{"vulnerability": "CVE-2017-11357", "sightings": [{"uuid": "5fb9d2aa-77f5-4777-8be5-e8182eb1e00b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "MISP/42d04e94-bf5b-427d-acc8-f5d740675941", "content": "", "creation_timestamp": "2020-10-20T15:57:21.000000Z"}, {"uuid": "757f8718-4e4e-4331-b4bf-5287119e0fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "MISP/d925a2ee-e7cf-46f6-bec1-ad8e19122730", "content": "", "creation_timestamp": "2020-10-20T15:58:04.000000Z"}, {"uuid": "e5277999-80fd-4907-9182-44dd1131f11b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "9876f0d0-c8c7-4ab5-beab-84ad3ceb3249", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "MISP/0f91d6dd-6e90-4ff4-b535-99c3ac07aedf", "content": "", "creation_timestamp": "2023-06-17T09:49:44.000000Z"}, {"uuid": "4f98d5bb-2a44-4aaa-8a10-0d8e8a64f618", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971757", "content": "", "creation_timestamp": "2024-12-24T20:33:42.110851Z"}, {"uuid": "d60f954a-7dd1-4c3e-90ca-0d122b15900f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:14.000000Z"}, {"uuid": "84631d1f-7109-4e1b-9d2e-2ebb0aa785fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "Telegram/QxUmQQxHqCkxTaysLBNBbpuc19gaa6hhliNR9D5GoirJ5b8y", "content": "", "creation_timestamp": "2025-02-06T02:42:30.000000Z"}, {"uuid": "f9b8ad6a-6e82-458a-8aab-a1975442eedd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:58.000000Z"}, {"uuid": "b253f4ed-7e17-4067-b80b-46ef54b23dce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-11357", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5c707e9d-fc90-4a10-87e0-3f351758f088", "content": "", "creation_timestamp": "2026-02-02T12:27:06.157907Z"}, {"uuid": "60e86d6e-fdee-4bfb-b878-1d1223267b8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-11357", "type": "seen", "source": "https://t.me/arpsyndicate/1387", "content": "#ExploitObserverAlert\n\nCVE-2017-11357\n\nDESCRIPTION: Exploit Observer has 9 entries related to CVE-2017-11357. Progress Telerik UI for ASP.NET AJAX before R2 2017 SP2 does not properly restrict user input to RadAsyncUpload, which allows remote attackers to perform arbitrary file uploads or execute arbitrary code.\n\nFIRST-EPSS: 0.653970000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-05T04:19:30.000000Z"}]}