{"vulnerability": "CVE-2013-1965", "sightings": [{"uuid": "056152d7-0173-4c44-9e36-a2e93c995ad2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-1965", "type": "seen", "source": "https://t.me/arpsyndicate/1516", "content": "#ExploitObserverAlert\n\nCVE-2013-1965\n\nDESCRIPTION: Exploit Observer has 20 entries related to CVE-2013-1965. Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect.\n\nFIRST-EPSS: 0.008130000\nNVD-IS: 10.0\nNVD-ES: 8.6", "creation_timestamp": "2023-12-06T17:15:52.000000Z"}, {"uuid": "82e5435c-e85f-42ee-b88d-6db58599d328", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-1965", "type": "seen", "source": "https://gist.github.com/aw-junaid/6ba7bcfb795f6a9e31d2f07c98443ebb", "content": "", "creation_timestamp": "2026-04-05T07:50:38.000000Z"}, {"uuid": "a64a1530-b33a-4300-b741-4161a34f4a62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2013-1965", "type": "exploited", "source": "https://t.me/falcon_unit/108", "content": "\u0628\u0633\u0645 \u0627\u0644\u0644\u0647 \u0627\u0644\u0631\u062d\u0645\u0646 \u0627\u0644\u0631\u062d\u064a\u0645\n\n\u062a\u0645 \u0648\u0628\u0641\u0636\u0644 \u0627\u0644\u0644\u0647 \u0627\u062e\u062a\u0631\u0627\u0642 \u0639\u0634\u0631\u0629 \u0633\u064a\u0631\u0641\u0631\u0627\u062a \u0628\u0634\u0643\u0644 \u0643\u0627\u0645\u0644 \u0648\u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0645\u0644\u0641\u0627\u062a \u062d\u0633\u0627\u0633\u0629 \u062f\u0627\u062e\u0644 \u0647\u0630\u0647 \u0627\u0644\u0633\u064a\u0631\u0641\u0631\u0627\u062a \u0643\u0645 \u0645\u0648\u0636\u062d \u0641\u064a \u0627\u0644\u0645\u0642\u0637\u0639 \u0639\u0628\u0631 \u062b\u063a\u0631\u0629\n\nCVE-2013-1965\n\n\u0644\u0646 \u0646\u0642\u0648\u0645 \u0628\u062a\u0634\u0648\u064a\u0647 \u0647\u0630\u0647 \u0627\u0644\u0633\u064a\u0631\u0641\u0631\u0627\u062a \u0633\u0646\u0643\u062a\u0641\u064a \u0628\u0633\u062d\u0628 \u0642\u0648\u0627\u0639\u062f \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0648\u0627\u0644\u0627\u062d\u062a\u0641\u0627\u0638 \u0628\u0647\u0627.\n\n\n\u062a\u0623\u062a\u064a \u0647\u0630\u0647 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a \u0641\u064a \u0633\u064a\u0627\u0642 \u062f\u0639\u0645\u0646\u0627 \u0644\u0644\u0642\u0636\u064a\u0629\u00a0 \u0627\u0644\u0641\u0644\u0633\u0637\u064a\u0646\u064a\u0629 \u0648\u0645\u0648\u0627\u062c\u0647\u0629 \u062c\u0645\u064a\u0639 \u0623\u0639\u0648\u0627\u0646 \u0627\u0644\u0627\u062d\u062a\u0644\u0627\u0644 \u0627\u0644\u0635\u0647\u064a\u0648\u0646\u064a.\n\n\u0627\u0644\u0623\u0647\u062f\u0627\u0641 : \n\nhttp://13.60.71.249:2379/\nhttp://18.231.254.1:2052/\nhttp://3.34.49.135:2082/\nhttp://43.217.97.249:2080/\nhttp://18.231.254.1:2052/\nhttp://13.208.214.136:7500/\nhttp://3.255.95.221:7547/\nhttp://3.90.254.53:7547/\nhttp://51.16.244.52:7547/\nhttp://54.233.226.185:7547/\n\n\nLink Channel: https://t.me/+mC1MrRnDp5FjNmQ0\n\n\n#LulzSec_Black\n#FreePalestine", "creation_timestamp": "2025-06-01T07:33:35.000000Z"}]}