{"vulnerability": "CVE-2013-0634", "sightings": [{"uuid": "7311c5cd-918b-45b7-8763-f817c4378f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/54645d0f-5a88-4160-9416-5694950d210b", "content": "", "creation_timestamp": "2014-11-13T09:56:43.000000Z"}, {"uuid": "a4c6574a-9fc6-403e-b09d-44811d53bf3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/546481a0-fc90-4aa4-8508-4a68950d210b", "content": "", "creation_timestamp": "2014-11-13T10:03:15.000000Z"}, {"uuid": "81f60b3b-8df8-441d-b0ed-df846b70bde0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/eae99895-23f5-40ce-afb4-8a2ca22054cf", "content": "", "creation_timestamp": "2020-10-09T14:37:33.000000Z"}, {"uuid": "4cd5b4ec-605c-4724-b7ee-771c71f138cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/412b011d-08c3-4029-bf77-4ebac76d5e1b", "content": "", "creation_timestamp": "2020-10-09T17:35:13.000000Z"}, {"uuid": "7e2935ad-84bc-4c5c-a3ad-a315d0cd9f23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:12.000000Z"}, {"uuid": "947894be-6eef-4e6a-bc21-8f6d204c6c9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:41.000000Z"}, {"uuid": "a15d07ab-dfd7-4194-9d09-ad533f73a343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/adobe_flash_regex_value.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "0f921c48-2862-4190-905d-4cba2cb1727e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:41.000000Z"}, {"uuid": "afcf587a-72c7-46de-a6f2-0a03751f854c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:00:54.000000Z"}, {"uuid": "a9725935-ee69-455f-8b86-44fc873ad62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-0634", "type": "seen", "source": "https://t.me/BABATATASASA/5484", "content": "Serangan IPS Trellix yang memerlukan Respons HTTP\u00a0:\n\u00a0\n\nSenarai Satu\u00a0:\n\u00a0\nSerangan berikut memerlukan pilihan respons HTTP didayakan dan mengandungi hanya tandatangan berasaskan respons HTTP.\u00a0\u00a0\nUntuk langkah mengkonfigurasi pilihan ini, lihat\u00a0\n\n Serangan @ jenis berasaskan Respons HTTP dijelaskan\u00a0.\n\nAntara nya \ud83d\udc47\n \n1 HIGH - BACKDOOR: Proxy-Agent.af.gen Detection \n2 HIGH - BACKDOOR: Backdoor Communication Detected using Adobe vulnerability CVE-2013-0634 \n3 HIGH - BOT: Darkshell Botnet Activity Detected\n4 HIGH - BOT: Monkif Bot Traffic Detected \n5 HIGH - BOT: PlugX Trojan Activity De\n6 HIGH - BOT: Warbot Bot Activity \n7 HIGH - BOT: Feodo Activity Detected \n8 HIGH - BOT: Zeus/Floki VM Request Detected \n9 HIGH - HTTP: Blackhole PDF Detected \n10 HIGH - HTTP: Blackhole Jar Detected \n11 HIGH - BOT: Hancitor Malware Traffic Detected \n12 HIGH - BOT: Dridex Malware Traffic Detected (\n13 HIGH - BOT: IcedID Malware Traffic Detected \n14 HIGH - HTTP: Bottle Exploit Kit Traffic Detected \n15 HIGH - HTTP: Fallout Exploit Kit Traffic Detected \n16 HIGH - HTTP: GrandSoft Exploit Kit Traffic Detected\n17 HIGH - HTTP: Purple Fox Exploit Kit Traffic Detected \n18 MEDIUM - ExploitKit: VBScript Phoenix ExploitKit\n19 MEDIUM - ExploitKit: Iframe Redirect Alureon Exploit Kit \n20 MEDIUM - ExploitKit: Prototype Catch Landing Blackhole ExploitKit \n21 MEDIUM - ExploitKit: V1 JAR BlackHole ExploitKit \n22 MEDIUM - ExploitKit: Goon Landing jnlp silverlight Feb 14 \n23 MEDIUM - ExploitKit: Prototype Catch C Landing Blackhole ExploitKit \n24 MEDIUM - ExploitKit: Prototype Catch D Landing Blackhole ExploitKit \n25 MEDIUM - ExploitKit: QWE GetElementById Landing Blackhole ExploitKit \n26 MEDIUM - HTTP: ExploitKit Unknown Java Exploit DFE42z Feb 15 (\n27 MEDIUM - HTTP: ExploitKit CK Landing bmw \n28 MEDIUM - ExploitKit: JDB game class \n29 MEDIUM - ExploitKit: JDB setTimeout Flash \n30 MEDIUM - ExploitKit: Styx Landing getmyfile current", "creation_timestamp": "2023-10-20T01:19:28.000000Z"}, {"uuid": "bdfd982c-66b0-4382-8311-2639d3c9cf33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "db99543d-496c-4eef-ad0a-2df2093364df", "vulnerability": "CVE-2013-0634", "type": "confirmed", "source": "https://www.exploit-db.com/exploits/32959", "content": "", "creation_timestamp": "2014-04-21T00:00:00.000000Z"}]}