<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T10:10:52.309753+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/0d32d0aa-4173-4d3a-a1a5-5097613b614f/export</id>
    <title>0d32d0aa-4173-4d3a-a1a5-5097613b614f</title>
    <updated>2026-05-04T10:10:52.773955+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "0d32d0aa-4173-4d3a-a1a5-5097613b614f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "seen", "source": "https://t.me/cibsecurity/56826", "content": "\u203c CVE-2023-24069 \u203c\n\nSignal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T12:24:46.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/0d32d0aa-4173-4d3a-a1a5-5097613b614f/export"/>
    <published>2023-01-23T12:24:46+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/112e2dd7-401b-418b-85bf-58d6e561d2e8/export</id>
    <title>112e2dd7-401b-418b-85bf-58d6e561d2e8</title>
    <updated>2026-05-04T10:10:52.773891+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "112e2dd7-401b-418b-85bf-58d6e561d2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "seen", "source": "https://t.me/zatelecom/24451", "content": "\u0421\u0438\u0433\u043d\u0430\u043b - \u0441\u0430\u043c\u044b\u0439 \u0431\u0438\u0437\u0430\u043f\u0430\u0441\u043d\u044b\u0439 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440, \u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043e\u043d\u0438\n\nhttps://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/\n\n\u0422\u0430\u043c \u0447\u0443\u0432\u0430\u043a \u0438\u0433\u0440\u0430\u0435\u0442\u0441\u044f \u0441 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u043d\u044b\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u043c \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \"\u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u0435\u0448\" \u0444\u0430\u0439\u043b\u044b \u043b\u0435\u0433\u043a\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u0418 \u0434\u0430\u0436\u0435 \u043f\u043e\u0434\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f. \u041d\u0443, \u0442\u043e \u0435\u0441\u0442\u044c, \u0435\u0441\u043b\u0438 \u0443 \u0432\u0430\u0441 \u0432 \u0447\u0430\u0442\u0438\u043a\u0435 \u043a\u0442\u043e-\u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0432\u0430\u043c \u0444\u0430\u0439\u043b, \u0442\u043e \u044d\u0442\u043e\u0442 \u0444\u0430\u0439\u043b \u043d\u0430 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u0435 \u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u043f\u0430\u043f\u043e\u0447\u043a\u0435 \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u0439. \u0410 \u043f\u043e\u0442\u043e\u043c, \u0435\u0441\u043b\u0438 \u0432\u044b \u0431\u0443\u0434\u0435\u0442\u0435 \u0434\u0435\u043b\u0430\u0442\u044c \u0444\u043e\u0440\u0432\u0430\u0440\u0434 \u044d\u0442\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430, \u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u0441\u044f \u043d\u0435 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b, \u0430 \u043f\u043e\u0434\u043c\u0435\u043d\u043a\u0430. \n\n\u041f\u043e\u043d\u044f\u0442\u043d\u043e, \u0447\u0442\u043e \u043d\u0443 \u0442\u0430\u043a \u0441\u0435\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043b\u0430\u0441\u0441\u0430 \"\u0435\u0441\u043b\u0438 \u0431\u044b \u0443 \u043c\u0435\u043d\u044f \u0431\u044b\u043b \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0442\u0432\u043e\u0435\u043c\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443, \u0442\u043e \u0443\u0436\u043e \u0431\u044b \u044f \u0432\u0441\u0451 \u0441\u043b\u043e\u043c\u0430\u043b\", \u043d\u043e \u0432\u0441\u0451 \u0440\u0430\u0432\u043d\u043e \u043a\u0430\u043a-\u0442\u043e \u0441\u0442\u044b\u0434\u043d\u043e\u0432\u0430\u0442\u043e \u043d\u0430\u0437\u044b\u0432\u0430\u0442\u044c\u0441\u044f \"\u0441\u0430\u043c\u044b\u043c \u043d\u0438\u0438\u0431\u0430\u0446\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u043e\u043c\".\n\n\u041d\u0443, \u0438 \u0438\u043c\u0435\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u0441\u0442\u0435\u0440\u0430 \u0438 \u043e\u0431\u044a\u0435\u043c\u043e\u043c \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430 \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u044c \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442\u0430 - \u044d\u0442\u043e \u0436 \u0447\u0435\u0433\u043e \u0442\u0430\u043c \u0432 \u043a\u043e\u0434\u0435-\u0442\u043e \u043d\u0430\u0432\u043e\u0440\u043e\u0447\u0435\u043d\u043e? \u0410 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044b\u0439 Sigal \u043f\u043e\u0434 \u043c\u0430\u043a\u043e\u043c \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442.  \u0414\u043b\u044f \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044f - \u0422\u0435\u043b\u0435\u0433\u0440\u0430\u043c \u0432\u0447\u0435\u0442\u0432\u0435\u0440\u043e \u043a\u043e\u043c\u043f\u0430\u043a\u0442\u043d\u0435\u0435 \u0441 \u043d\u0430 \u043f\u043e\u0440\u044f\u0434\u043e\u043a \u043b\u0443\u0447\u0448\u0438\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c.\n\n\u0418 \u0434\u0430, \u044f \u0432\u0441\u0435 \u0435\u0449\u0451 \u043d\u0435\u043d\u0430\u0432\u0438\u0436\u0443 \u044d\u0442\u043e\u0442 \u0432\u0430\u0448 \u0421\u0438\u0433\u043d\u0430\u043b \u0438 \u0441\u0442\u0440\u0435\u043c\u043b\u044e\u0441\u044c \u0435\u0433\u043e \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0438\u0442\u044c :)", "creation_timestamp": "2023-01-23T22:03:32.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/112e2dd7-401b-418b-85bf-58d6e561d2e8/export"/>
    <published>2023-01-23T22:03:32+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ae395f3f-d47f-4973-a9cc-bc109bcaaadc/export</id>
    <title>ae395f3f-d47f-4973-a9cc-bc109bcaaadc</title>
    <updated>2026-05-04T10:10:52.773833+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ae395f3f-d47f-4973-a9cc-bc109bcaaadc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/NeKaspersky/2796", "content": "\u0421\u0430\u043c\u044b\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u0432\u0441\u0435\u044f \u0441\u0435\u0442\u0438 Signal \u0441\u043f\u043e\u0442\u043a\u043d\u0443\u043b\u0441\u044f \u043e \u0433\u043b\u0443\u043f\u0435\u0439\u0448\u0438\u0435 \u0431\u0430\u0433\u0438\n\n\u041e\u0434\u0438\u043d \u0438\u0437 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e\u043f\u0438\u0441\u0430\u043b \"\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\" CVE-2023-24068 \u0438 CVE-2023-24069, \u0441\u0443\u0442\u044c \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043a\u0430\u043a\u043e\u0433\u043e-\u043b\u0438\u0431\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 \u043a\u044d\u0448\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0445\u0440\u0430\u043d\u0438\u0442 desktop-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435. \u0422\u0430\u043a, \u043f\u0440\u0438 \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u0442\u043e\u0433\u043e \u0438\u043b\u0438 \u0438\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432\u0441\u0451 \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u0433\u043b\u044f\u0434\u0435\u0442\u044c \u0442\u0430\u043a, \u0431\u0443\u0434\u0442\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0451\u043d\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0430\u0432\u0442\u043e\u0440.\n\n\u0413\u043b\u0443\u043f\u043e\u0441\u0442\u044c, \u043d\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0441 \u043a\u0430\u043a\u0438\u043c \u0440\u0430\u0437\u043c\u0430\u0445\u043e\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u043b\u0441\u044f \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440 \u0438 \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0430\u043c\u044f\u0442\u0438 \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0432 \u0440\u0430\u0437\u0432\u0451\u0440\u043d\u0443\u0442\u043e\u043c \u0432\u0438\u0434\u0435, \u0445\u043e\u0447\u0435\u0442\u0441\u044f \u0447\u0435\u0433\u043e-\u0442\u043e \u0445\u043e\u0442\u044f \u0431\u044b \u0443\u0440\u043e\u0432\u0435\u043d\u044c Telegram'\u0430 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c.\n\n\u0415\u0441\u043b\u0438 \u043a\u0442\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f, \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0437\u0430\u043b\u0435\u0437\u0430\u0439\u0442\u0435: \u043f\u0443\u0442\u044c \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0438 \u043d\u0430 \u043a\u0430\u0440\u0442\u0438\u043d\u043a\u0435 \ud83e\udd2b\n\n\u041d\u0435\u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u0438\u0439", "creation_timestamp": "2023-01-24T12:46:22.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ae395f3f-d47f-4973-a9cc-bc109bcaaadc/export"/>
    <published>2023-01-24T12:46:22+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/8ada3fc5-3617-4b36-a93c-692dd8357ca9/export</id>
    <title>8ada3fc5-3617-4b36-a93c-692dd8357ca9</title>
    <updated>2026-05-04T10:10:52.773784+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "8ada3fc5-3617-4b36-a93c-692dd8357ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "Telegram/aX_Ee6qvCcF7km2BkcHN2i2yKV3xOFr6sVnrFpgJWLWcFAE", "content": "", "creation_timestamp": "2023-01-24T14:04:15.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/8ada3fc5-3617-4b36-a93c-692dd8357ca9/export"/>
    <published>2023-01-24T14:04:15+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/43838784-747f-4a81-884d-cf17e7baaffd/export</id>
    <title>43838784-747f-4a81-884d-cf17e7baaffd</title>
    <updated>2026-05-04T10:10:52.773731+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "43838784-747f-4a81-884d-cf17e7baaffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/428", "content": "\ud83d\udde3\u0421\u0440\u043e\u0447\u043d\u044b\u0439 Signal \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0412 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u043d\u043e\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0435 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u0430 Signal \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: CVE-2023-24068 \u0438 CVE-2023-24069. \n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0432 \u0441\u0432\u043e\u0451\u043c \u0431\u043b\u043e\u0433\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u044d\u043a\u0441\u043f\u0435\u0440\u0442 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0414\u0436\u043e\u043d \u0414\u0436\u0435\u043a\u0441\u043e\u043d.\n\n\u041d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u043f\u0430\u0441\u043d\u044b, \u0438 \u0447\u0442\u043e \u0441 \u043d\u0438\u043c\u0438 \u0434\u0435\u043b\u0430\u0442\u044c?\n\u0420\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c\u0441\u044f \u0432 \u0441\u0442\u0430\u0442\u044c\u0435\u27f6", "creation_timestamp": "2023-01-25T14:11:29.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/43838784-747f-4a81-884d-cf17e7baaffd/export"/>
    <published>2023-01-25T14:11:29+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/86ef7245-4183-4a88-98f3-83463542b171/export</id>
    <title>86ef7245-4183-4a88-98f3-83463542b171</title>
    <updated>2026-05-04T10:10:52.773680+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "86ef7245-4183-4a88-98f3-83463542b171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/Freedom_Technology/30", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T10:55:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/86ef7245-4183-4a88-98f3-83463542b171/export"/>
    <published>2023-01-26T10:55:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a458bf4b-90ce-4feb-9c88-8acb31e6290d/export</id>
    <title>a458bf4b-90ce-4feb-9c88-8acb31e6290d</title>
    <updated>2026-05-04T10:10:52.773624+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a458bf4b-90ce-4feb-9c88-8acb31e6290d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/Freedom_Technology/65", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T11:55:51.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a458bf4b-90ce-4feb-9c88-8acb31e6290d/export"/>
    <published>2023-01-26T11:55:51+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/483a2289-df62-4f91-9835-da00c91c42a4/export</id>
    <title>483a2289-df62-4f91-9835-da00c91c42a4</title>
    <updated>2026-05-04T10:10:52.773543+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "483a2289-df62-4f91-9835-da00c91c42a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/AUSSIE_NEWS/33714", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T19:16:36.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/483a2289-df62-4f91-9835-da00c91c42a4/export"/>
    <published>2023-01-26T19:16:36+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/901792da-a320-4bf0-9f00-d34c28f25768/export</id>
    <title>901792da-a320-4bf0-9f00-d34c28f25768</title>
    <updated>2026-05-04T10:10:52.771826+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "901792da-a320-4bf0-9f00-d34c28f25768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/CyberSachok/956", "content": "\u00ab\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439\u00bb \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440 Signal, \u0440\u0430\u0441\u043a\u0440\u0443\u0442\u0438\u0432\u0448\u0438\u0439\u0441\u044f \u043d\u0430 \u0432\u043e\u043b\u043d\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u0438 \u0442\u0435\u043c\u044b \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0441\u0442\u0438 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0438 \u0441\u043a\u0430\u043d\u0434\u0430\u043b\u043e\u0432 \u0432 WhatsApp, \u0432 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u0440\u0430\u0437 \u0441\u0430\u043c \u0441\u0442\u0430\u043b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u043c \u0441\u043a\u0430\u043d\u0434\u0430\u043b\u0430. \n\n\u0412\u044b\u044f\u0441\u043d\u0438\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f CZ \u0438\u0437 Binance, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0449\u0430\u043b\u0441\u044f \u0447\u0435\u0440\u0435\u0437 Signal \u0441 \u0432\u043a\u043b\u044e\u0447\u0451\u043d\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u0441\u0432\u043e\u0438\u043c \u0440\u0430\u0431\u043e\u0447\u0438\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c, \u043a\u0430\u043a\u0438\u043c-\u0442\u043e \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b. \n\n\u0422\u0443\u0442 \u0434\u0432\u0430 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430: \u043b\u0438\u0431\u043e end2end encryption \u0443 Signal \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442, \u043b\u0438\u0431\u043e \u0435\u0441\u0442\u044c \u043a\u0430\u043a\u0430\u044f-\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044d\u0442\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043d\u0438\u043c. \n\n\u0415\u0441\u0442\u044c \u0435\u0449\u0451 \u0438 \u0442\u0440\u0435\u0442\u0438\u0439 \u2014 \u0441\u043e\u0431\u0435\u0441\u0435\u0434\u043d\u0438\u043a CZ Binance \u0441\u043b\u0438\u043b \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f. \n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0442\u043e, \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0443\u0436\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0432 Signal, \u0432\u0435\u0440\u0438\u043c \u0432\u043e \u0432\u0442\u043e\u0440\u043e\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442. \n\n\u041f\u0440\u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0441\u0442\u0430\u0442\u044c\u044f\u0445:\n\nhttps://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/\n\nhttps://techcrunch.com/2022/08/15/signal-phone-number-exposed-twilio/", "creation_timestamp": "2023-04-04T01:10:49.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/901792da-a320-4bf0-9f00-d34c28f25768/export"/>
    <published>2023-04-04T01:10:49+00:00</published>
  </entry>
</feed>
