<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" version="2.0">
  <channel>
    <title>Most recent sightings.</title>
    <link>https://db.gcve.eu</link>
    <description>Contains only the most 10 recent sightings.</description>
    <docs>http://www.rssboard.org/rss-specification</docs>
    <generator>python-feedgen</generator>
    <language>en</language>
    <lastBuildDate>Sun, 03 May 2026 04:47:07 +0000</lastBuildDate>
    <item>
      <title>e98bd981-25f9-4135-8aa2-ccde220de14b</title>
      <link>https://db.gcve.eu/sighting/e98bd981-25f9-4135-8aa2-ccde220de14b/export</link>
      <description>{"uuid": "e98bd981-25f9-4135-8aa2-ccde220de14b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43106", "type": "seen", "source": "https://t.me/cibsecurity/37447", "content": "\u203c CVE-2021-43106 \u203c\n\nA Header Injection vulnerability exists in Compass Plus TranzWare Online FIMI Web Interface Tranzware Online (TWO) 5.3.33.3 F38 and FIMI 4.2.19.4 25.The HTTP host header can be manipulated and cause the application to behave in unexpected ways. Any changes made to the header would just cause the request to be sent to a completely different Domain/IP address. This is due to that the server implicitly trusts the Host header, and fails to validate or escape it properly. An attacker can use this input to redirect target users to a malicious domain/web page. This would result in expanding the potential to further attacks and malicious actions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-14T22:33:09.000000Z"}</description>
      <content:encoded>{"uuid": "e98bd981-25f9-4135-8aa2-ccde220de14b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43106", "type": "seen", "source": "https://t.me/cibsecurity/37447", "content": "\u203c CVE-2021-43106 \u203c\n\nA Header Injection vulnerability exists in Compass Plus TranzWare Online FIMI Web Interface Tranzware Online (TWO) 5.3.33.3 F38 and FIMI 4.2.19.4 25.The HTTP host header can be manipulated and cause the application to behave in unexpected ways. Any changes made to the header would just cause the request to be sent to a completely different Domain/IP address. This is due to that the server implicitly trusts the Host header, and fails to validate or escape it properly. An attacker can use this input to redirect target users to a malicious domain/web page. This would result in expanding the potential to further attacks and malicious actions.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-02-14T22:33:09.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/e98bd981-25f9-4135-8aa2-ccde220de14b/export</guid>
      <pubDate>Mon, 14 Feb 2022 22:33:09 +0000</pubDate>
    </item>
    <item>
      <title>9cc785cb-6a98-48ae-be33-36a7c064689e</title>
      <link>https://db.gcve.eu/sighting/9cc785cb-6a98-48ae-be33-36a7c064689e/export</link>
      <description>{"uuid": "9cc785cb-6a98-48ae-be33-36a7c064689e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43102", "type": "seen", "source": "https://t.me/cibsecurity/39691", "content": "\u203c CVE-2021-43102 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via HelpManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:36.000000Z"}</description>
      <content:encoded>{"uuid": "9cc785cb-6a98-48ae-be33-36a7c064689e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43102", "type": "seen", "source": "https://t.me/cibsecurity/39691", "content": "\u203c CVE-2021-43102 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via HelpManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:36.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/9cc785cb-6a98-48ae-be33-36a7c064689e/export</guid>
      <pubDate>Tue, 29 Mar 2022 02:40:36 +0000</pubDate>
    </item>
    <item>
      <title>dfce1a58-e43c-4ee9-9eff-4757de716ecc</title>
      <link>https://db.gcve.eu/sighting/dfce1a58-e43c-4ee9-9eff-4757de716ecc/export</link>
      <description>{"uuid": "dfce1a58-e43c-4ee9-9eff-4757de716ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43105", "type": "seen", "source": "https://t.me/cibsecurity/39693", "content": "\u203c CVE-2021-43105 \u203c\n\nA vulnerability in the bailiwick checking function in Technitium DNS Server &amp;lt;= v7.0 exists that allows specific malicious users to inject `NS` records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:37.000000Z"}</description>
      <content:encoded>{"uuid": "dfce1a58-e43c-4ee9-9eff-4757de716ecc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43105", "type": "seen", "source": "https://t.me/cibsecurity/39693", "content": "\u203c CVE-2021-43105 \u203c\n\nA vulnerability in the bailiwick checking function in Technitium DNS Server &amp;lt;= v7.0 exists that allows specific malicious users to inject `NS` records of any domain (even TLDs) into the cache and conduct a DNS cache poisoning attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:37.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/dfce1a58-e43c-4ee9-9eff-4757de716ecc/export</guid>
      <pubDate>Tue, 29 Mar 2022 02:40:37 +0000</pubDate>
    </item>
    <item>
      <title>5784ffdf-9a23-4803-92e6-15d20a0c38cf</title>
      <link>https://db.gcve.eu/sighting/5784ffdf-9a23-4803-92e6-15d20a0c38cf/export</link>
      <description>{"uuid": "5784ffdf-9a23-4803-92e6-15d20a0c38cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43100", "type": "seen", "source": "https://t.me/cibsecurity/39694", "content": "\u203c CVE-2021-43100 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via TopicManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:38.000000Z"}</description>
      <content:encoded>{"uuid": "5784ffdf-9a23-4803-92e6-15d20a0c38cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43100", "type": "seen", "source": "https://t.me/cibsecurity/39694", "content": "\u203c CVE-2021-43100 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via TopicManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:38.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/5784ffdf-9a23-4803-92e6-15d20a0c38cf/export</guid>
      <pubDate>Tue, 29 Mar 2022 02:40:38 +0000</pubDate>
    </item>
    <item>
      <title>37436058-79aa-47a5-89d7-ac42253d010f</title>
      <link>https://db.gcve.eu/sighting/37436058-79aa-47a5-89d7-ac42253d010f/export</link>
      <description>{"uuid": "37436058-79aa-47a5-89d7-ac42253d010f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43101", "type": "seen", "source": "https://t.me/cibsecurity/39698", "content": "\u203c CVE-2021-43101 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via MembershipCardManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:44.000000Z"}</description>
      <content:encoded>{"uuid": "37436058-79aa-47a5-89d7-ac42253d010f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43101", "type": "seen", "source": "https://t.me/cibsecurity/39698", "content": "\u203c CVE-2021-43101 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via MembershipCardManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:44.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/37436058-79aa-47a5-89d7-ac42253d010f/export</guid>
      <pubDate>Tue, 29 Mar 2022 02:40:44 +0000</pubDate>
    </item>
    <item>
      <title>4862d6e2-2a1e-40d2-af2a-29c7170ba6bb</title>
      <link>https://db.gcve.eu/sighting/4862d6e2-2a1e-40d2-af2a-29c7170ba6bb/export</link>
      <description>{"uuid": "4862d6e2-2a1e-40d2-af2a-29c7170ba6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43103", "type": "seen", "source": "https://t.me/cibsecurity/39702", "content": "\u203c CVE-2021-43103 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via ForumManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:51.000000Z"}</description>
      <content:encoded>{"uuid": "4862d6e2-2a1e-40d2-af2a-29c7170ba6bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43103", "type": "seen", "source": "https://t.me/cibsecurity/39702", "content": "\u203c CVE-2021-43103 \u203c\n\nA File Upload vulnerability exists in bbs 5.3 is via ForumManageAction.java in a GetType function, which lets a remote malicious user execute arbitrary code.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T02:40:51.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/4862d6e2-2a1e-40d2-af2a-29c7170ba6bb/export</guid>
      <pubDate>Tue, 29 Mar 2022 02:40:51 +0000</pubDate>
    </item>
    <item>
      <title>8afdf443-62f4-41ce-a17e-ba0ac59b2eae</title>
      <link>https://db.gcve.eu/sighting/8afdf443-62f4-41ce-a17e-ba0ac59b2eae/export</link>
      <description>{"uuid": "8afdf443-62f4-41ce-a17e-ba0ac59b2eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43109", "type": "seen", "source": "https://t.me/cibsecurity/39772", "content": "\u203c CVE-2021-43109 \u203c\n\nAn SQL Injection vulnerability exits in PuneethReddyHC online-shopping-system as of 11/01/2021 via the p parameter in product.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T22:11:28.000000Z"}</description>
      <content:encoded>{"uuid": "8afdf443-62f4-41ce-a17e-ba0ac59b2eae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43109", "type": "seen", "source": "https://t.me/cibsecurity/39772", "content": "\u203c CVE-2021-43109 \u203c\n\nAn SQL Injection vulnerability exits in PuneethReddyHC online-shopping-system as of 11/01/2021 via the p parameter in product.php.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-29T22:11:28.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/8afdf443-62f4-41ce-a17e-ba0ac59b2eae/export</guid>
      <pubDate>Tue, 29 Mar 2022 22:11:28 +0000</pubDate>
    </item>
    <item>
      <title>1bf459da-ed46-440e-81fc-b05e7c83d632</title>
      <link>https://db.gcve.eu/sighting/1bf459da-ed46-440e-81fc-b05e7c83d632/export</link>
      <description>{"uuid": "1bf459da-ed46-440e-81fc-b05e7c83d632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43105", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/4724", "content": "\u0413\u0440\u0443\u043f\u043f\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0437 \u041a\u0430\u043b\u0438\u0444\u043e\u0440\u043d\u0438\u0439\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0432 \u0418\u0440\u0432\u0438\u043d\u0435 \u0438 \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0426\u0438\u043d\u0445\u0443\u0430 \u043d\u0430 Black Hat 2023 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043d\u043e\u0432\u0443\u044e \u043c\u043e\u0449\u043d\u0443\u044e \u0430\u0442\u0430\u043a\u0443 MaginotDNS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u0438 \u0443\u0441\u043b\u043e\u0432\u043d\u044b\u0445 DNS (CDNS) \u0438 \u043c\u043e\u0436\u0435\u0442 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0446\u0435\u043b\u044b\u0435 \u0434\u043e\u043c\u0435\u043d\u044b \u0432\u0435\u0440\u0445\u043d\u0435\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f TLD.\n\n\u0410\u0442\u0430\u043a\u0430 \u0441\u0442\u0430\u043b\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0439 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043d\u0435\u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u044f\u043c \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043e\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u043e\u043c \u041f\u041e DNS \u0438 \u0440\u0435\u0436\u0438\u043c\u0430\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 (\u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u044b\u0435 \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u0438 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438), \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u0442\u0440\u0435\u0442\u044c \u0432\u0441\u0435\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 CDNS.\n\n\u041a\u043e\u043d\u0446\u0435\u043f\u0446\u0438\u044f \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u043e\u0442\u0432\u0435\u0442\u043e\u0432 \u0432 \u043a\u0435\u0448 \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u044f DNS, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0445\u043e\u0434\u044f\u0442 \u0432 \u0434\u043e\u043c\u0435\u043d, \u043d\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0435 IP-\u0430\u0434\u0440\u0435\u0441\u0430, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u044f \u0438\u0445 \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u0430\u043c \u0431\u0435\u0437 \u0438\u0445 \u0432\u0435\u0434\u043e\u043c\u0430.\n\n\u041f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0430\u0442\u0430\u043a\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u043e\u0433\u043e \u0442\u0438\u043f\u0430 (\u0430\u0442\u0430\u043a\u0430 \u041a\u0430\u0448\u043f\u0443\u0440\u0435\u0432\u0430 \u0432 1997 \u0438\u043b\u0438 \u0430\u0442\u0430\u043a\u0430 \u041a\u0430\u043c\u0438\u043d\u0441\u043a\u043e\u0433\u043e \u0432 2008) \u0431\u044b\u043b\u0438 \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u044b \u043f\u0443\u0442\u0435\u043c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0441\u0442\u0430\u043b\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u044b\u043c\u0438.\n\n\u041e\u0434\u043d\u0430\u043a\u043e MaginotDNS \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u044d\u0442\u0443 \u0437\u0430\u0449\u0438\u0442\u0443, \u0430\u0442\u0430\u043a\u0443\u044f \u0440\u0435\u0436\u0438\u043c \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 CDNS \u043b\u0438\u0431\u043e \u043f\u043e \u043f\u0443\u0442\u0438, \u043b\u0438\u0431\u043e \u0432\u043d\u0435 \u043f\u0443\u0442\u0438.\n\n\u0420\u0435\u0437\u043e\u043b\u0432\u0435\u0440\u044b CDNS \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442 \u043a\u0430\u043a \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u044b\u0439, \u0442\u0430\u043a \u0438 \u0440\u0435\u0436\u0438\u043c \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u0430\u0446\u0438\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430\u043c\u0438 \u0434\u043b\u044f \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044f \u0437\u0430\u0442\u0440\u0430\u0442 \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0430\u0434\u0435\u043a\u0432\u0430\u0442\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435, \u043e\u0434\u043d\u0430\u043a\u043e \u0441\u0435\u0440\u0432\u0435\u0440 \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043e\u0434\u0438\u043d \u0438 \u0442\u043e\u0442 \u0436\u0435 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u044b\u0439 \u043a\u0435\u0448 DNS, \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0440\u0435\u0436\u0438\u043c \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u043f\u0443\u0442\u044c \u043a \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044e \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u043e\u0433\u043e \u0440\u0435\u0436\u0438\u043c\u0430, \u043f\u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443 \u043d\u0430\u0440\u0443\u0448\u0430\u044f \u0433\u0440\u0430\u043d\u0438\u0446\u0443 \u0437\u0430\u0449\u0438\u0442\u044b \u043a\u0435\u0448\u0430 DNS.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u043d\u0435\u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u044f \u0432 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0433\u043e \u041f\u041e DNS, \u0432\u043a\u043b\u044e\u0447\u0430\u044f BIND9 (CVE-2021-25220), Knot Resolver (CVE-2022-32983), Microsoft DNS \u0438 Technitium (CVE-2021-43105).\n\n\u0414\u043b\u044f \u0431\u043e\u043b\u044c\u0448\u0435\u0439 \u0443\u0431\u0435\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u043e\u0438\u0445 \u0432\u044b\u0432\u043e\u0434\u043e\u0432 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u043e\u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0430\u0442\u0430\u043a\u0443 MaginotDNS \u043d\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u0435 Microsoft DNS \u043d\u0430 \u0432\u0438\u0434\u0435\u043e.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u044d\u0442\u043e\u0433\u043e, \u0432 \u0445\u043e\u0434\u0435 \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u0440\u044b \u0430\u0442\u0430\u043a \u043a\u0430\u043a \u043d\u0430 \u043f\u0443\u0442\u0438, \u0442\u0430\u043a \u0438 \u0432\u043d\u0435 \u043f\u0443\u0442\u0438, \u043f\u0440\u0438\u0447\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435 \u0441\u043b\u043e\u0436\u043d\u044b\u043c\u0438, \u043d\u043e \u0438 \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0431\u043e\u043b\u0435\u0435 \u0446\u0435\u043d\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u041f\u0440\u043e\u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0432 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0435\u0442\u044c \u043e\u043d\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 1 200 000 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 DNS, \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 154 955 - \u0441\u0435\u0440\u0432\u0435\u0440\u044b CDNS. \u0414\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u043a\u0430\u0437\u0430\u043b, \u0447\u0442\u043e 54 949 \u0438\u0437 \u043d\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0430\u0442\u0430\u043a\u0430\u043c \u043d\u0430 \u043f\u0443\u0442\u0438, \u0430 88,3% - \u0430\u0442\u0430\u043a\u0430\u043c \u0432\u043d\u0435 \u043f\u0443\u0442\u0438.\n\n\u0412\u0441\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0438 \u041f\u041e, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438, \u0430 Microsoft \u0434\u0430\u0436\u0435 \u043d\u0430\u0433\u0440\u0430\u0434\u0438\u043b\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0437\u0430 \u043e\u0442\u0447\u0435\u0442.", "creation_timestamp": "2023-08-14T13:43:15.000000Z"}</description>
      <content:encoded>{"uuid": "1bf459da-ed46-440e-81fc-b05e7c83d632", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-43105", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/4724", "content": "\u0413\u0440\u0443\u043f\u043f\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0437 \u041a\u0430\u043b\u0438\u0444\u043e\u0440\u043d\u0438\u0439\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0432 \u0418\u0440\u0432\u0438\u043d\u0435 \u0438 \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0426\u0438\u043d\u0445\u0443\u0430 \u043d\u0430 Black Hat 2023 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043d\u043e\u0432\u0443\u044e \u043c\u043e\u0449\u043d\u0443\u044e \u0430\u0442\u0430\u043a\u0443 MaginotDNS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u0438 \u0443\u0441\u043b\u043e\u0432\u043d\u044b\u0445 DNS (CDNS) \u0438 \u043c\u043e\u0436\u0435\u0442 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0446\u0435\u043b\u044b\u0435 \u0434\u043e\u043c\u0435\u043d\u044b \u0432\u0435\u0440\u0445\u043d\u0435\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f TLD.\n\n\u0410\u0442\u0430\u043a\u0430 \u0441\u0442\u0430\u043b\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0439 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043d\u0435\u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u044f\u043c \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u043e\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u043e\u043c \u041f\u041e DNS \u0438 \u0440\u0435\u0436\u0438\u043c\u0430\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 (\u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u044b\u0435 \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u0438 \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438), \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u043d\u043e \u0442\u0440\u0435\u0442\u044c \u0432\u0441\u0435\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 CDNS.\n\n\u041a\u043e\u043d\u0446\u0435\u043f\u0446\u0438\u044f \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u043e\u0442\u0432\u0435\u0442\u043e\u0432 \u0432 \u043a\u0435\u0448 \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u044f DNS, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0445\u043e\u0434\u044f\u0442 \u0432 \u0434\u043e\u043c\u0435\u043d, \u043d\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0435 IP-\u0430\u0434\u0440\u0435\u0441\u0430, \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u044f \u0438\u0445 \u043a \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u0430\u043c \u0431\u0435\u0437 \u0438\u0445 \u0432\u0435\u0434\u043e\u043c\u0430.\n\n\u041f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0430\u0442\u0430\u043a\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u043e\u0433\u043e \u0442\u0438\u043f\u0430 (\u0430\u0442\u0430\u043a\u0430 \u041a\u0430\u0448\u043f\u0443\u0440\u0435\u0432\u0430 \u0432 1997 \u0438\u043b\u0438 \u0430\u0442\u0430\u043a\u0430 \u041a\u0430\u043c\u0438\u043d\u0441\u043a\u043e\u0433\u043e \u0432 2008) \u0431\u044b\u043b\u0438 \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u044b \u043f\u0443\u0442\u0435\u043c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0440\u0430\u0441\u043f\u043e\u0437\u043d\u0430\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0441\u0442\u0430\u043b\u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u044b\u043c\u0438.\n\n\u041e\u0434\u043d\u0430\u043a\u043e MaginotDNS \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u044d\u0442\u0443 \u0437\u0430\u0449\u0438\u0442\u0443, \u0430\u0442\u0430\u043a\u0443\u044f \u0440\u0435\u0436\u0438\u043c \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 CDNS \u043b\u0438\u0431\u043e \u043f\u043e \u043f\u0443\u0442\u0438, \u043b\u0438\u0431\u043e \u0432\u043d\u0435 \u043f\u0443\u0442\u0438.\n\n\u0420\u0435\u0437\u043e\u043b\u0432\u0435\u0440\u044b CDNS \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442 \u043a\u0430\u043a \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u044b\u0439, \u0442\u0430\u043a \u0438 \u0440\u0435\u0436\u0438\u043c \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u0430\u0446\u0438\u0438 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u0430\u043c\u0438 \u0434\u043b\u044f \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044f \u0437\u0430\u0442\u0440\u0430\u0442 \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438, \u0447\u0442\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0430\u0434\u0435\u043a\u0432\u0430\u0442\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435, \u043e\u0434\u043d\u0430\u043a\u043e \u0441\u0435\u0440\u0432\u0435\u0440 \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c.\n\n\u041f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u043e\u0434\u0438\u043d \u0438 \u0442\u043e\u0442 \u0436\u0435 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u044b\u0439 \u043a\u0435\u0448 DNS, \u0430\u0442\u0430\u043a\u0430 \u043d\u0430 \u0440\u0435\u0436\u0438\u043c \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 \u043c\u043e\u0436\u0435\u0442 \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u043f\u0443\u0442\u044c \u043a \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u044e \u0440\u0435\u043a\u0443\u0440\u0441\u0438\u0432\u043d\u043e\u0433\u043e \u0440\u0435\u0436\u0438\u043c\u0430, \u043f\u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443 \u043d\u0430\u0440\u0443\u0448\u0430\u044f \u0433\u0440\u0430\u043d\u0438\u0446\u0443 \u0437\u0430\u0449\u0438\u0442\u044b \u043a\u0435\u0448\u0430 DNS.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u043d\u0435\u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0438\u044f \u0432 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0433\u043e \u041f\u041e DNS, \u0432\u043a\u043b\u044e\u0447\u0430\u044f BIND9 (CVE-2021-25220), Knot Resolver (CVE-2022-32983), Microsoft DNS \u0438 Technitium (CVE-2021-43105).\n\n\u0414\u043b\u044f \u0431\u043e\u043b\u044c\u0448\u0435\u0439 \u0443\u0431\u0435\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u043e\u0438\u0445 \u0432\u044b\u0432\u043e\u0434\u043e\u0432 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043f\u0440\u043e\u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0430\u0442\u0430\u043a\u0443 MaginotDNS \u043d\u0430 \u043f\u0440\u0438\u043c\u0435\u0440\u0435 Microsoft DNS \u043d\u0430 \u0432\u0438\u0434\u0435\u043e.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u044d\u0442\u043e\u0433\u043e, \u0432 \u0445\u043e\u0434\u0435 \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u0440\u044b \u0430\u0442\u0430\u043a \u043a\u0430\u043a \u043d\u0430 \u043f\u0443\u0442\u0438, \u0442\u0430\u043a \u0438 \u0432\u043d\u0435 \u043f\u0443\u0442\u0438, \u043f\u0440\u0438\u0447\u0435\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0431\u043e\u043b\u0435\u0435 \u0441\u043b\u043e\u0436\u043d\u044b\u043c\u0438, \u043d\u043e \u0438 \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0431\u043e\u043b\u0435\u0435 \u0446\u0435\u043d\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432.\n\n\u041f\u0440\u043e\u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u0432 \u0433\u043b\u043e\u0431\u0430\u043b\u044c\u043d\u0443\u044e \u0441\u0435\u0442\u044c \u043e\u043d\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 1 200 000 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 DNS, \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 154 955 - \u0441\u0435\u0440\u0432\u0435\u0440\u044b CDNS. \u0414\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u043f\u043e\u043a\u0430\u0437\u0430\u043b, \u0447\u0442\u043e 54 949 \u0438\u0437 \u043d\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u0438 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0430\u0442\u0430\u043a\u0430\u043c \u043d\u0430 \u043f\u0443\u0442\u0438, \u0430 88,3% - \u0430\u0442\u0430\u043a\u0430\u043c \u0432\u043d\u0435 \u043f\u0443\u0442\u0438.\n\n\u0412\u0441\u0435 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044b\u0435 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0438 \u041f\u041e, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438, \u0430 Microsoft \u0434\u0430\u0436\u0435 \u043d\u0430\u0433\u0440\u0430\u0434\u0438\u043b\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0437\u0430 \u043e\u0442\u0447\u0435\u0442.", "creation_timestamp": "2023-08-14T13:43:15.000000Z"}</content:encoded>
      <guid isPermaLink="false">https://db.gcve.eu/sighting/1bf459da-ed46-440e-81fc-b05e7c83d632/export</guid>
      <pubDate>Mon, 14 Aug 2023 13:43:15 +0000</pubDate>
    </item>
  </channel>
</rss>
