{"vulnerability": "cve-2023-3253", "sightings": [{"uuid": "31ab4340-74f4-433a-afe6-fb7d0836b0bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/35126", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-09-04T22:15:58.000000Z"}, {"uuid": "2777e3a7-6939-4f5c-8dbe-74e2ed900844", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/19463", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-08-19T01:37:17.000000Z"}, {"uuid": "4d82d3fa-cf39-4701-b700-8c38825e1d29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/98754", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-09-04T22:15:56.000000Z"}, {"uuid": "ad2006bf-a927-4c1f-a017-0f4f65e37bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/u7gNnPnM2ORCu1I_9EsMbwG27-X6ApjvgklPhfIw5C5VNlRi", "content": "", "creation_timestamp": "2024-11-04T15:39:04.000000Z"}, {"uuid": "682095b1-0f88-489f-a409-b2062b3cb688", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/ThLXvPFRDPWhilIAcLP-Dscdr5kBFQwsBHKFOhYAj1n6fP6R", "content": "", "creation_timestamp": "2024-12-20T19:57:20.000000Z"}, {"uuid": "6779d3b4-1718-4641-bd1e-06e0b2d5d5f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/RRQtQSr5FcINKnjxf5IEdSUHGD07XJ2YxeVqIVXxSku8qfA", "content": "", "creation_timestamp": "2024-09-04T22:16:14.000000Z"}, {"uuid": "659612c6-15d6-4365-a271-0b0e6ace4d32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/dCyXUR8C9xWjvkM1T-3xRPIjh82Hf1zcRw914Up1GBrfH7k", "content": "", "creation_timestamp": "2024-08-19T01:37:41.000000Z"}, {"uuid": "a433b675-90d0-4fb2-8f12-82bfd9bd90c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/AnonymousEgypt/23575", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-09-04T22:14:02.000000Z"}, {"uuid": "30a06ed6-e9f0-429f-b6d5-573874e58b52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-3253", "type": "seen", "source": "https://t.me/cibsecurity/69391", "content": "\u203c CVE-2023-3253 \u203c\n\nAn improper authorization vulnerability exists where an authenticated, low privileged remote attacker could view a list of all the users available in the application.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-08-30T00:17:47.000000Z"}, {"uuid": "6958de74-29eb-4f43-966d-d00ff9cd12bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/0CHHt8ne91zjp2ceesrh6kQuN3rXIHQ6pdvfntqkcqmbFwey", "content": "", "creation_timestamp": "2024-03-06T12:55:31.000000Z"}, {"uuid": "c225f438-e2df-4e0c-a1ef-9e11dddefa89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/83037", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-08-19T01:37:20.000000Z"}, {"uuid": "31433a0c-6243-4bcc-b407-7058652a0f9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/BdA57Em_A4c1EKQsreXBpBs--lU2_Fc5OYvXZ5Rb0mV6-84", "content": "", "creation_timestamp": "2024-08-19T01:37:42.000000Z"}, {"uuid": "2067a75d-b9d6-4c59-96f5-19d89f75b3dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/a-eFtgvTGjisJoqEIHuAsSqExXEnCdI-yWQjP2MBY2x-nqxv", "content": "", "creation_timestamp": "2024-12-20T19:57:22.000000Z"}, {"uuid": "1669e51b-910b-40ca-9443-dd523d359d19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32536", "type": "seen", "source": "https://t.me/cibsecurity/65549", "content": "\u203c CVE-2023-32537 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32536.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:24:57.000000Z"}, {"uuid": "f2fe5a54-b134-4069-a926-13ec7ac859c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32533", "type": "seen", "source": "https://t.me/cibsecurity/65553", "content": "\u203c CVE-2023-32533 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:01.000000Z"}, {"uuid": "a940b0d4-8762-44fd-8008-149e5fa822ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32535", "type": "seen", "source": "https://t.me/cibsecurity/65561", "content": "\u203c CVE-2023-32535 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32534.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:09.000000Z"}, {"uuid": "78979b5b-d951-45e7-8633-9bd5c4286124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32531", "type": "seen", "source": "https://t.me/cibsecurity/65561", "content": "\u203c CVE-2023-32535 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32534.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:09.000000Z"}, {"uuid": "51a8bb27-7d11-4e58-a87b-f051c703bd6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32531", "type": "seen", "source": "https://t.me/cibsecurity/65553", "content": "\u203c CVE-2023-32533 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:01.000000Z"}, {"uuid": "19e24337-fede-4c32-a725-e6cc1f4ad0fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "seen", "source": "https://t.me/cibsecurity/65552", "content": "\u203c CVE-2023-32529 \u203c\n\nVulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.This is similar to, but not identical to CVE-2023-32530.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:00.000000Z"}, {"uuid": "2af4a550-1977-4ec6-90dc-4773f5d0425d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32532", "type": "seen", "source": "https://t.me/cibsecurity/65543", "content": "\u203c CVE-2023-32532 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:22:01.000000Z"}, {"uuid": "a2363890-2489-4c0a-8aa0-f9f25cd0da74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32531", "type": "seen", "source": "https://t.me/cibsecurity/65543", "content": "\u203c CVE-2023-32532 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:22:01.000000Z"}, {"uuid": "0cca7113-ea0e-4fd4-9d71-2b6dca0d843f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "seen", "source": "https://t.me/cibsecurity/65539", "content": "\u203c CVE-2023-32530 \u203c\n\nVulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.This is similar to, but not identical to CVE-2023-32529.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:21:54.000000Z"}, {"uuid": "3b38537a-95a9-459d-a070-70621f58aa6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32534", "type": "seen", "source": "https://t.me/cibsecurity/65538", "content": "\u203c CVE-2023-32534 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:21:53.000000Z"}, {"uuid": "ae037af8-8d64-429f-b59e-50522744032e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32537", "type": "seen", "source": "https://t.me/cibsecurity/65558", "content": "\u203c CVE-2023-32536 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32537.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:06.000000Z"}, {"uuid": "55186559-d810-42f3-b5a8-5a118454068a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32536", "type": "seen", "source": "https://t.me/cibsecurity/65558", "content": "\u203c CVE-2023-32536 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32537.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:06.000000Z"}, {"uuid": "d3366b96-10aa-4791-a912-c8182723b918", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32532", "type": "seen", "source": "https://t.me/cibsecurity/65557", "content": "\u203c CVE-2023-32531 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32532 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:05.000000Z"}, {"uuid": "461397a6-2b96-4467-9544-8af2d3baa462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32531", "type": "seen", "source": "https://t.me/cibsecurity/65557", "content": "\u203c CVE-2023-32531 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32532 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:25:05.000000Z"}, {"uuid": "400974f0-9bc1-46c2-b244-a8ed225feb4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32537", "type": "seen", "source": "https://t.me/cibsecurity/65549", "content": "\u203c CVE-2023-32537 \u203c\n\nAffected versions Trend Micro Apex Central (on-premise) are vulnerable to potential authenticated reflected cross-site scripting (XSS) attacks due to user input validation and sanitization issues. Please note: an attacker must first obtain authentication to Apex Central on the target system in order to exploit this vulnerability.This is similar to, but not identical to CVE-2023-32536.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:24:57.000000Z"}, {"uuid": "3c205fce-eec7-42b6-9278-96d263890695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32531", "type": "seen", "source": "https://t.me/cibsecurity/65538", "content": "\u203c CVE-2023-32534 \u203c\n\nCertain dashboard widgets on Trend Micro Apex Central (on-premise) are vulnerable to cross-site scripting (XSS) attacks that may allow an attacker to achieve remote code execution on affected servers.This is similar to, but not identical to CVE-2023-32531 through 32535.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-06-27T02:21:53.000000Z"}, {"uuid": "db5a1d68-dd10-4c9d-bda4-6076988d98dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2114", "content": "A PoC for the CVE-2023-32530, for iOS/MacOS from Operation Triangulation discovered by Kaspersky\n- Tested on: iOS 16.3, 16.3.1, 16.4 and 16.5 (iPhone 14 Pro Max) and macOS 13.1 and 13.4 (MacBook Air M2 2022)\n- Fixed in iOS 16.5.1 and macOS 13.4.1\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-01-23T09:19:15.000000Z"}, {"uuid": "1fc99b49-5413-475d-abf3-395b91e09196", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/x7jU1rzFVYNcnV5sOEc81PLKtY3I9ZlCS1DOBoGGwn2aT_U", "content": "", "creation_timestamp": "2024-11-04T15:38:11.000000Z"}, {"uuid": "23199c79-40f7-4c6b-a653-be7f38e6819e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/1126", "content": "(PoC) \u0644\u0640 CVE-2023-32530\u060c \u0644\u0646\u0638\u0627\u0645 iOS/MacOS \u0645\u0646 \u0639\u0645\u0644\u064a\u0629 Triangulation \u0627\u0644\u062a\u064a \u0627\u0643\u062a\u0634\u0641\u0647\u0627 Kaspersky\n\n- \u062a\u0645 \u0627\u0644\u0627\u062e\u062a\u0628\u0627\u0631 \u0639\u0644\u0649: iOS 16.3 \u064816.3.1 \u064816.4 \u064816.5 (iPhone 14 Pro Max) \u0648macOS 13.1 \u064813.4 (MacBook Air M2 2022)\n- \u062a\u0645 \u0625\u0635\u0644\u0627\u062d\u0647 \u0641\u064a iOS 16.5.1 \u0648macOS 13.4.1\n\nhttps://github.com/felix-pb/kfd/blob/main/writeups/smith.md", "creation_timestamp": "2024-03-29T18:32:08.000000Z"}, {"uuid": "790da8f9-a44e-4b57-994a-af550da153d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/l4ck3lAWlHO8VN8NzxDvl1KGGOetJO1ICELrbrI_r02cfHc", "content": "", "creation_timestamp": "2024-09-04T22:16:15.000000Z"}, {"uuid": "28da0b7d-2f09-40d5-996b-2c59a828c9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "published-proof-of-concept", "source": "Telegram/pFdjHs5JQSi1WMXkolOR4E95mWeI2FUx8bWBTLOI4vS1y5w7", "content": "", "creation_timestamp": "2024-11-04T15:38:59.000000Z"}, {"uuid": "d0d6f1be-5042-4b19-93f7-0b131d4affb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32530", "type": "seen", "source": "https://t.me/arpsyndicate/682", "content": "#ExploitObserverAlert\n\nCVE-2023-32529\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-32529. Vulnerable modules of Trend Micro Apex Central (on-premise) contain vulnerabilities which would allow authenticated users to perform a SQL injection that could lead to remote code execution.  Please note: an attacker must first obtain authentication on the target system in order to exploit these vulnerabilities.  This is similar to, but not identical to CVE-2023-32530.\n\nFIRST-EPSS: 0.003400000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-29T06:31:06.000000Z"}]}