{"vulnerability": "CVE-2024-3393", "sightings": [{"uuid": "69d18412-2598-4735-bdfc-879316736a16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lfblb3exm42c", "content": "", "creation_timestamp": "2025-01-09T01:57:49.248709Z"}, {"uuid": "a5abd7a4-6f79-41be-8a93-6a1f25711bcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3leayuapjiy2p", "content": "", "creation_timestamp": "2024-12-27T03:03:19.410398Z"}, {"uuid": "8cafb7f9-73a4-4e6c-9e83-2f9590109db5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3leb3tnmvq323", "content": "", "creation_timestamp": "2024-12-27T03:56:41.735159Z"}, {"uuid": "95a75afc-2387-4ce3-b41e-787957d23aa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113722788663656122", "content": "", "creation_timestamp": "2024-12-27T04:00:44.662231Z"}, {"uuid": "3101eab4-518b-4f6f-beea-f4e55b26c243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/shiftygeek.bsky.social/post/3lebcoztkb22w", "content": "", "creation_timestamp": "2024-12-27T05:59:24.240928Z"}, {"uuid": "093ab06f-bb04-4b3c-ae5b-7c9d93d90c59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-3393", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lebfc3co7k2f", "content": "", "creation_timestamp": "2024-12-27T06:45:49.022622Z"}, {"uuid": "e3787818-079f-4ff5-94d3-6496b2550830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2024-3393", "content": "", "creation_timestamp": "2024-12-27T01:30:00.000000Z"}, {"uuid": "fd232aea-35c5-46e0-85ec-f7c19fada26c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/reynardsec.bsky.social/post/3leblnia5xc2d", "content": "", "creation_timestamp": "2024-12-27T08:39:38.285363Z"}, {"uuid": "c0178718-05f7-43ea-abba-fe0e1648cc55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lebmyefqba22", "content": "", "creation_timestamp": "2024-12-27T09:03:32.612007Z"}, {"uuid": "14d54184-ee14-47d0-93bc-521ecaa0cce7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lebqzw3ice2a", "content": "", "creation_timestamp": "2024-12-27T10:15:59.378484Z"}, {"uuid": "f81e69b0-9640-4e64-ab55-2737eed5d75d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html", "content": "", "creation_timestamp": "2024-12-27T06:34:00.000000Z"}, {"uuid": "1e9278a6-e4d1-4940-b78f-fb828ad2f3b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lebv6l6lx62q", "content": "", "creation_timestamp": "2024-12-27T11:30:10.700886Z"}, {"uuid": "c932c55b-eca3-446b-be25-bf5e35403d1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/113725130421043226", "content": "", "creation_timestamp": "2024-12-27T13:56:16.750865Z"}, {"uuid": "9cd04e25-4ca4-4675-909a-1da2f28d509b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lec7mpgb422n", "content": "", "creation_timestamp": "2024-12-27T14:37:03.583836Z"}, {"uuid": "f9bd49a5-1a76-4925-b0ff-b3b5b94d5132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/coldwarkiid.bsky.social/post/3lecfkr5dsk2h", "content": "", "creation_timestamp": "2024-12-27T16:23:22.984689Z"}, {"uuid": "307558be-ce47-4308-b9b9-b8fa50a8d6f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://cyberplace.social/users/GossiTheDog/statuses/113725747984875127", "content": "", "creation_timestamp": "2024-12-27T16:33:33.394485Z"}, {"uuid": "41ccab44-bdd3-4a76-9258-100cf1deedec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/bleepingcomputer.com/post/3lecg577xrd2x", "content": "", "creation_timestamp": "2024-12-27T16:33:38.965388Z"}, {"uuid": "0a28157f-1be8-42fc-9745-af18e399128c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/GossiTheDog.cyberplace.social.ap.brid.gy/post/3lecg4ynn4yr2", "content": "", "creation_timestamp": "2024-12-27T16:33:40.063479Z"}, {"uuid": "cd7c9ae0-1357-4eb5-a429-ec339d7854f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/jussimetso.com/post/3lechf2llms2t", "content": "", "creation_timestamp": "2024-12-27T16:55:50.389821Z"}, {"uuid": "ea09bd61-798d-4cb5-b5cd-f2490bb3bf35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/taggart-tech.com/post/3lechndrw4s2v", "content": "", "creation_timestamp": "2024-12-27T17:00:37.378793Z"}, {"uuid": "7e864b83-d4bd-4620-87cd-48d5bf7487b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lecjfztpus26", "content": "", "creation_timestamp": "2024-12-27T17:32:23.858279Z"}, {"uuid": "f8925a83-f809-48b6-a9c9-a4cb79237aac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lecm636c622c", "content": "", "creation_timestamp": "2024-12-27T18:21:30.695076Z"}, {"uuid": "5787b393-0c61-441d-b531-2e443eb8a2c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lecnkuso4c2g", "content": "", "creation_timestamp": "2024-12-27T18:46:35.082135Z"}, {"uuid": "f63bc0cd-6847-4f55-a179-938632830da2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/wiretor.bsky.social/post/3lecnwyjuf22w", "content": "", "creation_timestamp": "2024-12-27T18:53:25.912312Z"}, {"uuid": "efaed1f9-55ae-4642-b729-834e3987208f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lecoiuepor27", "content": "", "creation_timestamp": "2024-12-27T19:03:19.436767Z"}, {"uuid": "f552fc24-59f8-4821-b481-9fcc444597b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-3393", "type": "seen", "source": "https://bsky.app/profile/securitycipher.bsky.social/post/3lecojw63an2c", "content": "", "creation_timestamp": "2024-12-27T19:03:54.769314Z"}, {"uuid": "0b6aa5f1-da94-4b3d-9d81-1d35f7d61433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/afonsoinfante.bsky.social/post/3lecrdykxhc2y", "content": "", "creation_timestamp": "2024-12-27T19:54:19.273642Z"}, {"uuid": "585c85c9-ea4f-44f2-afc7-f8d44d067f39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/gerardgermaine.bsky.social/post/3lecsdbygjs2c", "content": "", "creation_timestamp": "2024-12-27T20:12:00.246428Z"}, {"uuid": "65c22b91-ade0-4b63-9b50-23c5183cb58a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lecub7crjs2s", "content": "", "creation_timestamp": "2024-12-27T20:46:26.341404Z"}, {"uuid": "899dc1fc-9708-479e-be87-c4add0fa1633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lecudiwids2s", "content": "", "creation_timestamp": "2024-12-27T20:47:43.014564Z"}, {"uuid": "d0fb0459-fb08-40af-8084-06fe00255675", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/tribeofdan-michael.com/post/3lecvcdq4ps2i", "content": "", "creation_timestamp": "2024-12-27T21:04:58.165634Z"}, {"uuid": "40d5856c-2869-4ffe-9be6-93b48236530a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/securestep9.bsky.social/post/3lecvma6y7t2e", "content": "", "creation_timestamp": "2024-12-27T21:10:28.848224Z"}, {"uuid": "a4d2e6f9-bab3-49d8-a53e-acd3b805c433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3ledb64fbw22v", "content": "", "creation_timestamp": "2024-12-28T00:37:22.609450Z"}, {"uuid": "7ffb6ee4-3a20-4870-8db8-8aefd1d96514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/eyalestrin.bsky.social/post/3lee5xgw2pa2r", "content": "", "creation_timestamp": "2024-12-28T09:12:35.144223Z"}, {"uuid": "7e435ebf-23b2-47ad-8f68-02668cda2d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113730104225786101", "content": "", "creation_timestamp": "2024-12-28T11:01:12.354535Z"}, {"uuid": "093afd38-b703-46a2-b5ff-07943e69b565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/paloaltonetworks.bsky.social/post/3lefowsxfjc2p", "content": "", "creation_timestamp": "2024-12-28T23:49:06.902790Z"}, {"uuid": "422c71c1-b2a9-4f10-b4ad-11bbd26bb68d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113736165144569263", "content": "", "creation_timestamp": "2024-12-29T12:42:36.358759Z"}, {"uuid": "5bed1076-5bc5-4b35-a18a-ed51b8206386", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113742517337722611", "content": "", "creation_timestamp": "2024-12-30T15:38:00.233099Z"}, {"uuid": "f9be5985-45bb-40fc-a0c1-af187c4e01c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2995868", "content": "", "creation_timestamp": "2024-12-30T15:54:14.364523Z"}, {"uuid": "e227f6e8-8cf6-4a0a-9e1f-d94a6af47ece", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "cve-2024-3393", "type": "seen", "source": "https://www.linkedin.com/posts/nielshoekman_this-flaw-allows-unauthenticated-attackers-activity-7278677306896744448-KgeN/", "content": "", "creation_timestamp": "2024-12-30T16:20:40.052694Z"}, {"uuid": "ee2ab61c-6a61-4919-9121-0fa7b0f52ce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-12-30T18:10:02.000000Z"}, {"uuid": "f19fd000-c8a8-45e8-82e0-a5aa72443f41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3leq5ss3muk2i", "content": "", "creation_timestamp": "2025-01-02T03:41:55.958881Z"}, {"uuid": "7864393a-6223-421f-b2a6-8df2b34a48df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://social.cologne/users/pterlisten/statuses/113758364228934822", "content": "", "creation_timestamp": "2025-01-02T10:48:05.190162Z"}, {"uuid": "282d9dba-3c4c-4276-a9b8-36578b96a2ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/pterlisten.bsky.social/post/3leqvn6vguf2j", "content": "", "creation_timestamp": "2025-01-02T10:48:17.261577Z"}, {"uuid": "2c651608-c3ad-4602-ac0f-19229f49ebd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3leye3o374g2v", "content": "", "creation_timestamp": "2025-01-05T09:55:33.618823Z"}, {"uuid": "5bad557b-160f-4ffa-a487-9590f8eb5aa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lf2bmjehkc2i", "content": "", "creation_timestamp": "2025-01-06T04:16:41.834524Z"}, {"uuid": "cd795f62-9b3a-42e9-9b61-b8bd460cdfb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg7ad6sz3l2k", "content": "", "creation_timestamp": "2025-01-20T21:02:13.562476Z"}, {"uuid": "7efcdac9-8f18-4087-a752-0e2d0a0120f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lfyd4k2uf726", "content": "", "creation_timestamp": "2025-01-18T03:03:20.697908Z"}, {"uuid": "ad697fb3-d653-45b0-8957-51c7bb6c6309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33939", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/16904", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-33939\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)\n\ud83d\udd39 Description: Authentication Bypass Using an Alternate Path or Channel vulnerability in Masteriyo Masteriyo - LMS.\u00a0Unauth access to course progress.This issue affects Masteriyo - LMS: from n/a through 1.7.3.\n\ud83d\udccf Published: 2025-05-19T15:55:18.574Z\n\ud83d\udccf Modified: 2025-05-19T16:58:29.630Z\n\ud83d\udd17 References:\n1. https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-lms-by-masteriyo-plugin-1-7-3-broken-authentication-vulnerability?_s_id=cve", "creation_timestamp": "2025-05-19T17:39:17.000000Z"}, {"uuid": "b9226805-2b60-481a-8400-f2fa62eca3f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lgwipkhycm2q", "content": "", "creation_timestamp": "2025-01-30T03:03:19.628697Z"}, {"uuid": "456d7437-00a3-4cd0-b34b-77706756b22f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33939", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3maw6vycru42r", "content": "", "creation_timestamp": "2025-12-26T21:03:01.561489Z"}, {"uuid": "884b761d-41c9-4193-82b5-6fb182d95e12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://vulnerability.circl.lu/comment/6608623d-c8c2-494f-a4a8-41a12a6a7cc0", "content": "", "creation_timestamp": "2024-12-27T08:59:02.439757Z"}, {"uuid": "5f0aab20-23ba-4ac5-ba92-13bac5ea7682", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1451", "content": "", "creation_timestamp": "2024-12-30T04:00:00.000000Z"}, {"uuid": "33561d2f-51ca-472d-9ebc-18988492d968", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3393", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2985feaa-60cc-4679-9b17-544cd8808220", "content": "", "creation_timestamp": "2026-02-02T12:26:17.415946Z"}, {"uuid": "6f28db70-ed05-4bd6-b815-9059484e0db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-33939", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3likodq7unn2q", "content": "", "creation_timestamp": "2025-02-19T21:02:33.153900Z"}, {"uuid": "876aa1e4-cacf-403e-91c1-7574cba9327b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:03.000000Z"}, {"uuid": "01daabff-bef5-455e-a901-eb80ce3544aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "exploited", "source": "https://t.me/cyberbannews_ir/15160", "content": "\ud83e\ude99 \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u0634\u062f\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644\u200c\u0647\u0627\u06cc \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u067e\u0627\u0644\u0648 \u0622\u0644\u062a\u0648\n\n\ud83d\udd3a\u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc \u067e\u0627\u0644\u0648 \u0622\u0644\u062a\u0648 (Palo Alto Networks) \u0647\u0634\u062f\u0627\u0631 \u062f\u0627\u062f \u06a9\u0647 \u0647\u06a9\u0631\u0647\u0627 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u0646\u0639 \u0633\u0631\u0648\u06cc\u0633 \u00abCVE-2024-3393\u00bb \u0628\u0631\u0627\u06cc \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u0645\u062d\u0627\u0641\u0638\u062a\u200c\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0627 \u0648\u0627\u062f\u0627\u0631 \u06a9\u0631\u062f\u0646 \u0622\u0646 \u0628\u0647 \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0645\u062c\u062f\u062f\u060c \u0633\u0648\u0621\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f\u0646\u062f.\n\n\ud83d\udd3b\u0628\u0627 \u0627\u06cc\u0646 \u062d\u0627\u0644\u060c \u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0645\u0639\u062a\u0642\u062f\u0646\u062f \u06a9\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06a9\u0631\u0631 \u0627\u0632 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627\u0639\u062b \u0645\u06cc\u200c\u0634\u0648\u062f \u062f\u0633\u062a\u06af\u0627\u0647 \u0648\u0627\u0631\u062f \u062d\u0627\u0644\u062a \u062a\u0639\u0645\u06cc\u0631 \u0648 \u0646\u06af\u0647\u062f\u0627\u0631\u06cc \u0634\u0648\u062f \u0648 \u0628\u0631\u0627\u06cc \u0628\u0627\u0632\u06af\u0631\u062f\u0627\u0646\u062f\u0646 \u0622\u0646 \u0628\u0647 \u062d\u0627\u0644\u062a \u0639\u0627\u062f\u06cc \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0645\u062f\u0627\u062e\u0644\u0647 \u062f\u0633\u062a\u06cc \u0627\u0633\u062a.\n\n\u2764\ufe0f \u06af\u0632\u0627\u0631\u0634 \u06a9\u0627\u0645\u0644\n\n#\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u062a\u0647\u062f\u06cc\u062f_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u067e\u0627\u0644\u0648_\u0622\u0644\u062a\u0648\n\n\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\ud83d\udd38\n\ud83d\udd39\ud83d\udd39 @cyberbannews_ir", "creation_timestamp": "2024-12-28T13:00:38.000000Z"}, {"uuid": "1e8d367f-b982-49c2-ac29-b7fb1bd9bcaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "exploited", "source": "https://t.me/BleepingComputer/21262", "content": "\u200aHackers exploit DoS flaw to disable Palo Alto Networks firewalls\n\nPalo Alto Networks is warning that hackers are exploiting the CVE-2024-3393 denial of service vulnerability to disable firewall protections by forcing it to reboot. [...]\n\nhttps://www.bleepingcomputer.com/news/security/hackers-exploit-dos-flaw-to-disable-palo-alto-networks-firewalls/", "creation_timestamp": "2024-12-30T21:07:45.000000Z"}, {"uuid": "5d02aa91-3652-457c-b74d-bd1efb784272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/kasperskyb2b/1574", "content": "\u2b50\ufe0f \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0432 \u044d\u0442\u043e\u043c \u0433\u043e\u0434\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f APT \u0438 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411\n\n\ud83d\ude11 \u0423\u0433\u0440\u043e\u0437\u044b \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0410\u0421\u0423 \u0432 3 \u043a\u0432\u0430\u0440\u0442\u0430\u043b\u0435 2024 \u0433\u043e\u0434\u0430: \u043e\u0431\u0437\u043e\u0440 \u0438 \u0441\u0442\u0430\u0442\u0438\u0441\u0442\u0438\u043a\u0430. \u0422\u043e\u043f \u0441\u0438\u0441\u0442\u0435\u043c, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u0437\u0430\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 \u043e\u0431\u044a\u0435\u043a\u0442\u044b, \u0432\u043e\u0437\u0433\u043b\u0430\u0432\u0438\u043b\u0438 \u0431\u0438\u043e\u043c\u0435\u0442\u0440\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \n\n\ud83d\uddff \u0420\u0430\u0437\u0431\u043e\u0440 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b Masque, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0432 2024 \u0433\u043e\u0434\u0443 \u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u0439 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u043e\u0439 \u0432\u044b\u0433\u043e\u0434\u044b.  \u0417\u0430\u0445\u043e\u0434\u044f\u0442 \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u0442\u0451\u043a\u0448\u0438\u0435 \u0431\u0438\u043b\u0434\u0435\u0440\u044b Lockbit \u0438 Babuk.\n\n\ud83d\ude80 \u0412 \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u0430\u0445 Palo Alto, \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 CVE-2024-9474, \u0432\u044b\u043b\u043e\u0432\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440 Littlelamb.Wooltea. \u041e\u0447\u0435\u043d\u044c \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u043e\u0442\u0447\u0451\u0442 \u043e \u043d\u0451\u043c \u0445\u043e\u0440\u043e\u0448\u043e \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442, \u043a\u0430\u043a \u043e\u043f\u044b\u0442\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0430 \u043f\u043e\u0433\u0440\u0430\u043d\u0438\u0447\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\ud83d\udfe3\u0421\u043f\u0438\u0441\u043e\u043a \u0438\u0437 2,5 \u0442\u044b\u0441\u044f\u0447 IP-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 Astrill VPN, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043f\u043e \u0441\u043b\u043e\u0432\u0430\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u043e\u0447\u0435\u043d\u044c \u043b\u044e\u0431\u044f\u0442 \u0441\u0435\u0432\u0435\u0440\u043e\u043a\u043e\u0440\u0435\u0439\u0441\u043a\u0438\u0435 APT.\n\n\u2764\ufe0f\u041e\u0431\u0437\u043e\u0440 \u0444\u0438\u0448\u0438\u043d\u0433-\u043a\u0438\u0442\u0430 WikiKit, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0433\u043e \u0441\u0432\u043e\u0451 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u0437\u0430 \u0442\u043e, \u0447\u0442\u043e \u043e\u043d \u043f\u0435\u0440\u0435\u0430\u0434\u0440\u0435\u0441\u0443\u0435\u0442 \u043d\u0435\u043f\u043e\u0434\u0445\u043e\u0434\u044f\u0449\u0438\u0445 \u0436\u0435\u0440\u0442\u0432 \u043d\u0430 \u0412\u0438\u043a\u0438\u043f\u0435\u0434\u0438\u044e.\n\n\ud83d\ude35\u200d\ud83d\udcab \u041f\u044f\u0442\u044c \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 Chrome, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u043e\u0442 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Cyberhaven, \u0431\u044b\u043b\u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0438 \u043f\u043e\u043f\u0430\u043b\u0438 \u0432 \u043c\u0430\u0433\u0430\u0437\u0438\u043d Chrome. \u0415\u0449\u0451 \u043e\u0434\u0438\u043d \u043f\u043e\u0432\u043e\u0434 \u043f\u043e\u0434\u0447\u0438\u043d\u0438\u0442\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0443 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0439 \u0432 \u0425\u0440\u043e\u043c \u0441\u0442\u0440\u043e\u0433\u0438\u043c \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u043c \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0430\u043c.\n\n\ud83d\udfe2\u041d\u043e\u0432\u044b\u0439 \u0434\u0435\u043d\u044c \u2014 \u043d\u043e\u0432\u043e\u0435 \u0412\u041f\u041e \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f\u0445 open source. \u0422\u0435\u043f\u0435\u0440\u044c \u0447\u0435\u0440\u0435\u0437 PyPi \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 \u0441\u0442\u0438\u043b\u0435\u0440\u044b Cometlogger \u0438 Zebo.\n\n\ud83d\udfe3\u0410 Lockbit \u0441\u043e\u0431\u0440\u0430\u043b\u0438\u0441\u044c \u043e\u0442\u043f\u0440\u0430\u0437\u0434\u043d\u043e\u0432\u0430\u0442\u044c \u0433\u043e\u0434\u043e\u0432\u0449\u0438\u043d\u0443 \u0440\u0430\u0437\u0433\u043e\u043d\u0430 \u0433\u0440\u0443\u043f\u043f\u044b \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u044f\u043c\u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u043e\u043c Lockbit 4.0.\n\n\ud83d\ude35 \u0426\u0435\u043b\u0430\u044f \u043f\u0430\u0447\u043a\u0430 \u0441\u0440\u043e\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0418\u0422-\u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043e\u043c\u0440\u0430\u0447\u0438\u043b\u0438 \u0430\u0434\u043c\u0438\u043d\u0430\u043c \u043f\u0440\u0430\u0437\u0434\u043d\u0438\u0447\u043d\u044b\u0439 \u0441\u0435\u0437\u043e\u043d. \u041e\u0442\u043c\u0435\u0442\u0438\u043c CVE-2024-52046 \u0432 Apache MINA (CVSS 10), CVE-2024-45387 \u0432 Apache Traffic Ops (CVSS 9.9) \u0438 \u043c\u0435\u043d\u0435\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u0443\u044e CVE-2024-43441 \u0432 OpenGraph. \u0410 \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u0435\u0434\u0432\u0430 \u0432\u044b\u0434\u043e\u0445\u043d\u0443\u043b, \u0437\u0430\u043b\u0430\u0442\u0430\u0432 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e CVE-2024-50379 \u0432 Apache Tomcat, \u0442\u043e\u0436\u0435 \u0435\u0441\u0442\u044c \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u044b\u0435 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u2014 \u0444\u0438\u043a\u0441 \u0431\u044b\u043b \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0442\u0440\u0435\u0447\u0430\u0439\u0442\u0435 CVE-2024-56337 \u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u0439\u0442\u0435 \u0441\u043d\u0430\u0447\u0430\u043b\u0430. \u0414\u0430, \u0438 CVE-2024-53677 \u0432 Struts \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u043d\u0435 \u0437\u0430\u0431\u0443\u0434\u044c\u0442\u0435.\n\u0421\u043d\u043e\u0432\u0430 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438\u0441\u044c \u0438 Palo Alto \u0441 DoS \u0432 PAN-OS (CVE-2024-3393, CVSS 8.7).\n\n\ud83d\udc4b \u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435 \u0447\u0442\u0438\u0432\u043e \u043d\u0430 \u0432\u044b\u0445\u043e\u0434\u043d\u044b\u0435: \u043a\u0430\u043a \u043b\u044e\u0431\u0438\u043c\u0430\u044f \u0441\u0442\u0430\u0440\u0442\u0430\u043f\u0430\u043c\u0438 \u0438 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043b\u0435\u0433\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0444\u0430\u0441\u0430\u0434\u0430 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #APT #\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 @\u041f2\u0422", "creation_timestamp": "2024-12-28T08:57:19.000000Z"}, {"uuid": "208702a4-57a3-40d6-9455-d7759144345d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/cibsecurity/81874", "content": "\ud83e\udd85 CISA Adds CVE-2024-3393 to Vulnerabilities Catalog: Palo Alto Networks PAN-OS DNS Packet Flaw Threatens Firewalls \ud83e\udd85\n\n  Overview\u00a0   The Cybersecurity and Infrastructure Security Agency CISA has added CVE20243393, a Palo Alto Networks PANOS Malformed DNS Packet vulnerability, to its Known Exploited Vulnerabilities KEV catalog. This vulnerability impacts the DNS Security feature of PANOS, which powers firewalls and security solutions. The vulnerability allows attackers to exploit the system through specially crafted DNS packets, leading to a denialofservice DoS condition, affecting the availability of essential firewall services.\u00a0   On December 27, 2024, Palo Alto Networks reported a Denial of Service DoS vulnerability in the DNS Security feature of PANOS, specifically linked to the malformed DNS packet handling process. This issue, now documented as CVE20243393, has been added to the CISAs Known Exploit...\n\n\ud83d\udcd6 Read more.\n\n\ud83d\udd17 Via \"CYBLE\"\n\n----------\n\ud83d\udc41\ufe0f Seen on @cibsecurity", "creation_timestamp": "2025-01-02T14:22:32.000000Z"}, {"uuid": "cdb7213a-b5b0-4c86-ae58-1ea23aa48870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "Telegram/htc2li5xVeC7Ljwtah4b4Zwk-8Gt1IE-uoCuS5lRDw7ojg", "content": "", "creation_timestamp": "2024-12-27T09:13:54.000000Z"}, {"uuid": "ee0f34c2-fc8d-49a2-8416-4d560bd6071d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/cvedetector/13724", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-3393 - Palo Alto Networks PAN-OS DNS Reboot Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-3393 \nPublished : Dec. 27, 2024, 10:15 a.m. | 31\u00a0minutes ago \nDescription : A Denial of Service vulnerability in the DNS Security feature of Palo Alto Networks PAN-OS software allows an unauthenticated attacker to send a malicious packet through the data plane of the firewall that reboots the firewall. Repeated attempts to trigger this condition will cause the firewall to enter maintenance mode. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-27T11:48:32.000000Z"}, {"uuid": "67c81501-d4cf-4541-8637-c8ec8565b097", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "exploited", "source": "https://t.me/ViralCyber/9669", "content": "\ud83d\udd34 \u0633\u0648\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0647\u06a9\u0631\u200c\u0647\u0627 \u0627\u0632 \u0646\u0642\u0635 DoS \u0628\u0631\u0627\u06cc \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644\u200c\u0647\u0627\u06cc Palo Alto Networks\n\n\u0645\u062c\u0645\u0648\u0639\u0647 Palo Alto Networks \u0647\u0634\u062f\u0627\u0631 \u062f\u0627\u062f \u06a9\u0647 \u0647\u06a9\u0631\u200c\u0647\u0627 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc Denial of Service \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2024-3393 \u0628\u0631\u0627\u06cc \u063a\u06cc\u0631\u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u0645\u062d\u0627\u0641\u0638\u062a\u200c\u0647\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0628\u0627 \u062a\u062d\u0645\u06cc\u0644 \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0645\u062c\u062f\u062f \u0628\u0647 \u0622\u0646\u060c \u0633\u0648\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f.\n\n\u0628\u0627\u200c\u0627\u06cc\u0646\u200c\u062d\u0627\u0644\u060c \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06a9\u0631\u0631 \u0627\u0632 \u0645\u0634\u06a9\u0644 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0628\u0627\u0639\u062b \u0645\u06cc\u200c\u0634\u0648\u062f \u062f\u0633\u062a\u06af\u0627\u0647 \u0648\u0627\u0631\u062f \u062d\u0627\u0644\u062a \u062a\u0639\u0645\u06cc\u0631 \u0648 \u0646\u06af\u0647\u062f\u0627\u0631\u06cc \u0634\u0648\u062f \u0648 \u0628\u0631\u0627\u06cc \u0628\u0627\u0632\u06af\u0631\u062f\u0627\u0646\u062f\u0646 \u0622\u0646 \u0628\u0647 \u062d\u0627\u0644\u062a \u0639\u0627\u062f\u06cc \u0646\u06cc\u0627\u0632 \u0628\u0647 \u0645\u062f\u0627\u062e\u0644\u0647 \u062f\u0633\u062a\u06cc \u0627\u0633\u062a.\n\n\u062f\u0631 \u0627\u06cc\u0646 \u06af\u0632\u0627\u0631\u0634 \u0622\u0645\u062f\u0647 \u0627\u0633\u062a: \u00ab\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc Denial of Service \u062f\u0631 \u0648\u06cc\u0698\u06af\u06cc DNS Security \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 PAN-OS \u0634\u0628\u06a9\u0647\u200c\u0647\u0627\u06cc Palo Alto \u0628\u0647 \u06cc\u06a9 \u0645\u0647\u0627\u062c\u0645 \u062a\u0627\u06cc\u06cc\u062f \u0646\u0634\u062f\u0647 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u067e\u06a9\u062a \u0645\u062e\u0631\u0628 \u0631\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0635\u0641\u062d\u0647 \u062f\u06cc\u062a\u0627\u06cc \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u06a9\u0647 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644 \u0631\u0627 \u0631\u0627\u0647 \u0627\u0646\u062f\u0627\u0632\u06cc \u0645\u062c\u062f\u062f \u0645\u06cc\u200c\u06a9\u0646\u062f\u060c \u0627\u0631\u0633\u0627\u0644 \u0646\u0645\u0627\u06cc\u062f\u00bb.\n\n\u0627\u06cc\u0646 \u0645\u0634\u06a9\u0644 \u0641\u0642\u0637 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc\u06cc \u0631\u0627 \u062a\u062d\u062a\u200c\u062a\u0627\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u0645\u06cc\u200c\u062f\u0647\u062f \u06a9\u0647 \u062f\u0631 \u0622\u0646\u200c\u0647\u0627 \u062b\u0628\u062a \u00abDNS Security\u00bb \u0641\u0639\u0627\u0644 \u0627\u0633\u062a. \u0647\u0645\u0686\u0646\u06cc\u0646 \u0646\u0633\u062e\u0647\u200c\u0647\u0627\u06cc \u0645\u062d\u0635\u0648\u0644 \u062a\u062d\u062a\u200c\u062a\u0627\u062b\u06cc\u0631 CVE-2024-3393 \u062f\u0631 \u0627\u062f\u0627\u0645\u0647 \u0644\u06cc\u0633\u062a \u0634\u062f\u0647\u200c\u0627\u0646\u062f.\n\n#Cybersecurity #Cyber_Attack #Palo_Alto_Networks #DoS #Bug #Firewall #DNS_Security #PANOS #NGFW #Denial_of_Service #\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u062d\u0645\u0644\u0647_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u067e\u0627\u0644\u0648\u0622\u0644\u062a\u0648 #\u0628\u0627\u06af #\u0641\u0627\u06cc\u0631\u0648\u0627\u0644\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @Takianco\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2024-12-30T13:58:01.000000Z"}, {"uuid": "a3300ab8-be9f-4a4f-8bbb-03f355a61320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "published-proof-of-concept", "source": "Telegram/DyH3VVSYjE6whgCdDfZEkmad92IEsXBMlqI5Z10FttTgL14", "content": "", "creation_timestamp": "2025-01-10T04:00:07.000000Z"}, {"uuid": "4af10abb-6161-41dd-8e51-70050a13adaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/ZeroDay_ru/370", "content": "#exploit\n1. CVE-2024-3393:\nPalo Alto Networks PAN-OS Malicious DNS Packet Vulnerability (DoS)\n\n2. CVE-2024-12908:\nDelinea Protocol Handler - RCE via Update Process\n\n3. CVE-2024-53677:\nUnrestricted Upload of File with Dangerous Type and RCE in Apache Struts\n\n4. CVE-2021-44967:\nLimeSurvey &lt;=5.2 - RCE\n\n5. CVE-2024-47575:\nFortinet FortiManager Missing Authentication", "creation_timestamp": "2025-01-06T13:23:51.000000Z"}, {"uuid": "9cef562d-9ca0-4504-a913-0ceeb4404e2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "exploited", "source": "https://t.me/CyberSecurityIL/64090", "content": "\u05d7\u05d1\u05e8\u05ea \u05e4\u05d0\u05dc\u05d5 \u05d0\u05dc\u05d8\u05d5 \u05de\u05d3\u05d5\u05d5\u05d7\u05ea \u05db\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05de\u05e0\u05e6\u05dc\u05d9\u05dd \u05d0\u05ea \u05d4\u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2024-3393 \u05d1\u05e9\u05d1\u05d9\u05dc \u05dc\u05d2\u05e8\u05d5\u05dd \u05dc-FW \u05dc\u05d1\u05e6\u05e2 \u05e8\u05d9\u05e1\u05d8\u05e8\u05d8 \u05d5\u05dc\u05d4\u05d9\u05db\u05e0\u05e1 \u05dc\u05de\u05e6\u05d1 \u05ea\u05d7\u05d6\u05d5\u05e7\u05d4.\n\n\u05d4\u05d3\u05d9\u05d5\u05d5\u05d7 \u05d4\u05de\u05dc\u05d0 - \u05db\u05d0\u05df\n\nhttps://t.me/CyberSecurityIL/6309\n\n#\u05d7\u05d5\u05dc\u05e9\u05d5\u05ea", "creation_timestamp": "2024-12-28T18:05:31.000000Z"}, {"uuid": "dfec9422-b455-4948-8e06-564125205698", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "Telegram/v7KKDlS5vqdtVMmSHgD-5OCUS33K-0a-bCqNCUwhYlWP1Og", "content": "", "creation_timestamp": "2024-12-28T21:33:56.000000Z"}, {"uuid": "997c1ae3-3765-4376-b9ec-a2cc0daad2c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/11647", "content": "#exploit\n1. CVE-2024-3393:\nPalo Alto Networks PAN-OS Malicious DNS Packet Vulnerability (DoS)\n\n2. CVE-2024-12908:\nDelinea Protocol Handler - RCE via Update Process\n\n3. CVE-2024-53677:\nUnrestricted Upload of File with Dangerous Type and RCE in Apache Struts\n\n4. CVE-2021-44967:\nLimeSurvey &lt;=5.2 - RCE\n\n5. CVE-2024-47575:\nFortinet FortiManager Missing Authentication", "creation_timestamp": "2025-01-06T15:36:02.000000Z"}, {"uuid": "64112fc9-f0b0-419d-991b-5d34757e7a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/thehackernews/6092", "content": "\ud83d\udd25 CVE-2024-3393 Alert! A single malicious DNS packet can reboot your Palo Alto firewall and leave your network defenseless. \n \nImportant to Know: \n\u00bb This flaw impacts PAN-OS 10.X &amp; 11.X, including Prisma Access. \n\u00bb Repeated attacks could force your firewall into maintenance mode. \n\u00bb Legacy PAN-OS 11.0 users? No fixes\u2014it\u2019s time to upgrade! \n \n\u2699\ufe0f How to Fix: \n\u00bb Update to PAN-OS 10.1.14-h8 or later. \n\u00bb Use workarounds to disable risky logging until upgrades are complete. \n \nRead now: https://thehackernews.com/2024/12/palo-alto-releases-patch-for-pan-os-dos.html", "creation_timestamp": "2024-12-27T08:39:08.000000Z"}, {"uuid": "938ea1ef-b124-4e03-9be1-46be1d74234c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "exploited", "source": "https://t.me/xakep_ru/16914", "content": "Palo Alto Networks \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 DoS-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 PAN-OS, \u0438 \u0441\u0432\u0435\u0436\u0438\u0439 \u0431\u0430\u0433 \u0443\u0436\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u0445\u0430\u043a\u0435\u0440\u044b\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Palo Alto Networks \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u0443\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0441\u0432\u0435\u0436\u0443\u044e DoS-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-3393, \u0447\u0442\u043e\u0431\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0430\u0442\u044c \u0437\u0430\u0449\u0438\u0442\u0443 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432, \u0437\u0430\u0441\u0442\u0430\u0432\u043b\u044f\u044f \u0438\u0445 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c\u0441\u044f. \u041c\u043d\u043e\u0433\u043e\u043a\u0440\u0430\u0442\u043d\u043e\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u043e\u043e\u0431\u0449\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0442\u043e\u043c\u0443, \u0447\u0442\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043f\u0435\u0440\u0435\u0445\u043e\u0434\u044f\u0442 \u0432 \u0441\u0435\u0440\u0432\u0438\u0441\u043d\u044b\u0439 \u0440\u0435\u0436\u0438\u043c, \u0438 \u0434\u043b\u044f \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0445 \u0440\u0430\u0431\u043e\u0442\u044b \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0440\u0443\u0447\u043d\u043e\u0435 \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e.\n\nhttps://xakep.ru/2024/12/28/pan-os-dos/", "creation_timestamp": "2024-12-28T13:37:13.000000Z"}, {"uuid": "52ac6f0a-fbab-4dc5-b357-2abca94dc8a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "seen", "source": "https://t.me/true_secator/6591", "content": "\u0415\u0441\u043b\u0438 \u0443 \u0432\u0430\u0441 PAN-OS, \u0442\u043e \u0443 \u043d\u0430\u0441 \u0434\u043b\u044f \u0432\u0430\u0441 \u043f\u043b\u043e\u0445\u0438\u0435 \u043d\u043e\u0432\u043e\u0441\u0442\u0438.\n\nPalo Alto Networks \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0432\u043b\u0438\u044f\u044e\u0449\u0443\u044e \u043d\u0430 \u041f\u041e PAN-OS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a DoS \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\nCVE-2024-3393 \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS: 8.7 \u0438 \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 PAN-OS 10.X \u0438 11.X, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0430 Prisma Access, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0443\u044e \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u0432\u0435\u0440\u0441\u0438\u0439 PAN-OS.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u0432 PAN-OS 10.1.14-h8, 10.2.10-h12, 11.1.5, 11.2.3 \u0438 \u0432\u0441\u0435\u0445 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 PAN-OS.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 DNS \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f PAN-OS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043e\u0442\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043f\u0430\u043a\u0435\u0442 \u0447\u0435\u0440\u0435\u0437 \u043f\u043b\u043e\u0441\u043a\u043e\u0441\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0445 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u0435\u0440\u0435\u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440.\n\n\u041f\u043e\u0432\u0442\u043e\u0440\u043d\u044b\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u044d\u0442\u043e \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0443\u0442 \u043a \u043f\u0435\u0440\u0435\u0445\u043e\u0434\u0443 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 \u0432 \u0440\u0435\u0436\u0438\u043c \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u044f.\n\n\u0412 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0437\u0430\u044f\u0432\u0438\u043b\u0438, \u0447\u0442\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0441\u0440\u0435\u0434\u0435 \u0438 \u0435\u0439 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430\u0445, \u0441\u0442\u043e\u043b\u043a\u043d\u0443\u0432\u0448\u0438\u0445\u0441\u044f \u0441 DoS-\u0430\u0442\u0430\u043a\u0430\u043c\u0438, \u043a\u043e\u0433\u0434\u0430 \u0438\u0445 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043b \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0435 DNS-\u043f\u0430\u043a\u0435\u0442\u044b, \u0432\u044b\u0437\u044b\u0432\u0430\u044e\u0449\u0438\u0435 \u044d\u0442\u0443 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443. \u041f\u0440\u0430\u0432\u0434\u0430, \u043c\u0430\u0441\u0448\u0442\u0430\u0431 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0440\u0430\u0437\u0433\u043b\u0430\u0448\u0430\u0435\u0442\u0441\u044f.\n\n\u0421\u0442\u043e\u0438\u0442 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c, \u0447\u0442\u043e \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u044b, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043e \u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 DNS Security, \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-3393.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0442\u0430\u043a\u0436\u0435 \u0441\u043d\u0438\u0436\u0430\u0435\u0442\u0441\u044f \u0434\u043e CVSS 7,1, \u043a\u043e\u0433\u0434\u0430 \u0434\u043e\u0441\u0442\u0443\u043f \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0447\u0435\u0440\u0435\u0437 Prisma Access.\n\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u0431\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0443\u0442\u0438 \u0438 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u0434\u043b\u044f \u043d\u0435\u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0445 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432 \u0438\u043b\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0445 Panorama, \u043a\u043b\u0438\u0435\u043d\u0442\u044b \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u043d\u0430 \u00ab\u043d\u0435\u0442\u00bb \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 DNS \u0434\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0433\u043e\u00a0\u043f\u0440\u043e\u0444\u0438\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0433\u043e \u041f\u041e.\n\n\u0414\u043b\u044f \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0445 Strata Cloud Manager (SCM), \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u043b\u0438\u0431\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u044b\u0435 \u0432\u044b\u0448\u0435 \u0448\u0430\u0433\u0438, \u0447\u0442\u043e\u0431\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 DNS Security \u043d\u0435\u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043d\u0430 \u043a\u0430\u0436\u0434\u043e\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435, \u043b\u0438\u0431\u043e \u043d\u0430 \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 - \u0447\u0435\u0440\u0435\u0437 \u0437\u0430\u043f\u0440\u043e\u0441 \u0432 \u0441\u043b\u0443\u0436\u0431\u0443 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438.\n\n\u0414\u043b\u044f \u0430\u0440\u0435\u043d\u0434\u0430\u0442\u043e\u0440\u043e\u0432 Prisma Access, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0445 SCM, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0442\u043a\u0440\u044b\u0442\u044c \u0437\u0430\u043f\u0440\u043e\u0441 \u0432 \u0441\u043b\u0443\u0436\u0431\u0443 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438, \u0447\u0442\u043e\u0431\u044b \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432\u0435\u0434\u0435\u043d\u0438\u0435 \u0436\u0443\u0440\u043d\u0430\u043b\u0430 \u0434\u043e \u0442\u0435\u0445 \u043f\u043e\u0440, \u043f\u043e\u043a\u0430 \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435.", "creation_timestamp": "2024-12-27T15:00:06.000000Z"}, {"uuid": "f897d5b7-a939-461b-89d0-6eda255eb42e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3393", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/312", "content": "https://github.com/FelixFoxf/-CVE-2024-3393\n\nCVE-2024-3393 EXPLOIT\n#github #exploit", "creation_timestamp": "2025-01-06T10:55:48.000000Z"}]}