{"vulnerability": "CVE-2024-4671", "sightings": [{"uuid": "41c3b8c0-1797-46ff-94ff-11294b059057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "Telegram/WZQMfdH3O2w4ic7Pd6kvNx9r1ozt2ogB1cGcre0430Zsxg", "content": "", "creation_timestamp": "2024-05-10T15:53:15.000000Z"}, {"uuid": "19df15f6-216d-4902-8c66-80e99e79dc3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/7311", "content": "The Hacker News\nChrome Zero-Day Alert \u2014 Update Your Browser to Patch New Vulnerability\n\nGoogle on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild.\nTracked as&nbsp;CVE-2024-4671, the high-severity vulnerability has&nbsp;been described&nbsp;as a case of use-after-free in the Visuals component.&nbsp;It was reported by an anonymous researcher on May 7, 2024.\nUse-after-free bugs, which arise when a program", "creation_timestamp": "2024-05-10T15:53:16.000000Z"}, {"uuid": "ccd2a51d-c5d7-4457-9698-a73c5c9d469a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1372", "content": "The Hacker News\nChrome Zero-Day Alert \u2014 Update Your Browser to Patch New Vulnerability\n\nGoogle on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild.\nTracked as&nbsp;CVE-2024-4671, the high-severity vulnerability has&nbsp;been described&nbsp;as a case of use-after-free in the Visuals component.&nbsp;It was reported by an anonymous researcher on May 7, 2024.\nUse-after-free bugs, which arise when a program", "creation_timestamp": "2024-05-10T15:53:16.000000Z"}, {"uuid": "c6db0524-0197-444e-9677-855346aa30d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://t.me/ctinow/217058", "content": "https://ift.tt/hdtaLGT\nGet Weekends Back: Put Chrome CVEs like CVE-2024-4671 on Auto-Patching", "creation_timestamp": "2024-05-11T02:09:56.000000Z"}, {"uuid": "c65bfb39-86cb-4af0-ad26-cf90ffffa92b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11448", "content": "#exploit\n#Kernel_Security\nCVE-2024-46713:\nRace conditions in Linux Kernel perf events\nhttps://binarygecko.com/race-conditions-in-linux-kernel-perf-events\n]-&gt; https://u1f383.github.io/linux/2024/11/15/a-quick-note-for-perf-cve-2024-46713.html", "creation_timestamp": "2024-11-20T18:54:01.000000Z"}, {"uuid": "edd290ff-fd3e-41c7-88a7-284ad0c57ecb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-05-13T18:10:02.000000Z"}, {"uuid": "fff4fc2f-7a34-4adf-91d1-7d75c3eb9f83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46716", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "d39995b4-4de8-4a19-b977-5fd6015e2ba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46719", "type": "seen", "source": "https://t.me/cvedetector/5920", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46719 - Linux Kernel usb AlterMode Null Pointer Dereference\", \n  \"Content\": \"CVE ID : CVE-2024-46719 \nPublished : Sept. 18, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nusb: typec: ucsi: Fix null pointer dereference in trace  \n  \nucsi_register_altmode checks IS_ERR for the alt pointer and treats  \nNULL as valid. When CONFIG_TYPEC_DP_ALTMODE is not enabled,  \nucsi_register_displayport returns NULL which causes a NULL pointer  \ndereference in trace. Rather than return NULL, call  \ntypec_port_register_altmode to register DisplayPort alternate mode  \nas a non-controllable mode when CONFIG_TYPEC_DP_ALTMODE is not enabled. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:01:39.000000Z"}, {"uuid": "79c3870e-0d90-41e4-a4ac-f60f6af59221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46717", "type": "seen", "source": "https://t.me/cvedetector/5916", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46717 - Apache NetMLX5e Memory Leak Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46717 \nPublished : Sept. 18, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nnet/mlx5e: SHAMPO, Fix incorrect page release  \n  \nUnder the following conditions:  \n1) No skb created yet  \n2) header_size == 0 (no SHAMPO header)  \n3) header_index + 1 % MLX5E_SHAMPO_WQ_HEADER_PER_PAGE == 0 (this is the  \n   last page fragment of a SHAMPO header page)  \n  \na new skb is formed with a page that is NOT a SHAMPO header page (it  \nis a regular data page). Further down in the same function  \n(mlx5e_handle_rx_cqe_mpwrq_shampo()), a SHAMPO header page from  \nheader_index is released. This is wrong and it leads to SHAMPO header  \npages being released more than once. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:01:33.000000Z"}, {"uuid": "fbd13d15-d259-46b2-802d-e68403332ef4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46716", "type": "seen", "source": "https://t.me/cvedetector/5923", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46716 - Altera MSGDMA Linux Kernel DMA Engine Use-After-Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46716 \nPublished : Sept. 18, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndmaengine: altera-msgdma: properly free descriptor in msgdma_free_descriptor  \n  \nRemove list_del call in msgdma_chan_desc_cleanup, this should be the role  \nof msgdma_free_descriptor. In consequence replace list_add_tail with  \nlist_move_tail in msgdma_free_descriptor.  \n  \nThis fixes the path:  \n   msgdma_free_chan_resources -&gt; msgdma_free_descriptors -&gt;  \n   msgdma_free_desc_list -&gt; msgdma_free_descriptor  \n  \nwhich does not correctly free the descriptors as first nodes were not  \nremoved from the list. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:01:42.000000Z"}, {"uuid": "22c2613b-612a-460c-9625-52a0c7bddda3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://t.me/cvedetector/5616", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46713 - Apache Linux Kernel Mutex Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46713 \nPublished : Sept. 13, 2024, 3:15 p.m. | 39\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nperf/aux: Fix AUX buffer serialization  \n  \nOle reported that event-&gt;mmap_mutex is strictly insufficient to  \nserialize the AUX buffer, add a per RB mutex to fully serialize it.  \n  \nNote that in the lock order comment the perf_event::mmap_mutex order  \nwas already wrong, that is, it nesting under mmap_lock is not new with  \nthis patch. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T17:58:03.000000Z"}, {"uuid": "8d1434f1-4303-4908-b6a5-aa827c8f3e46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46712", "type": "seen", "source": "https://t.me/cvedetector/5558", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46712 - VMware drm Driver: Unauthenticated Coherent Dumb Buffer Disable Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46712 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/vmwgfx: Disable coherent dumb buffers without 3d  \n  \nCoherent surfaces make only sense if the host renders to them using  \naccelerated apis. Without 3d the entire content of dumb buffers stays  \nin the guest making all of the extra work they're doing to synchronize  \nbetween guest and host useless.  \n  \nConfigurations without 3d also tend to run with very low graphics  \nmemory limits. The pinned console fb, mob cursors and graphical login  \nmanager tend to run out of 16MB graphics memory that those guests use.  \n  \nFix it by making sure the coherent dumb buffers are only used on  \nconfigs with 3d enabled. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:35:55.000000Z"}, {"uuid": "4aba55be-7931-44ad-93aa-4c3ec75605b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "published-proof-of-concept", "source": "Telegram/oYmpRnsP0n5l9UoNVnmi0Tqagk8hdqptE5SM8rliaeN2ddE", "content": "", "creation_timestamp": "2025-04-19T13:00:06.000000Z"}, {"uuid": "fbe30695-e1a9-4266-be4c-99073bd405b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "Telegram/hXBVtq_vQALtVQeIFAgKK-S2hj8k3D51My4YiCPF4vPfe-M", "content": "", "creation_timestamp": "2024-05-14T22:53:21.000000Z"}, {"uuid": "65943c9f-19b2-4a77-be24-2ee9b35a705f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://t.me/true_secator/5729", "content": "\u041d\u0435 \u043f\u0440\u043e\u0448\u043b\u043e \u0438 \u043d\u0435\u0434\u0435\u043b\u0438, \u043a\u0430\u043a Chrome \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0441\u044f \u043d\u043e\u0432\u043e\u0439 0-day, \u0434\u043b\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u044d\u043a\u0441\u0442\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0421\u043f\u0443\u0441\u0442\u044f \u0442\u0440\u0438 \u0434\u043d\u044f \u0432\u0441\u043b\u0435\u0434 \u0437\u0430 \u043f\u044f\u0442\u044b\u043c \u043d\u0443\u043b\u0435\u043c CVE-2024-4671 \u0432 Visuals \u0441\u043f\u0438\u0441\u043e\u043a \u0442\u0435\u043a\u0443\u0449\u0435\u0433\u043e \u0433\u043e\u0434\u0430 \u043f\u043e\u043f\u043e\u043b\u043d\u0438\u043b\u0441\u044f \u0448\u0435\u0441\u0442\u044b\u043c CVE-2024-4761. \u041d\u043e\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0434\u0432\u0438\u0436\u043e\u043a JavaScript Chrome V8 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0437\u0430\u043f\u0438\u0441\u0438 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0433\u0440\u0430\u043d\u0438\u0446.\n\n\u041f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0435 \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u043e \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u044b \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u043e\u0433\u043e \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0438\u043b\u0438 \u0431\u0443\u0444\u0435\u0440\u0430, \u0447\u0442\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f\u0443 \u043a \u0434\u0430\u043d\u043d\u044b\u043c, \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0441\u0431\u043e\u044f\u043c.\n\n\u0412 \u0441\u0432\u043e\u0435\u043c \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 Google \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0438 \u0440\u0430\u0431\u043e\u0447\u0435\u0433\u043e \u044d\u043a\u0441\u043f\u043e\u0440\u0442\u0430 \u0434\u043b\u044f CVE-2024-4761, \u043d\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u0435\u0442.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0432 \u0432\u0435\u0440\u0441\u0438\u0438 124.0.6367.207/.208 \u0434\u043b\u044f Mac/Windows \u0438 124.0.6367.207 \u0434\u043b\u044f Linux. \u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0443\u0434\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0432\u0441\u0435\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u0434\u043d\u0438.", "creation_timestamp": "2024-05-14T12:13:04.000000Z"}, {"uuid": "2898879c-64bb-434f-bc74-bb9aaeaf300b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/true_secator/5720", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u044f\u0442\u043e\u0439 \u0437\u0430 \u044d\u0442\u043e\u0442 \u0433\u043e\u0434 0-day \u0432 Chrome 124, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a\u00a0CVE-2024-4671\u00a0\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 use-after-free \u0432 Visuals, \u043d\u0430\u0431\u043e\u0440\u0435 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a \u0434\u043b\u044f \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u043c.\n\n\u041e\u0431 \u043e\u0448\u0438\u0431\u043a\u0435 \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e 7 \u043c\u0430\u044f 2024 \u0433\u043e\u0434\u0430 \u043f\u043e\u0441\u043b\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043e\u0442 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u0433\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f. \u041f\u0440\u0438\u0447\u0435\u043c \u043d\u0430 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0443 \u0438 \u0432\u044b\u043f\u0443\u0441\u043a \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0443\u0448\u043b\u043e \u0432\u0441\u0435\u0433\u043e \u0434\u0432\u0430 \u0434\u043d\u044f.\n\n\u0412 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\u0445 Google \u043d\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043d\u0438\u043a\u0430\u043a\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0438 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0432\u043e\u0437\u043d\u0430\u0433\u0440\u0430\u0436\u0434\u0435\u043d\u0438\u044f \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438, \u043d\u0438 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u0430\u0442\u0430\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0435, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441\u043e spyware.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c Chrome \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 124.0.6367.201/.202 \u0434\u043b\u044f Windows \u0438 macOS \u0438 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 124.0.6367.201 \u0434\u043b\u044f Linux \u0434\u043b\u044f \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044f \u0440\u0438\u0441\u043a\u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0433\u0440\u043e\u0437.", "creation_timestamp": "2024-05-13T13:29:53.000000Z"}, {"uuid": "b2b3cc15-3196-4491-8129-cce02b9ff550", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/thehackernews/4938", "content": "WARNING: Using Chrome or any Chromium-based browsers? Don't wait\u2014update your browser ASAP! \n \nGoogle has just released an update to patch a new zero-day flaw, CVE-2024-4671, which hackers are actively exploiting in the wild. \n \nDetails https://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html", "creation_timestamp": "2024-05-10T12:50:53.000000Z"}, {"uuid": "0fb3533e-2e60-4857-9bd7-341d45dede99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:54.000000Z"}, {"uuid": "65e9e7f3-c3bd-4eea-9ecb-0314e4c91a33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3lnouaqgu2i2z", "content": "", "creation_timestamp": "2025-04-26T04:04:50.962159Z"}, {"uuid": "137fb9d1-02d0-47d2-8406-77a112f91a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "MISP/682055c7-fb73-4d29-be0f-ef00f55f3970", "content": "", "creation_timestamp": "2025-07-03T05:09:44.000000Z"}, {"uuid": "d5bec307-0c49-41ca-9335-e9fc7d097b09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3luso5gun5k27", "content": "", "creation_timestamp": "2025-07-25T18:22:41.275712Z"}, {"uuid": "7c7ba446-c855-4dae-b7f5-5430470b5701", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46714", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "ec236fa8-9abb-4067-99c3-9f299448ec76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:11.000000Z"}, {"uuid": "1c5806e3-3eaf-4a7a-9898-d035db841582", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-4671", "type": "seen", "source": "https://bsky.app/profile/cyberhub.blog/post/3m5vdomstkh2q", "content": "", "creation_timestamp": "2025-11-18T08:40:08.655261Z"}, {"uuid": "ae6b85be-2e43-4c38-9c34-1263c61cb079", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://gist.github.com/burakcanbalta/7e4fa670e296f994509e9ffef99b6aed", "content": "", "creation_timestamp": "2025-11-06T20:21:17.000000Z"}, {"uuid": "a93ff16c-ad57-4bf2-8c2f-f7e67190adc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://gist.github.com/ozymahdias/8987464fab5e9908ef1e73fbb5187861", "content": "", "creation_timestamp": "2025-10-26T06:26:35.000000Z"}, {"uuid": "9eaedb93-af8d-469c-859c-cb647b9a23f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mhqeeeduqr2w", "content": "", "creation_timestamp": "2026-03-23T15:20:54.471138Z"}, {"uuid": "83c471b4-c325-46c0-bae4-4021992b874c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116279164131270309", "content": "", "creation_timestamp": "2026-03-23T15:20:38.663984Z"}, {"uuid": "53cb5632-b7dd-42f6-9a86-6e8085ddc3e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46715", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "19fef8ad-4cd8-470b-9767-306bd36b2de2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "608a15fc-d07a-4348-8b50-88bee65f8f77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "Telegram/Lw_uxGc7bEZFiGgkDUU_nHMS2zuxPzSITjp6mTUAJ7M8OdE", "content": "", "creation_timestamp": "2024-05-10T13:07:10.000000Z"}, {"uuid": "5d2e986e-4b26-4693-829c-db2e06faac5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/freeosint/2030", "content": "Google: \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f iOS \u0438 Android \u043e\u0442 NSO. \n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Google Threat Analysis Group (TAG) \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u043b\u0438 \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 APT29: \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u044f\u043a\u043e\u0431\u044b \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u0420\u043e\u0441\u0441\u0438\u0435\u0439, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 NSO Group \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 iOS \u0438 Android.\n\u0410\u0442\u0430\u043a\u0438, \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u043f\u0440\u043e\u0445\u043e\u0434\u0438\u043b\u0438 \u0441 \u043d\u043e\u044f\u0431\u0440\u044f 2023 \u0433\u043e\u0434\u0430 \u043f\u043e \u0438\u044e\u043b\u044c 2023-\u0433\u043e. \u041a \u0442\u043e\u043c\u0443 \u043c\u043e\u043c\u0435\u043d\u0442\u0443 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0443\u0436\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043f\u0430\u0442\u0447\u0438, \u043d\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043f\u043e \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u0438 \u043d\u0435 \u0443\u0441\u043f\u0435\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.\nAPT29, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043f\u043e\u0434 \u0438\u043c\u0435\u043d\u0435\u043c Midnight Blizzard, \u0432 \u043f\u043e\u0448\u043b\u043e\u043c \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430\u0441\u044c \u0430\u0442\u0430\u043a\u043e\u0439 \u043d\u0430 Microsoft, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0430 \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u044b \u0421\u0428\u0410. \u0422\u0435\u043f\u0435\u0440\u044c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0432\u0437\u044f\u043b\u0430\u0441\u044c \u0437\u0430 \u0432\u043b\u0430\u0441\u0442\u0438 \u041c\u043e\u043d\u0433\u043e\u043b\u0438\u0438.\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438 \u0432 Google Threat Analysis Group, \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2023-41993, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0443\u044e WebKit \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0443\u044e \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u043f\u0440\u0438 \u043e\u0442\u0440\u0430\u0431\u043e\u0442\u043a\u0435 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0432\u0435\u0431-\u043a\u043e\u043d\u0442\u0435\u043d\u0442\u0430.\n\u041a\u0430\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, Apple \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u0434\u044b\u0440\u044b \u0432 \u043a\u043e\u043d\u0446\u0435 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f 2022 \u0433\u043e\u0434\u0430. \u0412\u043c\u0435\u0441\u0442\u0435 \u0441 \u043d\u0435\u0439 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u044f \u0437\u0430\u043a\u0440\u044b\u043b\u0430 CVE-2023-41991 \u0438 CVE-2023-41992.\n\u0412\u043e\u043e\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0441\u044c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c, APT29 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0441\u0430\u0439\u0442\u044b mfa.gov[.]mn \u0438 cabinet.gov[.]mn \u0438 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430 \u0432 \u043a\u043e\u0434 \u0438\u0445 \u0441\u0442\u0440\u0430\u043d\u0438\u0446 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 iframe. \u0421\u0445\u0435\u043c\u0430 \u0432\u0435\u043a\u0442\u043e\u0440\u0430 \u0432\u044b\u0433\u043b\u044f\u0434\u0435\u043b\u0430 \u0442\u0430\u043a:\n\u00a0\n\u0422\u0430\u043a\u043e\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u043b\u0438 \u043f\u043e\u0445\u0438\u0449\u0430\u0442\u044c cookies \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432 iPhone, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0438\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c iOS 16.6.1 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0441\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u041e\u0421.\n\u0423\u0436\u0435 \u0432 \u0438\u044e\u043b\u0435 2024-\u0433\u043e \u0433\u0440\u0443\u043f\u043f\u0430 \u0441\u0442\u0430\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f CVE-2024-5274 \u0438 CVE-2024-4671, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0438\u0435 Google Chrome, \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Android, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u0441\u0435\u0449\u0430\u043b\u0438 \u0441\u0430\u0439\u0442 mga.gov[.]mn.", "creation_timestamp": "2024-10-21T16:49:20.000000Z"}, {"uuid": "26fbadc5-5483-42a2-9d1e-d187995ebbc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/alexmakus/5291", "content": "\u041d\u0435 \u0437\u0430\u0431\u0443\u0434\u044c\u0442\u0435 \u043f\u0440\u043e\u0430\u043f\u0434\u0435\u0439\u0442\u0438\u0442\u044c \u0425\u0440\u043e\u043c\n\nhttps://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_9.html\n\nhttps://nvd.nist.gov/vuln/detail/cve-2024-0519\n\nGoogle is aware that an exploit for CVE-2024-4671 exists in the wild.", "creation_timestamp": "2024-05-11T12:20:02.000000Z"}, {"uuid": "54383796-8907-4db5-a330-ab19e57880aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46715", "type": "seen", "source": "https://t.me/cvedetector/5915", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46715 - \"Linux IIO Driver Kernel Oops Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-46715 \nPublished : Sept. 18, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndriver: iio: add missing checks on iio_info's callback access  \n  \nSome callbacks from iio_info structure are accessed without any check, so  \nif a driver doesn't implement them trying to access the corresponding  \nsysfs entries produce a kernel oops such as:  \n  \n[ 2203.527791] Unable to handle kernel NULL pointer dereference at virtual address 00000000 when execute  \n[...]  \n[ 2203.783416] Call trace:  \n[ 2203.783429]  iio_read_channel_info_avail from dev_attr_show+0x18/0x48  \n[ 2203.789807]  dev_attr_show from sysfs_kf_seq_show+0x90/0x120  \n[ 2203.794181]  sysfs_kf_seq_show from seq_read_iter+0xd0/0x4e4  \n[ 2203.798555]  seq_read_iter from vfs_read+0x238/0x2a0  \n[ 2203.802236]  vfs_read from ksys_read+0xa4/0xd4  \n[ 2203.805385]  ksys_read from ret_fast_syscall+0x0/0x54  \n[ 2203.809135] Exception stack(0xe0badfa8 to 0xe0badff0)  \n[ 2203.812880] dfa0:                   00000003 b6f10f80 00000003 b6eab000 00020000 00000000  \n[ 2203.819746] dfc0: 00000003 b6f10f80 7ff00000 00000003 00000003 00000000 00020000 00000000  \n[ 2203.826619] dfe0: b6e1bc88 bed80958 b6e1bc94 b6e1bcb0  \n[ 2203.830363] Code: bad PC value  \n[ 2203.832695] ---[ end trace 0000000000000000 ]--- \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:01:32.000000Z"}, {"uuid": "7fb037f0-2d7a-494a-92a4-bf5a0e623f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46710", "type": "seen", "source": "https://t.me/cvedetector/5570", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46710 - VMware vMWGFX Unmapped Active Read Buffer Race Condition\", \n  \"Content\": \"CVE ID : CVE-2024-46710 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/vmwgfx: Prevent unmapping active read buffers  \n  \nThe kms paths keep a persistent map active to read and compare the cursor  \nbuffer. These maps can race with each other in simple scenario where:  \na) buffer \"a\" mapped for update  \nb) buffer \"a\" mapped for compare  \nc) do the compare  \nd) unmap \"a\" for compare  \ne) update the cursor  \nf) unmap \"a\" for update  \nAt step \"e\" the buffer has been unmapped and the read contents is bogus.  \n  \nPrevent unmapping of active read buffers by simply keeping a count of  \nhow many paths have currently active maps and unmap only when the count  \nreaches 0. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:13.000000Z"}, {"uuid": "d3a22e84-5276-4277-97d0-b3aae1d98e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "Telegram/68zPlps8tvxT6sG-LGfBPim39uemFxJOQ8ICBNO1fUMJ0g", "content": "", "creation_timestamp": "2024-05-10T14:47:55.000000Z"}, {"uuid": "0bdd1929-d194-4d80-88f0-1135be21507a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/KomunitiSiber/1923", "content": "Chrome Zero-Day Alert \u2014 Update Your Browser to Patch New Vulnerability\nhttps://thehackernews.com/2024/05/chrome-zero-day-alert-update-your.html\n\nGoogle on Thursday released security updates to address a zero-day flaw in Chrome that it said has been actively exploited in the wild.\nTracked as\u00a0CVE-2024-4671, the high-severity vulnerability has\u00a0been described\u00a0as a case of use-after-free in the Visuals component.\u00a0It was reported by an anonymous researcher on May 7, 2024.\nUse-after-free bugs, which arise when a program", "creation_timestamp": "2024-05-10T15:10:11.000000Z"}, {"uuid": "a39b74ec-17db-4f53-b1b5-9be07c077477", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "published-proof-of-concept", "source": "Telegram/pSW96i48zX6NP99CfOkIgHqpdLy2hZyXX1e5O2PACcNGgvo", "content": "", "creation_timestamp": "2025-04-19T05:00:07.000000Z"}, {"uuid": "2af432f0-24ea-49c3-ad1d-eda1c8b81244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/CyberSecurityIL/44812", "content": "\u05d7\u05d5\u05dc\u05e9\u05ea Zero-Day \u05d7\u05de\u05d9\u05e9\u05d9\u05ea \u05de\u05ea\u05d7\u05d9\u05dc\u05ea \u05d4\u05e9\u05e0\u05d4 - \u05d2\u05d5\u05d2\u05dc \u05de\u05e9\u05d7\u05e8\u05e8\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05dc\u05db\u05e8\u05d5\u05dd \u05d4\u05e1\u05d5\u05d2\u05e8 \u05d7\u05d5\u05dc\u05e9\u05d4 \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d4\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\"\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2024-4671 \u05ea\u05d5\u05e7\u05e0\u05d4 \u05d1\u05d2\u05e8\u05e1\u05d0\u05d5\u05ea \u05d4\u05d1\u05d0\u05d5\u05ea:\n\n- 124.0.6367.201/.202 for Mac and Windows\n- 124.0.6367.201 for Linux\n\nhttps://t.me/CyberSecurityIL/5122\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-05-10T12:35:38.000000Z"}, {"uuid": "e776c705-98c1-4875-ae9b-872cccc4a17d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "MISP/682055c7-fb73-4d29-be0f-ef00f55f3970", "content": "", "creation_timestamp": "2024-09-09T15:30:14.000000Z"}, {"uuid": "032e2d01-b58d-4044-a729-208104515833", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "MISP/7a9d9173-4384-4175-9c02-52868c04fd34", "content": "", "creation_timestamp": "2024-09-02T11:19:54.000000Z"}, {"uuid": "d353240b-a59a-4277-84df-c8e0a15357a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://u1f383.github.io/linux/2024/11/15/a-quick-note-for-perf-cve-2024-46713.html", "content": "", "creation_timestamp": "2024-11-14T23:00:00.000000Z"}, {"uuid": "dd87bc29-2bc3-4764-ad00-143709ca336e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46713", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "f594616b-a13c-4afb-83d3-145c0bcd1b0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46719", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "a3d51cf8-249f-47ae-a1ba-50932022969c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-46715", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "d9db5326-e030-4cfd-93bc-8913ca6902ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-46717", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "d0d28a39-3668-422d-ad96-b1b0df2419b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-46716", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "7710942f-2b0a-411e-ac9f-3a96e559f536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-46718", "type": "seen", "source": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2026-AVI-0316/", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "40afc3b3-adf8-4578-8818-7c0c99aa44c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/59804577-82ab-4a2d-ab2c-581cfad0f623", "content": "", "creation_timestamp": "2026-02-02T12:26:37.290721Z"}, {"uuid": "8420b1f9-8c69-480f-bfe8-7620e90470da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1285", "content": "", "creation_timestamp": "2024-05-10T04:00:00.000000Z"}, {"uuid": "aba72e30-a1d6-4200-84d7-a677f504f1da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1286", "content": "", "creation_timestamp": "2024-05-13T04:00:00.000000Z"}, {"uuid": "3c6c657b-0d34-4d09-b961-6cae3b5fc84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46717", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "95cd440b-cee9-4b45-a1c4-10c7757b39dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/59804577-82ab-4a2d-ab2c-581cfad0f623", "content": "", "creation_timestamp": "2026-02-02T12:26:37.290721Z"}, {"uuid": "158c9a1f-2931-4602-9281-650885cff120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-4671", "type": "seen", "source": "https://gist.github.com/jrabenah/cac8452f2a62a8d34fcd45179775a11f", "content": "", "creation_timestamp": "2026-04-08T03:54:07.000000Z"}, {"uuid": "d0f9c4e1-56ec-406f-859b-068324926827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/itsec_news/4434", "content": "\u200b\u26a1\ufe0fCVE-2024-4947: Google \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0435\u0449\u0451 \u043e\u0434\u043d\u0443 0day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Chrome\n\n\ud83d\udcac \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0435\u0432\u044f\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0435 Chrome, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u043e\u0432\u0443\u044e zero-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-4947 \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 Type Confusion \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 JavaScript V8 \u0438 WebAssembly.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u2014 \u0412\u0430\u0441\u0438\u043b\u0438\u0435\u043c \u0411\u0435\u0440\u0434\u043d\u0438\u043a\u043e\u0432\u044b\u043c \u0438 \u0411\u043e\u0440\u0438\u0441\u043e\u043c \u041b\u0430\u0440\u0438\u043d\u044b\u043c 13 \u043c\u0430\u044f 2024 \u0433\u043e\u0434\u0430. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Type Confusion \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0442, \u043a\u043e\u0433\u0434\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u043f\u044b\u0442\u0430\u0435\u0442\u0441\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u0435\u0441\u0443\u0440\u0441\u0443 \u0441 \u043d\u0435\u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u044b\u043c \u0442\u0438\u043f\u043e\u043c. \u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c, \u0442\u0430\u043a\u0438\u043c \u043a\u0430\u043a \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 (Memory Out-of-bounds), \u0441\u0431\u043e\u0438 \u0432 \u0440\u0430\u0431\u043e\u0442\u0435 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430.\n\n\u042d\u0442\u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0441\u0442\u0430\u043b \u0442\u0440\u0435\u0442\u044c\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 Google \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044e\u044e \u043d\u0435\u0434\u0435\u043b\u044e, \u043f\u043e\u0441\u043b\u0435 CVE-2024-4671 \u0438 CVE-2024-4761. \u0414\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0434\u0435\u0442\u0430\u043b\u0438 \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u044e\u0442\u0441\u044f, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0442\u0438\u0442\u044c \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0434\u043d\u0430\u043a\u043e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u0435\u0439 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0438 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0434\u043b\u044f CVE-2024-4947 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u0421 \u0443\u0447\u0451\u0442\u043e\u043c CVE-2024-4947, \u0441 \u043d\u0430\u0447\u0430\u043b\u0430 \u0433\u043e\u0434\u0430 Google \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0441\u0435\u043c\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 Chrome:\n\nCVE-2024-0519 \u2014 \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 V8;\nCVE-2024-2886 \u2014 Use-After-Free \u0432 WebCodecs;\nCVE-2024-2887 \u2014 \u043e\u0448\u0438\u0431\u043a\u0430 \u0442\u0438\u043f\u0430 confusion \u0432 WebAssembly;\nCVE-2024-3159 \u2014 \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 V8;\nCVE-2024-4671 \u2014 Use-After-Free \u0432 Visuals;\nCVE-2024-4761 \u2014 \u0437\u0430\u043f\u0438\u0441\u044c \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u0430\u043c\u0438 \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u0432 V8.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c Chrome \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 125.0.6422.60/.61, \u0447\u0442\u043e\u0431\u044b \u0441\u043d\u0438\u0437\u0438\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0443\u0433\u0440\u043e\u0437\u044b. \u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f, \u043a\u0430\u043a \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0434\u0440\u0443\u0433\u0438\u0445 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 \u043d\u0430 \u0431\u0430\u0437\u0435 Chromium, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Edge, Brave, Opera \u0438 Vivaldi \u2014 \u0441\u0442\u043e\u0438\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443, \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u043d\u0438 \u0441\u0442\u0430\u043d\u0443\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-05-16T15:41:15.000000Z"}, {"uuid": "2618a513-d903-4e5d-80f8-b7fa56c0d29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4671", "type": "exploited", "source": "https://t.me/kasperskyb2b/1256", "content": "\u0421\u043d\u043e\u0432\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u2014 \u0442\u0440\u0435\u0442\u0438\u0439 0day \u0437\u0430 \u043d\u0435\u0434\u0435\u043b\u044e \ud83d\ude33\n\nGoogle \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Chrome \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 5.0.6422.60/.61 \u0434\u043b\u044f Windows \u0438 125.0.6422.60 \u0434\u043b\u044f Linux.\n\u041a\u043b\u044e\u0447\u0435\u0432\u044b\u043c \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u044b\u043c \u0434\u0435\u0444\u0435\u043a\u0442\u043e\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f CVE-2024-4947 \u0432 \u0434\u0432\u0438\u0436\u043a\u0435 V8. \u041e \u043d\u0435\u0439 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u00ab\u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e\u00bb \u0438 \u043e\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u0412\u0440\u0435\u043c\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c\u0441\u044f!\n\n\u0414\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u043d\u0435\u0434\u0435\u043b\u044e \u043d\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u043b\u0441\u044f \ud83d\udc7f, \u0437\u0430\u043e\u0434\u043d\u043e \u0431\u0443\u0434\u0443\u0442 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0434\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0445 0day, \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0435 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0438 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0435 \u0440\u0430\u043d\u0435\u0435:  CVE-2024-4671 \u0438 CVE-2024-4761.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2024-05-16T16:16:04.000000Z"}, {"uuid": "025d1fe6-1314-447d-a825-c2fccfd3dfe7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46718", "type": "seen", "source": "https://t.me/cvedetector/5921", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46718 - AMD Ryzen Linux Graphics Hardware corruption Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46718 \nPublished : Sept. 18, 2024, 7:15 a.m. | 35\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \ndrm/xe: Don't overmap identity VRAM mapping  \n  \nOvermapping the identity VRAM mapping is triggering hardware bugs on  \ncertain platforms. Use 2M pages for the last unaligned (to 1G) VRAM  \nchunk.  \n  \nv2:  \n - Always use 2M pages for last chunk (Fei Yang)  \n - break loop when 2M pages are used  \n - Add assert for usable_size being 2M aligned  \nv3:  \n - Fix checkpatch \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-18T10:01:40.000000Z"}, {"uuid": "90c287dc-cafc-4367-9bd3-5263799c22a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-46711", "type": "seen", "source": "https://t.me/cvedetector/5567", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-46711 - MPTCP pm Linux Kernel Double Free Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-46711 \nPublished : Sept. 13, 2024, 7:15 a.m. | 19\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nmptcp: pm: fix ID 0 endp usage after multiple re-creations  \n  \n'local_addr_used' and 'add_addr_accepted' are decremented for addresses  \nnot related to the initial subflow (ID0), because the source and  \ndestination addresses of the initial subflows are known from the  \nbeginning: they don't count as \"additional local address being used\" or  \n\"ADD_ADDR being accepted\".  \n  \nIt is then required not to increment them when the entrypoint used by  \nthe initial subflow is removed and re-added during a connection. Without  \nthis modification, this entrypoint cannot be removed and re-added more  \nthan once. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T09:36:08.000000Z"}]}