{"vulnerability": "cve-2023-2406", "sightings": [{"uuid": "cb25b420-a052-49e7-8315-05f26cac391c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24060", "type": "seen", "source": "https://t.me/cibsecurity/57021", "content": "\u203c CVE-2023-24060 \u203c\n\nHaven 5d15944 allows Server-Side Request Forgery (SSRF) via the feed[url]= Feeds functionality. Authenticated users with the ability to create new RSS Feeds or add RSS Feeds can supply an arbitrary hostname (or even the hostname of the Haven server itself). NOTE: this product has significant usage but does not have numbered releases; ordinary end users may typically use the master branch.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-27T07:34:05.000000Z"}, {"uuid": "0d32d0aa-4173-4d3a-a1a5-5097613b614f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "seen", "source": "https://t.me/cibsecurity/56826", "content": "\u203c CVE-2023-24069 \u203c\n\nSignal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to obtain potentially sensitive attachments sent in messages from the attachments.noindex directory. Cached attachments are not effectively cleared. In some cases, even after a self-initiated file deletion, an attacker can still recover the file if it was previously replied to in a conversation. (Local filesystem access is needed by the attacker.)\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T12:24:46.000000Z"}, {"uuid": "4cf8e448-702e-4693-acf5-bd9e0c24d2e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "seen", "source": "https://t.me/cibsecurity/56825", "content": "\u203c CVE-2023-24068 \u203c\n\nSignal Desktop before 6.2.0 on Windows, Linux, and macOS allows an attacker to modify conversation attachments within the attachments.noindex directory. Client mechanisms fail to validate modifications of existing cached files, resulting in an attacker's ability to insert malicious code into pre-existing attachments or replace them completely. A threat actor can forward the existing attachment in the corresponding conversation to external groups, and the name and size of the file will not change, allowing the malware to masquerade as another file.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-01-23T12:24:45.000000Z"}, {"uuid": "ac0a2ab4-cc64-4e52-af52-27943e3da348", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "seen", "source": "https://t.me/zatelecom/24451", "content": "\u0421\u0438\u0433\u043d\u0430\u043b - \u0441\u0430\u043c\u044b\u0439 \u0431\u0438\u0437\u0430\u043f\u0430\u0441\u043d\u044b\u0439 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440, \u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043e\u043d\u0438\n\nhttps://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/\n\n\u0422\u0430\u043c \u0447\u0443\u0432\u0430\u043a \u0438\u0433\u0440\u0430\u0435\u0442\u0441\u044f \u0441 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u043d\u044b\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u043c \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \"\u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u0435\u0448\" \u0444\u0430\u0439\u043b\u044b \u043b\u0435\u0433\u043a\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u0418 \u0434\u0430\u0436\u0435 \u043f\u043e\u0434\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f. \u041d\u0443, \u0442\u043e \u0435\u0441\u0442\u044c, \u0435\u0441\u043b\u0438 \u0443 \u0432\u0430\u0441 \u0432 \u0447\u0430\u0442\u0438\u043a\u0435 \u043a\u0442\u043e-\u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0432\u0430\u043c \u0444\u0430\u0439\u043b, \u0442\u043e \u044d\u0442\u043e\u0442 \u0444\u0430\u0439\u043b \u043d\u0430 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u0435 \u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u043f\u0430\u043f\u043e\u0447\u043a\u0435 \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u0439. \u0410 \u043f\u043e\u0442\u043e\u043c, \u0435\u0441\u043b\u0438 \u0432\u044b \u0431\u0443\u0434\u0435\u0442\u0435 \u0434\u0435\u043b\u0430\u0442\u044c \u0444\u043e\u0440\u0432\u0430\u0440\u0434 \u044d\u0442\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430, \u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u0441\u044f \u043d\u0435 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b, \u0430 \u043f\u043e\u0434\u043c\u0435\u043d\u043a\u0430. \n\n\u041f\u043e\u043d\u044f\u0442\u043d\u043e, \u0447\u0442\u043e \u043d\u0443 \u0442\u0430\u043a \u0441\u0435\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043b\u0430\u0441\u0441\u0430 \"\u0435\u0441\u043b\u0438 \u0431\u044b \u0443 \u043c\u0435\u043d\u044f \u0431\u044b\u043b \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0442\u0432\u043e\u0435\u043c\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443, \u0442\u043e \u0443\u0436\u043e \u0431\u044b \u044f \u0432\u0441\u0451 \u0441\u043b\u043e\u043c\u0430\u043b\", \u043d\u043e \u0432\u0441\u0451 \u0440\u0430\u0432\u043d\u043e \u043a\u0430\u043a-\u0442\u043e \u0441\u0442\u044b\u0434\u043d\u043e\u0432\u0430\u0442\u043e \u043d\u0430\u0437\u044b\u0432\u0430\u0442\u044c\u0441\u044f \"\u0441\u0430\u043c\u044b\u043c \u043d\u0438\u0438\u0431\u0430\u0446\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u043e\u043c\".\n\n\u041d\u0443, \u0438 \u0438\u043c\u0435\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u0441\u0442\u0435\u0440\u0430 \u0438 \u043e\u0431\u044a\u0435\u043c\u043e\u043c \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430 \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u044c \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442\u0430 - \u044d\u0442\u043e \u0436 \u0447\u0435\u0433\u043e \u0442\u0430\u043c \u0432 \u043a\u043e\u0434\u0435-\u0442\u043e \u043d\u0430\u0432\u043e\u0440\u043e\u0447\u0435\u043d\u043e? \u0410 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044b\u0439 Sigal \u043f\u043e\u0434 \u043c\u0430\u043a\u043e\u043c \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442.  \u0414\u043b\u044f \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044f - \u0422\u0435\u043b\u0435\u0433\u0440\u0430\u043c \u0432\u0447\u0435\u0442\u0432\u0435\u0440\u043e \u043a\u043e\u043c\u043f\u0430\u043a\u0442\u043d\u0435\u0435 \u0441 \u043d\u0430 \u043f\u043e\u0440\u044f\u0434\u043e\u043a \u043b\u0443\u0447\u0448\u0438\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c.\n\n\u0418 \u0434\u0430, \u044f \u0432\u0441\u0435 \u0435\u0449\u0451 \u043d\u0435\u043d\u0430\u0432\u0438\u0436\u0443 \u044d\u0442\u043e\u0442 \u0432\u0430\u0448 \u0421\u0438\u0433\u043d\u0430\u043b \u0438 \u0441\u0442\u0440\u0435\u043c\u043b\u044e\u0441\u044c \u0435\u0433\u043e \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0438\u0442\u044c :)", "creation_timestamp": "2023-01-23T22:03:32.000000Z"}, {"uuid": "112e2dd7-401b-418b-85bf-58d6e561d2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "seen", "source": "https://t.me/zatelecom/24451", "content": "\u0421\u0438\u0433\u043d\u0430\u043b - \u0441\u0430\u043c\u044b\u0439 \u0431\u0438\u0437\u0430\u043f\u0430\u0441\u043d\u044b\u0439 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440, \u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043e\u043d\u0438\n\nhttps://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/\n\n\u0422\u0430\u043c \u0447\u0443\u0432\u0430\u043a \u0438\u0433\u0440\u0430\u0435\u0442\u0441\u044f \u0441 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u043d\u044b\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u043c \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \"\u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0435 \u0432 \u043a\u0435\u0448\" \u0444\u0430\u0439\u043b\u044b \u043b\u0435\u0433\u043a\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u0418 \u0434\u0430\u0436\u0435 \u043f\u043e\u0434\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f. \u041d\u0443, \u0442\u043e \u0435\u0441\u0442\u044c, \u0435\u0441\u043b\u0438 \u0443 \u0432\u0430\u0441 \u0432 \u0447\u0430\u0442\u0438\u043a\u0435 \u043a\u0442\u043e-\u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0432\u0430\u043c \u0444\u0430\u0439\u043b, \u0442\u043e \u044d\u0442\u043e\u0442 \u0444\u0430\u0439\u043b \u043d\u0430 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u0435 \u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u043f\u0430\u043f\u043e\u0447\u043a\u0435 \u043c\u043e\u0436\u043d\u043e \u0437\u0430\u043c\u0435\u043d\u0438\u0442\u044c \u043d\u0430 \u0434\u0440\u0443\u0433\u043e\u0439. \u0410 \u043f\u043e\u0442\u043e\u043c, \u0435\u0441\u043b\u0438 \u0432\u044b \u0431\u0443\u0434\u0435\u0442\u0435 \u0434\u0435\u043b\u0430\u0442\u044c \u0444\u043e\u0440\u0432\u0430\u0440\u0434 \u044d\u0442\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430, \u0442\u043e \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u0441\u044f \u043d\u0435 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b, \u0430 \u043f\u043e\u0434\u043c\u0435\u043d\u043a\u0430. \n\n\u041f\u043e\u043d\u044f\u0442\u043d\u043e, \u0447\u0442\u043e \u043d\u0443 \u0442\u0430\u043a \u0441\u0435\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043b\u0430\u0441\u0441\u0430 \"\u0435\u0441\u043b\u0438 \u0431\u044b \u0443 \u043c\u0435\u043d\u044f \u0431\u044b\u043b \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0442\u0432\u043e\u0435\u043c\u0443 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443, \u0442\u043e \u0443\u0436\u043e \u0431\u044b \u044f \u0432\u0441\u0451 \u0441\u043b\u043e\u043c\u0430\u043b\", \u043d\u043e \u0432\u0441\u0451 \u0440\u0430\u0432\u043d\u043e \u043a\u0430\u043a-\u0442\u043e \u0441\u0442\u044b\u0434\u043d\u043e\u0432\u0430\u0442\u043e \u043d\u0430\u0437\u044b\u0432\u0430\u0442\u044c\u0441\u044f \"\u0441\u0430\u043c\u044b\u043c \u043d\u0438\u0438\u0431\u0430\u0446\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u043e\u043c\".\n\n\u041d\u0443, \u0438 \u0438\u043c\u0435\u0442\u044c \u043a\u043b\u0438\u0435\u043d\u0442\u0430 \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0442\u043e\u0441\u0442\u0435\u0440\u0430 \u0438 \u043e\u0431\u044a\u0435\u043c\u043e\u043c \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u0430 \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u044c \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442\u0430 - \u044d\u0442\u043e \u0436 \u0447\u0435\u0433\u043e \u0442\u0430\u043c \u0432 \u043a\u043e\u0434\u0435-\u0442\u043e \u043d\u0430\u0432\u043e\u0440\u043e\u0447\u0435\u043d\u043e? \u0410 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044b\u0439 Sigal \u043f\u043e\u0434 \u043c\u0430\u043a\u043e\u043c \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442.  \u0414\u043b\u044f \u0441\u0440\u0430\u0432\u043d\u0435\u043d\u0438\u044f - \u0422\u0435\u043b\u0435\u0433\u0440\u0430\u043c \u0432\u0447\u0435\u0442\u0432\u0435\u0440\u043e \u043a\u043e\u043c\u043f\u0430\u043a\u0442\u043d\u0435\u0435 \u0441 \u043d\u0430 \u043f\u043e\u0440\u044f\u0434\u043e\u043a \u043b\u0443\u0447\u0448\u0438\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u043e\u043c.\n\n\u0418 \u0434\u0430, \u044f \u0432\u0441\u0435 \u0435\u0449\u0451 \u043d\u0435\u043d\u0430\u0432\u0438\u0436\u0443 \u044d\u0442\u043e\u0442 \u0432\u0430\u0448 \u0421\u0438\u0433\u043d\u0430\u043b \u0438 \u0441\u0442\u0440\u0435\u043c\u043b\u044e\u0441\u044c \u0435\u0433\u043e \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0438\u0442\u044c :)", "creation_timestamp": "2023-01-23T22:03:32.000000Z"}, {"uuid": "80d36ed7-0a22-4f3d-897c-4e98633e0377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24063", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9143", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-24063\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR10 fails to validate /etc/mtab during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk.\n\ud83d\udccf Published: 2024-08-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-27T16:02:33.660Z\n\ud83d\udd17 References:\n1. https://www.dieboldnixdorf.com/en-us/banking/portfolio/software/security/\n2. https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Matt%20Burch%20-%20Where%E2%80%99s%20the%20Money%20-%20Defeating%20ATM%20Disk%20Encryption-white%20paper.pdf", "creation_timestamp": "2025-03-27T16:27:10.000000Z"}, {"uuid": "8ada3fc5-3617-4b36-a93c-692dd8357ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "Telegram/aX_Ee6qvCcF7km2BkcHN2i2yKV3xOFr6sVnrFpgJWLWcFAE", "content": "", "creation_timestamp": "2023-01-24T14:04:15.000000Z"}, {"uuid": "cbdbface-90f8-4cf7-b357-8187e7cfed51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24063", "type": "seen", "source": "https://t.me/cvedetector/2816", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-24063 - Diebold Nixdorf Vynamic Security Suite Buffer Overflow Denial of Service\", \n  \"Content\": \"CVE ID : CVE-2023-24063 \nPublished : Aug. 8, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR10 fails to validate /etc/mtab during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T20:35:16.000000Z"}, {"uuid": "75e78d6e-6605-4149-89f3-a8229fd6e938", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "https://t.me/Freedom_Technology/65", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T11:55:51.000000Z"}, {"uuid": "a458bf4b-90ce-4feb-9c88-8acb31e6290d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/Freedom_Technology/65", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T11:55:51.000000Z"}, {"uuid": "a146214f-4b7a-4bde-9081-908da95fc83b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "https://t.me/NeKaspersky/2796", "content": "\u0421\u0430\u043c\u044b\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u0432\u0441\u0435\u044f \u0441\u0435\u0442\u0438 Signal \u0441\u043f\u043e\u0442\u043a\u043d\u0443\u043b\u0441\u044f \u043e \u0433\u043b\u0443\u043f\u0435\u0439\u0448\u0438\u0435 \u0431\u0430\u0433\u0438\n\n\u041e\u0434\u0438\u043d \u0438\u0437 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e\u043f\u0438\u0441\u0430\u043b \"\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\" CVE-2023-24068 \u0438 CVE-2023-24069, \u0441\u0443\u0442\u044c \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043a\u0430\u043a\u043e\u0433\u043e-\u043b\u0438\u0431\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 \u043a\u044d\u0448\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0445\u0440\u0430\u043d\u0438\u0442 desktop-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435. \u0422\u0430\u043a, \u043f\u0440\u0438 \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u0442\u043e\u0433\u043e \u0438\u043b\u0438 \u0438\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432\u0441\u0451 \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u0433\u043b\u044f\u0434\u0435\u0442\u044c \u0442\u0430\u043a, \u0431\u0443\u0434\u0442\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0451\u043d\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0430\u0432\u0442\u043e\u0440.\n\n\u0413\u043b\u0443\u043f\u043e\u0441\u0442\u044c, \u043d\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0441 \u043a\u0430\u043a\u0438\u043c \u0440\u0430\u0437\u043c\u0430\u0445\u043e\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u043b\u0441\u044f \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440 \u0438 \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0430\u043c\u044f\u0442\u0438 \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0432 \u0440\u0430\u0437\u0432\u0451\u0440\u043d\u0443\u0442\u043e\u043c \u0432\u0438\u0434\u0435, \u0445\u043e\u0447\u0435\u0442\u0441\u044f \u0447\u0435\u0433\u043e-\u0442\u043e \u0445\u043e\u0442\u044f \u0431\u044b \u0443\u0440\u043e\u0432\u0435\u043d\u044c Telegram'\u0430 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c.\n\n\u0415\u0441\u043b\u0438 \u043a\u0442\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f, \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0437\u0430\u043b\u0435\u0437\u0430\u0439\u0442\u0435: \u043f\u0443\u0442\u044c \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0438 \u043d\u0430 \u043a\u0430\u0440\u0442\u0438\u043d\u043a\u0435 \ud83e\udd2b\n\n\u041d\u0435\u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u0438\u0439", "creation_timestamp": "2023-01-24T12:46:22.000000Z"}, {"uuid": "ae395f3f-d47f-4973-a9cc-bc109bcaaadc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/NeKaspersky/2796", "content": "\u0421\u0430\u043c\u044b\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440 \u0432\u0441\u0435\u044f \u0441\u0435\u0442\u0438 Signal \u0441\u043f\u043e\u0442\u043a\u043d\u0443\u043b\u0441\u044f \u043e \u0433\u043b\u0443\u043f\u0435\u0439\u0448\u0438\u0435 \u0431\u0430\u0433\u0438\n\n\u041e\u0434\u0438\u043d \u0438\u0437 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e\u043f\u0438\u0441\u0430\u043b \"\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\" CVE-2023-24068 \u0438 CVE-2023-24069, \u0441\u0443\u0442\u044c \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0441\u043e\u0441\u0442\u043e\u0438\u0442 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0438\u0442\u044c \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043a\u0430\u043a\u043e\u0433\u043e-\u043b\u0438\u0431\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 \u043a\u044d\u0448\u0435, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0445\u0440\u0430\u043d\u0438\u0442 desktop-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435. \u0422\u0430\u043a, \u043f\u0440\u0438 \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u0442\u043e\u0433\u043e \u0438\u043b\u0438 \u0438\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0432\u0441\u0451 \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u0433\u043b\u044f\u0434\u0435\u0442\u044c \u0442\u0430\u043a, \u0431\u0443\u0434\u0442\u043e \u043f\u043e\u0434\u043c\u0435\u043d\u0451\u043d\u043d\u043e\u0435 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u043b \u0430\u0432\u0442\u043e\u0440.\n\n\u0413\u043b\u0443\u043f\u043e\u0441\u0442\u044c, \u043d\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0441 \u043a\u0430\u043a\u0438\u043c \u0440\u0430\u0437\u043c\u0430\u0445\u043e\u043c \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u043b\u0441\u044f \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440 \u0438 \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0430\u043c\u044f\u0442\u0438 \u0437\u0430\u043d\u0438\u043c\u0430\u0435\u0442 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0435 \u0432 \u0440\u0430\u0437\u0432\u0451\u0440\u043d\u0443\u0442\u043e\u043c \u0432\u0438\u0434\u0435, \u0445\u043e\u0447\u0435\u0442\u0441\u044f \u0447\u0435\u0433\u043e-\u0442\u043e \u0445\u043e\u0442\u044f \u0431\u044b \u0443\u0440\u043e\u0432\u0435\u043d\u044c Telegram'\u0430 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c.\n\n\u0415\u0441\u043b\u0438 \u043a\u0442\u043e \u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f, \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0437\u0430\u043b\u0435\u0437\u0430\u0439\u0442\u0435: \u043f\u0443\u0442\u044c \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0438 \u043d\u0430 \u043a\u0430\u0440\u0442\u0438\u043d\u043a\u0435 \ud83e\udd2b\n\n\u041d\u0435\u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u0438\u0439", "creation_timestamp": "2023-01-24T12:46:22.000000Z"}, {"uuid": "86ef7245-4183-4a88-98f3-83463542b171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/Freedom_Technology/30", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T10:55:51.000000Z"}, {"uuid": "df7e0ca5-17bb-4eba-aaf9-d4df33697e99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "Telegram/aX_Ee6qvCcF7km2BkcHN2i2yKV3xOFr6sVnrFpgJWLWcFAE", "content": "", "creation_timestamp": "2023-01-24T14:04:15.000000Z"}, {"uuid": "f740b00e-7b40-4956-9a8a-2f39c537d3cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24062", "type": "seen", "source": "https://t.me/cvedetector/2820", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-24062 - Diebold Nixdorf Vynamic Security Suite File System Validation Bypass\", \n  \"Content\": \"CVE ID : CVE-2023-24062 \nPublished : Aug. 8, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR12, 4.0.0 SR04, 4.1.0 SR02, and 4.2.0 SR01 fails to validate the directory structure of the root file system during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T20:35:20.000000Z"}, {"uuid": "d600f27b-43de-406b-b277-c4366fa3b9b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24064", "type": "seen", "source": "https://t.me/cvedetector/2818", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-24064 - Diebold Nixdorf Vynamic Security Suite (VSS) Disk Fuzzing Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-24064 \nPublished : Aug. 8, 2024, 6:15 p.m. | 16\u00a0minutes ago \nDescription : Diebold Nixdorf Vynamic Security Suite (VSS) before 3.3.0 SR4 fails to validate /etc/initab during the Pre-Boot Authorization (PBA) process. This can be exploited by a physical attacker who is able to manipulate the contents of the system's hard disk. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"08 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-08T20:35:18.000000Z"}, {"uuid": "72d0a482-3433-44a4-bcf9-6df2d5d6a19a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "https://t.me/CyberSachok/956", "content": "\u00ab\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439\u00bb \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440 Signal, \u0440\u0430\u0441\u043a\u0440\u0443\u0442\u0438\u0432\u0448\u0438\u0439\u0441\u044f \u043d\u0430 \u0432\u043e\u043b\u043d\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u0438 \u0442\u0435\u043c\u044b \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0441\u0442\u0438 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0438 \u0441\u043a\u0430\u043d\u0434\u0430\u043b\u043e\u0432 \u0432 WhatsApp, \u0432 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u0440\u0430\u0437 \u0441\u0430\u043c \u0441\u0442\u0430\u043b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u043c \u0441\u043a\u0430\u043d\u0434\u0430\u043b\u0430. \n\n\u0412\u044b\u044f\u0441\u043d\u0438\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f CZ \u0438\u0437 Binance, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0449\u0430\u043b\u0441\u044f \u0447\u0435\u0440\u0435\u0437 Signal \u0441 \u0432\u043a\u043b\u044e\u0447\u0451\u043d\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u0441\u0432\u043e\u0438\u043c \u0440\u0430\u0431\u043e\u0447\u0438\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c, \u043a\u0430\u043a\u0438\u043c-\u0442\u043e \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b. \n\n\u0422\u0443\u0442 \u0434\u0432\u0430 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430: \u043b\u0438\u0431\u043e end2end encryption \u0443 Signal \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442, \u043b\u0438\u0431\u043e \u0435\u0441\u0442\u044c \u043a\u0430\u043a\u0430\u044f-\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044d\u0442\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043d\u0438\u043c. \n\n\u0415\u0441\u0442\u044c \u0435\u0449\u0451 \u0438 \u0442\u0440\u0435\u0442\u0438\u0439 \u2014 \u0441\u043e\u0431\u0435\u0441\u0435\u0434\u043d\u0438\u043a CZ Binance \u0441\u043b\u0438\u043b \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f. \n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0442\u043e, \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0443\u0436\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0432 Signal, \u0432\u0435\u0440\u0438\u043c \u0432\u043e \u0432\u0442\u043e\u0440\u043e\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442. \n\n\u041f\u0440\u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0441\u0442\u0430\u0442\u044c\u044f\u0445:\n\nhttps://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/\n\nhttps://techcrunch.com/2022/08/15/signal-phone-number-exposed-twilio/", "creation_timestamp": "2023-04-04T01:10:49.000000Z"}, {"uuid": "901792da-a320-4bf0-9f00-d34c28f25768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/CyberSachok/956", "content": "\u00ab\u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0439\u00bb \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440 Signal, \u0440\u0430\u0441\u043a\u0440\u0443\u0442\u0438\u0432\u0448\u0438\u0439\u0441\u044f \u043d\u0430 \u0432\u043e\u043b\u043d\u0435 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u0438 \u0442\u0435\u043c\u044b \u043f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0441\u0442\u0438 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u0438 \u0441\u043a\u0430\u043d\u0434\u0430\u043b\u043e\u0432 \u0432 WhatsApp, \u0432 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 \u0440\u0430\u0437 \u0441\u0430\u043c \u0441\u0442\u0430\u043b \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u043c \u0441\u043a\u0430\u043d\u0434\u0430\u043b\u0430. \n\n\u0412\u044b\u044f\u0441\u043d\u0438\u043b\u043e\u0441\u044c, \u0447\u0442\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f CZ \u0438\u0437 Binance, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043e\u0431\u0449\u0430\u043b\u0441\u044f \u0447\u0435\u0440\u0435\u0437 Signal \u0441 \u0432\u043a\u043b\u044e\u0447\u0451\u043d\u043d\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043f\u043e \u0441\u0432\u043e\u0438\u043c \u0440\u0430\u0431\u043e\u0447\u0438\u043c \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c, \u043a\u0430\u043a\u0438\u043c-\u0442\u043e \u043e\u0431\u0440\u0430\u0437\u043e\u043c \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b. \n\n\u0422\u0443\u0442 \u0434\u0432\u0430 \u0432\u0430\u0440\u0438\u0430\u043d\u0442\u0430: \u043b\u0438\u0431\u043e end2end encryption \u0443 Signal \u043d\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442, \u043b\u0438\u0431\u043e \u0435\u0441\u0442\u044c \u043a\u0430\u043a\u0430\u044f-\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044d\u0442\u043e\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043d\u0438\u043c. \n\n\u0415\u0441\u0442\u044c \u0435\u0449\u0451 \u0438 \u0442\u0440\u0435\u0442\u0438\u0439 \u2014 \u0441\u043e\u0431\u0435\u0441\u0435\u0434\u043d\u0438\u043a CZ Binance \u0441\u043b\u0438\u043b \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f. \n\n\u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0442\u043e, \u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0443\u0436\u0435 \u0431\u044b\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043e \u0432 Signal, \u0432\u0435\u0440\u0438\u043c \u0432\u043e \u0432\u0442\u043e\u0440\u043e\u0439 \u0432\u0430\u0440\u0438\u0430\u043d\u0442. \n\n\u041f\u0440\u043e \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0441\u0442\u0430\u0442\u044c\u044f\u0445:\n\nhttps://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/\n\nhttps://techcrunch.com/2022/08/15/signal-phone-number-exposed-twilio/", "creation_timestamp": "2023-04-04T01:10:49.000000Z"}, {"uuid": "c4bc7ba6-7553-47c7-8628-1ab6dde962b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "https://t.me/Freedom_Technology/30", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T10:55:51.000000Z"}, {"uuid": "0ce60f15-858c-4f61-afcc-54340b99f827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "https://t.me/AUSSIE_NEWS/33714", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T19:16:36.000000Z"}, {"uuid": "ad034060-f649-4eee-89c8-7718c3c4d01d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24068", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/428", "content": "\ud83d\udde3\u0421\u0440\u043e\u0447\u043d\u044b\u0439 Signal \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0412 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u043d\u043e\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0435 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u0430 Signal \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: CVE-2023-24068 \u0438 CVE-2023-24069. \n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0432 \u0441\u0432\u043e\u0451\u043c \u0431\u043b\u043e\u0433\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u044d\u043a\u0441\u043f\u0435\u0440\u0442 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0414\u0436\u043e\u043d \u0414\u0436\u0435\u043a\u0441\u043e\u043d.\n\n\u041d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u043f\u0430\u0441\u043d\u044b, \u0438 \u0447\u0442\u043e \u0441 \u043d\u0438\u043c\u0438 \u0434\u0435\u043b\u0430\u0442\u044c?\n\u0420\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c\u0441\u044f \u0432 \u0441\u0442\u0430\u0442\u044c\u0435\u27f6", "creation_timestamp": "2023-01-25T14:11:29.000000Z"}, {"uuid": "43838784-747f-4a81-884d-cf17e7baaffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/kasperskyb2b/428", "content": "\ud83d\udde3\u0421\u0440\u043e\u0447\u043d\u044b\u0439 Signal \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\n\n\u0412 \u0434\u0435\u0441\u043a\u0442\u043e\u043f\u043d\u043e\u043c \u043a\u043b\u0438\u0435\u043d\u0442\u0435 \u043c\u0435\u0441\u0441\u0435\u043d\u0434\u0436\u0435\u0440\u0430 Signal \u043d\u0430\u0439\u0434\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: CVE-2023-24068 \u0438 CVE-2023-24069. \n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0432 \u0441\u0432\u043e\u0451\u043c \u0431\u043b\u043e\u0433\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u044d\u043a\u0441\u043f\u0435\u0440\u0442 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0414\u0436\u043e\u043d \u0414\u0436\u0435\u043a\u0441\u043e\u043d.\n\n\u041d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u043f\u0430\u0441\u043d\u044b, \u0438 \u0447\u0442\u043e \u0441 \u043d\u0438\u043c\u0438 \u0434\u0435\u043b\u0430\u0442\u044c?\n\u0420\u0430\u0437\u0431\u0438\u0440\u0430\u0435\u043c\u0441\u044f \u0432 \u0441\u0442\u0430\u0442\u044c\u0435\u27f6", "creation_timestamp": "2023-01-25T14:11:29.000000Z"}, {"uuid": "483a2289-df62-4f91-9835-da00c91c42a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-24069", "type": "published-proof-of-concept", "source": "https://t.me/AUSSIE_NEWS/33714", "content": "https://johnjhacking.com/blog/cve-2023-24068-cve-2023-24069/", "creation_timestamp": "2023-01-26T19:16:36.000000Z"}]}