{"uuid": "536a3680-6f5a-4eb2-923e-cc6d5fc53bdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-4577", "type": "exploited", "source": "https://t.me/KomunitiSiber/2236", "content": "PHP Vulnerability Exploited to Spread Malware and Launch DDoS Attacks\nhttps://thehackernews.com/2024/07/php-vulnerability-exploited-to-spread.html\n\nMultiple threat actors have been observed exploiting a recently disclosed security flaw in PHP to deliver remote access trojans, cryptocurrency miners, and distributed denial-of-service (DDoS) botnets.\nThe vulnerability in question is CVE-2024-4577 (CVSS score: 9.8), which allows an attacker to remotely execute malicious commands on Windows systems using Chinese and Japanese language locales. It", "creation_timestamp": "2024-07-11T08:51:46.000000Z"}