{"vulnerability": "CVE-2017-5638", "sightings": [{"uuid": "9ac8d215-d96e-42fe-85b1-6cd74aa176b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/58e67f1b-1564-4d8e-81cc-4b8a02de0b81", "content": "", "creation_timestamp": "2017-04-06T17:49:50.000000Z"}, {"uuid": "2394ac1c-0fff-4da3-b4ab-b2efb4f9dd34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/5af0211d-d718-446c-a094-496602de0b81", "content": "", "creation_timestamp": "2018-05-07T09:51:53.000000Z"}, {"uuid": "1d488b25-d075-4a6d-ab40-624b7cf5e14c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/5df74123-1020-46ef-9504-7c5c0a3b4631", "content": "", "creation_timestamp": "2019-12-16T08:33:51.000000Z"}, {"uuid": "fe4b0ca5-4c70-421b-b663-436d2efb7fcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "68e58c02-0283-4297-a6f9-bd375b4f4746", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "880bae1c-d752-40d5-a6d5-5ffda68f0e99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/c25ea0f0-f1fc-4399-b3c8-4fab2c198ab8", "content": "", "creation_timestamp": "2020-10-09T16:07:56.000000Z"}, {"uuid": "20ffd103-29e6-4354-941c-5ea1af9d2e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/876545d6-d8ae-4cdc-baaa-ca0c8b8815cd", "content": "", "creation_timestamp": "2020-10-16T03:00:20.000000Z"}, {"uuid": "37f6f4ad-4653-4365-af03-5a947fad9173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/019ecf84-21f3-4ce0-9a62-7e5a0a1d0cb2", "content": "", "creation_timestamp": "2020-10-09T14:46:14.000000Z"}, {"uuid": "821434a8-d2e4-4aec-bf6a-8450b4c63392", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/19e46030-47f3-46ac-80da-11cca3670b23", "content": "", "creation_timestamp": "2020-10-09T13:23:52.000000Z"}, {"uuid": "efa8fe96-3e3b-4b33-a411-b0f04ccc1b14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/e21d087e-3787-4018-b59b-53c93aaa07a1", "content": "", "creation_timestamp": "2020-10-09T15:22:44.000000Z"}, {"uuid": "40c62647-d34e-4a7a-b5fc-c7474ba24d2e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/292c8ff0-f4d9-40b6-ac72-e44392d6cc31", "content": "", "creation_timestamp": "2020-10-09T16:31:53.000000Z"}, {"uuid": "fe227c0c-6cb4-4c23-b147-97d3877d1101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/4b8b2092-c42b-4b02-b660-03ad2f64eee6", "content": "", "creation_timestamp": "2020-10-09T16:32:57.000000Z"}, {"uuid": "cdf414f2-2017-47b0-ac19-181ff2f789fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/776464a9-8248-494d-8bd3-a41cd81bc232", "content": "", "creation_timestamp": "2020-10-09T17:18:37.000000Z"}, {"uuid": "3b23ba26-0953-449f-9da4-0245f9be74b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/c5e48a64-9733-4430-8682-18034f8b3018", "content": "", "creation_timestamp": "2024-02-22T06:10:02.000000Z"}, {"uuid": "1acee22b-8b35-4db4-a7dc-b3bcb8293f3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://www.exploit-db.com/exploits/41570", "content": "", "creation_timestamp": "2017-03-07T00:00:00.000000Z"}, {"uuid": "416dbe1c-d64b-4ea1-81fc-1fcfa2e6631c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://www.exploit-db.com/exploits/41614", "content": "", "creation_timestamp": "2017-03-15T00:00:00.000000Z"}, {"uuid": "d2e43a9a-eb0f-4551-8ac8-dcde324ef9ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971151", "content": "", "creation_timestamp": "2024-12-24T20:25:00.179821Z"}, {"uuid": "062eedef-5b3e-49a1-997f-7151deffe9a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-29)", "content": "", "creation_timestamp": "2025-03-29T00:00:00.000000Z"}, {"uuid": "194d10e1-f69e-4bfb-93d1-28df2d76de51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-15)", "content": "", "creation_timestamp": "2025-01-15T00:00:00.000000Z"}, {"uuid": "9d3a2f3c-83db-4d4d-b77c-47bbc19e3020", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-23)", "content": "", "creation_timestamp": "2024-12-23T00:00:00.000000Z"}, {"uuid": "281ecce6-5450-4662-b2e1-a744233f3cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-02)", "content": "", "creation_timestamp": "2024-11-02T00:00:00.000000Z"}, {"uuid": "010b8e76-e19b-4998-860b-60c232f0f9c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "fbfcbec6-3565-4a9f-aa92-fbda32d166d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-22)", "content": "", "creation_timestamp": "2024-11-22T00:00:00.000000Z"}, {"uuid": "10925a26-8b5f-4d23-858a-b7a5b047d4dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-24)", "content": "", "creation_timestamp": "2024-11-24T00:00:00.000000Z"}, {"uuid": "b5b06c6b-8b58-4431-b90e-03177faad347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-29)", "content": "", "creation_timestamp": "2024-12-29T00:00:00.000000Z"}, {"uuid": "cda1e83c-a921-400e-90cb-eb78a8f97075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-23)", "content": "", "creation_timestamp": "2024-12-23T00:00:00.000000Z"}, {"uuid": "499ae97d-a286-4734-aa0d-2a8b5cf64d62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-10)", "content": "", "creation_timestamp": "2025-01-10T00:00:00.000000Z"}, {"uuid": "59b19f06-6bd3-416d-80af-312a03c2e651", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-05)", "content": "", "creation_timestamp": "2025-01-05T00:00:00.000000Z"}, {"uuid": "02412bb1-c56c-4972-8932-c10d8e3be922", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-25)", "content": "", "creation_timestamp": "2024-12-25T00:00:00.000000Z"}, {"uuid": "69ba3a1a-6ff1-42cf-9066-77fe50994e7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-29)", "content": "", "creation_timestamp": "2024-12-29T00:00:00.000000Z"}, {"uuid": "7057c9cd-0e6a-4931-b00d-123646f139ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-26)", "content": "", "creation_timestamp": "2024-12-26T00:00:00.000000Z"}, {"uuid": "18db0f03-8865-4adb-8de4-2ac6690eb5ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-27)", "content": "", "creation_timestamp": "2024-12-27T00:00:00.000000Z"}, {"uuid": "d19a69b9-11a0-4314-85ef-8492eed5b424", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "c1b8c75f-e727-46b1-a333-5f6bb7b17fc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-12)", "content": "", "creation_timestamp": "2025-01-12T00:00:00.000000Z"}, {"uuid": "fb157efe-733e-465e-ba8d-ea4c755a6413", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-31)", "content": "", "creation_timestamp": "2024-12-31T00:00:00.000000Z"}, {"uuid": "543cf758-b3d8-40bc-b183-3e06ccbac48e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-06)", "content": "", "creation_timestamp": "2025-01-06T00:00:00.000000Z"}, {"uuid": "d179286e-37db-4e15-bc8a-aaa9c3a6ac0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-20)", "content": "", "creation_timestamp": "2025-01-20T00:00:00.000000Z"}, {"uuid": "823ca392-9900-4dcd-9eba-a2c23bef7285", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-10-24)", "content": "", "creation_timestamp": "2024-10-24T00:00:00.000000Z"}, {"uuid": "c5d3cd05-17e5-4c34-942b-d5c04b4a9036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-27)", "content": "", "creation_timestamp": "2024-11-27T00:00:00.000000Z"}, {"uuid": "c2ce8bb2-3c2e-4970-b826-f9b6248f4112", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-01)", "content": "", "creation_timestamp": "2024-12-01T00:00:00.000000Z"}, {"uuid": "7300d75b-2a4b-46ba-bcb9-99ff13a69cc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "b5c6b18d-31c1-4483-857e-5fa4b743f845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-02)", "content": "", "creation_timestamp": "2024-11-02T00:00:00.000000Z"}, {"uuid": "84d0cf46-a755-47e7-88b7-acd35c2e3cc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-09)", "content": "", "creation_timestamp": "2024-11-09T00:00:00.000000Z"}, {"uuid": "2c978f93-dd93-441d-a73f-7d480d538a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-23)", "content": "", "creation_timestamp": "2024-11-23T00:00:00.000000Z"}, {"uuid": "2a1e76a7-fe41-4d60-9764-0893d23f7a42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-28)", "content": "", "creation_timestamp": "2025-01-28T00:00:00.000000Z"}, {"uuid": "dbdda4d0-40f5-4cb2-b576-97ebba1fbdca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-11-16)", "content": "", "creation_timestamp": "2024-11-16T00:00:00.000000Z"}, {"uuid": "9cbd81c0-e2a2-4b97-8b29-c6edb376ac7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-16)", "content": "", "creation_timestamp": "2024-12-16T00:00:00.000000Z"}, {"uuid": "97f9c33c-177b-4a41-ac37-a477dea4ce69", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:58.000000Z"}, {"uuid": "32de0bff-3df6-423a-b28c-f86697fd91d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "dfbf4e5e-2281-4b50-9244-b86a8b5a77c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "98e17086-824f-4fac-914a-380c2c327eb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-04)", "content": "", "creation_timestamp": "2025-03-04T00:00:00.000000Z"}, {"uuid": "ef03db4e-fc2c-470a-ab73-eedbc888abbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "287e1f2e-9504-438c-9d23-216a8e1f863f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "4709d86f-d79c-467b-a3b3-69868313b8b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "cd40e9c5-d5ad-44cb-a51a-0383fc64e20a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-12)", "content": "", "creation_timestamp": "2025-03-12T00:00:00.000000Z"}, {"uuid": "cf4d6e29-13fd-4864-bf63-b5a2bae55245", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-20)", "content": "", "creation_timestamp": "2025-02-20T00:00:00.000000Z"}, {"uuid": "17447bf7-67d8-4e74-b830-75b53f2358f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-18)", "content": "", "creation_timestamp": "2025-02-18T00:00:00.000000Z"}, {"uuid": "a7b2d38e-49f8-4e68-ad3a-af6c0a37633b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-28)", "content": "", "creation_timestamp": "2025-02-28T00:00:00.000000Z"}, {"uuid": "d2185ce4-11b6-4e80-8158-d5553d478728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-11)", "content": "", "creation_timestamp": "2025-03-11T00:00:00.000000Z"}, {"uuid": "825fb37c-f364-46ed-b522-ddb20db96eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:39.000000Z"}, {"uuid": "c93e9711-2c2d-4d54-b473-c4841a5af06b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}, {"uuid": "b0106fd5-66ec-4936-bf90-48375fe521ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-01)", "content": "", "creation_timestamp": "2025-04-01T00:00:00.000000Z"}, {"uuid": "cfddbc31-c7e6-48b8-93fc-badefae4c5c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-05)", "content": "", "creation_timestamp": "2025-04-05T00:00:00.000000Z"}, {"uuid": "a895fe7c-1c87-4477-8663-38188360e50f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-08)", "content": "", "creation_timestamp": "2025-04-08T00:00:00.000000Z"}, {"uuid": "7417e505-d74b-45d1-8f83-bf9309782814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-01)", "content": "", "creation_timestamp": "2025-07-01T00:00:00.000000Z"}, {"uuid": "133ff91d-5225-42d4-97a0-c1621336b721", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-10)", "content": "", "creation_timestamp": "2025-04-10T00:00:00.000000Z"}, {"uuid": "4f76fd7e-b088-4da7-a868-a1e8c6618625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-05)", "content": "", "creation_timestamp": "2025-07-05T00:00:00.000000Z"}, {"uuid": "b88750c4-fee6-44f9-9496-635e9654957a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-28)", "content": "", "creation_timestamp": "2025-06-28T00:00:00.000000Z"}, {"uuid": "44499b53-526c-4a35-bed4-27a4d015c9be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-28)", "content": "", "creation_timestamp": "2025-06-28T00:00:00.000000Z"}, {"uuid": "6cd699c4-89a9-4590-9d93-9dd785f1c824", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-19)", "content": "", "creation_timestamp": "2025-05-19T00:00:00.000000Z"}, {"uuid": "55e2565a-a1e0-4c04-aa57-5df4a19927a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-14)", "content": "", "creation_timestamp": "2025-06-14T00:00:00.000000Z"}, {"uuid": "778942d3-61c7-4ece-9b09-9ce2f3d65b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "5f5b98d8-d151-4328-80fb-2bf07b8efa0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "1c643a21-887e-4e6f-820c-14f0709975c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "b3cf80ca-77a2-4a0d-a37b-1193ae42f54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-08)", "content": "", "creation_timestamp": "2025-05-08T00:00:00.000000Z"}, {"uuid": "aa4d568d-14ee-42ed-89b8-bcd82079fb9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "0f3c3ff3-0c05-44e5-b070-f009006cbe71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-08)", "content": "", "creation_timestamp": "2025-05-08T00:00:00.000000Z"}, {"uuid": "5624835f-55f5-4d56-9689-4b371eb63cc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-11)", "content": "", "creation_timestamp": "2025-07-11T00:00:00.000000Z"}, {"uuid": "71a10bbf-7446-401f-938a-474b6a798793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-12)", "content": "", "creation_timestamp": "2025-05-12T00:00:00.000000Z"}, {"uuid": "1264af08-3c69-41f7-b0d4-63d3bf6f3eeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-07)", "content": "", "creation_timestamp": "2025-08-07T00:00:00.000000Z"}, {"uuid": "a79233e6-7fc7-49b8-a648-97557650e872", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-09)", "content": "", "creation_timestamp": "2025-09-09T00:00:00.000000Z"}, {"uuid": "fd0564f8-5b22-4727-a1d2-c6cd5e3e8eb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "2939d31e-3619-4c1d-ab92-f9182fd57ca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "7337d87d-b3a9-4c07-82d8-81132fe034c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "d881b042-6a75-4ba8-b99d-0c7ad13555e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-27)", "content": "", "creation_timestamp": "2025-11-27T00:00:00.000000Z"}, {"uuid": "0c38d9b7-04b5-4a3f-b763-e3fc8a0d396f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "e3ed6346-1aff-4a45-91a2-13bf70b41287", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-18)", "content": "", "creation_timestamp": "2025-11-18T00:00:00.000000Z"}, {"uuid": "14f5a522-c84d-4f54-bed4-2716ce327ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "5e09ba98-bb30-47ab-b3a6-bafe1f5a696f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-23)", "content": "", "creation_timestamp": "2025-11-23T00:00:00.000000Z"}, {"uuid": "473bbbf3-0b72-49a2-a631-508a89bf8843", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:56.000000Z"}, {"uuid": "47d5870d-f489-44a8-8e8f-16c394c56a95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts2_content_type_ognl.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "a43f382c-d0a4-41d1-9970-aaa7d53677d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-29)", "content": "", "creation_timestamp": "2025-11-29T00:00:00.000000Z"}, {"uuid": "752ea780-2286-4dac-a70b-f022f9d43605", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-10)", "content": "", "creation_timestamp": "2026-02-10T00:00:00.000000Z"}, {"uuid": "66e6462b-fec9-428c-a736-5d1ee9f8a027", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "42cdd644-c227-4956-8059-a1dc9e2eb12c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)", "content": "", "creation_timestamp": "2025-12-28T00:00:00.000000Z"}, {"uuid": "03a64edd-13d5-4205-849d-f404f5f0b090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-10)", "content": "", "creation_timestamp": "2025-12-10T00:00:00.000000Z"}, {"uuid": "6ed8400d-0a24-4342-ae87-f3a74f65f1b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-18)", "content": "", "creation_timestamp": "2025-12-18T00:00:00.000000Z"}, {"uuid": "372d003d-0ee2-44df-88d6-66c0ea36d0f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-08)", "content": "", "creation_timestamp": "2026-02-08T00:00:00.000000Z"}, {"uuid": "680d4c3d-08cc-4a50-b57f-5472c0894ae2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://gist.github.com/winterswang/4908fd900e5f5a047bafb32001894038", "content": "", "creation_timestamp": "2026-03-11T04:03:33.000000Z"}, {"uuid": "75ed197a-fd9c-4656-8471-c017bb1bc435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)", "content": "", "creation_timestamp": "2026-01-01T00:00:00.000000Z"}, {"uuid": "1bbad81c-510d-4dbc-a3e3-a6ad9a889710", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-01)", "content": "", "creation_timestamp": "2026-01-01T00:00:00.000000Z"}, {"uuid": "d0482aef-bfd8-4b28-92c8-ec4cd58aa06e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "f81dfc6c-30af-4149-995a-bf958762bc7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-07)", "content": "", "creation_timestamp": "2026-02-07T00:00:00.000000Z"}, {"uuid": "6923d604-6186-446d-90f8-551f60d48635", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://gist.github.com/alon710/2357d6a7e10001eac6a91988b299d815", "content": "", "creation_timestamp": "2026-01-24T21:27:00.000000Z"}, {"uuid": "8860132b-8f69-4b7b-833f-72cebac4ac1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "MISP/c5e48a64-9733-4430-8682-18034f8b3018", "content": "", "creation_timestamp": "2026-01-23T22:03:56.000000Z"}, {"uuid": "93e7c69f-41af-4d86-b09c-6289bb29f404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/webamoozir/1466", "content": "\u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u062f\u0631 Vmware\n@webamoozir\n\u0634\u0631\u06a9\u062a Vmware \u062f\u0648\u0634\u0646\u0628\u0647 \u0647\u0641\u062a\u0647 \u067e\u06cc\u0634 \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f \u06a9\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u06cc\u0627\u0641\u062a \u0634\u062f\u0647 \u062f\u0631 \u0622\u067e\u0627\u0686\u06cc Struts\u060c \u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0628\u0647\u0631\u0647 \u062c\u0648\u06cc\u06cc \u0645\u06cc\u0634\u062f\u0647 \u0627\u0633\u062a \u0648 \u0628\u0631 \u0686\u0646\u062f \u06a9\u0627\u0644\u0627\u06cc \u0634\u0631\u06a9\u062a \u0646\u0627\u0645\u0628\u0631\u062f\u0647 \u0646\u06cc\u0632 \u062a\u0623\u062b\u06cc\u0631 \u0646\u0647\u0627\u062f\u0647 \u0627\u0633\u062a.\u06a9\u0627\u0631\u0634\u0646\u0627\u0633\u0627\u0646 \u0634\u0631\u06a9\u062a \u06cc\u0627\u062f\u0634\u062f\u0647\u060c \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 : CVE-2017-5638 \u0631\u0627 \u0641\u0627\u062c\u0639\u0647 \u062e\u0648\u0627\u0646\u062f\u0647\u0627\u0646\u062f\u061b \u0641\u0627\u062c\u0639\u0647\u0627\u06cc \u06a9\u0647 \u0628\u0631 \u0646\u0633\u062e\u0647 \u0647\u0627\u06cc \u06f6.x \u0648 \u06f7.x \u0627\u0632 \u0628\u0633\u062a\u0631 \u062f\u0633\u06a9\u062a\u0627\u067e \u062f\u0631 \u062c\u0627\u06cc\u06af\u0627\u0647 \u062e\u062f\u0645\u062a VMware Horizon\u060c \u0633\u0631\u0648\u0631 vCenter \u0646\u0633\u062e\u0647 \u06f6.\u06f0 \u0648 \u06f6.\u06f5 \u0648 \u0645\u062f\u06cc\u0631 \u0639\u0645\u0644\u06cc\u0627\u062a vRealize \u0648 \u0633\u0631\u0648\u0631 vRealize Hyperic \u062a\u0623\u062b\u06cc\u0631 \u0645\u06cc \u0646\u0647\u062f. \n\n\u0645\u0646\u0628\u0639: http://www.securityweek.com.", "creation_timestamp": "2017-03-29T08:04:55.000000Z"}, {"uuid": "da2bbef0-3d44-4efc-a2ee-66f38a48ac38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://gist.github.com/alon710/4372f3bfe9ea66cc227388395661023f", "content": "", "creation_timestamp": "2026-01-24T22:42:21.000000Z"}, {"uuid": "6d2fb2e0-c59f-441b-8429-1812d6cb6d2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "Telegram/krao-tOMWfR_10ZycTeJjA8F8ncjWKRoBH7Q3qStxmpRQ6Q", "content": "", "creation_timestamp": "2025-08-26T03:00:07.000000Z"}, {"uuid": "9afa5db3-71fe-4679-9a1e-c82fa8b0538b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/386b2d98-fd34-49b6-a736-e7d072497ee5", "content": "", "creation_timestamp": "2026-02-02T12:28:35.704114Z"}, {"uuid": "d8d3b26b-4396-43c8-b816-6b5568ae4607", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "Telegram/71sICJ2qduNa9p7sy7EcgNRQvBtb-VPS3HuJRrErM7o1_Kg", "content": "", "creation_timestamp": "2026-01-04T21:00:04.000000Z"}, {"uuid": "c1fc0475-3e9b-4d29-9e35-b871336c5ade", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-07)", "content": "", "creation_timestamp": "2026-04-07T00:00:00.000000Z"}, {"uuid": "7c2cad34-c0ae-403a-8b97-0377c75d9a6a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/google/detectors/rce/cve20175638", "content": "", "creation_timestamp": "2020-11-03T19:48:53.000000Z"}, {"uuid": "a851fd6c-5280-4c83-9ac1-8bc7322f2ed8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/personal_oblivion/34", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c: Apache Struts2 CVE-2017\u20135638\n\n\u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442: https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts2_code_exec_showcase.rb\n\n\u0414\u0435\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430: https://medium.com/@lucideus/exploiting-apache-struts2-cve-2017-5638-lucideus-research-83adb9490ede", "creation_timestamp": "2023-09-25T21:11:26.000000Z"}, {"uuid": "cb67f746-c622-4cd5-ab88-cb60112825e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "Telegram/FSLrga5GWrvpmeBVVaiQjjslIGqlG9dAkDvrcZ703Y3a2_k", "content": "", "creation_timestamp": "2026-04-06T03:00:06.000000Z"}, {"uuid": "3a0e3b28-9e88-48d2-ac5d-9bfc6de177af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-28)", "content": "", "creation_timestamp": "2026-04-28T00:00:00.000000Z"}, {"uuid": "e7e663fd-0577-44e6-ae19-48d69ceb7a37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/webamoozir/1562", "content": "\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0622\u067e\u0627\u0686\u06cc Struts \u0628\u0631\u0627\u06cc \u062a\u0648\u0632\u06cc\u0639 \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631\n@webamoozir\n\u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u06a9\u0647 \u0627\u062e\u06cc\u0631\u0627\u064b \u062f\u0631 \u0622\u067e\u0627\u0686\u06cc Struts \u0648\u0635\u0644\u0647 \u0634\u062f\u0647\u060c \u062a\u0648\u0633\u0637 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0631\u0627\u06cc \u062a\u0648\u0632\u06cc\u0639 \u0628\u0627\u062c\u0627\u0641\u0632\u0627\u0631 Cerber \u0631\u0648\u06cc \u0633\u0627\u0645\u0627\u0646\u0647\u0647\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632\u06cc \u0645\u0648\u0631\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0642\u0631\u0627\u0631 \u0645\u06cc\u06af\u06cc\u0631\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0634\u0646\u0627\u0633\u0647 CVE-2017-5638 \u0645\u06cc\u062a\u0648\u0627\u0646\u0633\u062a \u0628\u0631\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0645\u0648\u0631\u062f \u0628\u0647\u0631\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0642\u0631\u0627\u0631 \u06af\u06cc\u0631\u062f. \u0627\u0646\u062f\u06a9\u06cc \u067e\u0633 \u0627\u0632 \u0627\u06cc\u0646\u06a9\u0647 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0648\u0635\u0644\u0647 \u0634\u062f \u0648 \u06cc\u06a9 \u06a9\u062f \u0627\u062b\u0628\u0627\u062a \u0645\u0641\u0647\u0648\u0645\u06cc \u0628\u0631\u0627\u06cc \u0622\u0646 \u0645\u0646\u062a\u0634\u0631 \u0634\u062f\u060c \u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u0645\u0648\u0631\u062f \u0628\u0647\u0631\u0647\u06a9\u0634\u06cc \u0642\u0631\u0627\u0631 \u06af\u0631\u0641\u062a. \u062f\u0631 \u0628\u0633\u06cc\u0627\u0631\u06cc \u0627\u0632 \u0645\u0648\u0627\u0631\u062f\u060c \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0633\u0627\u0645\u0627\u0646\u0647\u0647\u0627\u06cc \u06cc\u0648\u0646\u06cc\u06a9\u0633\u06cc \u0631\u0627 \u0628\u0627 \u062a\u0648\u0632\u06cc\u0639 \u0628\u062f\u0627\u0641\u0632\u0627\u0631 \u0648 \u0628\u0627\u062a\u0647\u0627\u06cc \u0631\u062f \u062e\u062f\u0645\u062a \u062a\u0648\u0632\u06cc\u0639\u0634\u062f\u0647 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0628\u0648\u062f\u0646\u062f \u0648\u0644\u06cc \u0627\u062e\u06cc\u0631\u0627\u064b \u0645\u0634\u0627\u0647\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0647 \u0628\u0647 \u0633\u0627\u0645\u0627\u0646\u0647\u0647\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632\u06cc \u0646\u06cc\u0632\u060c \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0645\u0648\u0631\u062f \u0628\u0647\u0631\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0642\u0631\u0627\u0631 \u0645\u06cc\u06af\u06cc\u0631\u062f. \u062f\u0631 \u0627\u0633\u0641\u0646\u062f \u0645\u0627\u0647 \u0633\u0627\u0644 \u06af\u0630\u0634\u062a\u0647\u060c \u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646 \u0627\u0645\u0646\u06cc\u062a\u06cc \u0645\u0634\u0627\u0647\u062f\u0647 \u06a9\u0631\u062f\u0646\u062f \u062f\u0631 \u062d\u0645\u0644\u0627\u062a\u06cc \u0628\u0631\u0627\u06cc \u062a\u0648\u0632\u06cc\u0639 \u0628\u0627\u062c\u0627\u0641\u0632\u0627\u0631 Cerber \u0631\u0648\u06cc \u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632\u06cc\u060c \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u0634\u0648\u062f. \u0631\u0648\u0632 \u0686\u0647\u0627\u0631\u0634\u0646\u0628\u0647 \u0646\u06cc\u0632 \u0645\u0648\u062c \u062a\u0627\u0632\u0647\u0627\u06cc \u0627\u0632 \u0627\u06cc\u0646 \u062d\u0645\u0644\u0627\u062a \u0645\u0634\u0627\u0647\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0631\u0627\u06cc \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631 \u0634\u0650\u0644 \u0648 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc BITSAdmin \u0648 \u062e\u0637 \u0641\u0631\u0645\u0627\u0646 \u062f\u06cc\u06af\u0631 \u062f\u0631 \u0648\u06cc\u0646\u062f\u0648\u0632\u060c \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0628\u0647\u0631\u0647\u0628\u0631\u062f\u0627\u0631\u06cc \u0645\u06cc\u06a9\u0646\u0646\u062f. \u0627\u06cc\u0646 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u062e\u0637 \u0641\u0631\u0645\u0627\u0646 \u0628\u0631\u0627\u06cc \u0628\u0627\u0631\u06af\u06cc\u0631\u06cc \u0648 \u0646\u0635\u0628 \u0628\u0627\u062c\u0627\u0641\u0632\u0627\u0631 Cerber \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u0634\u0648\u062f. \u0628\u0627\u062c\u0627\u0641\u0632\u0627\u0631 \u0631\u0648\u06cc \u0633\u0627\u0645\u0627\u0646\u0647 \u0642\u0631\u0628\u0627\u0646\u06cc \u0628\u0647 \u0631\u0645\u0632\u0646\u06af\u0627\u0631\u06cc \u067e\u0631\u0648\u0646\u062f\u0647\u0647\u0627\u06cc \u0645\u0647\u0645 \u067e\u0631\u062f\u0627\u062e\u062a\u0647\u060c \u0628\u0631\u0627\u06cc \u0627\u0631\u0627\u0626\u0647 \u06cc\u06a9 \u0646\u0631\u0645\u0627\u0641\u0632\u0627\u0631 \u0631\u0645\u0632\u06af\u0634\u0627\u06cc\u06cc \u0627\u0632 \u0622\u0646\u0647\u0627 \u0628\u0627\u062c \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0645\u06cc\u06a9\u0646\u062f. \u0622\u062f\u0631\u0633 \u06a9\u06cc\u0641 \u0628\u06cc\u062a\u06a9\u0648\u06cc\u0646 \u06a9\u0647 \u0627\u0632 \u0642\u0631\u0628\u0627\u0646\u06cc\u0627\u0646 \u062e\u0648\u0627\u0633\u062a\u0647 \u0634\u062f\u0647 \u062a\u0627 \u0628\u0627\u062c\u0647\u0627 \u0631\u0627 \u0628\u0647 \u0622\u0646 \u0627\u0631\u0633\u0627\u0644 \u06a9\u0646\u0646\u062f\u060c \u062f\u0631 \u0686\u0646\u062f\u06cc\u0646 \u06a9\u0645\u067e\u06cc\u0646 \u0645\u062e\u0631\u0628 \u0645\u0634\u0627\u0647\u062f\u0647 \u0634\u062f\u0647 \u0627\u0633\u062a. \u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646 \u0645\u06cc\u06af\u0648\u06cc\u0646\u062f \u062f\u0631 \u062d\u0627\u0644 \u062d\u0627\u0636\u0631 \u062f\u0631 \u062f\u0627\u062e\u0644 \u0627\u06cc\u0646 \u06a9\u06cc\u0641 \u067e\u0648\u0644\u060c \u06f8\u06f4 \u0628\u06cc\u062a\u06a9\u0648\u06cc\u0646 \u0645\u0639\u0627\u062f\u0644 \u06f1\u06f0\u06f0 \u0647\u0632\u0627\u0631 \u062f\u0644\u0627\u0631 \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f. \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0634\u0631\u06a9\u062a\u0647\u0627\u06cc \u0645\u062e\u062a\u0644\u0641 \u0627\u0632 \u062c\u0645\u0644\u0647 Cisco \u0648 Vmware \u0631\u0627 \u062a\u062d\u062a \u062a\u0623\u062b\u06cc\u0631 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a. \n\n\u0645\u0646\u0628\u0639: http://www.securityweek.com/\n.", "creation_timestamp": "2017-04-10T13:52:52.000000Z"}, {"uuid": "b4f6d3ee-a683-4cce-a0de-3663dad865ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "Telegram/PErUY-jHITMlah0KFWpBgwH1xvYx0Lxy2fdlWqetoLSdfaM", "content": "", "creation_timestamp": "2025-09-11T15:00:07.000000Z"}, {"uuid": "7c666cc3-6fe7-42da-a37d-af9769061c20", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/alexmakus/1355", "content": "\u0432\u0434\u043e\u0433\u043e\u043d\u043a\u0443 \u043f\u0440\u043e Equifax, \u0432\u0437\u043b\u043e\u043c \u0441\u0430\u0439\u0442\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439, \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u043f\u0440\u0438\u0432\u0435\u043b \u043a \u0443\u0442\u0435\u0447\u043a\u0435 \u043f\u0435\u0440\u0441\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 143 \u043c\u043b\u043d \u0447\u0435\u043b\u043e\u0432\u0435\u043a. \u0421\u0430\u043c\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432 \u0441\u043e\u0444\u0442\u0435 \u0441\u0430\u0439\u0442\u0430 \u2014\u00a0Apache Struts, \u0442\u043e\u043b\u044c\u043a\u043e CVE-2017-5638, \u0430 \u043d\u0435 \u0442\u043e, \u043e \u0447\u0435\u043c \u044f \u043f\u0438\u0441\u0430\u043b \u0440\u0430\u043d\u044c\u0448\u0435. \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432 \u0442\u043e\u043c, \u0447\u0442\u043e \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 6 \u043c\u0430\u0440\u0442\u0430 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430. \u041a\u043e\u0440\u043e\u0447\u0435, \u043e\u043f\u044f\u0442\u044c \u0431\u0435\u0441\u0442\u043e\u043b\u043a\u043e\u0432\u043e\u0441\u0442\u044c \u043f\u043e\u0434\u0432\u0435\u043b\u0430. https://www.equifaxsecurity2017.com/\n\n\u0438 \u0433\u043e\u0432\u043e\u0440\u044f \u043e \u0431\u0435\u0441\u0442\u043e\u043b\u043a\u043e\u0432\u043e\u0441\u0442\u0438. \u0412 \u0410\u0440\u0433\u0435\u043d\u0442\u0438\u043d\u0435 \u0441\u0430\u0439\u0442 \u043c\u0435\u0441\u0442\u043d\u043e\u0433\u043e Equifax \u0442\u043e\u0436\u0435 \u0445\u0430\u043a\u043d\u0443\u043b\u0438. \u041d\u0443 \u043a\u0430\u043a \u0445\u0430\u043a\u043d\u0443\u043b\u0438. \u043a\u043e\u0433\u0434\u0430 \u0443 \u0430\u0434\u043c\u0438\u043d\u0441\u043a\u043e\u0433\u043e \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u0430 \u043b\u043e\u0433\u0438\u043d \u0418 \u043f\u0430\u0440\u043e\u043b\u044c admin, \u0442\u043e \u044f \u0434\u0430\u0436\u0435 \u043d\u0435 \u0437\u043d\u0430\u044e, \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f \u043b\u0438 \u044d\u0442\u043e \u0437\u0430 \u0445\u0430\u043a https://www.bbc.co.uk/news/amp/technology-41257576", "creation_timestamp": "2017-09-14T19:07:06.000000Z"}, {"uuid": "6a5f72bf-7e8c-4932-a52b-6def4d988e4b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "Telegram/63Ywe12gnG7E1mjEm9qBRIXWQLRqnA7nYz9eO9WBeT2jKPw", "content": "", "creation_timestamp": "2025-09-25T15:00:07.000000Z"}, {"uuid": "03eeaa96-0b92-4316-a07a-fde02979a171", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/poxek/2249", "content": "Struts PWN\nAn exploit for Apache Struts CVE-2017-5638. \n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435:\n\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043e\u0434\u043d\u043e\u0433\u043e URL-\u0430\u0434\u0440\u0435\u0441\u0430.\npython struts-pwn.py --url 'http://example.com/struts2-showcase/index.action' -c 'id'\n\n\u0422\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u043f\u0438\u0441\u043a\u0430 URL-\u0430\u0434\u0440\u0435\u0441\u043e\u0432.\npython struts-pwn.py --list 'urls.txt' -c 'id'\n\n\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043e\u0434\u043d\u043e\u0433\u043e URL-\u0430\u0434\u0440\u0435\u0441\u0430.\npython struts-pwn.py --check --url 'http://example.com/struts2-showcase/index.action'\n\n\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e \u0441\u043f\u0438\u0441\u043a\u0443 URL-\u0430\u0434\u0440\u0435\u0441\u043e\u0432.\npython struts-pwn.py --check --list 'urls.txt'", "creation_timestamp": "2022-08-12T19:00:09.000000Z"}, {"uuid": "ab51da21-8ca4-4d11-9910-39b4ec6fb147", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "https://t.me/k8security/9", "content": "\u0413\u0434\u0435 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u043f\u0440\u0430\u043a\u0442\u0438\u043a\u043e\u0432\u0430\u0442\u044c\u0441\u044f, \u043f\u043e\u0443\u043f\u0440\u0430\u0436\u043d\u044f\u0442\u044c\u0441\u044f \u0441 k8s?\n\n\u0421\u043e\u0432\u0441\u0435\u043c \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043d\u0430 BSidesSF 2020 \u0431\u044b\u043b \"Using Built-in Kubernetes Controls to Secure Your Applications\" \u0432\u043e\u0440\u043a\u0448\u043e\u043f. \u0426\u0435\u043b\u044c\u044e, \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u0431\u044b\u043b\u043e \u043f\u043e\u043a\u0430\u0437\u0430\u0442\u044c, \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0432 Kubernetes \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0435\u0433\u043e \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438.  \u0412\u0441\u0435\u0433\u043e 11 \u0443\u043f\u0440\u0430\u0436\u043d\u0435\u043d\u0438\u044f, \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043f\u043e \u0438\u0434\u0435\u043d\u0442\u0438\u0447\u043d\u043e\u0439 \u0441\u0445\u0435\u043c\u0435: \u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430/\u041d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 -&gt; \u0423\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430 -&gt; \u0420\u0430\u0437\u0431\u043e\u0440 \u043f\u0440\u0438\u0447\u0438\u043d -&gt; \u0418\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435/\u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u0435 -&gt; \u041d\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u0430\u0442\u0430\u043a\u0430. \u0412\u0441\u0435 \u044d\u0442\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u043f\u043e \u0430\u0434\u0440\u0435\u0441\u0443 https://securek8s.dev/exercise/\n\n\u0414\u043b\u044f \u044d\u0442\u043e\u0433\u043e \u0434\u0430\u044e\u0442\u0441\u044f \u0441\u043b\u0430\u0439\u0434\u044b, \u0432\u0435\u0441\u044c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0438\u0433\u0440\u0430\u0442\u044c\u0441\u044f \u0441 \u044d\u0442\u0438\u043c \u043d\u0430 \u0431\u0435\u0441\u043f\u043b\u0430\u0442\u043d\u043e\u043c Google Cloud Shell.\n\n\u0412\u043d\u0443\u0442\u0440\u0438 \u0443\u043f\u0440\u0430\u0436\u043d\u0435\u043d\u0438\u0439:\n- \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0439 Apache Struts \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a c CVE-2017-5638\n- \u0421\u0446\u0435\u043d\u0430\u0440\u0438\u0439 \u043a\u0430\u043a BugBounty \u043e\u0442\u0447\u0435\u0442\u0435 \u0432 Shopify\n- Read-only root FS \u0438 host mounts, \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043f\u043e\u043b\u0438\u0442\u0438\u043a\u0438, \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0430 RBAC, \u0440\u0430\u0437\u0434\u0435\u043b\u0435\u043d\u0438\u0435 namespaces, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 non-root user,  \u043e\u0442\u043a\u0430\u0437 \u043e\u0442 privileged mode, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 resource limits", "creation_timestamp": "2020-03-31T20:23:40.000000Z"}, {"uuid": "d1f1fcd4-ad38-487b-8ca7-a266eebabce9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "Telegram/C5Uti98yNMibrytNOYJF3eWZ7TSU5JhC3eF6W16W_xddRY4", "content": "", "creation_timestamp": "2025-07-30T15:00:07.000000Z"}, {"uuid": "da1eea15-0ade-4e46-93fd-4dd4d40623c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "published-proof-of-concept", "source": "Telegram/u6h4hxOLEGJo8756pzIINeRXaaCHoOOF066El4a2wQI-Fp0", "content": "", "creation_timestamp": "2025-06-08T03:00:06.000000Z"}, {"uuid": "b54ba0fd-dd90-42a2-b887-e42d7f4b810b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/AGENTZSECURITY/32", "content": "Why Remote Code Execution (RCE) is Highly Dangerous and How to Protect Yourself\n\n What is Remote Code Execution (RCE)?\n\nRemote Code Execution (RCE) is a type of security vulnerability where an attacker can execute malicious code on a target system remotely. RCE typically arises from software flaws that allow attackers to insert and execute unauthorized scripts or code on the victim's system. It is one of the most dangerous types of attacks as it can give attackers complete control over the targeted system.\n\nExample of an RCE Vulnerability\n\nA well-known example of an RCE vulnerability is CVE-2017-5638 in Apache Struts. Apache Struts is a Java framework used to build web applications. This vulnerability allows an attacker to send an HTTP request with a modified header, which is then processed by the vulnerable Struts server. The vulnerable server executes the malicious code embedded in the header, giving the attacker the ability to execute commands on the server.\n\nTools for Scanning RCE\n\n1. Nmap: Nmap is an open-source tool widely used for network exploration and security auditing. Using the Nmap Scripting Engine (NSE), Nmap can detect various vulnerabilities, including RCE.\n\n2. Metasploit: Metasploit is a popular penetration testing framework. It provides various exploit modules that can be used to test for RCE vulnerabilities.\n\n3. Nikto: Nikto is a web server scanner that can detect numerous vulnerabilities, including RCE.\n\n4. Burp Suite: This tool is commonly used by security professionals for web application security testing, including the detection and exploitation of RCE vulnerabilities.\n\nHow to Use Tools for Scanning RCE\n\n1. Nmap\n\n   - Installation:\n    \n     sudo apt-get install nmap\n     \n   - Usage: To scan for RCE vulnerabilities using NSE scripts, you can run:\n    \n     nmap -sV --script=http-vuln-cve2017-5638 \n     \n2. Metasploit\n\n   - Installation:\n    \n     sudo apt-get install metasploit-framework\n     \n   - Usage: Once Metasploit is installed, start it with:\n    \n     msfconsole\n     \n     Then, find and run the relevant module:\n    \n     use exploit/multi/http/struts2_content_type_ognl\n     set RHOST \n     set TARGETURI /path/to/vulnerable/application\n     run\n     \n3. Nikto\n\n   - Installation:\n    \n     sudo apt-get install nikto\n     \n   - Usage: To scan a web server:\n    \n     nikto -h \n     \n4. Burp Suite\n\n   - Installation: Download Burp Suite from [PortSwigger](https://portswigger.net/burp) and run it.\n   - Usage: Configure your browser to use Burp Suite as a proxy, then use the Intruder or Scanner feature to detect and exploit RCE vulnerabilities.\n\nPrevention Steps\n\n1. Update and Patch: Ensure all software, especially web servers and applications, are always updated with the latest security patches.\n\n2. Input Validation: Always validate and sanitize all user inputs to prevent code injection.\n\n3. Security Configuration: Ensure that server and application configurations follow best security practices.\n\n4. Use WAF (Web Application Firewall): Implementing a WAF can help prevent attacks targeting RCE vulnerabilities.\n\n5. Auditing and Monitoring: Conduct regular security audits and monitor network activity to detect and respond to attacks promptly.\n\n Conclusion\n\nRemote Code Execution (RCE) vulnerabilities pose a serious threat as they can give attackers complete control over a target system. Using appropriate scanning tools and following recommended preventive measures can help protect your systems from RCE exploitation. Stay vigilant and proactive in maintaining your system\u2019s security to avoid the detrimental impacts of such attacks.", "creation_timestamp": "2024-06-05T09:15:20.000000Z"}, {"uuid": "ee5275cd-2e4b-4e49-8b61-939dd79e9da0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://t.me/thehackernews/6900", "content": "\ud83d\udea8 One Day. 251 IPs. 75 Targets.\n\nExperts detected a wave of Japan-based, Amazon-hosted IPs scanning 75 exposure points in hours.\n\nCVEs hit: ColdFusion (CVE-2018-15961), Struts (CVE-2017-5638), Elasticsearch (CVE-2015-1427)\n\nSee what was targeted \u2192 https://thehackernews.com/2025/05/251-amazon-hosted-ips-used-in-exploit.html", "creation_timestamp": "2025-05-28T12:04:56.000000Z"}, {"uuid": "18457140-ff79-47c3-b40f-9916d8c2f777", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/arpsyndicate/2000", "content": "#ExploitObserverAlert\n\nCVE-2017-5638\n\nDESCRIPTION: Exploit Observer has 345 entries related to CVE-2017-5638. The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a", "creation_timestamp": "2023-12-18T14:13:48.000000Z"}, {"uuid": "89410ef9-ef47-43ca-8af5-1d288a470839", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/arpsyndicate/1008", "content": "#ExploitObserverAlert\n\nCVE-2017-5638\n\nDESCRIPTION: Exploit Observer has 345 entries related to CVE-2017-5638. The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a", "creation_timestamp": "2023-12-03T19:15:53.000000Z"}, {"uuid": "480e5f06-88ed-4943-abda-55624daf6647", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://t.me/netrunnerz/424", "content": "Apache-Struts-v4\nCVE-2013-2251\nCVE-2017-5638\nCVE-2017-9805\nCVE-2018-11776\nCVE-2019-0230\n\n\u0421\u043a\u0440\u0438\u043f\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 5 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0435 RCE \u0432 Apache Struts. \u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043e\u043d \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f PHP shell.\n\n#CVE #POC", "creation_timestamp": "2023-02-14T17:30:31.000000Z"}, {"uuid": "469dc3e2-49d0-4f6e-a22e-a57c4fafef49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/arpsyndicate/1490", "content": "#ExploitObserverAlert\n\nCVE-2017-5638\n\nDESCRIPTION: Exploit Observer has 343 entries related to CVE-2017-5638. The Jakarta Multipart parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts, which allows remote attackers to execute arbitrary commands via a crafted Content-Type, Content-Disposition, or Content-Length HTTP header, as exploited in the wild in March 2017 with a Content-Type header containing a", "creation_timestamp": "2023-12-06T13:32:58.000000Z"}, {"uuid": "19576a78-9507-4e4d-97f1-fba0395cd1ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/true_secator/2850", "content": "\u034fApache \u0434\u043e\u043f\u0438\u043b\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 RCE \u0432 \u0441\u0432\u043e\u0435\u043c \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c \u043f\u0440\u043e\u0435\u043a\u0442\u0435 Struts, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0440\u0430\u043d\u0435\u0435 \u0441\u0447\u0438\u0442\u0430\u043b\u0430\u0441\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u043e\u0439, \u043d\u043e, \u043a\u0430\u043a \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c, \u043d\u0435 \u0434\u043e \u043a\u043e\u043d\u0446\u0430.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-31805 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432\u0435\u0440\u0441\u0438\u044f\u0445 Struts 2 \u043e\u0442 2.0.0 \u0434\u043e 2.5.29 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u043c \u043d\u0435\u043f\u043e\u043b\u043d\u043e\u0433\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0431\u044b\u043b\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u043e \u0434\u043b\u044f\u00a0CVE-2020-17530, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 OGNL Injection \u0441 \u0440\u0435\u0439\u0442\u0438\u043d\u0433\u043e\u043c 9,8. \n\nStruts - \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0441\u0440\u0435\u0434\u0443 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u0443\u044e \u0432\u0435\u0431-\u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430\u043c\u0438 Java \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u043c\u043e\u0434\u0435\u043b\u044c-\u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u0435-\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440 (MVC), \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u044f\u0437\u044b\u043a \u043d\u0430\u0432\u0438\u0433\u0430\u0446\u0438\u0438 \u043f\u043e \u043e\u0431\u044a\u0435\u043a\u0442\u043d\u044b\u043c \u0433\u0440\u0430\u0444\u0430\u043c (OGNL) \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u044f\u0437\u044b\u043a \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0439 (EL) \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f Java.\n\n\u0415\u0449\u0435 \u0432 2020 \u0433\u043e\u0434\u0443 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0410\u043b\u044c\u0432\u0430\u0440\u043e \u041c\u0443\u043d\u044c\u043e\u0441 \u0438\u0437 GitHub \u0438 \u041c\u0430\u0441\u0430\u0442\u043e \u0410\u043d\u0437\u0430\u0439 \u0438\u0437 Aeye Security Lab \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438 \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Struts2 \u0432\u0435\u0440\u0441\u0438\u0439 2.0.0\u20132.5.25, \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u043c\u043e\u0439 \u043f\u0440\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043e\u0431\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430\u0445, \u043a\u043e\u0442\u043e\u0440\u0443\u044e Apache \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0438 \u0432 Struts \u0432\u0435\u0440\u0441\u0438\u0438 2.5.26. \u041e\u0434\u043d\u0430\u043a\u043e \u0447\u0443\u0442\u044c \u043f\u043e\u0437\u0436\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u041a\u0440\u0438\u0441 \u041c\u0430\u043a\u041a\u0430\u0443\u043d\u00a0\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u043d\u0435\u043f\u043e\u043b\u043d\u044b\u043c, \u043e \u0447\u0435\u043c \u0438 \u0443\u0432\u0435\u0434\u043e\u043c\u0438\u043b \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0430.\n\n\u041f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f \u0434\u043e\u00a0Struts 2.5.30\u00a0\u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438, \u0438\u0437\u0431\u0435\u0433\u0430\u044f \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043d\u0443\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u043e\u0446\u0435\u043d\u043a\u0438 OGNL \u0432 \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u0430\u0445 \u0442\u0435\u0433\u0430 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0433\u043e \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0432\u0432\u043e\u0434\u0430. \n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Apache \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u044c\u00a0\u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u0443\u00a0\u043f\u043e \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0412\u0435\u0434\u044c \u043a\u0430\u043a \u043f\u043e\u043c\u043d\u0438\u0442\u0441\u044f, CVE-2017-5638 \u0432 Struts 2 OGNL Injection \u0440\u0430\u043d\u0435\u0435\u00a0\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438, \u0432 \u0442\u043e\u043c\u00a0\u0447\u0438\u0441\u043b\u0435 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 ransomware. \u0418\u043c\u0435\u043d\u043d\u043e \u044d\u0442\u0430 \u0431\u0430\u0433\u0430 \u043f\u0440\u0438\u0432\u0435\u043b\u0430 \u0432 2017 \u0433\u043e\u0434\u0443 \u0432 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u043c\u0443 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0443 \u0441 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438 \u0432 Equifax.", "creation_timestamp": "2022-04-14T16:45:03.000000Z"}, {"uuid": "f1c013fe-6f99-4bb9-8eaa-b2935bc7dd46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/true_secator/5208", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0440\u0430\u0441\u0447\u0435\u0445\u043b\u0438\u043b\u0438 \u043d\u043e\u0432\u043e\u0435 \u0443\u043d\u0438\u043a\u0430\u043b\u044c\u043d\u043e\u0435 \u043c\u043d\u043e\u0433\u043e\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043d\u0430 \u0431\u0430\u0437\u0435 Go \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c NKAbuse \u0441 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c\u044e \u0441\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043e\u0431\u043c\u0435\u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c New Kind of Network.\n\nNKN \u2014 \u044d\u0442\u043e \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043d\u043e\u0432\u044b\u0439 \u0434\u0435\u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u043e\u0434\u043d\u043e\u0440\u0430\u043d\u0433\u043e\u0432\u044b\u0439 \u0441\u0435\u0442\u0435\u0432\u043e\u0439 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b \u043d\u0430 \u0431\u0430\u0437\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 \u0431\u043b\u043e\u043a\u0447\u0435\u0439\u043d\u0430 \u0434\u043b\u044f \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438, \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0430\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0438 \u043f\u0440\u043e\u0437\u0440\u0430\u0447\u043d\u043e\u0439 \u043c\u043e\u0434\u0435\u043b\u0438 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439. \n\nNKN \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e \u043e\u043f\u0442\u0438\u043c\u0438\u0437\u0438\u0440\u0443\u0435\u0442 \u0441\u043a\u043e\u0440\u043e\u0441\u0442\u044c \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u043e \u0441\u0435\u0442\u0438, \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044f \u0440\u0430\u0437\u043d\u043e\u043e\u0431\u0440\u0430\u0437\u043d\u044b\u0435 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u041f\u043e \u0430\u043d\u0430\u043b\u043e\u0433\u0438\u0438 \u0441 Tor, NKN \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0443\u0437\u043b\u044b, \u0447\u0438\u0441\u043b\u043e \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u0435\u0442 \u0434\u043e 61 \u0442\u044b\u0441\u044f\u0447\u0438, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044f \u0434\u0435\u0446\u0435\u043d\u0442\u0440\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044e \u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u044c.\n\n\u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438, NKAbuse, \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043e \u043d\u0430 \u043d\u0430\u0441\u0442\u043e\u043b\u044c\u043d\u044b\u0435 \u041f\u041a \u043d\u0430 \u0431\u0430\u0437\u0435 Linux \u0432 \u041c\u0435\u043a\u0441\u0438\u043a\u0435, \u041a\u043e\u043b\u0443\u043c\u0431\u0438\u0438 \u0438 \u0412\u044c\u0435\u0442\u043d\u0430\u043c\u0435.  \u041e\u0434\u043d\u0430\u043a\u043e, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u0435\u0433\u043e \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u0440\u0430\u0436\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b MISP \u0438 ARM, \u043e\u043d \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0443\u0433\u0440\u043e\u0437\u0443 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 IoT.\n\n\u041e\u0434\u043d\u043e \u0438\u0437 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u043c\u044b\u0445 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0439 NKAbuse \u0431\u044b\u043b\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043e \u0432 \u0445\u043e\u0434\u0435 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u0443\u044e \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044e \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0441\u0442\u0430\u0440\u043e\u0439 10-\u0442\u0438 \u0431\u0430\u043b\u044c\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Apache Struts (CVE-2017-5638).\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, NKAbuse \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u044f\u0442\u044c NKN \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f DDoS-\u0430\u0442\u0430\u043a, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0441\u043b\u043e\u0436\u043d\u043e \u043e\u0442\u0441\u043b\u0435\u0434\u0438\u0442\u044c, \u043d\u0435 \u0433\u043e\u0432\u043e\u0440\u044f \u0443\u0436\u0435 \u043e\u0431 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438  \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u0439 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b, \u0432\u0435\u0434\u044c \u043d\u043e\u0432\u044b\u0439 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u043d\u0435 \u043f\u043e\u043b\u044f \u0437\u0440\u0435\u043d\u0438\u044f \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0430 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0430 \u043d\u043e\u0432\u043e\u0433\u043e \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u0441\u0432\u044f\u0437\u0438 \u0434\u043b\u044f C2, \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e \u0443\u043a\u043b\u043e\u043d\u044f\u044f\u0441\u044c \u043e\u0442 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f. \u0412 \u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438, \u043a\u043b\u0438\u0435\u043d\u0442 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0441\u0432\u044f\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f \u0441 \u043c\u0430\u0441\u0442\u0435\u0440\u043e\u043c \u0431\u043e\u0442\u0430 \u0447\u0435\u0440\u0435\u0437 NKN \u0434\u043b\u044f \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0421\u0440\u0435\u0434\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 C2, - \u0430\u0442\u0430\u043a\u0438 HTTP, TCP, UDP, PING, ICMP \u0438 SSL-\u0444\u043b\u0443\u0434.\n\n\u0412 \u0434\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044f\u043c DDoS, NKAbuse \u0442\u0430\u043a\u0436\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u043a\u0430\u043a RAT \u0432 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0441\u0432\u043e\u0438\u043c \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b, \u043a\u0440\u0430\u0436\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0434\u0435\u043b\u0430\u0442\u044c \u0441\u043d\u0438\u043c\u043a\u0438 \u044d\u043a\u0440\u0430\u043d\u0430.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043e\u0431\u044b\u0447\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0436\u0435\u0440\u0442\u0432\u044b \u043f\u0443\u0442\u0435\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u044f \u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438.\n\n\u041f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0430\u0441\u043f\u0435\u043a\u0442\u043e\u043c \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 \u0441\u0430\u043c\u043e\u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f, \u0430 \u043f\u0435\u0440\u0441\u0438\u0441\u0442\u0435\u043d\u0442\u043d\u043e\u0441\u0442\u044c \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u0435\u0442\u0441\u044f \u0437\u0430 \u0441\u0447\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0437\u0430\u0434\u0430\u043d\u0438\u0439 cron.\n\n\u041f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u041b\u041a, \u0438\u0441\u0441\u043b\u0435\u0434\u0443\u0435\u043c\u044b\u0439 \u0438\u043c\u043f\u043b\u0430\u043d\u0442\u0430\u0442 \u0431\u044b\u043b \u0442\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d \u0434\u043b\u044f \u0438\u043d\u0442\u0435\u0433\u0440\u0430\u0446\u0438\u0438 \u0432 \u0431\u043e\u0442\u043d\u0435\u0442, \u043e\u0434\u043d\u0430\u043a\u043e \u043e\u043d \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0430\u0434\u0430\u043f\u0442\u0438\u0440\u043e\u0432\u0430\u043d \u043a \u0440\u0430\u0431\u043e\u0442\u0435 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u043d\u0430 \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e\u043c \u0445\u043e\u0441\u0442\u0435.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438 \u0431\u043b\u043e\u043a\u0447\u0435\u0439\u043d\u0430 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u0443\u044e \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u044c \u0438 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u0441\u0442\u044c, \u0447\u0442\u043e \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u0432\u043d\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b \u0431\u0443\u0434\u0443\u0449\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0431\u043e\u0442\u043d\u0435\u0442\u0430, \u0444\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0433\u043e \u0431\u0435\u0437 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u0435\u043c\u043e\u0433\u043e \u0446\u0435\u043d\u0442\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u0430, \u0447\u0442\u043e \u0434\u0435\u043b\u0430\u0435\u0442 \u0437\u0430\u0449\u0438\u0442\u0443 \u043e\u0442 \u044d\u0442\u043e\u0439 \u0443\u0433\u0440\u043e\u0437\u044b \u0432\u0435\u0441\u044c\u043c\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u0442\u0438\u0447\u043d\u043e\u0439.", "creation_timestamp": "2023-12-15T16:14:56.000000Z"}, {"uuid": "54619233-f283-484d-8551-67c721eabbd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/HackerOne/990", "content": "https://www.tinfoilsecurity.com/strutshock\n\nWorried about Strutshock (CVE-2017-5638)? \ud83e\udd15\nUse our quick check to see if your website is vulnerable", "creation_timestamp": "2017-09-06T18:04:56.000000Z"}, {"uuid": "e21ad617-5b72-4fa4-bf7b-7ad940d98d8c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/true_secator/145", "content": "\u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e  \u044e\u0441\u0442\u0438\u0446\u0438\u0438 \u0421\u0428\u0410 \u043f\u0440\u0435\u0434\u044a\u044f\u0432\u0438\u043b\u043e \u043e\u0431\u0432\u0438\u043d\u0435\u043d\u0438\u0435 4 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u043c \u0432\u043e\u0435\u043d\u043d\u043e\u0441\u043b\u0443\u0436\u0430\u0449\u0438\u043c \u0438\u0437 54-\u0433\u043e \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0433\u043e \u0438\u043d\u0441\u0442\u0438\u0442\u0443\u0442\u0430 \u041d\u041e\u0410\u041a \u0432 \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u0438 \u0432\u0437\u043b\u043e\u043c\u0430 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u0431\u044e\u0440\u043e \u043a\u0440\u0435\u0434\u0438\u0442\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0440\u0438\u0439 Equifax \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 2017 \u0433\u043e\u0434\u0430.\n\n\u0410\u0442\u0430\u043a\u0430 \u0431\u044b\u043b\u0430 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2017-5638 \u0432 Apache Struts. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u0432\u043e \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u044e\u044e \u0441\u0435\u0442\u044c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u043d\u0435\u0434\u0435\u043b\u044c \u0432\u044b\u043a\u0430\u0447\u0430\u043b\u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u0440\u044f\u0434\u043a\u0430 150 \u043c\u043b\u043d. \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0446\u0435\u0432. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e\u043d\u0438 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u043b\u0438 \u0432\u0435\u0441\u044c\u043c\u0430 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043a\u043e\u043d\u0441\u043f\u0438\u0440\u0430\u0446\u0438\u0438.\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2017-5638 \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 \u043c\u0430\u0440\u0442\u0435 2017 \u0433\u043e\u0434\u0430 \u0438 \u0442\u043e\u0433\u0434\u0430 \u0436\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430, \u043e\u0434\u043d\u0430\u043a\u043e Equifax \u0437\u0430 \u043f\u043e\u043b\u0433\u043e\u0434\u0430 \u043d\u0435 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u044f\u043b\u0438 \u043d\u0438\u043a\u0430\u043a\u0438\u0445 \u043c\u0435\u0440 \u043f\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044e \u0441\u0432\u043e\u0435\u0433\u043e \u041f\u041e.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432 \u043f\u043e \u043f\u043e\u0432\u043e\u0434\u0443 \u0432\u0437\u043b\u043e\u043c\u0430 \u0432 2019 \u0433\u043e\u0434\u0443 Equifax \u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0432\u044b\u043f\u043b\u0430\u0442\u0438\u0442\u044c \u043e\u043a\u043e\u043b\u043e 700 \u043c\u043b\u043d. \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u043a\u0440\u044b\u0442\u044c \u0432\u043e\u043f\u0440\u043e\u0441 \u0441 FTC (\u0424\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u0430\u044f \u0442\u043e\u0440\u0433\u043e\u0432\u0430\u044f \u043a\u043e\u043c\u0438\u0441\u0441\u0438\u044f \u0421\u0428\u0410). \u0415\u0449\u0435 \u043f\u043e\u043b\u043c\u0438\u043b\u043b\u0438\u043e\u043d\u0430 \u0444\u0443\u043d\u0442\u043e\u0432 \u0441\u0442\u0435\u0440\u043b\u0438\u043d\u0433\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u043f\u043b\u0430\u0442\u0438\u043b\u0430 \u0432 \u0432\u0438\u0434\u0435 \u0448\u0442\u0440\u0430\u0444\u0430 \u0431\u0440\u0438\u0442\u0430\u043d\u0446\u0430\u043c.\n\n\u041c\u044b \u043d\u0435 \u0431\u0435\u0440\u0435\u043c\u0441\u044f \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u044a\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0445 \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u043d\u043e \u0432\u044b\u0432\u043e\u0434\u044b, \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e, \u043e\u0447\u0435\u0432\u0438\u0434\u043d\u044b - \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u0430\u043f\u0434\u0435\u0439\u0442\u0438\u0442\u044c \u041f\u041e. \u0410 \u0433\u043b\u0430\u0432\u043d\u043e\u0435 - \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0432\u043e\u044e \u0441\u0435\u0442\u044c.\n\nhttps://www.justice.gov/opa/pr/chinese-military-personnel-charged-computer-fraud-economic-espionage-and-wire-fraud-hacking", "creation_timestamp": "2020-02-11T10:05:53.000000Z"}, {"uuid": "8117c972-c34a-45d2-a719-507403c70ace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/information_security_channel/3786", "content": "CVE-2017-5638 \u2013 Apache Struts 2 Remote Code Execution Vulnerability\nhttp://blogs.quickheal.com/cve-2017-5638-apache-struts-2-remote-code-execution-vulnerability/\n\nThe well-known open source web application framework Apache Struts 2 is being actively exploited in the wild allowing hackers to launch a remote code execution attack.\u00a0 To address this issue, Apache has issued a security advisory and CVE-2017-5638 has been assigned to it. The zero-day bug has been rated with...\nThe post CVE-2017-5638 \u2013 Apache Struts 2 Remote Code Execution Vulnerability (http://blogs.quickheal.com/cve-2017-5638-apache-struts-2-remote-code-execution-vulnerability/) appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice (http://blogs.quickheal.com/).", "creation_timestamp": "2017-03-14T23:34:45.000000Z"}, {"uuid": "a8f539a7-3639-4273-8c03-28b8e76c0e30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/canyoupwnme/916", "content": "WIDESPREAD EXPLOITATION ATTEMPTS USING CVE-2017-5638\nhttp://threatgeek.com/2017/03/widespread-exploitation-attempts-using-cve-2017-5638.html", "creation_timestamp": "2017-03-11T19:02:27.000000Z"}, {"uuid": "8aa3fbcd-e4e7-4b83-a2eb-b489c271bf80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/information_security_channel/15204", "content": "One Year Later, Hackers Still Target Apache Struts Flaw\nhttp://feedproxy.google.com/~r/Securityweek/~3/bwhNGEstI4A/one-year-later-hackers-still-target-apache-struts-flaw\n\nOne year after researchers saw the first attempts to exploit a critical remote code execution flaw affecting the Apache Struts 2 framework, hackers continue to scan the Web for vulnerable servers.\nThe vulnerability in question, tracked as CVE-2017-5638, affects Struts 2.3.5 through 2.3.31 and Struts 2.5 through 2.5.10. The security hole was addressed on March 6, 2017 with the release of versions 2.3.32 and 2.5.10.1.\nThe bug, caused due to improper handling of the Content-Type header, can be triggered when performing file uploads with the Jakarta Multipart parser, and it allows a remote and unauthenticated attacker to execute arbitrary OS commands on the targeted system.\nThe first exploitation attempts  (https://www.securityweek.com/apache-struts-vulnerability-exploited-wild)were spotted one day after the patch was released, shortly after someone made available a proof-of-concept (PoC) exploit. Some of the attacks scanned servers in search of vulnerable Struts installations, while others were set up to deliver malware.\nGuy Bruneau, researcher and handler at the SANS Internet Storm Center, reported (https://isc.sans.edu/forums/diary/Scanning+for+Apache+Struts+Vulnerability+CVE20175638/23479/) over the weekend that his honeypot had caught a significant number of attempts to exploit CVE-2017-5638 over the past two weeks.\nThe expert said his honeypot recorded 57 exploitation attempts on Sunday, on ports 80, 8080 and 443.\u00a0The attacks, which appear to rely on a publicly available PoC exploit (https://github.com/r0otshell/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638), involved one of two requests designed to check if a system is vulnerable.\nBruneau told SecurityWeek that he has yet to see any payloads. The researcher noticed scans a few times a week starting on March 13, coming from IP addresses in Asia.\n\u201cThe actors are either looking for unpatched servers or new installations that have not been secured properly,\u201d Bruneau said.\nThe CVE-2017-5638 vulnerability is significant as it was exploited by cybercriminals last year to hack into the systems  (https://www.securityweek.com/equifax-confirms-apache-struts-flaw-used-hack)of U.S. credit reporting agency Equifax. Attackers had access to Equifax systems for more than two months and they managed to obtain information on over 145 million of the company\u2019s customers.\nThe same vulnerability was also leveraged late last year in a campaign (https://www.securityweek.com/zealot-apache-struts-attacks-abuses-nsa-exploits) that involved NSA-linked exploits and cryptocurrency miners.\nThis is not the only Apache Struts 2 vulnerability exploited by malicious actors since last year. In September, security firms warned that a remote code execution flaw tracked as CVE-2017-9805 had been exploited (https://www.securityweek.com/apache-struts-flaw-increasingly-exploited-hack-servers) to deliver malware.\nRelated: Actively Exploited Struts Flaw Affects Cisco Products (https://www.securityweek.com/actively-exploited-struts-flaw-affects-cisco-products)\nRelated: Oracle Releases Patches for Exploited Apache Struts Flaw (https://www.securityweek.com/oracle-releases-patches-exploited-apache-struts-flaw)", "creation_timestamp": "2018-03-26T18:03:10.000000Z"}, {"uuid": "ef68291a-7772-458b-9717-1d0a91b8d8ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}, {"uuid": "0e7ab875-8609-4098-9f31-7dc95a6df5ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/canyoupwnme/926", "content": "Exploit for Apache Struts CVE-2017-5638\nhttps://github.com/mazen160/struts-pwn", "creation_timestamp": "2017-03-12T11:22:50.000000Z"}, {"uuid": "03777ce6-58db-486d-8cb1-99443a85e4c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://t.me/haccking/2813", "content": "#\u041e\u0431\u0443\u0447\u0435\u043d\u0438\u0435 \nApache Struts \u0430\u0442\u0430\u043a\u0430 - CVE-2017-5638.", "creation_timestamp": "2018-09-08T13:36:06.000000Z"}, {"uuid": "fa798aec-8f3c-4ea1-aa34-42b973be80ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/canyoupwnme/1042", "content": "An Analysis Of CVE-2017-5638\nhttps://blog.gdssecurity.com/labs/2017/3/27/an-analysis-of-cve-2017-5638.html", "creation_timestamp": "2017-03-31T02:36:44.000000Z"}, {"uuid": "7a0002e8-ee7c-4924-af3a-7b38fe5a2ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "exploited", "source": "https://t.me/canyoupwnme/1214", "content": "VMware VCenter Unauthenticated RCE Using CVE-2017-5638 (Apache Struts 2 RCE)\nhttp://blog.gdssecurity.com/labs/2017/4/13/vmware-vcenter-unauthenticated-rce-using-cve-2017-5638-apach.html", "creation_timestamp": "2017-04-15T17:01:06.000000Z"}, {"uuid": "34723c59-faeb-4793-9df4-1477dda238bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5638", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/107", "content": "#Analytics\n25 vulnerabilities/exploits used by IoT Botnet (Mirai, Qbot, Gafygt etc.)\n1. CVE-2015-2280: AirLink101 IPCam 1620W OS CI\n2. CVE-2017-17215: Huawei Router HG532 Arbitrary Command Execution\n3. CVE-2018-10561, CVE-2018-10562 - GPON Routers Auth Bypass/Command Injection\n4. CVE-2018-14417: SoftNAS Cloud &lt;4.0.3 OS CI\n5. CVE-2014-8361: Realtek SDK Miniigd UPnP SOAP Command Execution\n6. CVE-2017-5638: Apache Struts 2.x RCE\n7. CVE-2018-9866: SonicWall SMS RCE\n8. CVE-2017-6884: Zyxel EMG2926 OS CI\n9. CVE-2015-2051: HNAP SoapAction Header Command Execution\n10. CVE-2008-4873: Sepal SPBOARD 4.5 - \"board.cgi\" RCE\n11. CVE-2016-6277: NETGEAR R7000 - CI\n12. D-Link DSL-2750B - OS CI\n13. CAM Wireless IP Camera - Unauth RCE\n14. Eir D1000 Wireless Router - WAN Side RCI\n15. TUTOS 1.3 \"cmd.php\" RCE\n16. WP Plugin DZS-VideoGallery - CSS/CI\n17. Netgear DGN1000 - Setup.cgi RCE\n18. Web Attack (CCTV-DVR RCE)\n19. MVPower DVR TV-7104HE - Shell Command Execution\n20. Vacron NVR RCE\n21. Linksys E-series - RCE\n22. D-Link command.php RCE\n23. EnGenius EnShare IoT Gigabit Cloud Service 1.4.11 - RCE\n24. AVTech IP Camera/NVR/DVR Devices - Multiple Vulns\n25. NetGain \"ping\" Command Injection", "creation_timestamp": "2024-10-11T09:08:41.000000Z"}]}