{"vulnerability": "cve-2024-4309", "sightings": [{"uuid": "abf35831-93d4-4618-8a8a-3b423b2804f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43098", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "606b75e5-4c0f-4c64-9c54-8f84693a92af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "1ca87937-8e96-4361-8677-8ff2ee450c3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1ec72d66-1291-4be7-8894-105a053925fa", "content": "", "creation_timestamp": "2026-02-02T12:26:24.683122Z"}, {"uuid": "f7b13397-38ed-44e1-b2d0-37da5df6ab04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43095", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2596", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43095\n\ud83d\udd39 Description: In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation.\n\ud83d\udccf Published: 2025-01-21T23:04:42.642Z\n\ud83d\udccf Modified: 2025-01-22T17:37:02.097Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2025-01-01", "creation_timestamp": "2025-01-22T18:02:22.000000Z"}, {"uuid": "0a97224e-08fa-4011-b62c-d619a9b9e75d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/2599", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43096\n\ud83d\udd39 Description: In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-21T23:04:42.806Z\n\ud83d\udccf Modified: 2025-01-22T17:35:05.744Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2025-01-01", "creation_timestamp": "2025-01-22T18:02:27.000000Z"}, {"uuid": "15ff8b7f-55ef-493d-8f52-b78fbdcf35db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8042", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43096\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-21T23:04:42.806Z\n\ud83d\udccf Modified: 2025-03-19T13:40:29.299Z\n\ud83d\udd17 References:\n1. https://source.android.com/security/bulletin/2025-01-01", "creation_timestamp": "2025-03-19T13:49:10.000000Z"}, {"uuid": "dc0114d6-6926-4768-8b09-99b5cb97c5ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/claytechsolution/169", "content": "The Hacker News\nGoogle's March 2025 Android Security Update Fixes Two Actively Exploited Vulnerabilities\n\nGoogle has released its monthly Android Security Bulletin for March 2025 to address a total of 44 vulnerabilities, including two that it said have come under active exploitation in the wild.\nThe two high-severity vulnerabilities are listed below -\n\nCVE-2024-43093 - A privilege escalation flaw in the Framework component that could result in unauthorized access to \"Android/data,\" \"Android/obb,\"", "creation_timestamp": "2025-03-04T06:09:18.000000Z"}, {"uuid": "81856af8-9018-4a69-a199-32a6ffbbcfde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "Telegram/5Nab3RNfTBkvOpMLNYJaEuqpzi9QB49V6Gol8aMTkVzp5g", "content": "", "creation_timestamp": "2025-03-05T14:58:56.000000Z"}, {"uuid": "64f60bf6-ef04-4193-bc64-b62507c349a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/nusantaraMYID/1144", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:03:00.000000Z"}, {"uuid": "81bd7d4f-88d7-445c-ab3d-076a71a8011c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/eaglecyberwashere/55620", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:03:03.000000Z"}, {"uuid": "f38011db-22cb-4f76-b8db-971d36106b90", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://t.me/true_secator/6472", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u043a\u043e\u043c\u0430\u043d\u0434\u044b GReAT \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u043f\u043e\u0434\u044b\u0442\u043e\u0436\u0438\u043b\u0438 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u044b \u0441\u0432\u043e\u0435\u0439 \u0430\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0438 \u043f\u043e \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u0430\u043c \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439 \u043b\u0430\u043d\u0434\u0448\u0430\u0444\u0442\u0430 \u0443\u0433\u0440\u043e\u0437, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c\u044e APT \u0432 2024 \u0433\u043e\u0434\u0443.\n\n\u0412 \u043f\u043e\u043b\u0435 \u0437\u0440\u0435\u043d\u0438\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u043e\u0441\u044c \u0431\u043e\u043b\u0435\u0435 900 \u0433\u0440\u0443\u043f\u043f. \u041f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0441\u0435 \u0432\u0435\u0440\u0434\u0438\u043a\u0442\u044b \u043f\u043e \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u043c \u0432 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u0442\u0440\u0435\u043d\u0434\u0430\u043c - \u0432 \u043f\u043e\u043b\u044c\u0437\u0443 \u041b\u041a: \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u044b \u0432 \u0446\u0435\u043b\u043e\u043c \u0441\u0431\u044b\u043b\u0438\u0441\u044c.\n\n\u0415\u0441\u043b\u0438 \u0432\u043a\u0440\u0430\u0442\u0446\u0435, \u0442\u043e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u0430\u043c \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u043f\u0440\u0435\u0434\u0443\u0433\u0430\u0434\u0430\u0442\u044c, \u0447\u0442\u043e:\n\n1. \u0423\u0432\u0435\u043b\u0438\u0447\u0438\u043b\u043e\u0441\u044c \u0447\u0438\u0441\u043b\u043e \u0438\u0437\u043e\u0431\u0440\u0435\u0442\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u043d\u0430 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435, \u043d\u043e\u0441\u0438\u043c\u044b\u0435 \u0438 \u0443\u043c\u043d\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430. \u0412\u0441\u043b\u0435\u0434 \u0437\u0430 \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u0435\u0439 \u0422\u0440\u0438\u0430\u043d\u0433\u0443\u043b\u044f\u0446\u0438\u0435\u0439 \u0430\u0442\u0430\u043a\u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Apple \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0438\u043b\u0438\u0441\u044c \u0438 \u0432 2024\u00a0\u0433\u043e\u0434\u0443.\n\n\u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443, \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 \u0432 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\u0445 \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u00a0CVE-2024-23222\u00a0\u0432 \u0434\u0432\u0438\u0436\u043a\u0435 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u0430 Safari, \u0430 \u043e\u0441\u0435\u043d\u044c\u044e \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u00a0\u0434\u0432\u0443\u0445 \u043d\u043e\u0432\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435: CVE-2024-23225 \u0432 \u044f\u0434\u0440\u0435 XNU \u0438 CVE-2024-23296 \u0432 RTKit.\n\n\u0423\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043d\u0430 \u0431\u0430\u0437\u0435 Android \u0442\u0430\u043a\u0436\u0435 \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u0432 \u0444\u043e\u043a\u0443\u0441\u0435 APT-\u0433\u0440\u0443\u043f\u043f.\u00a0\u0412 \u043d\u043e\u044f\u0431\u0440\u0435 Google \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430 \u043e \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u043e\u0442\u0434\u0435\u043b\u044c\u043d\u044b\u0445 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445:\u00a0CVE-2024-43093 \u0438 CVE-2024-43047.\u00a0\n\n2. \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0440\u0435\u0439\u0434\u044b \u043f\u043e \u043d\u0435\u0439\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u04212 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u043f\u0440\u0438\u0432\u0435\u043b\u0438 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 APT-\u0433\u0440\u0443\u043f\u043f\u044b \u043d\u0430\u0447\u0430\u043b\u0438 \u0441\u043e\u0437\u0434\u0430\u0432\u0430\u0442\u044c \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0431\u043e\u0442\u043d\u0435\u0442\u044b \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a.\n\n\u0412 2024\u00a0\u0433\u043e\u0434\u0443 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043a\u0438\u0442\u0430\u0435\u044f\u0437\u044b\u0447\u043d\u044b\u0445 \u0433\u0440\u0443\u043f\u043f \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u0431\u043e\u0442\u043d\u0435\u0442\u044b \u0434\u043b\u044f \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a. \u041e\u0434\u0438\u043d \u0438\u0437 \u043d\u0438\u0445 -\u00a0Quad7 \u043d\u0430 \u0431\u0430\u0437\u0435 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0440\u043e\u0443\u0442\u0435\u0440\u043e\u0432, \u0434\u0440\u0443\u0433\u043e\u0439 -\u00a0KV-Botnet, \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044b\u0439 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445, \u0440\u043e\u0443\u0442\u0435\u0440\u0430\u0445 \u0438 IP-\u043a\u0430\u043c\u0435\u0440\u0430\u0445.\n\n3. \u0421\u0442\u0430\u043b\u043e \u0431\u043e\u043b\u044c\u0448\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u0441 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430 \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u044f\u0434\u0440\u0430 (\u0440\u0443\u0442\u043a\u0438\u0442\u044b \u0440\u0435\u0436\u0438\u043c\u0430 \u044f\u0434\u0440\u0430 \u0441\u043d\u043e\u0432\u0430 \u0432 \u0434\u0435\u043b\u0435). \u0412 2024\u00a0\u0433\u043e\u0434\u0443 \u0442\u0435\u0445\u043d\u0438\u043a\u0430 BYOVD, \u043e\u0441\u0442\u0430\u0432\u0430\u044f\u0441\u044c \u0441\u0430\u043c\u044b\u043c \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u043c \u043c\u0435\u0442\u043e\u0434\u043e\u043c \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u044f\u0434\u0440\u0443, \u0438 \u0441\u0442\u0430\u043b\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f \u0434\u0430\u0436\u0435 \u0447\u0430\u0449\u0435 (\u0440\u043e\u0441\u0442 \u043d\u0430 23%). \n\n4. \u0421 \u043a\u0430\u0436\u0434\u044b\u043c \u0433\u043e\u0434\u043e\u043c \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0430\u0442\u0430\u043a, \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u043e\u043f\u044b\u0442\u043d\u044b\u043c\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0440\u0430\u0441\u0442\u0438, \u0438 2024\u00a0\u0433\u043e\u0434 \u043d\u0435 \u0441\u0442\u0430\u043b \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c. \u0412 \u043f\u0435\u0440\u0432\u043e\u0439 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430\u00a0\u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u00a0\u0440\u043e\u0441\u0442 \u043d\u0430 25% \u0447\u0438\u0441\u043b\u0430 APT-\u0430\u0442\u0430\u043a.\n\n5. \u041a\u0430\u043a \u043c\u044b \u0438 \u043e\u0436\u0438\u0434\u0430\u043b\u043e\u0441\u044c, \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0441\u044f \u0440\u043e\u0441\u0442 \u0447\u0438\u0441\u043b\u0430 \u0430\u0442\u0430\u043a \u0445\u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u0441\u043a\u0438\u0445 \u0433\u0440\u0443\u043f\u043f \u043d\u0430 \u0444\u043e\u043d\u0435 \u0433\u0435\u043e\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043a\u043e\u043d\u0444\u043b\u0438\u043a\u0442\u043e\u0432. \u041e\u0442\u043c\u0435\u0442\u0438\u043b\u0438\u0441\u044c:\u00a0Twelve, Head Mare \u0438 Crypt Ghouls, BlackMeta.\n\n6. \u0421 \u043f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0433\u0435\u043d\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0418\u0418 \u043c\u043d\u043e\u0433\u0438\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u043a\u0430\u043a \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e \u043c\u043e\u0442\u0438\u0432\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435, \u0442\u0430\u043a \u0438 \u0441\u043f\u043e\u043d\u0441\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0430\u043c\u0438, \u043d\u0430\u0447\u0430\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u044e \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a. \u041a \u043f\u0440\u0438\u043c\u0435\u0440\u0443 -\u00a0\u043d\u0435\u0443\u0434\u0430\u0447\u043d\u0430\u044f \u043f\u043e\u043f\u044b\u0442\u043a\u0430 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 KnowBe4.\n\n7. \u041d\u043e\u0432\u044b\u0445 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u0447\u0435\u0440\u0435\u0437 MFT-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043d\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043e, \u043d\u043e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u044f\u0432\u0438\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445 MFT: CVE-2024-0204 \u0441 \u043e\u0431\u0445\u043e\u0434\u043e\u043c \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 GoAnywhere MFT \u0438 \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0447\u043d\u0430\u044f CVE-2024-5806 \u0432 MOVEit Transfer.\n\n\u041e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u043d\u043e\u0437\u044b \u043f\u043e \u043f\u0440\u043e\u0434\u0432\u0438\u043d\u0443\u0442\u044b\u043c \u0443\u0433\u0440\u043e\u0437\u0430\u043c \u043d\u0430 2025\u00a0\u0433\u043e\u0434 \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442:\n\n- \u0410\u043b\u044c\u044f\u043d\u0441\u044b \u0445\u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u043e\u0432 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0442 \u0440\u0430\u0441\u0448\u0438\u0440\u044f\u0442\u044c\u0441\u044f\n- APT-\u0433\u0440\u0443\u043f\u043f\u044b \u0431\u0443\u0434\u0443\u0442 \u0447\u0430\u0449\u0435 \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u0447\u0435\u0440\u0435\u0437 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 IoT\n- \u0420\u043e\u0441\u0442 \u0447\u0438\u0441\u043b\u0430 \u0430\u0442\u0430\u043a \u043d\u0430 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u043e\u043a \u0432 \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u0445 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c\n- \u041f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0435 \u0437\u043b\u043e\u0432\u0440\u0435\u0434\u043e\u0432 \u043d\u0430 \u044f\u0437\u044b\u043a\u0430\u0445 C++ \u0438 Go \u0434\u043b\u044f \u0430\u0434\u0430\u043f\u0442\u0430\u0446\u0438\u0438 \u043a \u044d\u043a\u043e\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c\n- \u0411\u043e\u043b\u0435\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0418\u0418 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u043c\u0438 \u043f\u0440\u0438 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0435\n- APT-\u0433\u0440\u0443\u043f\u043f\u044b \u0431\u0443\u0434\u0443\u0442 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u0438\u043f\u0444\u0435\u0439\u043a\u0430\u043c\u0438\n- \u0411\u044d\u043a\u0434\u043e\u0440\u044b \u0432 \u043c\u043e\u0434\u0435\u043b\u044f\u0445 \u0418\u0418\n- \u0420\u043e\u0441\u0442 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0442\u0438\u043f\u0430 BYOVD \u0432 APT-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f\u0445\n\n\u0411\u0443\u0434\u0435\u043c \u0441\u043b\u0435\u0434\u0438\u0442\u044c.", "creation_timestamp": "2024-11-26T11:40:16.000000Z"}, {"uuid": "f8b3c8d0-1cb9-4f16-be38-d8f136abb6e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://t.me/true_secator/6804", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 43 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Android \u0437\u0430 \u043c\u0430\u0440\u0442 2025 \u0433\u043e\u0434\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-50302 \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u044f\u0434\u0440\u0430 Linux, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u0430\u043c\u0438 \u0421\u0435\u0440\u0431\u0438\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0437\u044a\u044f\u0442\u044b\u0445 \u0432 \u0445\u043e\u0434\u0435 \u043e\u0431\u044b\u0441\u043a\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0434\u043b\u044f Android, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u0439 \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u043a\u0438 Cellebrite.\n\n\u0426\u0435\u043f\u043e\u0447\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 0-day (CVE-2024-53104), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 Amnesty International \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u043b\u043e\u0433\u043e\u0432, \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435, \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432 \u0421\u0435\u0440\u0431\u0438\u0438.\n\nGoogle \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0431\u044b\u043b\u0430 \u043e\u0441\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0430 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0440\u0438\u0441\u043a\u0430\u043c\u0438 \u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0435\u0449\u0435 \u0434\u043e \u043e\u0442\u0447\u0435\u0442\u043e\u0432 \u0438 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0430 \u043d\u0430\u0434 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0434\u043b\u044f Android, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u044b\u043b\u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b OEM-\u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0430\u043c \u0432 \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0438 \u043e\u0442 18 \u044f\u043d\u0432\u0430\u0440\u044f.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f 0-day (CVE-2024-43093) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Android Framework, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430\u043c \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043d\u043e\u0440\u043c\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 Unicode, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u043e\u0431\u0445\u043e\u0434 \u0444\u0438\u043b\u044c\u0442\u0440\u0430 \u043f\u0443\u0442\u0438 \u043a \u0444\u0430\u0439\u043b\u0443 \u0431\u0435\u0437\u00a0\u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 11 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\nGoogle \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0434\u0432\u0430 \u043d\u0430\u0431\u043e\u0440\u0430: \u0443\u0440\u043e\u0432\u043d\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 2025-03-01 \u0438\u00a02025-03-01.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0432\u0441\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0435\u0440\u0432\u043e\u0439 \u043f\u0430\u0440\u0442\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0438 \u043f\u043e\u0434\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f \u043d\u0435 \u043a\u043e \u0432\u0441\u0435\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c Android.", "creation_timestamp": "2025-03-04T19:58:29.000000Z"}, {"uuid": "c8df2203-b87e-4d65-884e-dc19b7a70a97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://t.me/ctinow/226058", "content": "Android flaw CVE-2024-43093 may be under limited, targeted exploitation\nhttps://ift.tt/mzSFtAh", "creation_timestamp": "2024-11-05T10:05:17.000000Z"}, {"uuid": "f27c260d-281f-477a-810c-4f07012621d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/ctinow/226053", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System\nhttps://ift.tt/9dzXKZP", "creation_timestamp": "2024-11-05T04:59:20.000000Z"}, {"uuid": "fd03c39f-884a-4bd3-8766-8df3ed038e7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/thehackernews/5830", "content": "Google warns of active exploitation of CVE-2024-43093 in Android. \n \nThis #vulnerability allows unauthorized access to critical directories, emphasizing the need for timely updates and patching processes. \n \nhttps://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html", "creation_timestamp": "2024-11-05T04:49:19.000000Z"}, {"uuid": "61218d6a-026d-434d-bf30-064b8c98b011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/xakep_ru/16652", "content": "Google \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Android\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0430, \u0447\u0442\u043e \u0441\u0432\u0435\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-43093 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 Android \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438.\n\nhttps://xakep.ru/2024/11/06/cve-2024-4309/", "creation_timestamp": "2024-11-06T11:35:10.000000Z"}, {"uuid": "a40f4249-192b-4411-9c70-d5bc7b98709d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lf4ro76fzm2x", "content": "", "creation_timestamp": "2025-01-07T04:09:13.922221Z"}, {"uuid": "ab8c8ae6-2302-44ea-92f6-c5f84cd716a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43097", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113761554238269582", "content": "", "creation_timestamp": "2025-01-03T00:19:20.221424Z"}, {"uuid": "36484d25-2a47-4bbb-b2eb-a0d77b254980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43097", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lesg3ywwk72c", "content": "", "creation_timestamp": "2025-01-03T01:15:34.267804Z"}, {"uuid": "59404d7e-2692-4b90-9db0-0dfeb26d643f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43097", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lesi62reyf2k", "content": "", "creation_timestamp": "2025-01-03T01:52:30.507265Z"}, {"uuid": "1eccba10-6b73-4d0d-85a6-1beb4c36e599", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbyd64wmp2f", "content": "", "creation_timestamp": "2025-01-21T23:16:49.264941Z"}, {"uuid": "02eb355f-1970-4952-9bbf-f3a4d44e11c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43095", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lgbyd35zph2b", "content": "", "creation_timestamp": "2025-01-21T23:16:46.147740Z"}, {"uuid": "2ce4eab9-0e07-41cc-a4c4-753ee7bb2d83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43095", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgc26ietq62e", "content": "", "creation_timestamp": "2025-01-21T23:49:59.759867Z"}, {"uuid": "dd952737-4cd1-4824-8a92-6504d9507342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lgc26jdeia2r", "content": "", "creation_timestamp": "2025-01-21T23:50:03.706823Z"}, {"uuid": "41d2fd3b-805b-406a-bff0-b14b59417cb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113873498923074521", "content": "", "creation_timestamp": "2025-01-22T18:48:21.788753Z"}, {"uuid": "24af4b2a-d559-451a-bd71-0d443f10a64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ljmrw3aigk2q", "content": "", "creation_timestamp": "2025-03-05T10:37:05.476014Z"}, {"uuid": "2bf2e0b4-748d-4d0d-97ff-257ffc1ba313", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/theitnerd.bsky.social/post/3ljl56rkfga2o", "content": "", "creation_timestamp": "2025-03-04T18:53:23.341837Z"}, {"uuid": "abbcc4e6-16d7-4ffb-97fe-cbc78ceb9961", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:01.000000Z"}, {"uuid": "f7b522e7-4003-492b-8a7d-63a87d8fe1d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://thehackernews.com/2025/03/googles-march-2025-android-security.html", "content": "", "creation_timestamp": "2025-03-04T03:07:00.000000Z"}, {"uuid": "be0975a6-b60c-404e-b02a-394235d3d4a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ba03b550867df29f318d54ffcd9bb7f3", "content": "", "creation_timestamp": "2025-09-03T17:21:44.000000Z"}, {"uuid": "20e800f9-45e9-4df7-b412-ef1b01eca904", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "fe241f50-9c1b-4c0c-a1dc-3bb23c3411d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43090", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "08a21e0b-49f7-49fc-9204-c24776d2dbd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43091", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/aaa30339-107b-4cb3-8a1a-3e5d8398b429", "content": "", "creation_timestamp": "2024-11-07T17:04:54.853683Z"}, {"uuid": "986cffed-e886-4241-9f21-1ca97da99594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/itsec_news/5307", "content": "\u200b\u26a1\ufe0fCVE-2024-53104: Google \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e 0day-\u0431\u0440\u0435\u0448\u044c \u0432 Android\n\n\ud83d\udcac \u0424\u0435\u0432\u0440\u0430\u043b\u044c\u0441\u043a\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android 2025 \u0433\u043e\u0434\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u043e 48 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u00ab\u043d\u0443\u043b\u0435\u0432\u043e\u0439 \u0434\u0435\u043d\u044c\u00bb \u0432 \u044f\u0434\u0440\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u041d\u0430\u0438\u0431\u043e\u043b\u044c\u0448\u0443\u044e \u0443\u0433\u0440\u043e\u0437\u0443 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-53104 , \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 USB Video Class (UVC) \u044f\u0434\u0440\u0430 Android.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u0440\u0430\u0437\u0431\u043e\u0440\u043e\u043c \u043a\u0430\u0434\u0440\u043e\u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0430 UVC_VS_UNDEFINED \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 uvc_parse_format, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u043c\u0443 \u0440\u0430\u0441\u0447\u0451\u0442\u0443 \u0440\u0430\u0437\u043c\u0435\u0440\u0430 \u0431\u0443\u0444\u0435\u0440\u0430. \u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0432\u044b\u0445\u043e\u0434\u0443 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b \u043f\u0430\u043c\u044f\u0442\u0438, \u0430 \u0437\u043d\u0430\u0447\u0438\u0442 \u2014 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u0430\u0442\u0430\u043a\u0430\u043c \u0442\u0438\u043f\u0430 \u00ab\u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438\u00bb (DoS). \u0414\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0438\u043c\u0435\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443, \u043d\u043e \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438 \u043e\u0441\u0442\u0430\u0451\u0442\u0441\u044f \u043d\u0438\u0437\u043a\u043e\u0439, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0435\u0451 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043e\u043f\u0430\u0441\u043d\u043e\u0439.\n\n\u041a\u0440\u043e\u043c\u0435 \u00ab\u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f\u00bb, \u043f\u0430\u0442\u0447 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-45569 \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 WLAN \u043e\u0442 Qualcomm. \u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0438\u043d\u0434\u0435\u043a\u0441\u0430 \u043c\u0430\u0441\u0441\u0438\u0432\u0430 \u043f\u0440\u0438 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u0435 ML IE \u0432 \u0431\u0435\u0441\u043f\u0440\u043e\u0432\u043e\u0434\u043d\u043e\u043c \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0438, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044e \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043f\u0440\u043e\u0448\u0438\u0432\u043a\u0435.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u043d\u043e \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0431\u0435\u0437 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u0430\u0432\u0430\u0445 \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438\u043b\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0438 \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0435\u0451 \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445. \u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0447\u0442\u0435\u043d\u0438\u0435 \u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432 \u043f\u0430\u043c\u044f\u0442\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u044b\u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0438\u0437 \u0441\u0442\u0440\u043e\u044f.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0434\u0432\u0430 \u043d\u0430\u0431\u043e\u0440\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439: 2025-02-01 \u0438 2025-02-05 . \u041f\u0435\u0440\u0432\u044b\u0439 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0431\u0430\u0437\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u0442\u043e\u0440\u043e\u0439 \u2014 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u0430\u0442\u0447\u0438 \u0434\u043b\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0437\u0430\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043d\u0435 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u044c\u0441\u044f \u043a\u043e \u0432\u0441\u0435\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c. \u041f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u043e\u044d\u0442\u0430\u043f\u043d\u043e, \u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Google Pixel \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u043f\u0430\u0442\u0447\u0438 \u0432 \u0447\u0438\u0441\u043b\u0435 \u043f\u0435\u0440\u0432\u044b\u0445, \u0432 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u0434\u0440\u0443\u0433\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0442\u0435\u0441\u0442\u0438\u0440\u0443\u044e\u0442 \u0438\u0445 \u043f\u043e\u0434 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435.\n\n\u042d\u0442\u043e \u043d\u0435 \u043f\u0435\u0440\u0432\u044b\u0439 \u0441\u043b\u0443\u0447\u0430\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Android \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043c\u0435\u0441\u044f\u0446\u044b. \u0412 \u043d\u043e\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 Google \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b \u0435\u0449\u0451 \u0434\u0432\u0430 \u00ab\u043d\u0443\u043b\u0435\u0432\u044b\u0445 \u0434\u043d\u044f\u00bb \u2014 CVE-2024-43047 \u0438 CVE-2024-43093 . \u041e\u0434\u0438\u043d \u0438\u0437 \u043d\u0438\u0445 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0441\u0435\u0440\u0431\u0441\u043a\u0438\u043c\u0438 \u0432\u043b\u0430\u0441\u0442\u044f\u043c\u0438 \u0434\u043b\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0433\u043e \u041f\u041e NoviSpy \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u043e\u0432 \u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0441\u0442\u043e\u0432.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-02-04T13:58:12.000000Z"}, {"uuid": "1a0c63ac-d839-48db-b93e-2e6eec4099ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://t.me/cvedetector/10862", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43093 - \"Apache ExternalStorageFile Path Filter Bypass (Local Privilege Escalation)\"\", \n  \"Content\": \"CVE ID : CVE-2024-43093 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In shouldHideDocument of ExternalStorageProvider.java, there is a possible bypass of a file path filter designed to prevent access to sensitive directories due to  incorrect unicode normalization. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:49.000000Z"}, {"uuid": "b562f138-1629-4e61-91ff-02d940d49b45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43091", "type": "seen", "source": "https://t.me/cvedetector/10859", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43091 - \"Skia Graphics Library Integer Overflow RCE\"\", \n  \"Content\": \"CVE ID : CVE-2024-43091 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In filterMask of SkEmbossMaskFilter.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:44.000000Z"}, {"uuid": "e7de856a-20b5-4b20-a460-ab69423d871b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43090", "type": "seen", "source": "https://t.me/cvedetector/10858", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43090 - CentOS Apache Cross-User Image Read Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43090 \nPublished : Nov. 13, 2024, 6:15 p.m. | 28\u00a0minutes ago \nDescription : In multiple locations, there is a possible cross-user image read due to a missing permission check. This could lead to local information disclosure with User execution privileges needed. User interaction is needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-13T19:44:43.000000Z"}, {"uuid": "70ab817f-4fbb-4609-872e-36dc6bb1e2ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "published-proof-of-concept", "source": "https://t.me/HackerArsenal/693", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-43093\nURL\uff1ahttps://github.com/hatvix1/CVE-2024-43093\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-05T20:57:54.000000Z"}, {"uuid": "0210b411-1592-42ee-9e35-99163471f08a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/5211", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:04:31.000000Z"}, {"uuid": "9dbe719e-245b-410d-be69-e410a30ac9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/MalaysiaHacktivistz/311", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:04:31.000000Z"}, {"uuid": "f25085ba-dc13-4fbe-b64e-c1405dd12bce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5599", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:03:03.000000Z"}, {"uuid": "0fad3f7e-baec-497e-9401-2cf971ea7d17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "Telegram/ZqErU5JpgCRRMEEOmg_jJ9-g9rWZz4TCeox7AekT23Nxujg", "content": "", "creation_timestamp": "2024-11-05T07:00:47.000000Z"}, {"uuid": "93fe045c-5dab-487f-9548-4ad90169f5dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/thehackernews/6430", "content": "\u26a0\ufe0f Google\u2019s March 2025 Android Security Bulletin warns of 44 vulnerabilities, including two actively exploited flaws: CVE-2024-43093 and CVE-2024-50302, with one tied to a zero-day attack on activists.\n\nGet the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html", "creation_timestamp": "2025-03-04T05:09:51.000000Z"}, {"uuid": "3794f02c-4d4d-4d49-8705-de915e755d46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2623046", "content": "", "creation_timestamp": "2024-11-07T18:26:13.960427Z"}, {"uuid": "b038f489-8c7f-4208-b990-50f90ac1ee99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0429", "content": "", "creation_timestamp": "2024-11-05T14:09:27.000000Z"}, {"uuid": "f360ed15-cf52-4dea-8f52-a6c8626de821", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://source.android.com/docs/security/bulletin/2024-11-01", "content": "", "creation_timestamp": "2024-11-08T08:53:26.566494Z"}, {"uuid": "4a5a5688-9c8f-4d14-be65-0211284ebd8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "patched", "source": "https://source.android.com/docs/security/bulletin/2024-11-01", "content": "", "creation_timestamp": "2024-11-08T09:08:01.860056Z"}, {"uuid": "f401603b-f91a-49ea-bf86-63d83c34685c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://social.circl.lu/users/circl/statuses/113476225009102749", "content": "", "creation_timestamp": "2024-11-13T14:56:21.608734Z"}, {"uuid": "5581f7af-3c9b-4ec2-9644-9a6dea39f1c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43091", "type": "seen", "source": "https://infosec.exchange/users/vuldb/statuses/113477230624232608", "content": "", "creation_timestamp": "2024-11-13T19:12:05.834702Z"}, {"uuid": "7fe17292-bc7f-40d1-986c-626a270d8ed0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-43096", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lf52h3ciws26", "content": "", "creation_timestamp": "2025-01-07T06:46:18.238000Z"}, {"uuid": "1dbb9f1e-cccf-496f-9531-37ca58a32034", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43098", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113809719412087274", "content": "", "creation_timestamp": "2025-01-11T12:28:22.482434Z"}, {"uuid": "a99ac407-a808-4b8e-868c-e41590f55d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://bsky.app/profile/jfreeg.bsky.social/post/3lfhq74nomb2k", "content": "", "creation_timestamp": "2025-01-11T12:42:11.240900Z"}, {"uuid": "34b20af0-e697-4d0e-b03b-c79491f98c42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0072", "content": "", "creation_timestamp": "2025-03-04T09:15:32.000000Z"}, {"uuid": "fbbe6c66-a291-49e1-b900-4f6b7f7d27d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljnrbwikfc23", "content": "", "creation_timestamp": "2025-03-05T19:58:29.131049Z"}, {"uuid": "0cd7847f-eac2-4503-8c3e-f192fe9863fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://threatintel.cc/2025/03/04/googles-march-android-security-update.html", "content": "", "creation_timestamp": "2025-03-04T12:39:16.000000Z"}, {"uuid": "442d3c88-8b11-4d55-a85b-98e3024ac28f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/aimainainnu.bsky.social/post/3ljodi4yzu22p", "content": "", "creation_timestamp": "2025-03-06T01:24:05.669001Z"}, {"uuid": "3c7c42cf-6cd1-4be3-9843-7459ff9e7d7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3ljjoqspk6u2h", "content": "", "creation_timestamp": "2025-03-04T05:02:22.389353Z"}, {"uuid": "0a62b062-37d4-4c5a-adbb-bb6ca580ba24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-43093", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljjowcb3jc24", "content": "", "creation_timestamp": "2025-03-04T05:05:26.920090Z"}, {"uuid": "d7164d31-1628-4679-bf2d-23daeb11b2bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/nerdontour.bsky.social/post/3loli7xxdls2l", "content": "", "creation_timestamp": "2025-05-07T13:16:53.663909Z"}, {"uuid": "8da1031c-7bbf-4eae-b546-a83b56493363", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://vulnerability.circl.lu/comment/a57c1b41-602a-4340-b6bf-c7e95751f645", "content": "", "creation_timestamp": "2024-11-08T08:48:36.588145Z"}, {"uuid": "51649b8a-ff5c-4fe1-9475-29cd1e26ed42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/1ec72d66-1291-4be7-8894-105a053925fa", "content": "", "creation_timestamp": "2026-02-02T12:26:24.683122Z"}, {"uuid": "593d0cb5-bf57-432c-a43e-f07b6f67c9ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8956", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-43093\nURL\uff1ahttps://github.com/hatvix1/CVE-2024-43093\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-05T15:11:07.000000Z"}, {"uuid": "b4659a42-9d70-4c02-8036-eae8c6c0ef9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43097", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/351", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-43097\n\ud83d\udd39 Description: In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.\n\ud83d\udccf Published: 2025-01-02T23:58:26.791Z\n\ud83d\udccf Modified: 2025-01-07T04:56:24.367Z\n\ud83d\udd17 References:\n1. https://android.googlesource.com/platform/external/skia/+/8d355fe1d0795fc30b84194b87563f75c6f8f2a7\n2. https://source.android.com/security/bulletin/2024-12-01", "creation_timestamp": "2025-01-07T05:40:10.000000Z"}, {"uuid": "a85500fb-273b-4b31-817d-3d574d429aa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "Telegram/FbgTBvx7xZ-mchrgmYlbkNT8P8WeM5SxYAN_e5MNabnmQg", "content": "", "creation_timestamp": "2024-11-05T18:15:13.000000Z"}, {"uuid": "96c8ee3a-70cb-4a54-83fc-5bf70af581c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://t.me/cvedetector/16058", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43096 - BlueZ Out-of-Bounds Write Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-43096 \nPublished : Jan. 21, 2025, 11:15 p.m. | 39\u00a0minutes ago \nDescription : In build_read_multi_rsp of gatt_sr.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote (proximal/adjacent) code execution with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T01:21:09.000000Z"}, {"uuid": "249e6584-ae03-4d4d-a0c3-275f5e97d272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43095", "type": "seen", "source": "https://t.me/cvedetector/16056", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43095 - Adobe System Privilege Escalation\", \n  \"Content\": \"CVE ID : CVE-2024-43095 \nPublished : Jan. 21, 2025, 11:15 p.m. | 39\u00a0minutes ago \nDescription : In multiple locations, there is a possible way to obtain any system permission due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-22T01:21:04.000000Z"}, {"uuid": "f18de3ad-10a1-417f-a121-031d405ca3f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43097", "type": "seen", "source": "https://t.me/cvedetector/14196", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43097 - Synthes CAD Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-43097 \nPublished : Jan. 3, 2025, 1:15 a.m. | 30\u00a0minutes ago \nDescription : In resizeToAtLeast of SkRegion.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"03 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-03T02:48:14.000000Z"}, {"uuid": "b1aa071e-2ebc-4f46-ade0-ba7ca078263e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/cibsecurity/80774", "content": "\ud83d\udd8b\ufe0f Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \ud83d\udd8b\ufe0f\n\nGoogle has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE202443093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to \"Androiddata,\" \"Androidobb,\" and \"Androidsandbox\" directories and its subdirectories,.\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"The Hacker News\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2024-11-05T08:01:18.000000Z"}, {"uuid": "a425cc26-8506-469e-bfe5-407c317ebb96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43099", "type": "seen", "source": "https://t.me/cvedetector/5628", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-43099 - \"Siemens PLC Session Key Hijacking\"\", \n  \"Content\": \"CVE ID : CVE-2024-43099 \nPublished : Sept. 13, 2024, 5:15 p.m. | 17\u00a0minutes ago \nDescription : The session hijacking attack targets the application layer's control mechanism, which manages authenticated sessions between a host PC and a PLC. During such sessions, a session key is utilized to maintain security. However, if an attacker captures this session key, they can inject traffic into an ongoing authenticated session. To successfully achieve this, the attacker also needs to spoof both the IP address and MAC address of the originating host which is typical of a session-based attack. \nSeverity: 8.8 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"13 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-13T19:38:26.000000Z"}, {"uuid": "5828b3fa-b3df-43ab-815c-53586bfa1df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/25410", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:03:03.000000Z"}, {"uuid": "67be1904-22b1-4334-bb7f-a0e2b2ca1c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "Telegram/2K86bO10bMMwF61Pev_IeXBw7KDmEmNqMWTErVVYmAns5Q", "content": "", "creation_timestamp": "2024-11-05T06:08:42.000000Z"}, {"uuid": "a3ef2193-d74d-4f6e-8dfc-f3ca95866297", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "Telegram/XgDwXBI4Ujh7Ln-8Vj8zmV7MfGmzU7BUh14X2Zg0rOe2nQ", "content": "", "creation_timestamp": "2025-03-04T10:26:01.000000Z"}, {"uuid": "8e8ed6cc-863a-4160-be17-930dcfe81148", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/KomunitiSiber/2813", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System\nhttps://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html\n\nGoogle has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild.\nThe vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to \"Android/data,\" \"Android/obb,\" and \"Android/sandbox\" directories and its sub-directories,", "creation_timestamp": "2024-11-05T07:31:38.000000Z"}, {"uuid": "e3d7d761-c840-4435-b04b-3de41bfadb0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "exploited", "source": "https://t.me/eaglecyberwashere/3469", "content": "Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System \u2013 thehackernews.com\n\nTue, 05 Nov 2024 11:30:00", "creation_timestamp": "2024-11-05T05:03:03.000000Z"}, {"uuid": "1661e8f4-acbf-4a6a-bc19-256f80da2559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://t.me/true_secator/6401", "content": "Google \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0432\u0430 \u043d\u0443\u043b\u044f \u0432 Android \u0432 \u0447\u0438\u0441\u043b\u0435 51 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0441\u0432\u043e\u0438\u0445 \u043d\u043e\u044f\u0431\u0440\u044c\u0441\u043a\u0438\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u043a\u0430\u043a \u044d\u0442\u043e \u043e\u0431\u044b\u0447\u043d\u043e \u0431\u044b\u0432\u0430\u0435\u0442 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f.\n\n\u041f\u0435\u0440\u0432\u0430\u044f CVE-2024-43047 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u0432 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445 Qualcomm \u0432 \u044f\u0434\u0440\u0435 Android, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a EoP.\n\n\u0412\u043f\u0435\u0440\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 Qualcomm \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2024 \u0433\u043e\u0434\u0430 \u043a\u0430\u043a \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u0435\u0435 \u0441\u043b\u0443\u0436\u0431\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0433\u043e \u0441\u0438\u0433\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u0430 (DSP).\n\nCVE-2024-43093 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0443\u044e \u043a EoP, \u043d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u0432\u043b\u0438\u044f\u044e\u0449\u0443\u044e \u043d\u0430 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 Android Framework \u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Google Play, \u0432 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u0432 c\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u043c \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 Documents.\n\nGoogle \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430, \u043a\u0442\u043e \u0438\u043c\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b CVE-2024-43093.\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e Google \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u0435\u0442 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0435\u0439 \u043e \u0442\u043e\u043c, \u043a\u0430\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0434\u043d\u0430\u043a\u043e \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 CVE-2024-43047 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Amnesty International \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043b\u0430\u0433\u0430\u0442\u044c, \u0447\u0442\u043e \u043e\u043d\u0430 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 spyware.\n\n\u041e\u0441\u0442\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 49 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0438 \u0432\u0435\u0440\u0441\u0438\u0438 Android \u0441 12 \u043f\u043e 15, \u0438 \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0434\u043d\u0430, CVE-2024-38408, \u043a\u043b\u0430\u0441\u0441\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0438 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u044b Qualcomm.\n\nGoogle \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0434\u0432\u0430 \u0443\u0440\u043e\u0432\u043d\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043a\u0430\u0436\u0434\u044b\u0439 \u043c\u0435\u0441\u044f\u0446: 1 \u043d\u043e\u044f\u0431\u0440\u044f (\u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f 2024-11-01) \u0438 5 \u043d\u043e\u044f\u0431\u0440\u044f (\u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f 2024-11-05).\n\n\u041f\u0435\u0440\u0432\u044b\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Android, \u0432 \u043e\u0431\u0449\u0435\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 17 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u0432 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u0432\u0442\u043e\u0440\u043e\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0442\u0435 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0441\u043f\u0435\u0446\u0438\u0444\u0438\u0447\u043d\u044b\u0435 \u0434\u043b\u044f \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 (Qualcomm, MediaTek \u0438 \u0442. \u0434.) - \u0435\u0449\u0435 34.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c Android 11 \u0438 \u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0435 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f, \u043d\u043e \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438, \u0447\u0435\u0440\u0435\u0437\u00a0\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b Google Play, \u0445\u043e\u0442\u044f \u044d\u0442\u043e \u043d\u0435 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f.", "creation_timestamp": "2024-11-06T12:30:05.000000Z"}, {"uuid": "581319a8-1f53-4969-acee-facc0f0a829a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-4309", "type": "exploited", "source": "https://t.me/xakep_ru/16652", "content": "Google \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0430 \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Android\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Google \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0430, \u0447\u0442\u043e \u0441\u0432\u0435\u0436\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-43093 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435 Android \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438.\n\nhttps://xakep.ru/2024/11/06/cve-2024-4309/", "creation_timestamp": "2024-11-06T11:35:10.000000Z"}, {"uuid": "8cad5b2f-6fd7-430d-9208-7a1d0becf24a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://thehackernews.com/2024/11/google-warns-of-actively-exploited-cve.html", "content": "", "creation_timestamp": "2024-11-05T03:30:00.000000Z"}, {"uuid": "6f3b0092-5be9-4c8d-b835-e2b5374602e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113442403763317792", "content": "", "creation_timestamp": "2024-11-07T15:35:10.454756Z"}, {"uuid": "d94b91d6-fffb-4e0c-856e-f541f4d33a75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://mastodon.social/users/hrbrmstr/statuses/113442673510281546", "content": "", "creation_timestamp": "2024-11-07T16:43:47.532663Z"}, {"uuid": "5abce7a8-e872-46ac-bf26-eb0f8069eb2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-11-07T18:10:03.000000Z"}, {"uuid": "6173353e-0c8f-49fa-a5a1-dab61a6e4b65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "MISP/1b3f74e1-436e-4ca4-a41d-8d0b822e3feb", "content": "", "creation_timestamp": "2024-11-11T13:07:14.000000Z"}, {"uuid": "2883d486-1aea-4aed-8011-83a94ae49cd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43096", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lf5el3ksqw2y", "content": "", "creation_timestamp": "2025-01-07T09:47:29.871640Z"}, {"uuid": "08533e08-887a-4f4f-9994-a14942804b9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43098", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfhs36m3mm2i", "content": "", "creation_timestamp": "2025-01-11T13:15:45.742793Z"}, {"uuid": "2fbe9534-ae2b-4df2-b0b5-def40deda7ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/kaldata.bsky.social/post/3ljmvyivwmo2d", "content": "", "creation_timestamp": "2025-03-05T11:49:59.146300Z"}, {"uuid": "37f5f286-2c6a-490d-af19-c4f2deedb900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3ljkjmdqw4s24", "content": "", "creation_timestamp": "2025-03-04T13:03:04.694337Z"}, {"uuid": "6656028e-1376-416a-973b-ea8dc7e7d31b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/114104439847713596", "content": "", "creation_timestamp": "2025-03-04T13:39:39.122329Z"}, {"uuid": "c3a8a2e7-8f48-4114-b2c1-ecd7c4d00575", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljqbppbsn22s", "content": "", "creation_timestamp": "2025-03-06T19:57:50.524986Z"}, {"uuid": "ac2e092a-2930-4f7a-b758-822be14e3dd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3ljl75zxkgt2w", "content": "", "creation_timestamp": "2025-03-04T19:29:01.448653Z"}, {"uuid": "5362b6c7-f1ef-453b-a989-43dd6efeecaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3ljjbwhlu3c2k", "content": "", "creation_timestamp": "2025-03-04T01:12:53.787531Z"}, {"uuid": "cd7688c9-8281-40fa-831d-ff72fca949d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljjnlzbufh2l", "content": "", "creation_timestamp": "2025-03-04T04:41:48.600607Z"}, {"uuid": "551ff5e7-b0c8-4b02-b199-ea7aa3a9eef1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3ljlsgezkhe2m", "content": "", "creation_timestamp": "2025-03-05T01:13:30.718360Z"}, {"uuid": "932e98e1-3314-4ca9-95dc-cf1300f1b81f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-43093", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3ljm63jn5tr2x", "content": "", "creation_timestamp": "2025-03-05T04:42:07.795859Z"}]}