{"vulnerability": "CVE-2017-5645", "sightings": [{"uuid": "194223a0-9839-4935-bd31-b81d1163a56f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5645", "type": "seen", "source": "https://t.me/arpsyndicate/1509", "content": "#ExploitObserverAlert\n\nCVE-2017-5645\n\nDESCRIPTION: Exploit Observer has 121 entries related to CVE-2017-5645. In Apache Log4j 2.x before 2.8.2, when using the TCP socket server or UDP socket server to receive serialized log events from another application, a specially crafted binary payload can be sent that, when deserialized, can execute arbitrary code.\n\nFIRST-EPSS: 0.819480000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-06T16:22:02.000000Z"}, {"uuid": "47f6a1d4-d030-44c8-8004-7d1139bf3aef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-5645", "type": "seen", "source": "https://t.me/ctinow/168198", "content": "https://ift.tt/KCS8p1M\nCVE-2017-5645 | Oracle JD Edwards EnterpriseOne Tools 4.0.1.0 Log4j deserialization (BID-97702 / ID 1040200)", "creation_timestamp": "2024-01-15T08:11:13.000000Z"}]}