{"vulnerability": "cve-2024-5030", "sightings": [{"uuid": "2045ab7c-7d4d-410d-9851-3c42936d9f44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50300", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113507597193583520", "content": "", "creation_timestamp": "2024-11-19T03:54:43.116476Z"}, {"uuid": "e5644cdc-aeea-41fe-9706-b840993a241b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50301", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113507597215119698", "content": "", "creation_timestamp": "2024-11-19T03:54:43.711565Z"}, {"uuid": "f68c6fd8-aee0-41ba-9d7f-86b3708fb169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113507597228668955", "content": "", "creation_timestamp": "2024-11-19T03:54:43.787789Z"}, {"uuid": "f6c29846-bbe0-4f14-a517-a4e31e1c98d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5030", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113502437564937679", "content": "", "creation_timestamp": "2024-11-18T06:02:33.531507Z"}, {"uuid": "45ab8127-b136-4e32-adf3-7f199a29e3ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljrrpwem4uz2", "content": "", "creation_timestamp": "2025-03-07T10:17:35.138495Z"}, {"uuid": "c5590893-c70e-46eb-ae78-a729e563768f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljpe2jpqwsl2", "content": "", "creation_timestamp": "2025-03-06T11:17:52.441895Z"}, {"uuid": "a31fd849-b1d0-4953-80f0-e0d2b8546e24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d6499dff-06fb58f112d18e92", "content": "", "creation_timestamp": "2025-03-03T11:12:05.765774Z"}, {"uuid": "35bba581-dfe3-44b9-b98d-dcc0fb1386e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljsdyipu6ov2", "content": "", "creation_timestamp": "2025-03-07T16:01:56.483235Z"}, {"uuid": "fb5632c9-c8ee-4335-9f17-b08dad1b7c27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqpueuwc2u", "content": "", "creation_timestamp": "2025-02-28T15:43:48.254319Z"}, {"uuid": "6ab3236c-3faa-4538-b135-d3a8a4a6c280", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqpvpi7c2u", "content": "", "creation_timestamp": "2025-02-28T15:43:49.736664Z"}, {"uuid": "361888e8-f19e-449b-91c6-434c2f8f21e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3ljmmrbi2pn2g", "content": "", "creation_timestamp": "2025-03-05T09:04:50.152178Z"}, {"uuid": "22484eaf-fef8-4aa1-b375-ddc9fec226d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqpwq6422u", "content": "", "creation_timestamp": "2025-02-28T15:43:51.223576Z"}, {"uuid": "9e92ae88-c28c-4474-b63b-e3cff1120e09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3ljal7jtnws2n", "content": "", "creation_timestamp": "2025-02-28T14:05:06.493541Z"}, {"uuid": "03313591-0bf7-461c-993f-2af7ec671fe5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3ljal7yglds2n", "content": "", "creation_timestamp": "2025-02-28T14:05:19.182024Z"}, {"uuid": "5968e170-92a5-42d3-bac6-15a615ab1641", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3ljalaxxels2n", "content": "", "creation_timestamp": "2025-02-28T14:05:52.208753Z"}, {"uuid": "d37294ed-fc1c-429e-87ac-ed004731e268", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/tuxcare.bsky.social/post/3lklto7wza22h", "content": "", "creation_timestamp": "2025-03-17T19:00:55.917106Z"}, {"uuid": "0e305c0d-0406-47b2-adc2-bbe36fe93e69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqprsgas2u", "content": "", "creation_timestamp": "2025-02-28T15:43:45.204871Z"}, {"uuid": "14537c2e-a2fa-4298-b14d-087fa604343e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqpwq73c2u", "content": "", "creation_timestamp": "2025-02-28T15:43:52.700628Z"}, {"uuid": "fe2e35af-6df6-407f-aac7-cfe2faa8eca1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqprssx22u", "content": "", "creation_timestamp": "2025-02-28T15:43:46.715678Z"}, {"uuid": "f4fa1056-dc85-4193-9b79-4eb9e49600c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3ljaqpwqa2k2u", "content": "", "creation_timestamp": "2025-02-28T15:43:54.215083Z"}, {"uuid": "e54a9556-4fe4-46a8-a489-99caf5089d6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljpk5yeha3a2", "content": "", "creation_timestamp": "2025-03-06T13:05:53.902317Z"}, {"uuid": "6b75ad0d-adda-42eb-b91e-84922b79c64d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3ljmrw3aigk2q", "content": "", "creation_timestamp": "2025-03-05T10:37:05.418642Z"}, {"uuid": "a4edd521-ae19-4cf4-94df-2fd6c5392873", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3ljkjmdqw4s24", "content": "", "creation_timestamp": "2025-03-04T13:03:04.596455Z"}, {"uuid": "2ef21e00-fb2a-4fb6-9769-c0fe0b5b3b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3ljpscy7ltp2y", "content": "", "creation_timestamp": "2025-03-06T15:22:12.155645Z"}, {"uuid": "84ca33da-df47-472b-90a4-61e818393d65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/114104439847713596", "content": "", "creation_timestamp": "2025-03-04T13:39:39.188432Z"}, {"uuid": "d85ea37f-222e-4b51-ac44-37b641edc71b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3ljpst6w6vj2e", "content": "", "creation_timestamp": "2025-03-06T15:31:15.991318Z"}, {"uuid": "20e481f7-ce39-43ea-bf2c-4f8ed059ed51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljmyf6xxz3f2", "content": "", "creation_timestamp": "2025-03-05T12:33:58.026204Z"}, {"uuid": "813723b6-35e3-4f8f-85a7-e1a9b9572706", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljyzjbv4aux2", "content": "", "creation_timestamp": "2025-03-10T07:25:08.188000Z"}, {"uuid": "00ea232a-d8e9-44af-8ca9-89e0150d08b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljqbppbsn22s", "content": "", "creation_timestamp": "2025-03-06T19:57:50.587193Z"}, {"uuid": "7c52b2fb-d004-4f1b-b336-b6cf9d5a5189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljz4oqommfy2", "content": "", "creation_timestamp": "2025-03-10T08:24:45.430516Z"}, {"uuid": "95ee9f48-bbd2-4026-a0d2-e07e1eb84192", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljqbjeloxs2s", "content": "", "creation_timestamp": "2025-03-06T19:54:16.353898Z"}, {"uuid": "878cdb3d-c099-4a69-a997-0daf39608620", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-04T18:10:02.000000Z"}, {"uuid": "6df2316f-cbb4-4512-b63e-e9f2b98fe9a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3ljl6k2yeuk2w", "content": "", "creation_timestamp": "2025-03-04T19:17:36.516785Z"}, {"uuid": "1c71b600-facc-4af7-9aae-022b6b98706f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0072", "content": "", "creation_timestamp": "2025-03-04T09:15:32.000000Z"}, {"uuid": "1b976ae5-061a-44f8-bde9-8276206b9a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/stefanlasiewski.bsky.social/post/3ljnnl3ng6k2i", "content": "", "creation_timestamp": "2025-03-05T18:51:56.054473Z"}, {"uuid": "9f2d4181-1fd3-4010-a150-97126dba29c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljnrbwikfc23", "content": "", "creation_timestamp": "2025-03-05T19:58:29.211467Z"}, {"uuid": "19375f23-fbbd-4095-8fbd-5c3d3f2625ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/theitnerd.bsky.social/post/3ljl56rkfga2o", "content": "", "creation_timestamp": "2025-03-04T18:53:23.407676Z"}, {"uuid": "fd0c640c-440e-46e3-8894-ca198a2d7de8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://threatintel.cc/2025/03/04/googles-march-android-security-update.html", "content": "", "creation_timestamp": "2025-03-04T12:39:16.000000Z"}, {"uuid": "c543a0b5-61b8-4890-bfeb-9b43d83e869a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3ljnutmlb7j2u", "content": "", "creation_timestamp": "2025-03-05T21:02:01.145981Z"}, {"uuid": "9666e106-284f-4bd8-8532-f28bc9092a17", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/3483015", "content": "", "creation_timestamp": "2025-03-04T19:14:09.691066Z"}, {"uuid": "8794b0b8-85c1-47de-9f93-a38727ba40c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3ljl75zxkgt2w", "content": "", "creation_timestamp": "2025-03-04T19:29:01.507994Z"}, {"uuid": "8d0032f1-a940-4326-91bc-dc435f1bb8c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljrlfu7kiep2", "content": "", "creation_timestamp": "2025-03-07T08:23:54.896357Z"}, {"uuid": "a7395f6b-1764-4e16-a550-9afc8c12afb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/aimainainnu.bsky.social/post/3ljodi4yzu22p", "content": "", "creation_timestamp": "2025-03-06T01:24:05.763605Z"}, {"uuid": "ae4f090c-1f99-4173-b416-cd0045411df4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3ljl6k2yeul2w", "content": "", "creation_timestamp": "2025-03-04T19:17:37.733182Z"}, {"uuid": "ef396ef0-4d0e-41ba-86c6-917ce9815887", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3ljjbwhlu3c2k", "content": "", "creation_timestamp": "2025-03-04T01:12:53.865213Z"}, {"uuid": "79e2d781-458b-4f7a-9ff8-3560db3fcdfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/grapheneos.org/post/3ljjclirk2s2k", "content": "", "creation_timestamp": "2025-03-04T01:24:39.696545Z"}, {"uuid": "a54b3966-a2a7-421e-b884-996e829e7d9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljud2oz5oyw2", "content": "", "creation_timestamp": "2025-03-08T10:34:17.093555Z"}, {"uuid": "6c373014-b0eb-4027-96c1-f8bdba909e31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3ljlhbw6h4s2z", "content": "", "creation_timestamp": "2025-03-04T21:54:07.555810Z"}, {"uuid": "e6359844-063c-46dc-993e-f1a34d269309", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3ljosoyhtuez2", "content": "", "creation_timestamp": "2025-03-06T05:56:26.689837Z"}, {"uuid": "764afa79-d65c-476e-9bf8-35aefc7269c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3ljjnlzbufh2l", "content": "", "creation_timestamp": "2025-03-04T04:41:48.687726Z"}, {"uuid": "cffb4182-3f93-4ba4-a55c-0aa470d11809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-50302", "type": "seen", "source": "https://bsky.app/profile/shiojiri.com/post/3ljjowcb3jc24", "content": "", "creation_timestamp": "2025-03-04T05:05:26.992531Z"}, {"uuid": "fd4f4c23-4d92-4a67-a0e5-36e5b252f255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-03-06T04:40:22.000000Z"}, {"uuid": "f2967c1e-c379-4bd1-9fc5-ca0058b792b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3ljm3gh452f2j", "content": "", "creation_timestamp": "2025-03-05T03:54:32.852701Z"}, {"uuid": "758e4c4b-9498-477c-a841-99f2073417a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3ljjoqspk6u2h", "content": "", "creation_timestamp": "2025-03-04T05:02:22.481474Z"}, {"uuid": "9be05ef3-60d6-4da1-a24d-85517672abe8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/securitylab-jp.bsky.social/post/3ljlsgezkhe2m", "content": "", "creation_timestamp": "2025-03-05T01:13:30.780658Z"}, {"uuid": "3d4b20de-6a2d-4237-bc6d-3fb40d355b28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50301", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "c28be530-8dd2-4458-aaa0-44f5c97d987c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/calebpr.bsky.social/post/3ljm63jn5tr2x", "content": "", "creation_timestamp": "2025-03-05T04:42:07.883454Z"}, {"uuid": "c004b2e0-ad84-4355-90c3-f75df7ee3cf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-ea7a5b86-11cff497d0049949", "content": "", "creation_timestamp": "2025-04-11T10:04:40.795723Z"}, {"uuid": "888acad0-2ab4-4b3f-bf19-ef3079fc2b00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50301", "type": "seen", "source": "https://bsky.app/profile/bluesky.awakari.com/post/3lwbhky6biw2y", "content": "", "creation_timestamp": "2025-08-13T09:00:04.796314Z"}, {"uuid": "1869b006-ddd5-4060-b8c9-b568a4c3754e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://gist.github.com/webmutation/894dd1a9a17615b7469198bb18bc3a16", "content": "", "creation_timestamp": "2025-04-12T00:10:16.000000Z"}, {"uuid": "a2db4111-d85f-4a4e-81d3-5fb2dac178c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://notnow.dev/objects/ca98a628-5cb9-4e57-a8fe-6e66a888173c", "content": "", "creation_timestamp": "2025-04-26T15:48:16.047404Z"}, {"uuid": "df514b98-4bd0-4708-9f26-d01b99376bc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50304", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "93979ea5-fc11-40fb-82d0-850ea27cec96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50304", "type": "seen", "source": "https://bsky.app/profile/ferramentaslinux.bsky.social/post/3lx2tuyayd22c", "content": "", "creation_timestamp": "2025-08-23T11:17:00.128864Z"}, {"uuid": "cb9a3e21-2b4f-4d2c-a652-f2d6fef5343f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-226-07", "content": "", "creation_timestamp": "2025-08-14T10:00:00.000000Z"}, {"uuid": "04b9593e-a826-4fe0-a2ed-77aaa2ecd7a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "MISP/fc16b923-3a13-4e9d-9aac-10a57cac12c7", "content": "", "creation_timestamp": "2025-08-18T18:31:00.000000Z"}, {"uuid": "8d6e160a-dd76-4cdd-a640-e693c4e03586", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3lyl3etf2q22o", "content": "", "creation_timestamp": "2025-09-11T15:39:03.042297Z"}, {"uuid": "e4973873-be0d-4b9d-bc35-b168344503f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3lyl3eycpnk2o", "content": "", "creation_timestamp": "2025-09-11T15:39:04.159692Z"}, {"uuid": "d7411fdc-29b9-4d7b-beea-82a5393866a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://bsky.app/profile/andreyknvl.bsky.social/post/3lyl3f37s622o", "content": "", "creation_timestamp": "2025-09-11T15:39:05.293337Z"}, {"uuid": "4d260935-1fe7-4781-9d6c-94e3789dbfdd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-50304", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/816dcc8e-f25a-4895-9b59-1bbd9caeccb8", "content": "", "creation_timestamp": "2025-12-03T14:14:49.267740Z"}, {"uuid": "ce7bd9c8-2e0b-444e-8967-4dde78b35c25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://gist.github.com/Darkcrai86/ba03b550867df29f318d54ffcd9bb7f3", "content": "", "creation_timestamp": "2025-09-03T17:21:44.000000Z"}, {"uuid": "019c06e3-3cc7-44ca-900e-7def453d01de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6374", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-50302\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: zero-initialize the report buffer\n\nSince the report buffer is used by all kinds of drivers in various ways, let's\nzero-initialize it during allocation to make sure that it can't be ever used\nto leak kernel memory via specially-crafted report.\n\ud83d\udccf Published: 2024-11-19T01:30:51.300Z\n\ud83d\udccf Modified: 2025-03-04T15:16:48.992Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/e7ea60184e1e88a3c9e437b3265cbb6439aa7e26\n2. https://git.kernel.org/stable/c/3f9e88f2672c4635960570ee9741778d4135ecf5\n3. https://git.kernel.org/stable/c/d7dc68d82ab3fcfc3f65322465da3d7031d4ab46\n4. https://git.kernel.org/stable/c/05ade5d4337867929e7ef664e7ac8e0c734f1aaf\n5. https://git.kernel.org/stable/c/1884ab3d22536a5c14b17c78c2ce76d1734e8b0b\n6. https://git.kernel.org/stable/c/9d9f5c75c0c7f31766ec27d90f7a6ac673193191\n7. https://git.kernel.org/stable/c/492015e6249fbcd42138b49de3c588d826dd9648\n8. https://git.kernel.org/stable/c/177f25d1292c7e16e1199b39c85480f7f8815552", "creation_timestamp": "2025-03-04T15:31:05.000000Z"}, {"uuid": "a65ebcd4-ef1f-4788-8308-c893145574dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-50302", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fc0fc027-1090-4e11-9d90-8cc81af807b8", "content": "", "creation_timestamp": "2026-02-02T12:26:09.203937Z"}, {"uuid": "45df8c2f-e85a-4174-9061-603d9a878e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5030", "type": "seen", "source": "https://t.me/cvedetector/11285", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-5030 - WordPress CSRF Vulnerability in CM Table Of Contents Plugin\", \n  \"Content\": \"CVE ID : CVE-2024-5030 \nPublished : Nov. 18, 2024, 6:15 a.m. | 36\u00a0minutes ago \nDescription : The CM Table Of Contents  WordPress plugin before 1.2.3 does not have CSRF check in place when resetting its settings, which could allow attackers to make a logged in admin perform such action via a CSRF attack \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-18T08:10:58.000000Z"}, {"uuid": "02c86d0d-f6ec-41ab-9bb8-65787f950d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "exploited", "source": "Telegram/5Nab3RNfTBkvOpMLNYJaEuqpzi9QB49V6Gol8aMTkVzp5g", "content": "", "creation_timestamp": "2025-03-05T14:58:56.000000Z"}, {"uuid": "ce05441e-09ac-421a-b910-2c8f9203f2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "exploited", "source": "https://t.me/cIub1337/49", "content": "Multiple critical vulnerabilities have been identified in VMware products, with evidence of active exploitation by ransomware groups. \n\nOrganizations using these products should urgently apply the recommended patches to mitigate potential risks.  \n\n 1. CISA Adds Four Known Exploited Vulnerabilities to Catalog: On March 4, 2025, the Cybersecurity and Infrastructure Security Agency (CISA) updated its Known Exploited Vulnerabilities Catalog to include four new vulnerabilities: \n \u2022 CVE-2024-50302: A Linux Kernel Use of Uninitialized Resource Vulnerability. \n \u2022 CVE-2025-22225: A VMware ESXi Arbitrary Write Vulnerability. \n \u2022 CVE-2025-22224: A VMware ESXi and Workstation TOCTOU Race Condition Vulnerability. \n \u2022 CVE-2025-22226: A VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability. \nCISA emphasizes that these vulnerabilities are actively exploited and pose significant risks, urging organizations to prioritize timely remediation as part of their vulnerability management practices.\n 2. Kevin Beaumont\u2019s Cyberplace Post: Cybersecurity expert Kevin Beaumont highlighted that three different zero-day vulnerabilities in VMware products are currently under active exploitation. He noted that these vulnerabilities are being leveraged by threat actors, underscoring the critical need for immediate patching and mitigation efforts.\n 3. Broadcom Security Advisory (VMSA-2025-0004): On March 4, 2025, Broadcom released a security advisory addressing multiple vulnerabilities in VMware products:\n \u2022 CVE-2025-22224: A critical heap-overflow vulnerability in VMware ESXi and Workstation that could allow a malicious actor with local administrative privileges on a virtual machine to execute code as the VMX process on the host. \n \u2022 CVE-2025-22225: An arbitrary write vulnerability in VMware ESXi, enabling a malicious actor with VMX process privileges to perform arbitrary kernel writes, potentially leading to a sandbox escape. \n \u2022 CVE-2025-22226: An information disclosure vulnerability in VMware ESXi, Workstation, and Fusion due to an out-of-bounds read in HGFS, which could allow an attacker with administrative privileges on a virtual machine to leak memory from the VMX process. \nBroadcom has released patches to address these vulnerabilities and recommends that affected users apply them promptly.\n\n#ransomware #vmware\n\nTelegram   \u2709\ufe0f @cIub1337\nX (Twitter) \ud83d\udd4a @club31337", "creation_timestamp": "2025-03-10T18:48:29.000000Z"}, {"uuid": "5e9b6a09-0109-47a3-89d9-a4270f8be5ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "exploited", "source": "https://t.me/itsec_news/5739", "content": "\u200b\u26a1\ufe0fGoogle \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Android, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f\n\n\ud83d\udcacGoogle \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0430\u043f\u0440\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android, \u0437\u0430\u043a\u0440\u044b\u0432 \u0441\u0440\u0430\u0437\u0443 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445. \u041e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043d\u0438\u0445 \u0441\u0442\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441 \u0432\u044b\u0441\u043e\u043a\u0438\u043c \u0443\u0440\u043e\u0432\u043d\u0435\u043c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (CVE-2024-53197 ), \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 USB-audio \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 ALSA \u0432 \u044f\u0434\u0440\u0435 Linux. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c, \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438, \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0445\u043e\u0434\u0438\u043b\u0430 \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u0443\u044e \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439 Cellebrite \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0441\u0435\u0440\u0431\u0441\u043a\u0438\u043c\u0438 \u0432\u043b\u0430\u0441\u0442\u044f\u043c\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0437\u044a\u044f\u0442\u044b\u0445 Android-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u0420\u0430\u043d\u0435\u0435 \u0432 \u044d\u0442\u043e\u0439 \u0436\u0435 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0443\u0436\u0435 \u0444\u0438\u0433\u0443\u0440\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 USB Video Class (CVE-2024-53104), \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u0430\u044f \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u0438 \u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0432\u0432\u043e\u0434\u0430 HID (CVE-2024-50302), \u0437\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u043c\u0430\u0440\u0442\u0435. \u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0432\u0441\u0435\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u043e \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c\u0438 Security Lab \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 Amnesty International, \u0438\u0437\u0443\u0447\u0430\u0432\u0448\u0438\u043c\u0438 \u043b\u043e\u0433\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432, \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0440\u0431\u0441\u043a\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0438\u0435\u0439.\n\nGoogle \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e \u0437\u043d\u0430\u043b\u0430 \u043e\u0431 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0437\u0430\u0440\u0430\u043d\u0435\u0435 \u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f\u043c \u0435\u0449\u0451 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435. \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0443\u0442\u043e\u0447\u043d\u0438\u043b, \u0447\u0442\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u044b\u043b\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b OEM-\u043f\u0430\u0440\u0442\u043d\u0451\u0440\u0430\u043c 18 \u044f\u043d\u0432\u0430\u0440\u044f \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0438\u044f.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u043a\u0440\u044b\u0442\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f ( CVE-2024-53150 ) \u043a\u0430\u0441\u0430\u0435\u0442\u0441\u044f \u0443\u0442\u0435\u0447\u043a\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438\u0437 \u044f\u0434\u0440\u0430 Android. \u041e\u043d\u0430 \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0447\u0442\u0435\u043d\u0438\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0434\u043e\u043f\u0443\u0441\u0442\u0438\u043c\u043e\u0433\u043e \u0434\u0438\u0430\u043f\u0430\u0437\u043e\u043d\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u043e\u043c\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0435\u043c\u0443 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0447\u0443\u0432\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0434\u0430\u043d\u043d\u044b\u043c \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435 \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u044d\u0442\u043e\u0433\u043e, \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442 \u0435\u0449\u0451 60 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0431\u043e\u043b\u044c\u0448\u0430\u044f \u0447\u0430\u0441\u0442\u044c \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u0438\u043c\u0435\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u043e\u0441\u0442\u0438.\n\nGoogle \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0434\u0432\u0430 \u0443\u0440\u043e\u0432\u043d\u044f \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: 1 \u0430\u043f\u0440\u0435\u043b\u044f (2025-04-01) \u0438 5 \u0430\u043f\u0440\u0435\u043b\u044f (2025-04-05 ). \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0435\u0440\u0432\u043e\u0433\u043e \u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043f\u0430\u0442\u0447\u0438 \u0434\u043b\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0441 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0438 \u043c\u043e\u0434\u0443\u043b\u0435\u0439 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u043d\u0435\u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u044b \u0434\u043b\u044f \u0432\u0441\u0435\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432. \u0421\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u044b Pixel \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443, \u0442\u043e\u0433\u0434\u0430 \u043a\u0430\u043a \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u0447\u0430\u0441\u0442\u043e \u0437\u0430\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u044e\u0442 \u0432\u044b\u043f\u0443\u0441\u043a, \u0442\u0435\u0441\u0442\u0438\u0440\u0443\u044f \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u0438\u043c\u043e\u0441\u0442\u044c \u0441 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u043c \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0435\u043c.\n\n\u0418\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e, \u0447\u0442\u043e \u0432 \u043d\u043e\u044f\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 Google \u0443\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u043b\u0430 \u0435\u0449\u0451 \u043e\u0434\u043d\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f ( CVE-2024-43047 ), \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Project Zero \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0432 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0431\u0441\u043a\u0438\u043c\u0438 \u0432\u043b\u0430\u0441\u0442\u044f\u043c\u0438. \u041e\u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0432 \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 NoviSpy \u043f\u0440\u043e\u0442\u0438\u0432 \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u043e\u0432, \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u0438 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u043e\u0432 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u043e\u0432.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-04-08T04:14:15.000000Z"}, {"uuid": "d031e4a0-a229-47b8-afc2-2cd0a00645ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://t.me/cvedetector/11416", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50302 - Linux Kernel HID Memory Leak Information Exposure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50302 \nPublished : Nov. 19, 2024, 2:16 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nHID: core: zero-initialize the report buffer  \n  \nSince the report buffer is used by all kinds of drivers in various ways, let's  \nzero-initialize it during allocation to make sure that it can't be ever used  \nto leak kernel memory via specially-crafted report. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T04:15:53.000000Z"}, {"uuid": "85aad5fd-7756-4c59-9723-7242bb04e9a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50300", "type": "seen", "source": "https://t.me/cvedetector/11415", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50300 - \"Texas Instruments Regulator RTQ2208 Use After Free Information Disclosure Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-50300 \nPublished : Nov. 19, 2024, 2:16 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nregulator: rtq2208: Fix uninitialized use of regulator_config  \n  \nFix rtq2208 driver uninitialized use to cause kernel error. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T04:15:52.000000Z"}, {"uuid": "45e8916a-d3bb-4aff-8a42-8ab4c6c33515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50301", "type": "published-proof-of-concept", "source": "https://t.me/cvedetector/11414", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50301 - Huawei Linux Keys KASAN Slab Out-of-Bounds Read\", \n  \"Content\": \"CVE ID : CVE-2024-50301 \nPublished : Nov. 19, 2024, 2:16 a.m. | 41\u00a0minutes ago \nDescription : In the Linux kernel, the following vulnerability has been resolved:  \n  \nsecurity/keys: fix slab-out-of-bounds in key_task_permission  \n  \nKASAN reports an out of bounds read:  \nBUG: KASAN: slab-out-of-bounds in __kuid_val include/linux/uidgid.h:36  \nBUG: KASAN: slab-out-of-bounds in uid_eq include/linux/uidgid.h:63 [inline]  \nBUG: KASAN: slab-out-of-bounds in key_task_permission+0x394/0x410  \nsecurity/keys/permission.c:54  \nRead of size 4 at addr ffff88813c3ab618 by task stress-ng/4362  \n  \nCPU: 2 PID: 4362 Comm: stress-ng Not tainted 5.10.0-14930-gafbffd6c3ede #15  \nCall Trace:  \n __dump_stack lib/dump_stack.c:82 [inline]  \n dump_stack+0x107/0x167 lib/dump_stack.c:123  \n print_address_description.constprop.0+0x19/0x170 mm/kasan/report.c:400  \n __kasan_report.cold+0x6c/0x84 mm/kasan/report.c:560  \n kasan_report+0x3a/0x50 mm/kasan/report.c:585  \n __kuid_val include/linux/uidgid.h:36 [inline]  \n uid_eq include/linux/uidgid.h:63 [inline]  \n key_task_permission+0x394/0x410 security/keys/permission.c:54  \n search_nested_keyrings+0x90e/0xe90 security/keys/keyring.c:793  \n  \nThis issue was also reported by syzbot.  \n  \nIt can be reproduced by following these steps(more details [1]):  \n1. Obtain more than 32 inputs that have similar hashes, which ends with the  \n   pattern '0xxxxxxxe6'.  \n2. Reboot and add the keys obtained in step 1.  \n  \nThe reproducer demonstrates how this issue happened:  \n1. In the search_nested_keyrings function, when it iterates through the  \n   slots in a node(below tag ascend_to_node), if the slot pointer is meta  \n   and node-&gt;back_pointer != NULL(it means a root), it will proceed to  \n   descend_to_node. However, there is an exception. If node is the root,  \n   and one of the slots points to a shortcut, it will be treated as a  \n   keyring.  \n2. Whether the ptr is keyring decided by keyring_ptr_is_keyring function.  \n   However, KEYRING_PTR_SUBTYPE is 0x2UL, the same as  \n   ASSOC_ARRAY_PTR_SUBTYPE_MASK.  \n3. When 32 keys with the similar hashes are added to the tree, the ROOT  \n   has keys with hashes that are not similar (e.g. slot 0) and it splits  \n   NODE A without using a shortcut. When NODE A is filled with keys that  \n   all hashes are xxe6, the keys are similar, NODE A will split with a  \n   shortcut. Finally, it forms the tree as shown below, where slot 6 points  \n   to a shortcut.  \n  \n                      NODE A  \n              +------&gt;+---+  \n      ROOT    |       | 0 | xxe6  \n      +---+   |       +---+  \n xxxx | 0 | shortcut  :   : xxe6  \n      +---+   |       +---+  \n xxe6 :   :   |       |   | xxe6  \n      +---+   |       +---+  \n      | 6 |---+       :   : xxe6  \n      +---+           +---+  \n xxe6 :   :           | f | xxe6  \n      +---+           +---+  \n xxe6 | f |  \n      +---+  \n  \n4. As mentioned above, If a slot(slot 6) of the root points to a shortcut,  \n   it may be mistakenly transferred to a key*, leading to a read  \n   out-of-bounds read.  \n  \nTo fix this issue, one should jump to descend_to_node if the ptr is a  \nshortcut, regardless of whether the node is root or not.  \n  \n[1]   \n  \n[jarkko: tweaked the commit message a bit to have an appropriate closes  \n tag.] \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-19T04:15:51.000000Z"}, {"uuid": "5e9e63d4-30ee-423b-9a2d-073520e67dea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50306", "type": "seen", "source": "https://t.me/cvedetector/10914", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50306 - Apache Traffic Server Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50306 \nPublished : Nov. 14, 2024, 10:15 a.m. | 17\u00a0minutes ago \nDescription : Unchecked return value can allow Apache Traffic Server to retain privileges on startup.  \n  \nThis issue affects Apache Traffic Server: from 9.2.0 through 9.2.5, from 10.0.0 through 10.0.1.  \n  \nUsers are recommended to upgrade to version 9.2.6 or 10.0.2, which fixes the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T11:38:00.000000Z"}, {"uuid": "8364a1da-0cc1-4039-a326-890cf6b7d324", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50305", "type": "seen", "source": "https://t.me/cvedetector/10913", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50305 - Apache Traffic Server Host Header Buffer Overflow\", \n  \"Content\": \"CVE ID : CVE-2024-50305 \nPublished : Nov. 14, 2024, 10:15 a.m. | 17\u00a0minutes ago \nDescription : Valid Host header field can cause Apache Traffic Server to crash on some platforms.  \n  \nThis issue affects Apache Traffic Server: from 9.2.0 through 9.2.5.  \n  \nUsers are recommended to upgrade to version 9.2.6, which fixes the issue, or 10.0.2, which does not have the issue. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-14T11:37:59.000000Z"}, {"uuid": "88a406d2-8a48-445e-b3da-9edba5467e77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://t.me/true_secator/6921", "content": "Google \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Android \u0437\u0430 \u0430\u043f\u0440\u0435\u043b\u044c 2025 \u0433\u043e\u0434\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u0434\u0438\u043d \u0438\u0437 \u043d\u0443\u043b\u0435\u0439 - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u0440\u0438\u0441\u043a\u0430, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 EoP (CVE-2024-53197) \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 USB-audio \u044f\u0434\u0440\u0430 Linux \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 ALSA.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u043e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u0430\u043c\u0438 \u0421\u0435\u0440\u0431\u0438\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0437\u044a\u044f\u0442\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Android \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u0439 \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u043a\u0438 Cellebrite.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f USB Video Class (CVE-2024-53104), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u0438 \u0434\u0440\u0443\u0433\u043e\u0439 0-day Human Interface Devices (CVE-2024-50302), \u0437\u0430\u043a\u0440\u044b\u0442\u0443\u044e \u0432 \u043c\u0430\u0440\u0442\u0435.\n\n\u041e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 EoP (CVE-2024\u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430 \u0432 \u0445\u043e\u0434\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432, \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445, \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0440\u0431\u0441\u043a\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0438\u0435\u0439.\n\n\u0412 \u044f\u043d\u0432\u0430\u0440\u0435 Google \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f OEM-\u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0430\u043c.\u00a0\n\n\u0414\u0440\u0443\u0433\u0430\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 0-day \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-53150 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u044f\u0434\u0440\u0430 Android, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0447\u0442\u0435\u043d\u0438\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0431\u0443\u0444\u0435\u0440\u0430 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\u00a0\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android \u0437\u0430 \u043c\u0430\u0440\u0442 2025 \u0433\u043e\u0434\u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 60 \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a EoP.\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e Google \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0434\u0432\u0430 \u043d\u0430\u0431\u043e\u0440\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439: \u0443\u0440\u043e\u0432\u043d\u0438 2025-04-01 \u0438 2025-04-05. \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f   \u0434\u043b\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0441 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0438 \u043f\u043e\u0434\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u044b \u043a\u043e \u0432\u0441\u0435\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c Android.\n\n\u0423\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Google Pixel \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u044d\u0442\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e, \u0432 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u0434\u0440\u0443\u0433\u0438\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c \u0447\u0430\u0441\u0442\u043e \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0431\u043e\u043b\u044c\u0448\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0441\u0432\u043e\u0438\u0445 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f.", "creation_timestamp": "2025-04-08T12:30:05.000000Z"}, {"uuid": "6df4e605-fe0d-4279-9437-624ec68c65ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50307", "type": "seen", "source": "https://t.me/cvedetector/9091", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-50307 - Chatwork Desktop Application (Windows) - Arbitrary File Execution Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-50307 \nPublished : Oct. 28, 2024, 5:15 a.m. | 33\u00a0minutes ago \nDescription : Use of potentially dangerous function issue exists in Chatwork Desktop Application (Windows) versions prior to 2.9.2. If a user clicks a specially crafted link in the application, an arbitrary file may be downloaded from an external website and executed. As a result, arbitrary code may be executed on the device that runs Chatwork Desktop Application (Windows). \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-28T06:57:34.000000Z"}, {"uuid": "4433f864-0e8f-4c9d-a955-dbf9e1b96402", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "exploited", "source": "https://t.me/thehackernews/6430", "content": "\u26a0\ufe0f Google\u2019s March 2025 Android Security Bulletin warns of 44 vulnerabilities, including two actively exploited flaws: CVE-2024-43093 and CVE-2024-50302, with one tied to a zero-day attack on activists.\n\nGet the full details: https://thehackernews.com/2025/03/googles-march-2025-android-security.html", "creation_timestamp": "2025-03-04T05:09:51.000000Z"}, {"uuid": "9e07b8a4-4ca4-4c37-aa87-a14db90f4d5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://t.me/true_secator/6804", "content": "Google \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 43 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Android \u0437\u0430 \u043c\u0430\u0440\u0442 2025 \u0433\u043e\u0434\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445, \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-50302 \u0438 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 \u044f\u0434\u0440\u0430 Linux, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u0430\u043c\u0438 \u0421\u0435\u0440\u0431\u0438\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0437\u044a\u044f\u0442\u044b\u0445 \u0432 \u0445\u043e\u0434\u0435 \u043e\u0431\u044b\u0441\u043a\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432 \u0434\u043b\u044f Android, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u0439 \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0435\u0439 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u043a\u0438 Cellebrite.\n\n\u0426\u0435\u043f\u043e\u0447\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 0-day (CVE-2024-53104), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435, \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 Amnesty International \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u043b\u043e\u0433\u043e\u0432, \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0435, \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0432 \u0421\u0435\u0440\u0431\u0438\u0438.\n\nGoogle \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0431\u044b\u043b\u0430 \u043e\u0441\u0432\u0435\u0434\u043e\u043c\u043b\u0435\u043d\u0430 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u0440\u0438\u0441\u043a\u0430\u043c\u0438 \u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0435\u0449\u0435 \u0434\u043e \u043e\u0442\u0447\u0435\u0442\u043e\u0432 \u0438 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0430 \u043d\u0430\u0434 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0434\u043b\u044f Android, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u044b\u043b\u0438 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b OEM-\u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0430\u043c \u0432 \u043a\u043e\u043d\u0441\u0443\u043b\u044c\u0442\u0430\u0442\u0438\u0432\u043d\u043e\u043c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0438 \u043e\u0442 18 \u044f\u043d\u0432\u0430\u0440\u044f.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f 0-day (CVE-2024-43093) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Android Framework, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u043c \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0430\u043c \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u043d\u043e\u0440\u043c\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 Unicode, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044f \u043e\u0431\u0445\u043e\u0434 \u0444\u0438\u043b\u044c\u0442\u0440\u0430 \u043f\u0443\u0442\u0438 \u043a \u0444\u0430\u0439\u043b\u0443 \u0431\u0435\u0437\u00a0\u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android \u0442\u0430\u043a\u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0442 11 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\nGoogle \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0434\u0432\u0430 \u043d\u0430\u0431\u043e\u0440\u0430: \u0443\u0440\u043e\u0432\u043d\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 2025-03-01 \u0438\u00a02025-03-01.\n\n\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0432\u0441\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0435\u0440\u0432\u043e\u0439 \u043f\u0430\u0440\u0442\u0438\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u043b\u044f \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0445 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0438 \u043f\u043e\u0434\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0442\u044c\u0441\u044f \u043d\u0435 \u043a\u043e \u0432\u0441\u0435\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c Android.", "creation_timestamp": "2025-03-04T19:58:29.000000Z"}, {"uuid": "f67e09ab-9a2f-4c11-a459-43f9f2ff0542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "https://t.me/sysodmins/25046", "content": "\ud83d\udc94 \u041f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0441\u0442\u044c \u043e\u043f\u044f\u0442\u044c \u0432 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: Zero-Day \u043e\u0442 Cellebrite \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 Android-\u0442\u0435\u043b\u0435\u0444\u043e\u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u0430.\n\nAmnesty International \u0432 \u0441\u0432\u043e\u0435\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u0437\u0430\u044f\u0432\u0438\u043b\u0430 \u043e\u0431 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 zero-day \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u043e\u0442 Cellebrite (\u0442\u043e\u0439 \u0441\u0430\u043c\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \"\u0432\u043e\u043b\u0448\u0435\u0431\u043d\u044b\u0435\" USB-\u043a\u0430\u0431\u0435\u043b\u0438 \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0442\u0435\u043b\u0435\u0444\u043e\u043d\u043e\u0432) \u043f\u0440\u043e\u0442\u0438\u0432 Android-\u0441\u043c\u0430\u0440\u0442\u0444\u043e\u043d\u0430 23-\u043b\u0435\u0442\u043d\u0435\u0433\u043e \u0441\u0435\u0440\u0431\u0441\u043a\u043e\u0433\u043e \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u0430 \"\u0412\u0435\u0434\u0440\u0430\u043d\u0430\"! \u041a\u0442\u043e \u0442\u0430\u043a\u0438\u0435 Cellebrite? \u042d\u0442\u043e \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u0430 \"\u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0435\" \ud83d\ude33\n\n\ud83d\udd13 \u041a\u0430\u043a \u0440\u0430\u0431\u043e\u0442\u0430\u043b \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442: \u0426\u0435\u043f\u043e\u0447\u043a\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043b\u044e\u0447\u0435\u0432\u0430\u044f - CVE-2024-53104 (\u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442 - USB Video Class (UVC) \u0434\u0440\u0430\u0439\u0432\u0435\u0440 \u0432 \u044f\u0434\u0440\u0435 Linux).  \u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u043e\u0431\u043e\u0439\u0442\u0438 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0443 \u044d\u043a\u0440\u0430\u043d\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 root-\u0434\u043e\u0441\u0442\u0443\u043f \u043a Android-\u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0443 \u0444\u0438\u0437\u0438\u0447\u0435\u0441\u043a\u0438, \u0447\u0435\u0440\u0435\u0437 USB-\u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435.\n\n\ud83d\udcf1 \u0416\u0435\u0440\u0442\u0432\u0430: \u0422\u0435\u043b\u0435\u0444\u043e\u043d \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u0430 (Samsung Galaxy A32) \u043a\u043e\u043d\u0444\u0438\u0441\u043a\u043e\u0432\u0430\u043d \u043f\u043e\u043b\u0438\u0446\u0438\u0435\u0439 \u043f\u043e\u0441\u043b\u0435 \u0441\u0442\u0443\u0434\u0435\u043d\u0447\u0435\u0441\u043a\u043e\u0439 \u0430\u043a\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u0430.  \u0410\u043d\u0430\u043b\u0438\u0437 Amnesty \u043f\u043e\u043a\u0430\u0437\u0430\u043b \u0441\u043b\u0435\u0434\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0438 \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0433\u043e Android-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f, \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0433\u043e \u041f\u041e NoviSpy.\n\n\ud83d\udee1 \u0420\u0435\u0430\u043a\u0446\u0438\u044f Cellebrite:  \u041e\u0442\u0440\u0438\u0446\u0430\u044e\u0442 \u0437\u043b\u043e\u0439 \u0443\u043c\u044b\u0441\u0435\u043b, \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u0438\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \"\u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044e, \u0430 \u043d\u0435 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\", \u0438...  \u0432\u043d\u0435\u0437\u0430\u043f\u043d\u043e \u0437\u0430\u043f\u0440\u0435\u0449\u0430\u044e\u0442 \u0421\u0435\u0440\u0431\u0438\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0441\u0432\u043e\u0439 \u0441\u043e\u0444\u0442.  \ud83e\udd14\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044f\u0434\u0440\u0430 Linux, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0432 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0435 (\u0443\u0436\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0432 Linux, \u043d\u043e \u043d\u0435 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e \u0432\u043e \u0432\u0441\u0435\u0445 Android):\n* CVE-2024-53104 (UVC driver, \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, 7.8 CVSS)\n* CVE-2024-53197 (Extigy/Mbox, \u0432\u044b\u0445\u043e\u0434 \u0437\u0430 \u0433\u0440\u0430\u043d\u0438\u0446\u044b)\n* CVE-2024-50302 (\u043d\u0435\u0438\u043d\u0438\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0440\u0435\u0441\u0443\u0440\u0441, \u0443\u0442\u0435\u0447\u043a\u0430 \u043f\u0430\u043c\u044f\u0442\u0438 \u044f\u0434\u0440\u0430)\n\n\u041a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u0435 zero-day \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0442\u0435\u043b\u0435\u0444\u043e\u043d\u043e\u0432 - \u0432\u043f\u043e\u043b\u043d\u0435 \u0441\u0435\u0431\u0435 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043d\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \"\u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0430\u043c\u0438\", \u043d\u043e \u0438...  \u0433\u043e\u0441\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438.  \u041f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0441\u0442\u044c \u043e\u043f\u044f\u0442\u044c \u043f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0434\u043b\u044f \u043d\u0435\u0443\u0433\u043e\u0434\u043d\u044b\u0445 \u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u043e\u0432.\n\n\u0422\u0438\u043f\u0438\u0447\u043d\u044b\u0439 \ud83e\udd78 \u0421\u0438\u0441\u0430\u0434\u043c\u0438\u043d", "creation_timestamp": "2025-03-03T11:17:19.000000Z"}, {"uuid": "af58f658-d5d7-429b-a348-98d91511a062", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "exploited", "source": "https://t.me/Russian_OSINT/5421", "content": "\u041a\u0430\u043d\u0430\u043b \ud83d\udd28SecAtor \u2014 @true_secator \u043f\u0438\u0448\u0435\u0442 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0435:\n\nGoogle \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 62 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Android \u0437\u0430 \u0430\u043f\u0440\u0435\u043b\u044c 2025 \u0433\u043e\u0434\u0430, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 0-day, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u0434\u0438\u043d \u0438\u0437 \u043d\u0443\u043b\u0435\u0439 - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u0440\u0438\u0441\u043a\u0430, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 EoP (CVE-2024-53197) \u0432 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u0435 USB-audio \u044f\u0434\u0440\u0430 Linux \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 ALSA.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u0435\u0442\u0441\u044f, \u043e\u0448\u0438\u0431\u043a\u0430 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u0430\u043c\u0438 \u0421\u0435\u0440\u0431\u0438\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0437\u044a\u044f\u0442\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Android \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d\u043d\u043e\u0439 \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u043e\u0439 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u043a\u0438 Cellebrite.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0432 \u0446\u0435\u043f\u043e\u0447\u043a\u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f USB Video Class (CVE-2024-53104), \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435, \u0438 \u0434\u0440\u0443\u0433\u043e\u0439 0-day Human Interface Devices (CVE-2024-50302), \u0437\u0430\u043a\u0440\u044b\u0442\u0443\u044e \u0432 \u043c\u0430\u0440\u0442\u0435.\n\n\u041e\u043d\u0430 \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 EoP (CVE-2024\u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 2024 \u0433\u043e\u0434\u0430 \u0432 \u0445\u043e\u0434\u0435 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432, \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445, \u0440\u0430\u0437\u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0435\u0440\u0431\u0441\u043a\u043e\u0439 \u043f\u043e\u043b\u0438\u0446\u0438\u0435\u0439.\n\n\u0412 \u044f\u043d\u0432\u0430\u0440\u0435 Google \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f OEM-\u043f\u0430\u0440\u0442\u043d\u0435\u0440\u0430\u043c.\u00a0\n\n\u0414\u0440\u0443\u0433\u0430\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 0-day \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-53150 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u044f\u0434\u0440\u0430 Android, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0443\u044e \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 \u0447\u0442\u0435\u043d\u0438\u044f \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0432\u044b\u0434\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0431\u0443\u0444\u0435\u0440\u0430 \u043f\u0430\u043c\u044f\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0431\u0435\u0437 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c.\u00a0\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 Android \u0437\u0430 \u043c\u0430\u0440\u0442 2025 \u0433\u043e\u0434\u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f 60 \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f \u043a \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0438\u0445 \u043a EoP.\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e Google \u0430\u043d\u043e\u043d\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u0434\u0432\u0430 \u043d\u0430\u0431\u043e\u0440\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439: \u0443\u0440\u043e\u0432\u043d\u0438 2025-04-01 \u0438 2025-04-05. \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0439 \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f   \u0434\u043b\u044f \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u0441 \u0437\u0430\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0438 \u043f\u043e\u0434\u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u043e\u0432 \u044f\u0434\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043d\u0435 \u043e\u0431\u044f\u0437\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043c\u044b \u043a\u043e \u0432\u0441\u0435\u043c \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c Android.\n\n\u0423\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Google Pixel \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u044d\u0442\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e, \u0432 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a \u0434\u0440\u0443\u0433\u0438\u043c \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u0430\u043c \u0447\u0430\u0441\u0442\u043e \u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0431\u043e\u043b\u044c\u0448\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0441\u0432\u043e\u0438\u0445 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0439 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f.", "creation_timestamp": "2025-04-09T08:34:29.000000Z"}, {"uuid": "ad9b0c17-63a7-401f-8b78-8ca85dbd295b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-50302", "type": "seen", "source": "Telegram/knRK1G2lhiZC1irKza_he2gA0fL0ysN6swU7U2_Il1TGLT4", "content": "", "creation_timestamp": "2025-03-03T19:16:47.000000Z"}]}