{"vulnerability": "CVE-2025-30400", "sightings": [{"uuid": "3ba4235e-90af-4aa2-8d1c-7e693dae3ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/arcanasphere.com/post/3lrbwxe7m7k2i", "content": "", "creation_timestamp": "2025-06-10T22:29:27.765843Z"}, {"uuid": "fc4a771e-5fd5-4742-a00c-46bfcd1c0134", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/arcanasphere.com/post/3lrbwxe7vy22i", "content": "", "creation_timestamp": "2025-06-10T22:29:28.260337Z"}, {"uuid": "8c1119e8-06a3-4771-a645-a3f8351b662e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lp33pblhtd2t", "content": "", "creation_timestamp": "2025-05-13T18:15:23.246134Z"}, {"uuid": "616eeab3-2376-4002-9e3e-bb5ad497db91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114501996508548171", "content": "", "creation_timestamp": "2025-05-13T18:43:32.639819Z"}, {"uuid": "9a3f745b-05e9-4e92-a17f-2953a2a7b866", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3998079", "content": "", "creation_timestamp": "2025-05-13T20:19:05.771957Z"}, {"uuid": "fa3e308a-1d09-4d2d-b79a-708859238d50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/pigondrugs.bsky.social/post/3lp3h4mriyd2e", "content": "", "creation_timestamp": "2025-05-13T21:39:42.998337Z"}, {"uuid": "791f99c9-2616-41ca-9764-db0d25efc71a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://www.thezdi.com/blog/2025/5/13/the-may-2025-security-update-review", "content": "", "creation_timestamp": "2025-05-13T16:27:02.000000Z"}, {"uuid": "546e4d40-684f-44dc-9411-f8c644427af8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lp5oqcs4rs2c", "content": "", "creation_timestamp": "2025-05-14T19:01:19.402597Z"}, {"uuid": "1863eb19-7188-45a3-94a3-a475d27406da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3lp4dxat7j224", "content": "", "creation_timestamp": "2025-05-14T06:15:41.541131Z"}, {"uuid": "5f0d8c97-52f8-4f84-93e2-1dc8554e5e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5rzt3zm227", "content": "", "creation_timestamp": "2025-05-14T20:00:20.923650Z"}, {"uuid": "bacd54d0-05ae-470b-80bf-c7d2e2191b9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/114501662977985052", "content": "", "creation_timestamp": "2025-05-13T17:19:20.572891Z"}, {"uuid": "cb3efc23-b5ca-488d-b37a-36dd282eb062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lp2ykdlqbjr2", "content": "", "creation_timestamp": "2025-05-13T17:34:18.878991Z"}, {"uuid": "09c2dad0-f6af-4ebd-92a2-63f9f4bdab17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lp5viniyp52l", "content": "", "creation_timestamp": "2025-05-14T21:02:18.846965Z"}, {"uuid": "2107c636-6b7a-4d2e-94ca-b80580f6b2fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5vjc4vds2u", "content": "", "creation_timestamp": "2025-05-14T21:02:44.027409Z"}, {"uuid": "446ce3e1-7acf-4f7d-b206-be6f2baa092b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lp5vx6e33k2u", "content": "", "creation_timestamp": "2025-05-14T21:10:30.264123Z"}, {"uuid": "f72f2f72-828b-44b2-bd78-8fdce590d6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1548", "content": "", "creation_timestamp": "2025-05-14T04:00:00.000000Z"}, {"uuid": "bdb081ed-0695-4458-9f34-61ca29a4906a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lpachp5bxs22", "content": "", "creation_timestamp": "2025-05-15T19:59:48.109212Z"}, {"uuid": "f0ccc695-b2b9-4643-bb62-882c32e34cea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-28T08:23:31.000000Z"}, {"uuid": "8922df80-5135-4928-a647-c39eca679d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3lp4ym4ismbq2", "content": "", "creation_timestamp": "2025-05-14T12:25:34.107286Z"}, {"uuid": "4550790f-9a95-4b8b-99dd-0993de8670de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://krebsonsecurity.com/2025/05/patch-tuesday-may-2025-edition/", "content": "", "creation_timestamp": "2025-05-14T09:57:48.000000Z"}, {"uuid": "df299c23-d712-475a-a932-dd31230e94fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-09-29T03:12:17.000000Z"}, {"uuid": "6f8723b1-664c-4888-b5e0-f052c73374c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2025-30400", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/73489433-e6c4-47e2-b54c-f0988d2857ae", "content": "", "creation_timestamp": "2026-02-02T12:26:01.813775Z"}, {"uuid": "d5eda011-97a6-4e6f-baca-8af838b3fd44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "exploited", "source": "https://t.me/CyberUnderworlds/8", "content": "\ud83c\udf11 @CyberUnderworlds | Echoes from the Digital Void \ud83c\udf11\nMay 28, 2025 \u2013 The digital battlefield never sleeps, and today\u2019s whispers bring fresh tales of chaos and cunning. Behold the latest from the cybersecurity abyss:\n\n\ud83c\udde8\ud83c\uddf3 Taiwan-China Cyber Tensions Escalate: China accuses Taiwan of targeting a tech firm with a cyberattack, while Taiwan calls it a disinformation ploy. A high-stakes shadow war unfolds in the East.\n\n\ud83e\udda0 DarkCloud Stealer Emerges: A new wave of DarkCloud Stealer malware targets government organizations, extracting sensitive data since January 2025. Chihuahua and Pentagon Stealers join the fray, lurking in the wild.\n\n\ud83c\udfe6 JPMorgan\u2019s SaaS Warning: CISO Pat Opet sounds the alarm on OAuth-based SaaS vulnerabilities, highlighting risks from fourth-party vendors. Implicit trust in app connections is a ticking time bomb.\n\n\ud83c\uddec\ud83c\udde7 UK Legal Aid Breach: Hackers infiltrate Britain\u2019s Legal Aid Agency, stealing personal data, including criminal records, since 2010. Addresses, IDs, and financial details are now in the wrong hands.\n\n\ud83d\udee1\ufe0f Pentesting Crisis: Pentera\u2019s 2025 State of Pentesting Report reveals only 14% of CISOs trust government support for cyber challenges, with 59% adopting solutions driven by cyber insurance demands.\n\n\u26a0\ufe0f Microsoft\u2019s Zero-Day Fixes: Five actively exploited zero-days (CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-32706, CVE-2025-32709) patched in May 2025, targeting Windows vulnerabilities. Act fast or fall prey.\n\n\ud83c\udf10 Fourth-Party Risk Looms: Trellix\u2019s April 2025 Cyberthreat Report warns of evolving attack chains exploiting supply chain weaknesses, targeting cybersecurity tools themselves to erode defenses from within.\n\n@CyberUnderworlds \u2013 #CyberUnderworlds", "creation_timestamp": "2025-05-28T09:48:56.000000Z"}, {"uuid": "2c8fd4f0-b13a-4431-9c9d-3b33297aa428", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16284", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30400\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C)\n\ud83d\udd39 Description: Use after free in Windows DWM allows an authorized attacker to elevate privileges locally.\n\ud83d\udccf Published: 2025-05-13T16:58:49.601Z\n\ud83d\udccf Modified: 2025-05-14T04:00:49.993Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-30400", "creation_timestamp": "2025-05-14T04:31:57.000000Z"}, {"uuid": "c01dcf04-0379-4bbc-8691-c3f2f08fa1be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://t.me/ViralCyber/13425", "content": "\u26a0\ufe0f\u0647\u0634\u062f\u0627\u0631 \u0627\u0645\u0646\u06cc\u062a\u06cc | \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u2013 \u0645\u0647 \u06f2\u06f0\u06f2\u06f5\n\u274c \u06f7\u06f5 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062c\u062f\u06cc\u062f\u060c \u06f5 \u0645\u0648\u0631\u062f \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0641\u0639\u0627\u0644\u060c \u0648 \u06f1\u06f2 \u0645\u0648\u0631\u062f \u00ab\u0628\u062d\u0631\u0627\u0646\u06cc\u00bb!\n\u26a0\ufe0f\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062f\u0631 Patch Tuesday \u0627\u06cc\u0646 \u0645\u0627\u0647\u060c \u0641\u0647\u0631\u0633\u062a\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f \u06a9\u0647 \u0627\u0645\u0646\u06cc\u062a \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u06a9\u0644\u06cc\u062f\u06cc \u0631\u0627 \u062a\u0647\u062f\u06cc\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\u2757\ufe0f\u2757\ufe0f \u06f5 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 Exploit \u0622\u0646\u0647\u0627 \u0647\u0645 \u0627\u06a9\u0646\u0648\u0646 \u062f\u0631 \u062d\u0627\u0644 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0633\u062a: \n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-30397 \u2013 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0644\u06cc\u0646\u06a9\u200c\u0647\u0627\u06cc \u0645\u062e\u0631\u0628 \u062f\u0631 IE mode (\u0645\u0631\u0648\u0631\u06af\u0631 Edge)\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32701 &amp; CVE-2025-32706 \u2013 \u0627\u0631\u062a\u0642\u0627\u0621 \u0633\u0637\u062d \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Windows Log File System\u060c \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\u0647\u0627\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32709 \u2013 \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u062c\u062f\u062f \u0627\u0632 WinSock \n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-30400 \u2013 \u0646\u0642\u0635 \u062e\u0637\u0631\u0646\u0627\u06a9 \u062f\u0631 DWM Core Library\u060c \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u062f\u0631 \u06a9\u0645\u067e\u06cc\u0646\u200c\u0647\u0627\u06cc \u0641\u06cc\u0634\u06cc\u0646\u06af \u0648 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\n\n\ud83d\udde3 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc\u200c\u0647\u0627\u06cc Public \u0634\u062f\u0647 (\u0646\u06cc\u0627\u0632 \u0628\u0647 \u0646\u0635\u0628 \u0633\u0631\u06cc\u0639 Patch):\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-26685 \u2013 \u062c\u0639\u0644 \u0647\u0648\u06cc\u062a \u062f\u0631 Microsoft Defender for Identity\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-32702 \u2013 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062f\u0631 Visual Studio\n\n\u2757\ufe0f\u2757\ufe0f \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc\u0647\u0627\u06cc \u0646\u0645\u0631\u0647 10 !\n\ud83d\udfe0\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2025-29813 \u2013 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0631\u062a\u0642\u0627\u0621 \u062f\u0633\u062a\u0631\u0633\u06cc \u062f\u0631 Azure DevOps\n\n\ud83d\udcce \u0644\u06cc\u0633\u062a \u06a9\u0627\u0645\u0644 CVE\u0647\u0627\n\n\u2709\ufe0f@PingChannel\n\u062e\u0628\u0631\u060c \u062a\u062d\u0644\u06cc\u0644\u060c \u0627\u0646\u062a\u0642\u0627\u062f - \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a\n\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b\ud83d\udd2b", "creation_timestamp": "2025-05-16T22:31:12.000000Z"}, {"uuid": "7fd36e35-99dd-43e1-8b8e-614cf799c6f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "exploited", "source": "https://t.me/true_secator/7032", "content": "Microsoft \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u043c\u0430\u0439\u0441\u043a\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f PatchTuesday \u0441 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 78 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439\u00a0\u0432\u043e \u0432\u0441\u0435\u0439 \u043b\u0438\u043d\u0435\u0439\u043a\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 5 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\n\n11 \u0438\u0437 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0442\u043d\u043e\u0441\u044f\u0442\u0441\u044f \u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c, 66 - \u043a \u0432\u0430\u0436\u043d\u044b\u043c \u0438 \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430 \u0438\u043c\u0435\u0435\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438. 28 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE , 21 - EoP, \u0430 16 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438. \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0421\u0440\u0435\u0434\u0438 \u043d\u0443\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445:\n\n- CVE-2025-30397\u00a0(CVSS: 7,5): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 Scripting Engine;\n\n\u0412 Action1 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0447\u0435\u0440\u0435\u0437 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0443\u044e \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0443 \u0438\u043b\u0438 \u0441\u043a\u0440\u0438\u043f\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u044b\u0439 \u0434\u0432\u0438\u0436\u043e\u043a \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0438\u043d\u0442\u0435\u0440\u043f\u0440\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0442\u0438\u043f\u044b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u0432, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 RCE \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f.\n\n\u0415\u0441\u043b\u0438 \u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0435\u0441\u0442\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0441\u043e \u0432\u0441\u0435\u043c\u0438 \u0432\u044b\u0442\u0435\u043a\u0430\u044e\u0449\u0438\u043c\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438.\n\n- CVE-2025-30400\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0430\u0437\u043e\u0432\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 Microsoft Desktop Window Manager (DWM), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\nCVE-2025-30400 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 DWM Core Library, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2023 \u0433\u043e\u0434\u0430. \n\n\u0413\u043e\u0434 \u043d\u0430\u0437\u0430\u0434 Microsoft \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2024-30051, \u043a\u043e\u0442\u043e\u0440\u0430\u044f, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e QakBot (Qwaking Mantis).\n\n\u0413\u043e\u0434\u043e\u043c \u0440\u0430\u043d\u0435\u0435 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c CVE-2023-36033.\n\n- CVE-2025-32701\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u043e\u0431\u0449\u0435\u0439 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u0430 Windows (CLFS), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n- CVE-2025-32706\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows Common Log, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP;\n\n\u041e\u0431\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0434\u044c\u043c\u0443\u044e \u0438 \u0432\u043e\u0441\u044c\u043c\u0443\u044e EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 CLFS \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 2022 \u0433\u043e\u0434\u0430.\n\n\u0411\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043c\u0435\u0441\u044f\u0446 \u043d\u0430\u0437\u0430\u0434 \u0434\u0440\u0443\u0433\u0430\u044f CVE-2025-29824 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0421\u0428\u0410, \u0412\u0435\u043d\u0435\u0441\u0443\u044d\u043b\u0435, \u0418\u0441\u043f\u0430\u043d\u0438\u0438 \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0431\u0430\u043d\u0434\u043e\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 Play.\n\n- CVE-2025-32709\u00a0(CVSS: 7,8): \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0430 \u0432\u0441\u043f\u043e\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 Windows \u0434\u043b\u044f WinSock, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a EoP.\n\n\u0410\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u043e, CVE-2025-32709 - \u044d\u0442\u043e \u0442\u0440\u0435\u0442\u044c\u044f EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 Ancillary Function Driver for WinSock, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u044e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 CVE-2024-38193 (\u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b Lazarus) \u0438 CVE-2025-21418.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u0435\u0440\u0432\u044b\u0445 \u0442\u0440\u0435\u0445 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Microsoft, CVE-2025-32706 - \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Google Threat Intelligence Group \u0438 CrowdStrike Advanced Research Team, \u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f - \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u043c\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044e.\n\n\u041d\u043e\u0432\u044b\u0439 Patch Tuesday \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f EoP-\u043e\u0448\u0438\u0431\u043a\u0438 \u0432 Microsoft Defender \u0434\u043b\u044f Endpoint \u0434\u043b\u044f Linux (CVE-2025-26684, CVSS: 6,7), \u043a\u043e\u0442\u043e\u0440\u0430\u044f  \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438. \u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Stratascale.\n\n\u0414\u0440\u0443\u0433\u0438\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0437\u0432\u0430\u0442\u044c CVE-2025-26685 (CVSS: 6,5) \u0432 Microsoft Defender for Identity, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433 \u0447\u0435\u0440\u0435\u0437 \u0441\u043e\u0441\u0435\u0434\u043d\u044e\u044e \u0441\u0435\u0442\u044c.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043d\u0435\u043b\u044c\u0437\u044f \u043d\u0435 \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044c \u043f\u0440\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 CVSS: 10,0 - CVE-2025-29813, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a EoP \u0432 Azure DevOps Server, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u043e \u0441\u0435\u0442\u0438.\n\nMicrosoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a, \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f.", "creation_timestamp": "2025-05-14T19:14:33.000000Z"}, {"uuid": "aefc19df-5cb7-4708-83e1-8438d49e7afa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30400", "type": "seen", "source": "https://t.me/kasperskyb2b/1734", "content": "\ud83d\udc40 \u0417\u0430 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043d\u0435 \u0443\u043f\u0440\u0430\u0432\u0438\u043c\u0441\u044f. \u041e\u0431\u044a\u044f\u0432\u043b\u044f\u0435\u043c Patch Week!\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u044b\u043c  \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u043e\u043c \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft \u043f\u043e\u0441\u043b\u0435 \u0432\u0442\u043e\u0440\u043e\u0433\u043e \u0432\u0442\u043e\u0440\u043d\u0438\u043a\u0430 \u043c\u0435\u0441\u044f\u0446\u0430 \u043d\u0430\u043c \u043d\u0435 \u043e\u0431\u043e\u0439\u0442\u0438\u0441\u044c \u2014 \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0437\u0438\u0440\u043e\u0434\u0435\u0438 \u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u043f\u043e\u0441\u043f\u0435\u0448\u0438\u043b\u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Microsoft, Fortinet, SAP, Adobe, \u0438 \u043a\u043e\u043d\u0435\u0447\u043d\u043e Ivanti. \n\n\ud83d\udcbb \u0420\u0435\u0434\u043c\u043e\u043d\u0434 \u0432\u044b\u043a\u0430\u0442\u0438\u043b 72 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f (\u0435\u0441\u043b\u0438 \u043d\u0435 \u0441\u0447\u0438\u0442\u0430\u0442\u044c Azure \u0438 Chromium), \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0432 5 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u0438 2 \u0431\u0430\u0433\u0430, \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0451\u043d\u043d\u044b\u0445 \u0434\u043e \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438 Microsoft.  \n\n\u0418\u0437 72 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, 6 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 (\u0432 \u0442.\u0447. RCE \u0432 Office \u0438 Remote desktop client), \u043e\u0441\u0442\u0430\u043b\u044c\u043d\u044b\u0435 \u2014 \u0432\u0430\u0436\u043d\u044b\u043c\u0438. \u0412\u0441\u0435\u0433\u043e 28 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a RCE, 17 \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 15 \u2014 \u043a \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 7 \u2014 \u043a DoS, 2 \u2014 \u043e\u0431\u0445\u043e\u0434\u0443 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0437\u0438\u0440\u043e\u0434\u0435\u0438:\nCVE-2025-30397 (CVSS3 7.5) \u2014 RCE \u0432 Scripting Engine \u0438\u0437-\u0437\u0430 \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438, \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0438\u0437 \u0440\u0435\u0436\u0438\u043c\u0430 Internet Explorer  \u0432 Edge. \u0423\u043c\u0435\u0440, \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0435, \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u043b\u0438, \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0435. \u0416\u0435\u0440\u0442\u0432\u0430 \u0434\u043e\u043b\u0436\u043d\u0430 \u043a\u043b\u0438\u043a\u043d\u0443\u0442\u044c \u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0441\u044b\u043b\u043a\u0443 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435.\n\nCVE-2025-32701 \u0438 -32706 (7.8) \u2014 \u043f\u0430\u0440\u0430 EoP \u0447\u0435\u0440\u0435\u0437 \u0440\u0435\u0448\u0435\u0442\u043e \u0434\u0440\u0430\u0439\u0432\u0435\u0440 CLFS. \u041f\u0440\u043e\u0448\u043b\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b \u0442\u0430\u043a\u043e\u0433\u043e \u0440\u043e\u0434\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0431\u0430\u043d\u0434\u0430\u043c\u0438 ransomware.\n\nCVE-2025-32709 (7.8) \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0447\u0435\u0440\u0435\u0437 Windows Ancillary Function Driver for Winsock, \u043f\u043e\u0445\u043e\u0436\u0438\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u043c\u044b \u0443\u0436\u0435 \u0432\u0438\u0434\u0435\u043b\u0438 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435.\n\nCVE-2025-30400 (7.8) \u2014 \u0442\u043e\u0436\u0435 EoP, \u043d\u043e \u0447\u0435\u0440\u0435\u0437 DWM Core Library.\n\n\u041e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u0438\u0445 \u0431\u0430\u0433\u043e\u0432 Microsoft \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u043d\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442.\n\n\u0421\u0440\u0435\u0434\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u0431\u0440\u0430\u0442\u0438\u043c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u043f\u0430\u0440\u0443 RCE \u0432 RDP Client (CVE-2025-29966 \u0438 -29967) \u0438 \u043f\u0430\u0440\u0443 RCE \u0432 Office (CVE-2025-30377 \u0438 -30386). \u0425\u043e\u0442\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442 \u0448\u0430\u043d\u0441\u044b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043d\u0435\u0432\u044b\u0441\u043e\u043a\u043e, \u0445\u043e\u0440\u043e\u0448\u043e \u0437\u043d\u0430\u043a\u043e\u043c\u044b\u0435 \u0438\u0437 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0438 \u0432\u0435\u043a\u0442\u043e\u0440\u044b \u0430\u0442\u0430\u043a (\u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442, \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u044e\u0449\u0438\u0439 \u0434\u0430\u0436\u0435 \u0438\u0437 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430, \u0438 \u0442.\u043f.) \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043f\u043e\u0442\u043e\u0440\u043e\u043f\u0438\u0442\u044c\u0441\u044f \u0441 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438.\n\n\ud83d\udd0e Fortinet \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0437\u0438\u0440\u043e\u0434\u0435\u0439 CVE-2025-32756 \u0441\u043e \u0441\u043a\u0440\u043e\u043c\u043d\u044b\u043c CVSS 9.6. \u041a\u043b\u0430\u0441\u0441\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u043b\u043e \u043a RCE, \u0438 \u0445\u043e\u0442\u044f \u0440\u0435\u0430\u043b\u044c\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0431\u044b\u043b\u0430 \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 \u0432 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u044d\u043a\u0437\u043e\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u043c FortiVoice, \u0440\u043e\u0432\u043d\u043e \u0442\u043e\u0442 \u0436\u0435 \u0434\u0435\u0444\u0435\u043a\u0442 \u0435\u0441\u0442\u044c \u0432  FortiMail, FortiNDR, FortiRecorder \u0438 FortiCamera, \u0447\u0442\u043e \u0443\u0436\u0435 \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u0435\u0435. \n\u0412 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u044b \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u0430\u0442\u0447\u0438, \u043d\u043e \u0438 IoC \u0438\u0437 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u043e\u0432. \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0441\u043c\u044f\u0433\u0447\u0430\u044e\u0449\u0435\u0439 \u043c\u0435\u0440\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0435\u0431-\u043a\u043e\u043d\u0441\u043e\u043b\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\ud83c\udd70\ufe0f Adobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 13 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 40 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f ColdFusion. Lightroom, InDesign, Photoshop. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0441\u0440\u043e\u0447\u043d\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f 8 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 ColdFusion, 6 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0438\u043c\u0435\u044e\u0442 CVSS 9.1 \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043d\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u0435. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 (\u043f\u043e\u043a\u0430) \u043d\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e.\n\n\u2699\ufe0f SAP \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0430\u0440\u043d\u044b\u0439 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439 \u0432\u0442\u043e\u0440\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 NetWeaver, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u043e\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. CVE-2025-42999 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u043e\u0434\u043d\u043e\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u0441 \u0440\u0430\u043d\u0435\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u043e\u0439 CVE-2025-31324.\n\n\ud83d\udcac Ivanti \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0434\u0432\u0430 \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0434\u0435\u0444\u0435\u043a\u0442\u0430 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0435 EPMM (CVE-2025-4427 \u0438 -4428), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a RCE \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \u0414\u0440\u0443\u0433\u0438\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u043c \u0437\u0430\u043a\u0440\u044b\u0442\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2025-22462 \u0432 Ivanti Neurons for ITSM (on-prem)  \u0441 CVSS 9.8, \u043a\u043e\u0442\u043e\u0440\u0430\u044f (\u043f\u043e\u043a\u0430) \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f.\n\n\u0423\u0434\u0430\u0447\u043d\u043e\u0433\u043e \u0432\u0441\u0435\u043c \u043f\u0430\u0442\u0447\u0438\u043d\u0433\u0430!\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u043f\u0430\u0442\u0447\u0438 @\u041f2\u0422", "creation_timestamp": "2025-05-14T08:36:25.000000Z"}]}