{"vulnerability": "CVE-2024-43461", "sightings": [{"uuid": "2a8fd510-38d4-4a24-9999-2d24a87b83a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1368", "content": "", "creation_timestamp": "2024-09-11T04:00:00.000000Z"}, {"uuid": "bdc30b68-489b-4470-b4f9-f410a3dbce45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/d1c5628a-2c43-4149-930d-28e6f1a3a20d", "content": "", "creation_timestamp": "2026-02-02T12:26:29.140889Z"}, {"uuid": "bc218ea8-465d-48a2-b531-e8274ad278d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/HackingInsights/13238", "content": "Recently patched Windows flaw CVE-2024-43461 was actively exploited as a zero-day before July 2024\nhttps://ift.tt/Bay7LFl", "creation_timestamp": "2024-09-17T09:51:55.000000Z"}, {"uuid": "b006a895-9fed-4a61-a975-f1119bda4b91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/13189", "content": "\u200aNew Zero-Day Emerges After Microsoft Patch Tuesday: CVE-2024-43461 Targets Windows MSHTML\n\nhttps://securityonline.info/new-zero-day-emerges-after-microsoft-patch-tuesday-cve-2024-43461-targets-windows-mshtml/", "creation_timestamp": "2024-09-16T14:39:44.000000Z"}, {"uuid": "b4e440bf-fd3c-4edf-a813-f10f4fbbee12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/CyberBulletin/740", "content": "\u26a1\ufe0fRecently patched Windows flaw CVE-2024-43461 was actively exploited as a zero-day before July 2024.\n\n#CyberBulletin", "creation_timestamp": "2024-09-16T19:34:25.000000Z"}, {"uuid": "fdaf63b0-b8a2-4b53-bd2b-bb36c20ae51d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/ctinow/223554", "content": "Recently patched Windows flaw CVE-2024-43461 was actively exploited as a zero-day before July 2024\nhttps://ift.tt/Bay7LFl", "creation_timestamp": "2024-09-16T16:54:39.000000Z"}, {"uuid": "b3711c73-3060-4d28-97ad-5a707595f74d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://t.me/CyberBulletin/25565", "content": "\u26a1\ufe0fNew Zero-Day Emerges After Microsoft Patch Tuesday: CVE-2024-43461 Targets Windows MSHTML.\n\n#CyberBulletin", "creation_timestamp": "2024-09-16T09:21:12.000000Z"}, {"uuid": "2c450801-5812-46ed-b63b-c532a44ec3f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/CyberBulletin/25581", "content": "\u26a1\ufe0fRecently patched Windows flaw CVE-2024-43461 was actively exploited as a zero-day before July 2024.\n\n#CyberBulletin", "creation_timestamp": "2024-09-16T19:34:25.000000Z"}, {"uuid": "c2efad6f-8049-488b-b611-579d9af7111a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-09-20T18:10:03.000000Z"}, {"uuid": "7b7b8371-c0a6-4bd6-b13a-1f1698fce161", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://bsky.app/profile/gothburz.bsky.social/post/3lfaqqbiv7p2s", "content": "", "creation_timestamp": "2025-01-08T18:03:09.392517Z"}, {"uuid": "33aaaada-9caa-4164-8616-6b2302bf97be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/BleepingComputer/20677", "content": "\u200aWindows vulnerability abused braille \u201cspaces\u201d in zero-day attacks\n\nA recently fixed \"Windows MSHTML spoofing vulnerability\" tracked under CVE-2024-43461 is now marked as previously exploited after it was used in attacks by the Void Banshee APT hacking group. [...]\n\nhttps://www.bleepingcomputer.com/news/security/windows-vulnerability-abused-braille-spaces-in-zero-day-attacks/", "creation_timestamp": "2024-09-15T18:23:36.000000Z"}, {"uuid": "5fe7d15a-def8-4497-811c-9a7a14264967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/kasperskyb2b/1408", "content": "\ud83d\udd2c \u0421\u0435\u043d\u0442\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0439 \u0432\u0442\u043e\u0440\u043d\u0438\u043a \u043f\u0430\u0442\u0447\u0435\u0439: 3-5 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u0432 \u0438 79 CVE\n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u043e\u0441\u0435\u043d\u043d\u0438\u0439 \u043f\u0430\u043a\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 Microsoft \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 79 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f 7 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445. \u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e CVE (30) \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0442 \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, RCE \u2014 23, \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0435\u043d\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u2014 11, DoS \u2014 8, \u043e\u0431\u0445\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u2014 4.\n\n4 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u044b \u043a\u0430\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0432\u0436\u0438\u0432\u0443\u044e, \u043d\u043e \u043f\u0440\u0438 \u0436\u0435\u043b\u0430\u043d\u0438\u0438 \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0441\u0447\u0438\u0442\u0430\u0442\u044c \u0442\u0440\u0438 \u0438\u043b\u0438 \u043f\u044f\u0442\u044c \ud83e\udd21. CVE-2024-43491 (RCE, CVSS 9.8) \u044d\u0442\u043e \u00ab\u0441\u0430\u043c\u043e\u0441\u0442\u0440\u0435\u043b\u00bb \u2014 \u0434\u0435\u0444\u0435\u043a\u0442 \u0432 \u043c\u0430\u0440\u0442\u043e\u0432\u0441\u043a\u043e\u043c Patch Tuesday \u043f\u0440\u0438\u0432\u0451\u043b \u043a \u043e\u0442\u043a\u0430\u0442\u0443 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u043e\u043f\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 \u0441\u043e \u0441\u0442\u0430\u0440\u043e\u0439 \u0441\u0431\u043e\u0440\u043a\u043e\u0439 Windows 10 (\u0432\u0435\u0440\u0441\u0438\u0438 1507, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Windows 10 Enterprise 2015 LTSB \u0438  IoT Enterprise 2015 LTSB). \u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u0441\u0430\u043c\u0430 CVE-2024-43491 \u0432\u0440\u043e\u0434\u0435 \u0431\u044b \u043d\u0438\u043a\u0435\u043c \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f, \u043d\u043e \u043e\u043d\u0430 \u0441\u043d\u043e\u0432\u0430 \u0430\u043a\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0441\u0442\u0430\u0440\u044b\u0435, \u0440\u0430\u043d\u0435\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0432\u0448\u0438\u0435\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0431\u0430\u0433\u0438. \u0412 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 \u0443\u043a\u0430\u0437\u0430\u043d\u044b \u043e\u043f\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b Windows, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0438\u0441\u044c \u044d\u0442\u043e\u043c\u0443 \u0434\u0430\u0443\u043d\u0433\u0440\u0435\u0439\u0434\u0443, \u0430 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u0432\u0430 \u043f\u0430\u043a\u0435\u0442\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439: KB5043936 \u0438 KB5043083.\n\n\u0414\u0440\u0443\u0433\u0438\u0435 \u0437\u0438\u0440\u043e\u0434\u0435\u0438:\n- CVE-2024-38217 (CVSS 5.4) \u2014 \u044d\u0442\u043e \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u0444\u0438\u043a\u0441 \u0434\u043b\u044f LNK stomping, \u043e\u0431\u0445\u043e\u0434\u0430 MotW. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u0440\u0430\u0437\u043e\u0431\u0440\u0430\u043d\u0430 \u0418\u0411-\u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e, \u043f\u0440\u0438\u0447\u0451\u043c \u043c\u043d\u043e\u0433\u043e \u043b\u0435\u0442.\n- CVE-2024-38014 (CVSS 7.8) \u2014 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0434\u043e system \u0447\u0435\u0440\u0435\u0437 Windows Installer, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e.\n- CVE-2024-38226 (CVSS 7.3) \u2014 \u043e\u0431\u0445\u043e\u0434 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Microsoft Publisher 2016, Microsoft Office LTSC 2021, Office 2019, \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u044c \u043a \u0437\u0430\u043f\u0443\u0441\u043a\u0443 \u043d\u0435\u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u043c\u0430\u043a\u0440\u043e\u0441\u043e\u0432 \u0432 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435, \u043d\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u043d\u0430\u0434\u043e \u0443\u0431\u0435\u0434\u0438\u0442\u044c \u0441\u043a\u0430\u0447\u0430\u0442\u044c \u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u044d\u0442\u043e\u0442 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442. \u0427\u0435\u0440\u0435\u0437 \u043f\u0430\u043d\u0435\u043b\u044c \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0441\u043c\u043e\u0442\u0440\u0430 \u0430\u0442\u0430\u043a\u0430 \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442.\n\n\u0411\u043e\u043d\u0443\u0441-\u0442\u0440\u0435\u043a: Zero Day Initiative \u0441\u0447\u0438\u0442\u0430\u044e\u0442, \u0447\u0442\u043e \u0435\u0449\u0451 \u043e\u0434\u0438\u043d \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 (CVE-2024-43461, CVSS 8.8, spoofing \u0432 MSHTML) \u0442\u043e\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e.\n\n\u0421\u0440\u0435\u0434\u0438 \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432\u0436\u0438\u0432\u0443\u044e, \u0442\u0440\u0435\u0432\u043e\u0433\u0443 \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0442 \u0434\u0432\u0430 \u0431\u0430\u0433\u0430 \u0432 Sharepoint: CVE-2024-38018 (RCE, CVSS 8.8) \u0438 CVE-2024-43464 (RCE, CVSS 7.2) \u2014 \u043e\u0431\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u043d\u043e \u043f\u0435\u0440\u0432\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u043d\u0438\u0437\u043a\u043e\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c. \u0413\u0440\u043e\u0437\u043d\u043e \u0432\u044b\u0433\u043b\u044f\u0434\u044f\u0449\u0438\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 \u0432 Windows NAT (CVE-2024-38119, RCE, CVSS 7.5), \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0443 \u0438\u0437 \u0442\u043e\u0439 \u0436\u0435 \u043f\u043e\u0434\u0441\u0435\u0442\u0438, \u0433\u0434\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u0436\u0435\u0440\u0442\u0432\u0430, \u0438 \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0433\u043e\u043d\u043a\u0443 (race condition).\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 #Microsoft @\u041f2\u0422", "creation_timestamp": "2024-09-11T09:47:58.000000Z"}, {"uuid": "85ecc8f3-11c5-4770-a5bf-1a2f91c7b739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:59.000000Z"}, {"uuid": "4fc11af6-286d-47ec-9df8-fafc00e5135b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://t.me/cvedetector/5292", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43461 - Microsoft Windows MSHTML Type Confusion Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43461 \nPublished : Sept. 10, 2024, 5:15 p.m. | 42\u00a0minutes ago \nDescription : Windows MSHTML Platform Spoofing Vulnerability \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-10T20:06:31.000000Z"}, {"uuid": "5b9b04ac-cbb3-4171-b8db-6b554719e187", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://t.me/CyberBulletin/724", "content": "\u26a1\ufe0fNew Zero-Day Emerges After Microsoft Patch Tuesday: CVE-2024-43461 Targets Windows MSHTML.\n\n#CyberBulletin", "creation_timestamp": "2024-09-16T09:21:12.000000Z"}, {"uuid": "236b0599-8084-4263-86af-85b9c72eabef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/xakep_ru/16406", "content": "\u0425\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u043f\u0440\u043e\u0431\u0435\u043b\u044c\u043d\u044b\u0435 \u0441\u0438\u043c\u0432\u043e\u043b\u044b \u0411\u0440\u0430\u0439\u043b\u044f \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Windows\n\n\u041d\u0435\u0434\u0430\u0432\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u043f\u0443\u0444\u0438\u043d\u0433\u0430 MSHTML \u0432 Windows (CVE-2024-43461), \u0442\u0435\u043f\u0435\u0440\u044c \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 \u043a\u0430\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0430\u044f\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445. \u0414\u0435\u043b\u043e \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0445\u0430\u043a-\u0433\u0440\u0443\u043f\u043f\u0430 Void Banshee \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u043b\u0430 \u0435\u0435 \u0432 \u0441\u0432\u043e\u0438\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u044f\u0445, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0441\u0438\u043c\u0432\u043e\u043b\u044b \u0438\u0437 Unicode-\u0431\u043b\u043e\u043a\u0430 \u0448\u0440\u0438\u0444\u0442\u0430 \u0411\u0440\u0430\u0439\u043b\u044f \u0434\u043b\u044f \u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 \u043f\u043e\u0434 PDF.\n\nhttps://xakep.ru/2024/09/16/braille-pattern-blank-void-banshee/", "creation_timestamp": "2024-09-16T19:17:18.000000Z"}, {"uuid": "8630984a-f939-47b6-b026-b2146efb597c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://t.me/anti_malware/18326", "content": "\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 Microsoft \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0432 Windows \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2024-43461. \u0422\u0435\u043f\u0435\u0440\u044c \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u0447\u0442\u043e \u0431\u0440\u0435\u0448\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 Void Banshee.", "creation_timestamp": "2024-09-17T15:47:31.000000Z"}, {"uuid": "299271a5-c02f-40cb-ad45-f4f16758f7fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://www.thezdi.com/blog/2024/9/10/the-september-2024-security-update-review", "content": "", "creation_timestamp": "2024-09-10T17:25:32.000000Z"}, {"uuid": "3d23a5cb-adc3-46f2-96ad-26da9b1a7bb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "https://www.thezdi.com/blog/2025/1/8/zdi-threat-hunting-2024-highlights-trends-amp-challenges", "content": "", "creation_timestamp": "2025-01-08T16:07:59.000000Z"}, {"uuid": "b861871c-acaa-4884-b8bb-9729be8dee9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "seen", "source": "MISP/69967a43-1001-47ad-a325-0bc47a7f4f88", "content": "", "creation_timestamp": "2025-08-30T22:04:45.000000Z"}, {"uuid": "280d52d2-5422-4c10-b923-514c201d5bcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43461", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/d1c5628a-2c43-4149-930d-28e6f1a3a20d", "content": "", "creation_timestamp": "2026-02-02T12:26:29.140889Z"}]}