{"vulnerability": "CVE-2023-3680", "sightings": [{"uuid": "b3b23841-de03-4e01-826c-b7dea5e2484b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9e463f47-0725-4e1b-99ec-c582e600a803", "content": "", "creation_timestamp": "2026-02-02T12:26:51.260084Z"}, {"uuid": "5ccc3d15-62ef-4120-b90a-418799dcf4c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5499", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy\nURL\uff1ahttps://github.com/x0rb3l/CVE-2023-36802-MSKSSRV-LPE\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-20T02:11:32.000000Z"}, {"uuid": "517a1364-90eb-4df9-856d-034ec8254aab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5497", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-36802 ITW case\nURL\uff1ahttps://github.com/4zur-0312/CVE-2023-36802\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-19T23:43:01.000000Z"}, {"uuid": "5ef0beaf-a519-4a08-92ef-54c5bfc51196", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5531", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aExploit for CVE-2023-36802 targeting MSKSSRV.SYS driver\nURL\uff1ahttps://github.com/Nero22k/cve-2023-36802\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-10-23T18:53:44.000000Z"}, {"uuid": "7343a759-8d5d-4555-bb72-b1af2c7901a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "Telegram/pPehM9XP9UqPJSkSBo6XE6EECTJ7mFLOl2isDLbdd3m6RM0", "content": "", "creation_timestamp": "2025-09-26T21:00:06.000000Z"}, {"uuid": "df8c7dcf-953e-4638-8e90-7795c58fee0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "Telegram/rybSVA3PrhV-6tzmYK3PB9ou5_bhV394GU1E3usOeINa", "content": "", "creation_timestamp": "2023-10-22T23:29:10.000000Z"}, {"uuid": "852e1843-a0b0-4fa2-bcab-bf1db9ac1a22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/arpsyndicate/83", "content": "#ExploitObserverAlert\n\nCVE-2023-36802\n\nDESCRIPTION: Exploit Observer has 13 entries related to CVE-2023-36802. Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.000540000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-11T04:52:33.000000Z"}, {"uuid": "d26b11c6-6009-4c19-a6d2-2a61bf3fe6c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3482", "content": "https://github.com/Nero22k/cve-2023-36802\n\u9488\u5bf9\u9488\u5bf9MSKSSRV.SYS\u9a71\u52a8\u7a0b\u5e8f\u7684CVE-2023-36802\u653b\u51fb\n#github", "creation_timestamp": "2023-10-27T17:30:44.000000Z"}, {"uuid": "1ced2b09-950b-4a96-8f6a-50e6b089d523", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/JerusalemElectronicArmy/610", "content": "#\u0623\u062e\u0628\u0627\u0631_\u0627\u0644\u0633\u0627\u064a\u0628\u0631\n\n\u0625\u0635\u062f\u0627\u0631 \u062a\u0635\u062d\u064a\u062d\u0627\u062a \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0644\u0634\u0647\u0631 \u0633\u0628\u062a\u0645\u0628\u0631 2023 \u064a\u0648\u0645 \u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621 9/12 \u064a\u0639\u0627\u0644\u062c 59 \u0639\u064a\u0628\u064b\u0627 \u062c\u062f\u064a\u062f\u064b\u0627\u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u062b\u063a\u0631\u062a\u064a\u0646 Zero-day \u063a\u064a\u0631 \u0645\u0639\u0631\u0641\u062a\u064a\u0646 \u062a\u062a\u0639\u0631\u0636\u0627\u0646 \u0644\u0647\u062c\u0645\u0627\u062a \u0646\u0634\u0637\u0629.\n\n\u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639\u0647\u0627 \u062a\u0623\u062b\u0631 \u0628\u0634\u0643\u0644 \u0631\u0626\u064a\u0633\u064a \u0628\u0645\u0646\u062a\u062c\u0627\u062a \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a\u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 Microsoft Windows \u0648\u0645\u0643\u0648\u0646\u0627\u062a\u0647\u060c \u0648\u062e\u0627\u062f\u0645 Exchange Server\u060c \u0648\u0628\u0631\u0627\u0645\u062c Office \u0648\u0645\u0643\u0648\u0646\u0627\u062a\u0647\u0627\u060c \u0648NET \u0648Visual Studio\u060c \u0648\u062e\u062f\u0645\u0629 Azure\u060c \u0648Microsoft Dynamics\u060c \u0648\u0628\u0631\u0646\u0627\u0645\u062c Windows Defender.\n\n\u0645\u0646 \u0628\u064a\u0646 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0627\u062a\u060c \u062a\u0645 \u062a\u0635\u0646\u064a\u0641 \u062e\u0645\u0633 \u0645\u0646\u0647\u0627 \u0643\u062b\u063a\u0631\u0627\u062a \u062d\u0631\u062c\u0629\u060c \u064855 \u0643\u062b\u063a\u0631\u0627\u062a \u0647\u0627\u0645\u0629\u060c \u0648\u0648\u0627\u062d\u062f\u0629 \u0643\u062b\u063a\u0631\u0629 \u0645\u062a\u0648\u0633\u0637\u0629 \u0641\u064a \u0627\u0644\u062e\u0637\u0648\u0631\u0629.\n\u0648\u0641\u064a \u062a\u0635\u0631\u064a\u062d \u0644\u0634\u0631\u0643\u0629 ZDI\u060c \u0642\u0627\u0644\u0648\u0627: \"\u062a\u0645 \u0625\u0635\u062f\u0627\u0631 \u062b\u063a\u0631\u062a\u064a\u0646 \u0645\u0646 CVEs \u0627\u0644\u064a\u0648\u0645 \u0648\u0648\u0635\u0641\u0627 \u0639\u0644\u0649 \u0623\u0646\u0647\u0645\u0627 \u062a\u062a\u0639\u0631\u0636\u0627\u0646 \u0644\u0647\u062c\u0645\u0627\u062a \u0646\u0634\u0637\u0629 \u0641\u064a \u0648\u0642\u062a \u0627\u0644\u0625\u0635\u062f\u0627\u0631\u060c \u0628\u064a\u0646\u0645\u0627 \u062a\u0639\u0631\u0641 \u062b\u063a\u0631\u0629 \u0648\u0627\u062d\u062f\u0629 \u0641\u0642\u0637 \u0639\u0644\u0646\u064a\u064b\u0627\".\n\n\u0627\u0644\u062b\u063a\u0631\u062a\u0627\u0646 \u0627\u0644\u062a\u064a \u062a\u0639\u0631\u0636\u0627\u0646 \u0644\u0647\u062c\u0645\u0627\u062a \u0646\u0634\u0637\u0629 \u0647\u0645\u0627:\n\u0627\u0644\u0623\u0648\u0644\u0649   - CVE-2023-36802 - \u062b\u063a\u0631\u0629 \u0627\u0631\u062a\u0641\u0627\u0639 \u0627\u0645\u062a\u064a\u0627\u0632 \u062e\u062f\u0645\u0629 \u062a\u062f\u0641\u0642 Microsoft - \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0646\u0638\u0627\u0645 SYSTEM.\n\u0627\u0644\u062b\u0627\u0646\u064a\u0629  - CVE-2023-36761 - \u062b\u063a\u0631\u0629 \u0643\u0634\u0641 \u0645\u0639\u0644\u0648\u0645\u0627\u062a Microsoft Word - \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u0644\u0643\u0634\u0641 \u0639\u0646 \u062a\u062c\u0632\u0626\u0629 NTLM hashes.\n#\u062c\u064a\u0634_\u0627\u0644\u0642\u062f\u0633_\u0627\u0644\u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a", "creation_timestamp": "2023-09-14T09:23:37.000000Z"}, {"uuid": "a39462f9-85a3-4e32-9ce5-3d0f8db7bb80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "exploited", "source": "https://t.me/true_secator/5403", "content": "\u041f\u043e\u043c\u043d\u0438\u0442\u0435 \u043f\u0440\u043e \u043f\u0440\u0430\u0432\u0438\u043b\u043e 72 \u0447\u0430\u0441\u043e\u0432? \u0415\u0441\u043b\u0438 \u043d\u0435\u0442, \u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e Raspberry Robin \u043f\u043e\u043c\u043d\u044f\u0442 \u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0440\u0430\u0437\u0432\u0438\u0432\u0430\u044e\u0442 \u0441\u0432\u043e\u044e \u043c\u0430\u043b\u0432\u0430\u0440\u044c, \u043f\u0438\u0447\u043a\u0430\u044f \u0435\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438 \u0434\u043b\u044f 1-day \u0443\u044f\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u0422\u0430\u043a \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u044b\u0435 \"one-day\" \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 - \u0442\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0431\u044b\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438, \u043d\u043e \u0435\u0449\u0435 \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u043c\u0438 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445.\n\nRaspberry Robin \u2013 \u044d\u0442\u043e \u0434\u0440\u043e\u043f\u043f\u0435\u0440 \u0441 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u0447\u0435\u0440\u0432\u044f, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u0441\u044a\u0435\u043c\u043d\u044b\u0435 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u0438, \u0434\u043b\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043d\u0430 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0438 \u043e\u0431\u043b\u0435\u0433\u0447\u0435\u043d\u0438\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0445 \u043d\u0430\u0433\u0440\u0443\u0437\u043e\u043a.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0438\u0437 Check Point, \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 1-day, \u043a\u0430\u043a \u0432 \u0441\u043b\u0443\u0447\u0430\u0435 \u0441 CVE-2023-36802 \u0438 CVE-2023-29360, \u0433\u043e\u0432\u043e\u0440\u0438\u0442 \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0441\u0432\u043e\u0438 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b, \u043b\u0438\u0431\u043e \u0438\u043c\u0435\u044e\u0442 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0445 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442.\n\n\u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0431\u044b\u043b\u043e \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e, \u0447\u0442\u043e Raspberry Robin \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043b, \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044f \u043d\u043e\u0432\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438, \u043c\u0435\u0442\u043e\u0434\u044b \u0443\u043a\u043b\u043e\u043d\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044f \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Discord \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0430\u0440\u0445\u0438\u0432\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u0446\u0435\u043b\u044f\u043c, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043f\u043e\u0441\u043b\u0435 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u0445 \u0441\u0441\u044b\u043b\u043e\u043a \u043f\u043e \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u0435.\n\n\u042d\u0442\u0438 \u0430\u0440\u0445\u0438\u0432\u044b \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b \u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 DLL-\u0444\u0430\u0439\u043b, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u0443\u0435\u0442 Raspberry Robin \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u041f\u043e\u0445\u043e\u0436\u0435, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u0435\u043b\u0430\u044e\u0442 \u0441\u0442\u0430\u0432\u043a\u0443 \u043d\u0430 \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b Raspberry Robin \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a \u0432\u043d\u0435\u0448\u043d\u0438\u0435 64-\u0431\u0438\u0442\u043d\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0438 \u043d\u0435 \u0438\u043c\u0435\u044e\u0442 \u0441\u0438\u043b\u044c\u043d\u043e\u0439 \u043e\u0431\u0444\u0443\u0441\u043a\u0430\u0446\u0438\u0438, \u0447\u0442\u043e \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440\u043d\u043e \u0434\u043b\u044f \u0442\u0430\u043a\u043e\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e.\n\n\u042d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0439, \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0439 \u043c\u0435\u0442\u043e\u0434 \u0438 \u043e\u0447\u0435\u0432\u0438\u0434\u043d\u043e, \u0447\u0442\u043e Raspberry Robin \u0431\u0443\u0434\u0443\u0442 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0442\u044c \u043f\u043e\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0441\u0432\u043e\u0439 \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u043d\u043e\u0432\u044b\u043c\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e \u0431\u043e\u043b\u044c\u0448\u0435\u0439 \u0447\u0430\u0441\u0442\u0438 \u043d\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e.", "creation_timestamp": "2024-02-12T15:30:30.000000Z"}, {"uuid": "88dd71c1-ceda-4a31-88b4-76652431a8c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36808", "type": "seen", "source": "https://t.me/cibsecurity/66018", "content": "\u203c CVE-2023-36808 \u203c\n\nGLPI is a free asset and IT management software package. Starting in version 0.80 and prior to version 10.0.8, Computer Virtual Machine form and GLPI inventory request can be used to perform a SQL injection attack. Version 10.0.8 has a patch for this issue. As a workaround, one may disable native inventory.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-06T00:27:17.000000Z"}, {"uuid": "dd8c10c9-f953-43dc-aff5-9642cdc9b544", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1266", "content": "https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802\n\u6743\u9650\u63d0\u5347\n#github #\u63d0\u6743", "creation_timestamp": "2023-10-12T04:18:21.000000Z"}, {"uuid": "a5358da0-870d-4ada-8a65-8826accb57b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1369", "content": "https://github.com/Nero22k/cve-2023-36802\n\u9488\u5bf9\u9488\u5bf9MSKSSRV.SYS\u9a71\u52a8\u7a0b\u5e8f\u7684CVE-2023-36802\u653b\u51fb\n#github", "creation_timestamp": "2023-10-27T06:10:02.000000Z"}, {"uuid": "49a8dc7e-a3c2-4890-8032-cea65d430e88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1558", "content": "https://github.com/Nero22k/cve-2023-36802\n\u9488\u5bf9\u9488\u5bf9MSKSSRV.SYS\u9a71\u52a8\u7a0b\u5e8f\u7684CVE-2023-36802\u653b\u51fb\n#github", "creation_timestamp": "2024-08-16T08:40:08.000000Z"}, {"uuid": "a5ef2c31-d53e-4d3e-bbe1-34a33afda724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1552", "content": "#exploit\n1. CVE-2023-36802:\nWindows 10/11 MSKSSRV.SYS Exploit\nhttps://github.com/Nero22k/cve-2023-36802\n\n2. Apache ActiveMQ 5.18.3 RCE\nhttps://paper.seebug.org/3058\n\n3. CVE-2023-5360:\nAuto Shell Upload WordPress Royal Elementor\nhttps://github.com/phankz/Worpress-CVE-2023-5360", "creation_timestamp": "2024-08-16T08:40:08.000000Z"}, {"uuid": "51f44df3-75d8-4601-a7e6-ec80e0463f78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1336", "content": "#exploit\n1. CVE-2023-36802:\nWindows 11 22H2\u00a0LPE Exploit\nhttps://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802\n\n2. D-Link DAP-X1860: Remote Command Injection\nhttps://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection", "creation_timestamp": "2024-08-16T08:33:54.000000Z"}, {"uuid": "671bd9bd-a145-4a00-af79-ad99e59b855b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36803", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2024/04/the-windows-registry-adventure-1.html", "content": "", "creation_timestamp": "2024-04-18T16:45:00.000000Z"}, {"uuid": "d40dd9ae-2694-42c6-bcb6-6ac662766bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-09-12T21:10:03.000000Z"}, {"uuid": "1c4f1724-aa00-4ce9-8b68-c0dc952517cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971877", "content": "", "creation_timestamp": "2024-12-24T20:35:08.276256Z"}, {"uuid": "5fd14ab9-f5bd-4e2c-bbd4-cb159e03a4d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:46.000000Z"}, {"uuid": "bbc2ebbf-41b5-4df6-bcb1-5135ad1e1da4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36803", "type": "seen", "source": "https://projectzero.google/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T05:00:00.000000Z"}, {"uuid": "bbfaf654-e18f-4130-9544-2ba734b0fef7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/146", "content": "\u2604\ufe0fCVE-2023-36802 Local Privilege Escalation\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Microsoft Streaming Service Proxy\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802\n\n#cve #privesc #windows", "creation_timestamp": "2023-10-20T22:23:54.000000Z"}, {"uuid": "94496a6b-9878-456f-b3ac-7cb494f4aae6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/ap_security/204", "content": "\u2604\ufe0fCVE-2023-36802 Local Privilege Escalation\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Microsoft Streaming Service Proxy\n\n\ud83d\udce3\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 PoC:\nhttps://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802\n\n#cve #privesc #windows", "creation_timestamp": "2023-10-20T22:23:54.000000Z"}, {"uuid": "0d407414-3783-4af3-b642-9e9a1cf50d99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/kasperskyb2b/872", "content": "\ud83d\udcbb \u0421\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439: \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0430 \u0441 Exchange\n\nMicrosoft \u0437\u0430\u043a\u0440\u044b\u043b\u0430 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043e \u0432\u0447\u0435\u0440\u0430\u0448\u043d\u0435\u043c \u043f\u0430\u043a\u0435\u0442\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439.  5 \u0438\u043c\u0435\u044e\u0442 \u0440\u0435\u0439\u0442\u0438\u043d\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445: 4 RCE \u043f\u043b\u044e\u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 Azure Kubernetes Service. \u0412\u0441\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442 24 RCE, 3 DoS, 9 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 3 \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n2 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. CVE-2023-36761 (CVSS 6.2) \u0432 Word \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0441\u043a\u0440\u043e\u043c\u043d\u043e \u043d\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043d\u043e \u043f\u043e \u0441\u0443\u0442\u0438 \u0440\u0435\u0447\u044c \u0438\u0434\u0451\u0442 \u043e\u0431 \u0443\u0442\u0435\u0447\u043a\u0435 \u0445\u044d\u0448\u0435\u0439 NTLM, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0435\u043c \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 NTLM relay. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0440\u0430\u0431\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043d\u0430 \u043f\u0430\u043d\u0435\u043b\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430.\n\u0412\u0442\u043e\u0440\u043e\u0439 \u0437\u0438\u0440\u043e\u0434\u0435\u0439 \u2014 CVE-2023-36802 (CVSS 7.8), \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e system \u0447\u0435\u0440\u0435\u0437 Microsoft Streaming Service Proxy. \n\n\u0410 \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u043e \u043f\u0443\u0442\u0430\u043d\u0438\u0446\u0443 \u0441 Exchange. \u0412 \u0441\u043e\u0441\u0442\u0430\u0432 Patch Tuesday \u0432\u043e\u0448\u043b\u043e 5 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Exchange 2016 \u0438 2019, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u0442\u044b \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0430\u0432\u0433\u0443\u0441\u0442\u043e\u0432\u0441\u043a\u0438\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 Exchange, Server Security Update. \u0412 \u0441\u0432\u043e\u0451\u043c \u0431\u043b\u043e\u0433\u0435 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043e\u0431\u044a\u044f\u0441\u043d\u044f\u044e\u0442, \u0447\u0442\u043e \u043e\u043d\u0438 \u0441\u0434\u0435\u043b\u0430\u043b\u0438 \u044d\u0442\u043e, \u0447\u0442\u043e\u0431\u044b \u0432\u0441\u0435 \u0442\u043e\u0447\u043d\u043e \u0437\u0430\u043c\u0435\u0442\u0438\u043b\u0438 \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f. \u0421\u0440\u0435\u0434\u0438 \u044d\u0442\u0438\u0445 5 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u2014 \u0442\u0440\u0438 RCE \u0441 CVSS 8.0 (\u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0439 \u0434\u043e\u043b\u0436\u0435\u043d \u0431\u044b\u0442\u044c \u0432 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d \u043d\u0430 Exchange-\u0441\u0435\u0440\u0432\u0435\u0440\u0435), \u043e\u0434\u043d\u0430 \u0443\u0442\u0435\u0447\u043a\u0430 \u0445\u044d\u0448\u0430 Net-NTLMv2,  \u0438 \u043e\u0434\u043d\u043e \u00ab\u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438\u00bb \u0431\u0435\u0437 \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 (CVE-2023-36777).\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2023-09-13T10:06:37.000000Z"}, {"uuid": "9852efd0-c4c3-4145-a69e-c85ddd5e0e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3680", "type": "seen", "source": "https://t.me/arpsyndicate/2364", "content": "#ExploitObserverAlert\n\nCVE-2023-3680\n\nDESCRIPTION: Exploit Observer has 2 entries related to CVE-2023-3680. A vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_item of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-234225 was assigned to this vulnerability.\n\nFIRST-EPSS: 0.000760000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2024-01-03T21:53:16.000000Z"}, {"uuid": "6a768e83-0115-4497-b08c-6a310ecdca1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3418", "content": "Local Privilege Escalation POC\n\nhttps://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802", "creation_timestamp": "2023-10-12T04:54:01.000000Z"}, {"uuid": "7bc43ff3-247e-4b84-ad89-668a9f3cabda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/proxy_bar/1757", "content": "CVE-2023-36802 \nwindows Local Privilege Escalation\nUsage:\nWindows_MSKSSRV_LPE_CVE-2023-6802.exe \n\u0433\u0434\u0435 pid \u2014 \u044d\u0442\u043e \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0430 (\u0432 \u0434\u0435\u0441\u044f\u0442\u0438\u0447\u043d\u043e\u043c \u0444\u043e\u0440\u043c\u0430\u0442\u0435), \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0434\u043e SYSTEM\nPOC\n\n#win #lpe", "creation_timestamp": "2023-10-11T09:45:03.000000Z"}, {"uuid": "f94c50fa-c73a-463a-97b8-75af52662020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/zero_day_uz/386", "content": "https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802\n\n\nPoc", "creation_timestamp": "2023-10-11T20:34:17.000000Z"}, {"uuid": "d54ed24b-e456-4d61-840c-f22b04f0b2d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/true_secator/4841", "content": "\u041f\u043e\u0434\u043a\u0430\u0442\u0438\u043b\u0438 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0435 PatchTuesday, \u0430 \u0432\u0441\u0435 \u0441 \u043d\u0438\u043c\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 0-day \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c \u041f\u041e \u043e\u0442 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432.\n\nMicrosoft \u043f\u043e\u0444\u0438\u043a\u0441\u0438\u043b\u0430 2 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 0-day \u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 59 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445: 3 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 - \u043e\u0431\u0445\u043e\u0434\u0430 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, 24 - RCE (5 \u0438\u0437 \u043d\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435), 9 - \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, 3 - DoS, 5 - \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0430, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432 Edge - 5 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Chromium.\n\n\u0418\u0437 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e  \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430 \u043b\u0438\u0448\u044c \u043e\u0434\u043d\u0430.\n\n\u041f\u0435\u0440\u0432\u0430\u044f CVE-2023-36802 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0441\u043b\u0443\u0436\u0431\u044b \u043f\u043e\u0442\u043e\u043a\u043e\u0432\u043e\u0439 \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 Microsoft, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u0415\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 DBAPPSecurity WeBin Lab, IBM X-Force, Microsoft Threat Intelligence \u0438 Microsoft Security Response Center.\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2023-36761 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Microsoft Word \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n\n\u0421 \u0435\u0435 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043c\u043e\u0436\u043d\u043e \u043a\u0440\u0430\u0441\u0442\u044c NTLM-\u0445\u0435\u0448\u0438 \u043f\u0440\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u0438\u0438 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430. \u0417\u0430\u0442\u0435\u043c \u0445\u044d\u0448\u0438 NTLM \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 NTLM Relay \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438. \u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u043d\u0430\u0448\u0438 \u0432 Microsoft Threat Intelligence.\n\n\u041f\u043e\u043b\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043a\u0430\u0436\u0434\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0430 \u0432\u043b\u0438\u044f\u0435\u0442, \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0437\u0434\u0435\u0441\u044c.\n\n\u0412\u0441\u043b\u0435\u0434 \u0437\u0430 Google \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 Mozilla, \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e 0-day \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Firefox \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0435 Thunderbird.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u00a0CVE-2023-4863 \u0432\u044b\u0437\u0432\u0430\u043d\u0430 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430 \u043a\u0443\u0447\u0438 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u043a\u043e\u0434\u0430 WebP (libwebp) \u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u044c \u043a \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c \u043d\u0435\u0433\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 RCE.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 WebP \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0434\u043e\u0432\u043e\u0434\u044f\u0442\u0441\u044f \u0434\u043e \u0448\u0438\u0440\u043e\u043a\u043e\u0439 \u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u043e \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441\u043e spyware.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Firefox \u0438 Thunderbird.\n\nAdobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f 0-day \u0432 Acrobat \u0438 Reader, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445 \u0435\u0449\u0435 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0430, \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e 0-day \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b \u043a\u0430\u043a \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows, \u0442\u0430\u043a \u0438 macOS, \u0430 \u0430\u0442\u0430\u043a\u0438 \u043d\u043e\u0441\u0438\u043b\u0438 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u043d\u044b\u0439 \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0445\u0430\u0440\u0430\u043a\u0442\u0435\u0440.\n\nCVE-2023-26369 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0434\u043e\u0431\u0438\u0442\u044c\u0441\u044f RCE \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439.\n\n\u041d\u043e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043b\u0438\u0448\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u0418 \u0432\u0441\u0435 \u0436\u0435 Adobe \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435, \u0432 \u0438\u0434\u0435\u0430\u043b\u0435 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 72 \u0447\u0430\u0441\u043e\u0432.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u043d\u0435\u0435 Adobe \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0432 Connect (CVE-2023-29305 \u0438 CVE-2023-29306) \u0438 Experience Manager (CVE-2023-38214 \u0438 CVE-2023-38215), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 XSS-\u0430\u0442\u0430\u043a.", "creation_timestamp": "2023-09-13T12:00:23.000000Z"}, {"uuid": "a9c9d876-85b3-46ea-9be9-65c998c3efbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36804", "type": "seen", "source": "https://t.me/cibsecurity/70320", "content": "\u203c CVE-2023-36804 \u203c\n\nWindows GDI Elevation of Privilege Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:29:10.000000Z"}, {"uuid": "9ff4a0f9-e0f8-409f-b596-81c209247805", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36800", "type": "seen", "source": "https://t.me/cibsecurity/70302", "content": "\u203c CVE-2023-36800 \u203c\n\nDynamics Finance and Operations Cross-site Scripting Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:23:09.000000Z"}, {"uuid": "8e2f054b-d610-4d88-84d3-6b0babed5986", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3680", "type": "seen", "source": "https://t.me/cibsecurity/66771", "content": "\u203c CVE-2023-3680 \u203c\n\nA vulnerability classified as critical has been found in SourceCodester Lost and Found Information System 1.0. This affects an unknown part of the file /classes/Master.php?f=save_item of the component HTTP POST Request Handler. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The identifier VDB-234225 was assigned to this vulnerability.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-15T12:28:03.000000Z"}, {"uuid": "2f27eae0-93b5-4de2-b3ce-514cbbd1648e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9184", "content": "#exploit\n1. CVE-2023-36802:\nWindows 11 22H2\u00a0LPE Exploit\nhttps://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802\n\n2. D-Link DAP-X1860: Remote Command Injection\nhttps://www.redteam-pentesting.de/en/advisories/rt-sa-2023-006/-d-link-dap-x1860-remote-command-injection", "creation_timestamp": "2023-10-12T11:00:38.000000Z"}, {"uuid": "7d18db99-b18b-4452-b57c-77cecb691612", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9271", "content": "#exploit\n1. CVE-2023-36802:\nWindows 10/11 MSKSSRV.SYS Exploit\nhttps://github.com/Nero22k/cve-2023-36802\n\n2. Apache ActiveMQ 5.18.3 RCE\nhttps://paper.seebug.org/3058\n\n3. CVE-2023-5360:\nAuto Shell Upload WordPress Royal Elementor\nhttps://github.com/phankz/Worpress-CVE-2023-5360", "creation_timestamp": "2023-10-27T11:00:45.000000Z"}, {"uuid": "16fbb246-9da8-4a36-a387-bab9e9e2b6f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36803", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/9230", "content": "#exploit\n1. CVE-2023-38600:\nApple Safari copyWithin gone (way) outside\nhttps://www.zerodayinitiative.com/blog/2023/10/17/cve-2023-38600-story-of-an-innocent-apple-safari-copywithin-gone-way-outside\n\n2. CVE-2023-36803:\nWindows Kernel OOB Reads/Mem.Disclosure\nhttps://packetstormsecurity.com/files/175109\n\n3. CVE-2023-4169:\nRuijie RG-EW1200G - Administrator Password/API/SYS/SET_PASSWD/ACCESS CONTROL\nhttps://github.com/thedarknessdied/CVE-2023-4169_CVE-2023-3306_CVE-2023-4415", "creation_timestamp": "2023-10-20T11:06:20.000000Z"}, {"uuid": "fc851937-3cd9-4513-b892-b74993b343be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36803", "type": "seen", "source": "https://googleprojectzero.blogspot.com/2025/05/the-windows-registry-adventure-7-attack-surface.html", "content": "", "creation_timestamp": "2025-05-23T07:05:54.874000Z"}, {"uuid": "80b9938d-627d-46ca-82d7-c5646e051108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1107", "content": "", "creation_timestamp": "2023-09-13T04:00:00.000000Z"}, {"uuid": "ef3d4c18-5813-4dc1-88b9-0a0c4a01935f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/9e463f47-0725-4e1b-99ec-c582e600a803", "content": "", "creation_timestamp": "2026-02-02T12:26:51.260084Z"}, {"uuid": "10ef13db-0f55-4cb6-ba67-93837c8d3b3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "https://t.me/cKure/11720", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 CVE-2023-36802: Local Privilege Escalation POC.\n\nhttps://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802", "creation_timestamp": "2023-10-13T08:52:35.000000Z"}, {"uuid": "c9384bcf-f85d-48d0-84b8-6f85e235843f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/ctinow/136491", "content": "https://ift.tt/n43CVzw\nMicrosoft, Adobe fix zero-days exploited by attackers (CVE-2023-26369, CVE-2023-36761, CVE-2023-36802)", "creation_timestamp": "2023-09-12T22:17:21.000000Z"}, {"uuid": "99c34d50-c658-4ab3-9ff4-317e209ab3fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "published-proof-of-concept", "source": "Telegram/kSgTCxhHaxKY_9gSoKh3RlpuFjU7qw5pFr0sVqOrSBCh2w", "content": "", "creation_timestamp": "2023-10-28T05:50:41.000000Z"}, {"uuid": "9b00bca7-1165-4e73-87da-6f62d10fafb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "seen", "source": "https://t.me/arpsyndicate/149", "content": "#ExploitObserverAlert\n\nCVE-2023-36802\n\nDESCRIPTION: Exploit Observer has 13 entries related to CVE-2023-36802. Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability\n\nFIRST-EPSS: 0.000540000\nNVD-IS: 5.9\nNVD-ES: 1.8", "creation_timestamp": "2023-11-13T02:40:41.000000Z"}, {"uuid": "6f93723d-bf28-4097-bb25-d64459cd3785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36802", "type": "exploited", "source": "https://t.me/anonymous_syria_team/95", "content": "\u0625\u0635\u062f\u0627\u0631 \u062a\u0635\u062d\u064a\u062d\u0627\u062a \u062e\u0627\u0635\u0629 \u0628 \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0644\u0634\u0647\u0631 \u0633\u0628\u062a\u0645\u0628\u0631 2023 \u064a\u0648\u0645 \u0627\u0644\u062b\u0644\u0627\u062b\u0627\u0621 9/12 \u064a\u0639\u0627\u0644\u062c 59 \u0639\u064a\u0628\u064b\u0627 \u062c\u062f\u064a\u062f\u064b\u0627\u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u062b\u063a\u0631\u062a\u064a\u0646 Zero-day \u063a\u064a\u0631 \u0645\u0639\u0631\u0641\u062a\u064a\u0646 \u062a\u062a\u0639\u0631\u0636\u0627\u0646 \u0644\u0647\u062c\u0645\u0627\u062a \u0646\u0634\u0637\u0629.\n\n\u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639\u0647\u0627 \u062a\u0623\u062b\u0631 \u0628\u0634\u0643\u0644 \u0631\u0626\u064a\u0633\u064a \u0628\u0645\u0646\u062a\u062c\u0627\u062a \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a\u060c \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0646\u0638\u0627\u0645 \u0627\u0644\u062a\u0634\u063a\u064a\u0644 Microsoft Windows \u0648\u0645\u0643\u0648\u0646\u0627\u062a\u0647\u060c \u0648\u062e\u0627\u062f\u0645 Exchange Server\u060c \u0648\u0628\u0631\u0627\u0645\u062c Office \u0648\u0645\u0643\u0648\u0646\u0627\u062a\u0647\u0627\u060c \u0648NET \u0648Visual Studio\u060c \u0648\u062e\u062f\u0645\u0629 Azure\u060c \u0648Microsoft Dynamics\u060c \u0648\u0628\u0631\u0646\u0627\u0645\u062c Windows Defender.\n\n\u0645\u0646 \u0628\u064a\u0646 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0627\u062a\u060c \u062a\u0645 \u062a\u0635\u0646\u064a\u0641 \u062e\u0645\u0633 \u0645\u0646\u0647\u0627 \u0643\u062b\u063a\u0631\u0627\u062a \u062d\u0631\u062c\u0629\u060c \u064855 \u0643\u062b\u063a\u0631\u0627\u062a \u0647\u0627\u0645\u0629\u060c \u0648\u0648\u0627\u062d\u062f\u0629 \u0643\u062b\u063a\u0631\u0629 \u0645\u062a\u0648\u0633\u0637\u0629 \u0641\u064a \u0627\u0644\u062e\u0637\u0648\u0631\u0629.\n\u0648\u0641\u064a \u062a\u0635\u0631\u064a\u062d \u0644\u0634\u0631\u0643\u0629 ZDI\u060c \u0642\u0627\u0644\u0648\u0627: \"\u062a\u0645 \u0625\u0635\u062f\u0627\u0631 \u062b\u063a\u0631\u062a\u064a\u0646 \u0645\u0646 CVEs \u0627\u0644\u064a\u0648\u0645 \u0648\u0648\u0635\u0641\u0627 \u0639\u0644\u0649 \u0623\u0646\u0647\u0645\u0627 \u062a\u062a\u0639\u0631\u0636\u0627\u0646 \u0644\u0647\u062c\u0645\u0627\u062a \u0646\u0634\u0637\u0629... \u0641\u064a \u0648\u0642\u062a \u0627\u0644\u0625\u0635\u062f\u0627\u0631\u060c \u0628\u064a\u0646\u0645\u0627 \u062a\u0639\u0631\u0641 \u062b\u063a\u0631\u0629 \u0648\u0627\u062d\u062f\u0629 \u0641\u0642\u0637 \u0639\u0644\u0646\u064a\u064b\u0627\".\n\n\u0627\u0644\u062b\u063a\u0631\u062a\u0627\u0646 \u0627\u0644\u062a\u064a \u062a\u0639\u0631\u0636\u0627\u0646 \u0644\u0647\u062c\u0645\u0627\u062a \u0646\u0634\u0637\u0629 \u0647\u0645\u0627:\n\u0627\u0644\u0623\u0648\u0644\u0649   - CVE-2023-36802 - \u062b\u063a\u0631\u0629 \u0627\u0631\u062a\u0641\u0627\u0639 \u0627\u0645\u062a\u064a\u0627\u0632 \u062e\u062f\u0645\u0629 \u062a\u062f\u0641\u0642 Microsoft ...- \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u0646\u0638\u0627\u0645 SYSTEM.\n\u0627\u0644\u062b\u0627\u0646\u064a\u0629  - CVE-2023-36761 - \u062b\u063a\u0631\u0629 \u0643\u0634\u0641 \u0645\u0639\u0644\u0648\u0645\u0627\u062a Microsoft Word - \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0647\u0630\u0647 \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u0644\u0643\u0634\u0641 \u0639\u0646 \u062a\u062c\u0632\u0626\u0629 NTLM hashes.", "creation_timestamp": "2023-09-14T12:07:41.000000Z"}, {"uuid": "65011e36-8039-4c4a-99e4-a9b2110513e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36801", "type": "seen", "source": "https://t.me/cibsecurity/70309", "content": "\u203c CVE-2023-36801 \u203c\n\nDHCP Server Service Information Disclosure Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:23:17.000000Z"}, {"uuid": "4f1de8e4-28a0-4fd7-9ade-4d27ca3c5cb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36805", "type": "seen", "source": "https://t.me/cibsecurity/70330", "content": "\u203c CVE-2023-36805 \u203c\n\nWindows MSHTML Platform Security Feature Bypass Vulnerability\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-12T20:29:22.000000Z"}, {"uuid": "6a05ba9f-9430-4111-b937-f42dafa6d8ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-36807", "type": "published-proof-of-concept", "source": "https://t.me/cibsecurity/65818", "content": "\u203c CVE-2023-36807 \u203c\n\npypdf is a pure-python PDF library capable of splitting, merging, cropping, and transforming the pages of PDF files. In version 2.10.5 an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This infinite loop blocks the current process and can utilize a single core of the CPU by 100%. It does not affect memory usage. That is, for example, the case if the user extracted metadata from such a malformed PDF. Versions prior to 2.10.5 throw an error, but do not hang forever. This issue was fixed with https://github.com/py-pdf/pypdf/pull/1331 which has been included in release 2.10.6. Users are advised to upgrade. Users unable to upgrade should modify `PyPDF2/generic/_data_structures.py::read_object` to an an error throwing case. See GHSA-hm9v-vj3r-r55m for details.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-30T22:15:17.000000Z"}]}