{"vulnerability": "cve-2023-2405", "sightings": [{"uuid": "f0901075-aefb-42b5-8a1b-42186d895852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3708", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPOC and Scanner for CVE-2023-24055\nURL\uff1ahttps://github.com/deetl/CVE-2023-24055\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-01-25T00:08:13.000000Z"}, {"uuid": "e630c338-7bb4-4137-ac0d-bdc6d8d2f340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3764", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-24055 PoC (KeePass 2.5x)\nURL\uff1ahttps://github.com/alt3kx/CVE-2023-24055_PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-02-10T11:49:17.000000Z"}, {"uuid": "15fc6dd8-24f0-4694-a7ec-409390c30e66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3705", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPOC and Scanner for CVE-2023-24055\nURL\uff1ahttps://github.com/Live-Hack-CVE/CVE-2023-21867\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-01-24T22:52:22.000000Z"}, {"uuid": "f3a0587f-71da-4e14-bac4-2e3041092d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3749", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPowerShell POC for CVE-2023-24055\nURL\uff1ahttps://github.com/Live-Hack-CVE/CVE-2023-22458\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-02-02T16:20:51.000000Z"}, {"uuid": "1bf48a0b-88d5-4246-a69d-f08624d5bc3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/-J1niBQYGJNCVjLCmqP9wJBriDEWMNdtMs4OjdUCz0LpMaI", "content": "", "creation_timestamp": "2023-01-26T13:13:32.000000Z"}, {"uuid": "839e3f94-dbe0-4d0d-b717-504c159b2f99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/-3iReh3T6bPmUI9BLCEdfKilXbeOAtkjMJu1cqK_hdXRW1Q", "content": "", "creation_timestamp": "2023-03-05T09:17:01.000000Z"}, {"uuid": "c28bac73-8f41-479e-be2c-ae5edb9f4460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/1BYP11Zk4ceiIcoWEDRmUfW6XnQtFKwMtiduFrUb_IJSWPg", "content": "", "creation_timestamp": "2023-03-17T19:41:54.000000Z"}, {"uuid": "e032b8cf-5ca2-45db-b3f8-82f67677b164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/A3fpEgRXAUwFCxmkBW751E3DK1JHgOu0Ihg-g9hUgLVfSnA", "content": "", "creation_timestamp": "2023-03-16T03:14:05.000000Z"}, {"uuid": "a492cf1a-bee1-463e-b1d1-9e5583e128f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/sL2dn6YdVnQ3iPjrZeUxU2rYNsMiuvdc7t1EI2AWsgP9wbM", "content": "", "creation_timestamp": "2023-01-31T17:36:36.000000Z"}, {"uuid": "bc43481d-ff75-4d50-8860-71b80732f266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/4001", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f KeePass \u043e\u0442\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u043f\u0440\u0438\u0437\u043d\u0430\u0432\u0430\u0442\u044c \u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043e\u0448\u0438\u0431\u043a\u0443 CVE-2023-24055, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0443\u0436\u0435 \u043d\u0435\u043e\u0434\u043d\u043e\u043a\u0440\u0430\u0442\u043d\u043e \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0433\u043e\u0434 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0443\u0442\u0438\u043b\u0438\u0442\u044b.\n\nKeePass Password Safe\u00a0\u2014 \u044d\u0442\u043e \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u044b\u0439\u00a0\u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0441\u00a0\u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0445\u0440\u0430\u043d\u0438\u0442 \u0438\u043c\u0435\u043d\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043f\u0430\u0440\u043e\u043b\u0438, \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u043e\u043b\u044f \u0438 \u0432\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0432 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u00a0\u0444\u0430\u0439\u043b\u0435, \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u043e\u043c \u043b\u044e\u0431\u043e\u0439 \u043a\u043e\u043c\u0431\u0438\u043d\u0430\u0446\u0438\u0435\u0439\u00a0\u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044f, \u0444\u0430\u0439\u043b\u0430 \u043a\u043b\u044e\u0447\u0430 \u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u041e\u0421.\n\n\u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e Consumer Reports, KeePass \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u043e\u0432 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 (\u043d\u0430\u0440\u044f\u0434\u0443 \u0441\u00a01Password, Dashlane \u0438 LastPass).\n\n\u0420\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u0438\u043c\u0435\u044e\u0449\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u043c\u043e\u0436\u0435\u0442 \u043b\u0435\u0433\u043a\u043e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u0442\u0435\u043a\u0441\u0442\u0430 \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u043f\u0430\u0440\u043e\u043b\u0435\u0439, \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u0445\u0441\u044f \u0432 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0438 KeePass, \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0441\u044c \u0442\u0440\u0438\u0433\u0433\u0435\u0440\u043e\u043c \u0434\u043b\u044f \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0441\u0442\u0440\u043e\u043a\u0438 \u0432 XML-\u0444\u0430\u0439\u043b\u0435 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f.\n\n\u0422\u0430\u043a\u0438\u043c \u043e\u0431\u0440\u0430\u0437\u043e\u043c, KeePass \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 2.53 (\u043f\u0440\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443, \u0438\u043c\u0435\u044e\u0449\u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f \u043d\u0430 \u0437\u0430\u043f\u0438\u0441\u044c \u043a \u0444\u0430\u0439\u043b\u0443 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 XML, \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043f\u0430\u0440\u043e\u043b\u0438 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435, \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044f \u0442\u0440\u0438\u0433\u0433\u0435\u0440 \u044d\u043a\u0441\u043f\u043e\u0440\u0442\u0430.\n\n\u041f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u043c\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f KeePass, \u0438 \u0440\u0430\u0437\u043d\u043e\u0433\u043b\u0430\u0441\u0438\u044f \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u044e\u0442 \u0438\u0437-\u0437\u0430 \u043e\u0442\u043a\u0430\u0437\u0430 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 \u043f\u0440\u0438\u0437\u043d\u0430\u0442\u044c \u0435\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0433\u043e\u0432\u043e\u0440\u044f \u0443\u0436\u0435 \u043e\u0431 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438.\n\n\u041f\u043e\u0437\u0438\u0446\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0437\u0430\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u0431\u0430\u0437\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u043d\u0435 \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u0430 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430, \u0438\u043c\u0435\u044e\u0449\u0435\u0433\u043e \u0442\u0430\u043a\u043e\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u041f\u041a, \u0432\u0435\u0434\u044c, \u043a\u0430\u043a \u043e\u043d\u0438 \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u044e\u0442 \u00ab\u0435\u0441\u043b\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u0442 \u0432\u0430\u0448\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u0442\u043e \u044d\u0442\u043e \u0443\u0436\u0435 \u043d\u0435 \u0432\u0430\u0448\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u00bb.\n\n\u0421 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b, \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043d\u0430\u0441\u0442\u0430\u0438\u0432\u0430\u044e\u0442 \u043d\u0430 \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043e\u0440\u0442\u0430 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u043e\u0442 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430 KeePass \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0432\u0432\u043e\u0434\u0430 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u044f), \u0447\u0442\u043e \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0434\u0430\u0436\u0435 \u0432 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u044f\u0445, \u043a\u043e\u0433\u0434\u0430 \u0430\u043a\u0442\u043e\u0440 \u043f\u043e\u043b\u0443\u0447\u0430\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443.\n\n\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f, \u0431\u0435\u0437\u0443\u0441\u043b\u043e\u0432\u043d\u043e, \u0445\u043e\u0442\u044c \u0438 \u0441\u043f\u043e\u0440\u043d\u0430\u044f.\n\n\u041d\u043e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 \u043d\u0430 GitHub PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u043e\u0448\u0438\u0431\u043a\u0438 KeePass \u0431\u0443\u0434\u0435\u0442 \u0432\u0437\u044f\u0442 \u043d\u0430 \u0432\u043e\u043e\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u043c\u0438 \u0441\u0442\u0438\u043b\u043b\u0435\u0440\u0430\u043c\u0438 \u0438 RAT, \u043c\u043d\u0435\u043d\u0438\u0435 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u0432 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u0443\u0434\u0435\u0442 \u043f\u043e\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f.", "creation_timestamp": "2023-01-30T15:26:15.000000Z"}, {"uuid": "2e6515df-099c-4bbf-a170-f95241f0aeea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24051", "type": "seen", "source": "https://t.me/ctinow/158815", "content": "https://ift.tt/LkvY9CE\nCVE-2023-24051 | Connectize AC21000 G6 641.139.1.1256 excessive authentication", "creation_timestamp": "2023-12-23T13:46:50.000000Z"}, {"uuid": "ab8f763b-2fdd-4b44-83f0-9ad99ccfa7d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24058", "type": "seen", "source": "https://t.me/cibsecurity/56819", "content": "\u203c CVE-2023-24058 \u203c\n\nBooked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-22T12:23:57.000000Z"}, {"uuid": "a73557f6-2fe5-460b-ba38-c216ee2a9f62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24059", "type": "exploited", "source": "https://t.me/cibsecurity/56818", "content": "\u203c CVE-2023-24059 \u203c\n\nGrand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-22T12:23:57.000000Z"}, {"uuid": "7c939cb7-7015-42ee-aacf-8c4d197d6be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2609", "content": "#CVE-2023\nA script to automate privilege escalation with CVE-2023-22809 vulnerability\nhttps://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc\n\n\nA script to automate privilege escalation with CVE-2023-22809 vulnerability\n\nhttps://github.com/Live-Hack-CVE/CVE-2023-22884\n\nPOC and Scanner for CVE-2023-24055\n\nhttps://github.com/Live-Hack-CVE/CVE-2023-21867\n\n\n@BlueRedTeam", "creation_timestamp": "2023-03-05T09:21:57.000000Z"}, {"uuid": "4aaa8435-b703-4a14-86cb-51babd6a37c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2611", "content": "#CVE-2023\nPOC and Scanner for CVE-2023-24055\nhttps://github.com/deetl/CVE-2023-24055\n\n\nCVE-2023-21839 exp\n\nhttps://github.com/fakenews2025/CVE-2023-21839\n\nCVE-2023-23132\n\nhttps://github.com/l00neyhacker/CVE-2023-23132\n\n@BlueRedTeam", "creation_timestamp": "2023-03-05T09:27:29.000000Z"}, {"uuid": "c7774cf2-6cd3-4be7-ac0d-592f3abdc372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/7629", "content": "#exploit\n1. CVE-2023-23504:\nXNU Heap Underwrite in dlil.c\nhttps://adamdoupe.com/blog/2023/01/23/cve-2023-23504-xnu-heap-underwrite-in-dlil-dot-c\n\n2. CVE-2023-24055:\nKeePass 2.5x PoC\nhttps://github.com/alt3kx/CVE-2023-24055_PoC\n\n3. CVE-2022-34689:\nCryptoAPI spoofing vulnerability\nhttps://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2022-34689", "creation_timestamp": "2023-01-27T12:59:42.000000Z"}, {"uuid": "46a68e43-57eb-4efe-9002-ae31d021ecd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "seen", "source": "https://bsky.app/profile/tuxpanik.bsky.social/post/3lgvgbx6gx222", "content": "", "creation_timestamp": "2025-01-29T16:47:15.772812Z"}, {"uuid": "b46c1220-6fdd-481f-b8ff-31fd378f3169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "seen", "source": "https://t.me/codeby_sec/7135", "content": "\u200b\u041e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u043a\u043e\u0434. KeePassXC \u0432\u043c\u0435\u0441\u0442\u043e KeePass\n\n\u0418 \u0441\u043d\u043e\u0432\u0430 \u0440\u0430\u0434 \u043f\u0440\u0438\u0432\u0435\u0442\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u0434\u043e\u0440\u043e\u0433\u0438\u0445 \u0447\u0438\u0442\u0430\u0442\u0435\u043b\u0435\u0439 \u0434\u0430\u043d\u043d\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0438! C\u0435\u0433\u043e\u0434\u043d\u044f \u0445\u043e\u0447\u0443 \u0440\u0430\u0441\u0441\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u0430\u043c \u043e \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 KeePassXC. \u0412 \u0441\u0432\u043e\u0435\u0439 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u0441\u0442\u0430\u0442\u044c\u0435 \u043f\u0440\u043e \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0438 \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u044f \u043e\u0448\u0438\u0431\u043e\u0447\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043b \u0432\u0430\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443 KeePass \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u0435\u0439, \u043d\u043e \u0434\u0430\u043b\u0435\u0435, \u043a\u0430\u043a \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u0434\u0430\u043d\u043d\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u043f\u043e\u043b\u043d\u043e \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u044e\u044e CVE-2023-24055 KeePass 2.5x. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441 \u044d\u0442\u0438\u043c \u0445\u043e\u0447\u0443 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u0432\u0430\u043c \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u0443, \u0430 \u0437\u0430\u043e\u0434\u043d\u043e \u0438 \u043e\u043f\u0438\u0441\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\n\ud83d\udccc \u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435\n\n#password #opensource #software", "creation_timestamp": "2023-02-25T09:17:10.000000Z"}, {"uuid": "af830c3d-7352-4dea-ae48-019d750bcfe9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/poxek/2731", "content": "CVE-2023-24055 PoC KeePass 2.5x\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u0438\u043c\u0435\u044e\u0449\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043d\u0430 \u0437\u0430\u043f\u0438\u0441\u044c \u043a \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u043c\u0443 \u0444\u0430\u0439\u043b\u0443 KeePass, \u043c\u043e\u0436\u0435\u0442 \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u0435\u0433\u043e \u0438 \u0432\u043d\u0435\u0434\u0440\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u0442\u0440\u0438\u0433\u0433\u0435\u0440\u044b, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435 \u043f\u0443\u0442\u0435\u043c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0440\u0438\u0433\u0433\u0435\u0440\u0430 \u044d\u043a\u0441\u043f\u043e\u0440\u0442\u0430.\n\n#CVE", "creation_timestamp": "2023-02-17T17:16:00.000000Z"}, {"uuid": "74dc974c-0826-44ac-bd3c-c50c73fabd55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3748", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPowerShell POC for CVE-2023-24055\nURL\uff1ahttps://github.com/ATTACKnDEFEND/CVE-2023-24055\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-02-02T15:56:56.000000Z"}, {"uuid": "4e0d3ef0-d928-4cd0-86f7-64d15cce2e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/RalfHackerChannel/1301", "content": "CVE-2023-24055 KeePass 2.5x\n\nhttps://github.com/alt3kx/CVE-2023-24055_PoC\n\n\u0415\u0441\u043b\u0438 \u043a\u0440\u0430\u0442\u043a\u043e, \u0442\u043e \u0438\u043c\u0435\u044f \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u0443 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 KeePass, \u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u043e\u0432\u0430\u0442\u044c \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u0435\u0441\u044f \u043f\u0430\u0440\u043e\u043b\u0438 \u043d\u0430 \u0441\u0432\u043e\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435.\u0424\u0438\u0448\u043a\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u0442\u044c, \u043a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043e\u0442\u043a\u0440\u043e\u0435\u0442 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440.\n\nPS: \u0445\u043e\u0442\u044f \u0441\u043f\u043e\u0441\u043e\u0431 \u0431\u044b\u043b \u043e\u043f\u0438\u0441\u0430\u043d harmj0y \u0435\u0449\u0451 \u043b\u0435\u0442 7 \u043d\u0430\u0437\u0430\u0434))\n\n#git #pentest #redteam #exploit", "creation_timestamp": "2023-01-26T05:22:21.000000Z"}, {"uuid": "605d978b-b986-4154-86c5-d3665e9e906f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/2445", "content": "#exploit\n1. CVE-2023-23504:\nXNU Heap Underwrite in dlil.c\nhttps://adamdoupe.com/blog/2023/01/23/cve-2023-23504-xnu-heap-underwrite-in-dlil-dot-c\n\n2. CVE-2023-24055:\nKeePass 2.5x PoC\nhttps://github.com/alt3kx/CVE-2023-24055_PoC\n\n3. CVE-2022-34689:\nCryptoAPI spoofing vulnerability\nhttps://github.com/akamai/akamai-security-research/tree/main/PoCs/CVE-2022-34689", "creation_timestamp": "2023-01-27T08:11:25.000000Z"}, {"uuid": "fa515594-9058-40f2-a764-2ca64b09e4c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24052", "type": "seen", "source": "https://t.me/ctinow/158805", "content": "https://ift.tt/f7926xN\nCVE-2023-24052 | Connectize AC21000 G6 641.139.1.1256 password recovery", "creation_timestamp": "2023-12-23T12:41:39.000000Z"}, {"uuid": "8bf8dbaf-401f-4ed9-9641-3ef041e831cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24050", "type": "seen", "source": "https://t.me/ctinow/158951", "content": "https://ift.tt/2YGwEzb\nCVE-2023-24050 | Connectize AC21000 G6 641.139.1.1256 Admin Panel cross site scripting", "creation_timestamp": "2023-12-24T08:41:39.000000Z"}, {"uuid": "f7be31b0-c285-42cc-84b8-c5a88290fb29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "seen", "source": "https://bsky.app/profile/david-senate.bsky.social/post/3m7petwnc7z2r", "content": "", "creation_timestamp": "2025-12-11T10:35:24.229435Z"}, {"uuid": "933a5fe6-09e4-4e97-8b3f-899327703b2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24057", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/9990", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24057\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: HL7 (Health Level 7) FHIR Core Libraries before 5.6.92 allow attackers to extract files into arbitrary directories via directory traversal from a crafted ZIP or TGZ archive (for a prepackaged terminology cache, NPM package, or comparison archive).\n\ud83d\udccf Published: 2023-01-24T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-01T19:26:42.787Z\n\ud83d\udd17 References:\n1. https://github.com/HL7/fhir-ig-publisher/security/advisories/GHSA-xr8x-pxm6-prjg", "creation_timestamp": "2025-04-01T19:32:26.000000Z"}, {"uuid": "3b26be74-4a1f-4da4-89af-741920d16b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24059", "type": "exploited", "source": "https://t.me/DarkWebInformer_CVEAlerts/10131", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24059\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Grand Theft Auto V for PC allows attackers to achieve partial remote code execution or modify files on a PC, as exploited in the wild in January 2023.\n\ud83d\udccf Published: 2023-01-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-02T16:08:01.372Z\n\ud83d\udd17 References:\n1. https://support.rockstargames.com/community/200063373/13252523900819\n2. https://support.rockstargames.com/community/200063373/13249062368147\n3. https://www.reddit.com/r/gtaonline/comments/10hsosu/mass_reporting_the_dangerous_pc_exploit/\n4. https://twitter.com/TezFunz2/status/1616575783215964166", "creation_timestamp": "2025-04-02T16:35:13.000000Z"}, {"uuid": "46d420ba-70a8-408c-962d-2e3ffab88fa8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24058", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/10130", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24058\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Booked Scheduler 2.5.5 allows authenticated users to create and schedule events for any other user via a modified userId value to reservation_save.php. NOTE: 2.5.5 is a version from 2014; the latest version of Booked Scheduler is not affected. However, LabArchives Scheduler (Sep 6, 2022 Feature Release) is affected.\n\ud83d\udccf Published: 2023-01-22T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-02T16:09:24.559Z\n\ud83d\udd17 References:\n1. https://s1n1st3r.gitbook.io/theb10g/booked-scheduler-v2.5.5-vulnerability\n2. https://www.limswiki.org/index.php/Booked\n3. https://github.com/LibreBooking/app/tags?after=2.7.1\n4. https://github.com/LibreBooking/app/blob/0a6cb1a9eb84835553c8caf93db2791f8655140f/Web/ajax/reservation_save.php\n5. https://github.com/LibreBooking/app/blob/0a6cb1a9eb84835553c8caf93db2791f8655140f/Pages/Ajax/ReservationSavePage.php#L234-L237\n6. https://www.labarchives.com/labarchives-knowledge-base/2022-feature-releases-2/\n7. https://www.bookedscheduler.com/the-future-of-booked/", "creation_timestamp": "2025-04-02T16:35:12.000000Z"}, {"uuid": "e5f795b1-17e0-4edf-8c32-2a3f02606b68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/malwar3s/24", "content": "https://github.com/deetl/CVE-2023-24055", "creation_timestamp": "2023-01-30T16:21:28.000000Z"}, {"uuid": "806bf133-2e84-493b-81fd-9cc22aaa226f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24059", "type": "exploited", "source": "https://t.me/alexredsec/281", "content": "\u041e, \u0442\u0443\u0442 \u0433\u043e\u0440\u044f\u0447\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u043e\u0441\u043f\u0435\u043b\u0430 \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2023-24059.\n\n\u0412\u0443\u043b\u043d\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0439 \u0438\u0433\u0440\u0435 GTA V (PC-\u0432\u0435\u0440\u0441\u0438\u044f) \u0438 \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u0418\u0437\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0441\u043e\u0432\u0435\u0440\u0448\u0430\u0442\u044c \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u0441 \u0438\u0433\u0440\u043e\u0432\u043e\u0439 \u0443\u0447\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u044c\u044e (\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435, \u0441\u0431\u0440\u043e\u0441 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0438). \n\u041e\u0434\u043d\u0430\u043a\u043e, \u0443\u0436\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u043e, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \"\u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e\" \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0438 \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u0444\u0430\u0439\u043b\u044b \u043d\u0430 \u0438\u0433\u0440\u043e\u0432\u043e\u043c \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f RockStar Games, \u044f\u0432\u043b\u044f\u044e\u0449\u0430\u044f\u0441\u044f \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u043e\u043c GTA V, \u043f\u043e\u043a\u0430 \u043d\u0435 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c. \u0418\u0433\u0440\u043e\u043a\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0438\u0433\u0440\u0443 \u0434\u043e \u043c\u043e\u043c\u0435\u043d\u0442\u0430 \u0432\u044b\u0445\u043e\u0434\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439.", "creation_timestamp": "2023-01-22T15:09:06.000000Z"}, {"uuid": "0d6bc729-e08b-4c63-9a05-6495f4822c8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/7d-pvucQx8X-0S7HElmLACKzjSxgws_3M1eRxncTkZwDeQ", "content": "", "creation_timestamp": "2023-01-30T15:59:19.000000Z"}, {"uuid": "417f0cde-0b55-490d-8e4c-c6b83630f25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "seen", "source": "Telegram/14us4ds8PrCMhDMMZoXn0o7OCmSa_HmKz4r6SpWXcmz0k-k", "content": "", "creation_timestamp": "2023-03-08T08:00:15.000000Z"}, {"uuid": "f7b1bb46-b57d-441a-8fb1-f03aa1c1b007", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "Telegram/GLNY-zyYHjoqRpATub9Nwm_DL-PCo0ZWSxrWuNFFpc5uRXc", "content": "", "creation_timestamp": "2023-03-06T09:15:12.000000Z"}, {"uuid": "59697b41-0d0a-4733-8a73-67f1dfc4e716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/BlueRedTeam/2629", "content": "#CVE-2023\n\nCVE-2023-24055 PoC (KeePass 2.5x)\n\nhttps://github.com/alt3kx/CVE-2023-24055_PoC\n\nCVE-2023-0669 GoAnywhere MFT suffers from a pre-authentication command injection vulnerability in the License Response Servlet due to deserializing an arbitrary attacker-controlled object.\nhttps://github.com/0xf4n9x/CVE-2023-0669\n\n@BlueRedTeam", "creation_timestamp": "2023-03-17T16:36:37.000000Z"}, {"uuid": "63c7b875-5293-46fa-8fab-83c8db078036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24059", "type": "seen", "source": "https://t.me/vxunderground/1667", "content": "Grand Theft Auto V has been assigned CVE-2023-24059 for containing a partial Remote Code Execution exploit\n\nMore information: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-24059\n\nGrand Theft Auto Online community discussion: https://www.reddit.com/r/gtaonline/comments/10hsosu/mass_reporting_the_dangerous_pc_exploit/", "creation_timestamp": "2023-01-23T07:42:45.000000Z"}, {"uuid": "dfa3b729-fd5d-410e-a9e1-86320fc75f20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/3358", "content": "CVE-2023-24055 KeePass 2.5x\n\nhttps://github.com/alt3kx/CVE-2023-24055_PoC\n\n\u0415\u0441\u043b\u0438 \u043a\u0440\u0430\u0442\u043a\u043e, \u0442\u043e \u0438\u043c\u0435\u044f \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0444\u0430\u0439\u043b\u0443 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 KeePass, \u043c\u043e\u0436\u043d\u043e \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u043e\u0432\u0430\u0442\u044c \u0445\u0440\u0430\u043d\u044f\u0449\u0438\u0435\u0441\u044f \u043f\u0430\u0440\u043e\u043b\u0438 \u043d\u0430 \u0441\u0432\u043e\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 \u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u043c \u0432\u0438\u0434\u0435.\u0424\u0438\u0448\u043a\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043d\u0435 \u043d\u0443\u0436\u043d\u043e \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u0442\u044c, \u043a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u043e\u0442\u043a\u0440\u043e\u0435\u0442 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440.\n\nPS: \u0445\u043e\u0442\u044f \u0441\u043f\u043e\u0441\u043e\u0431 \u0431\u044b\u043b \u043e\u043f\u0438\u0441\u0430\u043d harmj0y \u0435\u0449\u0451 \u043b\u0435\u0442 7 \u043d\u0430\u0437\u0430\u0434))\n\n#git #pentest #redteam #exploit", "creation_timestamp": "2023-01-26T19:31:07.000000Z"}, {"uuid": "e60025fc-7ccf-4408-9c28-d726d927cfd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "exploited", "source": "https://t.me/DEVIL_La_RSx/204", "content": "\ud83d\ude08 [ Diego Capriotti  ]\n\nThis has been one of my favorites for a while, but now it's time to let it go.\nHere's my preferred way of getting the KeePass db that we often hunt for:\ndowngrade the executable to version 2.53, use CVE-2023-24055 and wait for the busy admin to trigger the dump of the database. \nThe target can remain clean and you can simply check for the dump creation.\nKeePass version 2.53 can still open kdbx created with the version 2.57 and if using a proper xml the user will likely notice nothing. \nUpdate alerts can also be disabled within the xml.\n\n\ud83d\udd17 https://gist.github.com/naksyn/6d5660dacd0730498a274b85d62a77e8\n\n\ud83d\udc25 [  ]", "creation_timestamp": "2024-10-31T10:33:07.000000Z"}, {"uuid": "f443c6f2-0626-471b-8db5-b37d45b1e67a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-08T21:59:27.000000Z"}, {"uuid": "3de46671-00aa-431a-adae-d3de43d6de8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24055", "type": "seen", "source": "MISP/af790da0-9e28-4cb7-bd4e-46ad005115c6", "content": "", "creation_timestamp": "2025-10-01T18:11:56.000000Z"}]}