u0442\u043e\u0440 \u0440\u043e\u0437\u043d\u0438\u0447\u043d\u043e\u0439 \u0442\u043e\u0440\u0433\u043e\u0432\u043b\u0438 \u0432 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438.\n\n\u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f ESET \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0441 \u043c\u0430\u0440\u0442\u0430 2023 \u0433\u043e\u0434\u0430 PipeMagic \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 0-day \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u044f\u0434\u0440\u0430 Windows Win32 (CVE-2025-24983).\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0435\u0439 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0432 2022 \u0433\u043e\u0434\u0443 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u041f\u041e \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u0441\u043e\u0431\u0438\u0440\u0430\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0434\u043b\u044f \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f.\n\n\u0412 2023 \u0433\u043e\u0434\u0443 \u041b\u041a \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0430 \u044d\u0442\u043e\u0442 \u0431\u044d\u043a\u0434\u043e\u0440 \u043f\u0440\u0438 \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0438\u00a0\u0430\u0442\u0430\u043a \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f Nokoyawa.\n\n\u0412 \u044d\u0442\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0434\u0440\u0443\u0433\u043e\u0439 \u043d\u043e\u043b\u044c \u0432 Windows Common Log File System Driver, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0443\u044e \u043a\u0430\u043a CVE-2023-28252.\n\n\u041f\u043e\u043b\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442, - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2025-04-09T15:00:08.000000Z"}, {"uuid": "18a44afd-af5f-4724-9a52-3e8d1a8fafa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/ctinow/234958", "content": "Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization\nhttps://ift.tt/IHiT421", "creation_timestamp": "2025-05-07T12:59:56.000000Z"}, {"uuid": "3ceeddc8-1f7a-4acb-b93f-c1f132e4a01d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/thehackernews/6786", "content": "\ud83d\udea8 A U.S. org was hit by Play ransomware using CVE-2025-29824 before it was patched. Attackers slipped in via a Cisco ASA, dropped fake Palo Alto files, stole AD data, and planted custom tools \u2014 but didn\u2019t launch ransomware.\n\n\ud83d\udd17 Read: https://thehackernews.com/2025/05/play-ransomware-exploited-windows-cve.html", "creation_timestamp": "2025-05-07T12:47:28.000000Z"}, {"uuid": "88fa4936-e400-40ba-920d-c0c168d2038b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "published-proof-of-concept", "source": "https://t.me/jj_8tl/212", "content": "CVE-2025-29824 Zero Day PipeMagic Detection.kql\n\nhttps://t.co/W4p7JVt0Nz\n\nhttps://t.co/OQEV0rewSw\n\n\u2728 Shared via Awham AutoFeed \u2728\nChannel: @jj_8tl", "creation_timestamp": "2025-04-11T12:09:09.000000Z"}, {"uuid": "508ec4f1-efb0-4306-823e-a087d2db78f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/thehackernews/6635", "content": "Microsoft\u2019s April update patches 126 flaws\u2014but CVE-2025-29824, already exploited in ransomware attacks, has no fix for Windows 10.\n\n\ud83d\udd17 More details: https://thehackernews.com/2025/04/microsoft-patches-126-flaws-including.html\n\nCISA demands federal agencies patch by April 29.", "creation_timestamp": "2025-04-09T09:10:22.000000Z"}, {"uuid": "8f0b37b4-2160-4337-8de8-b36f7645db4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/thehackernews/6636", "content": "\ud83d\udea8 New Windows zero-day (CVE-2025-29824) exploited in ransomware attacks!\n\n\u26a1 Attackers used PipeMagic malware, hidden in MSBuild files, and hijacked legit sites to spread payloads. Linked to RansomEXX gang.\n\nFull report \ud83d\udc49 https://thehackernews.com/2025/04/pipemagic-trojan-exploits-windows-clfs.html\n\n\ud83d\udd12 Patch ASAP if you haven't!", "creation_timestamp": "2025-04-09T10:07:25.000000Z"}, {"uuid": "3edea058-cd67-45c4-b413-c965bacdfd0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "seen", "source": "https://t.me/sysodmins/26658", "content": "\ud83c\udfb9 PipeMagic \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u0435\u0442\u0441\u044f: \u043d\u043e\u0432\u044b\u0439 \u0432\u0438\u0442\u043e\u043a \u0430\u0442\u0430\u043a \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Windows\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u043d\u043e\u0432\u043e\u0439 \u0432\u043e\u043b\u043d\u0435 \u0430\u0442\u0430\u043a \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u044d\u043a\u0434\u043e\u0440\u0430 PipeMagic. \u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u044b\u0439 \u0432 2022 \u0433\u043e\u0434\u0443, \u044d\u0442\u043e\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u043e\u043d\u0438\u0440\u0443\u0435\u0442: \u043e\u043d \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0441\u043f\u043e\u0441\u043e\u0431\u0435\u043d \u043a\u0440\u0430\u0441\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435, \u0434\u0430\u0432\u0430\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u043d\u044b\u0439 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f, \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043a\u0430\u043a \u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0441\u043e\u0444\u0442 \u0434\u043b\u044f \u0431\u043e\u043a\u043e\u0432\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0432 \u0441\u0435\u0442\u044f\u0445.\n\n\u0412 \u043f\u0440\u043e\u0448\u043b\u044b\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f\u0445 PipeMagic \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u043c Nokoyawa, \u0433\u0434\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 Windows Common Log (CVE-2023-28252). \u0412 2024 \u0433\u043e\u0434\u0443 \u0430\u0442\u0430\u043a\u0438 \u0431\u044b\u043b\u0438 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438, \u0430 \u0442\u0435\u043f\u0435\u0440\u044c \u0433\u0435\u043e\u0433\u0440\u0430\u0444\u0438\u044f \u0440\u0430\u0441\u0448\u0438\u0440\u0438\u043b\u0430\u0441\u044c \u2014 \u043f\u043e\u0434 \u0443\u0434\u0430\u0440 \u043f\u043e\u043f\u0430\u043b\u0438 \u0438 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0411\u0440\u0430\u0437\u0438\u043b\u0438\u0438.\n\n\u0422\u0435\u043a\u0443\u0449\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0435\u0439 \u0441\u0432\u0435\u0436\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2025-29824 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 clfs.sys, \u043a\u043e\u0442\u043e\u0440\u0443\u044e Microsoft \u0437\u0430\u043a\u0440\u044b\u043b\u0430 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 2025 \u0433\u043e\u0434\u0430. \u042d\u0442\u0430 \u0431\u0440\u0435\u0448\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u043f\u043e\u0434\u043d\u0438\u043c\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430, \u0432\u043e\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u0447\u0451\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b. \u0412 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0434\u0430\u0436\u0435 \u0438\u043d\u0434\u0435\u043a\u0441\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0441\u043f\u0440\u0430\u0432\u043a\u0438 Microsoft \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0448\u0435\u043b\u043b-\u043a\u043e\u0434\u0430.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 PipeMagic \u0432\u043d\u0435\u0441\u043b\u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u0434, \u0443\u0441\u0438\u043b\u0438\u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0432 \u0441\u0435\u0442\u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u0438 \u0443\u043f\u0440\u043e\u0441\u0442\u0438\u0432 \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0435 \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u0435. \u0414\u0440\u0430\u0439\u0432\u0435\u0440 clfs.sys \u0443\u0436\u0435 \u043d\u0435 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0441\u044f \u0446\u0435\u043b\u044c\u044e \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u043e\u0432: \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0434\u043b\u044f \u043d\u0435\u0433\u043e \u0432\u0441\u0451 \u0447\u0430\u0449\u0435 \u0444\u0438\u0433\u0443\u0440\u0438\u0440\u0443\u044e\u0442 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0433\u0434\u0435 \u043d\u0430 \u043a\u043e\u043d\u0443 \u0441\u0442\u043e\u0438\u0442 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u0430\u044f \u0432\u044b\u0433\u043e\u0434\u0430.\n\n\ud83d\udccc \u0424\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 PipeMagic \u0437\u0430\u043a\u0440\u0435\u043f\u0438\u043b\u0441\u044f \u043a\u0430\u043a \u00ab\u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0430\u043b\u044c\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u00bb \u0434\u043b\u044f APT-\u0433\u0440\u0443\u043f\u043f: \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0442\u043e\u0447\u0435\u0447\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u0432 \u0410\u0437\u0438\u0438, \u0442\u0435\u043f\u0435\u0440\u044c \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0438 \u0430\u0434\u0430\u043f\u0442\u0430\u0446\u0438\u044f \u043f\u043e\u0434 \u043d\u043e\u0432\u044b\u0435 \u0440\u0435\u0433\u0438\u043e\u043d\u044b \u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0422\u0438\u043f\u0438\u0447\u043d\u044b\u0439 \ud83e\udd78 \u0421\u0438\u0441\u0430\u0434\u043c\u0438\u043d", "creation_timestamp": "2025-08-20T04:36:41.000000Z"}, {"uuid": "906e53e0-71b8-4d2c-bf79-85553c1de8a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/SecLabNews/16422", "content": "\u26a0\ufe0f \u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Windows: \u0433\u0440\u0443\u043f\u043f\u0430 RansomEXX \u0430\u0442\u0430\u043a\u0443\u0435\u0442 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443\n\n\ud83d\uded1 \u0425\u0430\u043a\u0435\u0440\u044b \u0438\u0437 RansomEXX \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Windows, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0430\u0432\u0430 SYSTEM \u0431\u0435\u0437 \u0443\u0447\u0430\u0441\u0442\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\ud83c\udf10 \u0410\u0442\u0430\u043a\u0430\u043c \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0438\u0441\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0421\u0428\u0410, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438 \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438, \u043f\u0440\u0438\u0447\u0451\u043c \u043f\u0430\u0442\u0447\u0438 \u0434\u043b\u044f \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 Windows 10 \u043f\u043e\u043a\u0430 \u043e\u0442\u043b\u043e\u0436\u0435\u043d\u044b.\n\n\ud83d\udd10 \u041f\u043e\u0441\u043b\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 PipeMagic \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u043d\u0435\u0434\u0440\u044f\u044e\u0442 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 CVE-2025-29824, \u0448\u0438\u0444\u0440\u0443\u044e\u0442 \u0444\u0430\u0439\u043b\u044b \u0438 \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0437\u0430\u043f\u0438\u0441\u043a\u0438 \u0441 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0432\u044b\u043a\u0443\u043f\u0430.\n\n#ransomware #windows #zeroday #cybersecurity @ZerodayAlert", "creation_timestamp": "2025-04-09T06:59:20.000000Z"}, {"uuid": "58a8c025-23e7-4b91-b3d0-ac4b49dae9c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29824", "type": "exploited", "source": "https://t.me/CybNux/7927", "content": "\ud83d\udea8 \u062a\u0639\u0631\u0636\u062a \u0645\u0646\u0638\u0645\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0644\u0647\u062c\u0648\u0645 \u0628\u0648\u0627\u0633\u0637\u0629 Play ransomware (\u0628\u0631\u0645\u062c\u064a\u0629 \u0627\u0644\u0641\u062f\u064a\u0629 Play) \u0645\u0633\u062a\u063a\u0644\u0651\u0629 \u0627\u0644\u062b\u063a\u0631\u0629 CVE-2025-29824 \u0642\u0628\u0644 \u0623\u0646 \u064a\u062a\u0645 \u062a\u0635\u062d\u064a\u062d\u0647\u0627. \u062a\u0633\u0644\u0644 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0639\u0628\u0631 \u062c\u0647\u0627\u0632 Cisco ASA (\u062c\u062f\u0627\u0631 \u062d\u0645\u0627\u064a\u0629 \u0645\u0646 \u0633\u064a\u0633\u0643\u0648)\u060c \u0648\u0623\u0633\u0642\u0637\u0648\u0627 \u0645\u0644\u0641\u0627\u062a \u0645\u0632\u064a\u0641\u0629 \u062a\u0628\u062f\u0648 \u0648\u0643\u0623\u0646\u0647\u0627 \u062a\u0627\u0628\u0639\u0629 \u0644\u0640 Palo Alto (\u0634\u0631\u0643\u0629 \u0623\u0645\u0646 \u0633\u064a\u0628\u0631\u0627\u0646\u064a)\u060c \u0648\u0633\u0631\u0642\u0648\u0627 \u0628\u064a\u0627\u0646\u0627\u062a AD (Active Directory - \u0627\u0644\u062f\u0644\u064a\u0644 \u0627\u0644\u0646\u0634\u0637)\u060c \u0648\u0632\u0631\u0639\u0648\u0627 \u0623\u062f\u0648\u0627\u062a \u0645\u062e\u0635\u0635\u0629 \u2014 \u0644\u0643\u0646\u0647\u0645 \u0644\u0645 \u064a\u0637\u0644\u0642\u0648\u0627 \u0647\u062c\u0648\u0645 \u0627\u0644\u0641\u062f\u064a\u0629.", "creation_timestamp": "2025-05-07T13:59:52.000000Z"}, {"uuid": "d4daaf29-21f4-4937-968e-cd7954431604", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-29825", "type": "seen", "source": "https://t.me/cvedetector/24303", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-29825 - Microsoft Edge (Chromium-based) UI Spoofing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-29825 \nPublished : May 2, 2025, 2:15 a.m. | 33\u00a0minutes ago \nDescription : User interface (ui) misrepresentation of critical information in Microsoft Edge (Chromium-based) allows an unauthorized attacker to perform spoofing over a network. \nSeverity: 6.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"02 May 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-05-02T05:04:04.000000Z"}]}