{"vulnerability": "CVE-2017-9805", "sightings": [{"uuid": "7c6a1b4d-2efa-4bdd-a279-393f8dc2ca03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "c77afb22-abe2-4ea4-9562-e1ab1127c807", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "e1314bdc-f581-4eda-b5a7-3aba743a68fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "MISP/613a7aec-3ef5-4878-b639-1878e0c8edb3", "content": "", "creation_timestamp": "2020-10-09T16:28:03.000000Z"}, {"uuid": "139c7a82-11b7-4419-9871-e0059af4f2c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971158", "content": "", "creation_timestamp": "2024-12-24T20:25:07.470385Z"}, {"uuid": "682b5af0-7f3b-4265-8511-b4100151ac1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-30)", "content": "", "creation_timestamp": "2025-01-30T00:00:00.000000Z"}, {"uuid": "71b4aa4b-ee5e-47b6-8d5b-c0b97587586b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "236b3ee4-a6d4-4169-8960-d5abf47ea9ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-16)", "content": "", "creation_timestamp": "2024-12-16T00:00:00.000000Z"}, {"uuid": "42b86f1d-a4f6-4d8a-a182-1adb59411b78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-18)", "content": "", "creation_timestamp": "2024-12-18T00:00:00.000000Z"}, {"uuid": "04596b12-0140-4198-bb0b-9d28f6b4bc0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-23)", "content": "", "creation_timestamp": "2024-12-23T00:00:00.000000Z"}, {"uuid": "fea0d1a4-154d-42f2-8b24-58e06b5a84e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-25)", "content": "", "creation_timestamp": "2024-12-25T00:00:00.000000Z"}, {"uuid": "7f0b526e-4222-4631-a82f-6bdb5024e932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-10)", "content": "", "creation_timestamp": "2025-01-10T00:00:00.000000Z"}, {"uuid": "a71a541b-09d3-4927-953f-8ed040fe8c97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-26)", "content": "", "creation_timestamp": "2024-12-26T00:00:00.000000Z"}, {"uuid": "303f256f-c5b8-4073-be3b-3e1cbd1564b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-31)", "content": "", "creation_timestamp": "2024-12-31T00:00:00.000000Z"}, {"uuid": "16132ac4-9e8d-4c15-9c20-58ef5868c722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-01)", "content": "", "creation_timestamp": "2025-01-01T00:00:00.000000Z"}, {"uuid": "05d2f09b-bcdf-45c8-8b29-4a272611cb6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "b9a6abde-1384-4764-8ef6-491dc4a84e86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-28)", "content": "", "creation_timestamp": "2024-12-28T00:00:00.000000Z"}, {"uuid": "18150581-75f2-4e6c-bc0d-fae20a707980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-27)", "content": "", "creation_timestamp": "2024-12-27T00:00:00.000000Z"}, {"uuid": "9501cd19-4c46-4bc0-8331-e0a78303ae6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-11)", "content": "", "creation_timestamp": "2025-01-11T00:00:00.000000Z"}, {"uuid": "ba744d56-152d-4b22-b275-f900aca16b68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-04)", "content": "", "creation_timestamp": "2025-01-04T00:00:00.000000Z"}, {"uuid": "47df0f2e-85fb-4ca1-951d-83d5f456d18c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-06)", "content": "", "creation_timestamp": "2025-01-06T00:00:00.000000Z"}, {"uuid": "5d6b8064-7d8b-4d39-b53c-7b33c3c2ed0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-30)", "content": "", "creation_timestamp": "2024-12-30T00:00:00.000000Z"}, {"uuid": "df0c9934-ed8d-4aa7-ac43-03dae3962836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-09)", "content": "", "creation_timestamp": "2025-01-09T00:00:00.000000Z"}, {"uuid": "33fa5393-bc2b-4edb-9098-0332083b589a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-03)", "content": "", "creation_timestamp": "2025-01-03T00:00:00.000000Z"}, {"uuid": "1b3c8063-4207-461f-80bb-4544fb676ebc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-12)", "content": "", "creation_timestamp": "2025-01-12T00:00:00.000000Z"}, {"uuid": "388bbcc5-8251-4642-b133-c097c0b2e1fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-08)", "content": "", "creation_timestamp": "2025-01-08T00:00:00.000000Z"}, {"uuid": "830abea1-1a49-46b1-bc71-e416599f29fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:01.000000Z"}, {"uuid": "f95bf59e-49ba-4513-be8d-0267be2e2c7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2024-12-16)", "content": "", "creation_timestamp": "2024-12-16T00:00:00.000000Z"}, {"uuid": "10f27982-bafc-40d9-93f6-5d1de7d3c46c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "64530844-5f09-4b73-95f1-579ea3abca40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "9180c502-0276-4260-9883-ef9978ba05c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "6a6a86a6-79b7-4dfc-a653-89dc72dae6b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "648c6cc7-5b8c-41e5-8fb7-d6993041b42b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "6ac3db25-58e3-408d-9712-f1e2a891e75b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-16)", "content": "", "creation_timestamp": "2025-03-16T00:00:00.000000Z"}, {"uuid": "f1414eab-465e-4c2d-a9f5-70d4b37b242a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "b1118e70-5ca9-4681-be6c-3788e3a7ef91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "26568a9f-a741-4b0f-85e7-765de261b25a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "b81c1431-28e7-41c4-a760-b072b876e4c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:39.000000Z"}, {"uuid": "2ae3b36d-6727-46b2-95a3-7f100fc0b7ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "83b568b5-674d-4544-ba16-df9d70e9662b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-02)", "content": "", "creation_timestamp": "2025-04-02T00:00:00.000000Z"}, {"uuid": "6dde38d3-ddd4-43af-8b93-d517ee978769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-28)", "content": "", "creation_timestamp": "2025-03-28T00:00:00.000000Z"}, {"uuid": "b5aabe3b-7683-4a1a-9f68-32235bd5b5a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-28)", "content": "", "creation_timestamp": "2025-06-28T00:00:00.000000Z"}, {"uuid": "814a9020-0229-45f8-8806-33cd497105e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-01)", "content": "", "creation_timestamp": "2025-04-01T00:00:00.000000Z"}, {"uuid": "8313120f-df36-49c6-b735-cc8cb1fc98eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-05)", "content": "", "creation_timestamp": "2025-04-05T00:00:00.000000Z"}, {"uuid": "77be17ba-3cb9-4cea-87b3-b4160252fc86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-10)", "content": "", "creation_timestamp": "2025-04-10T00:00:00.000000Z"}, {"uuid": "f8710f5b-5f3d-4213-a5dd-0fd4f247ea58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-15)", "content": "", "creation_timestamp": "2025-07-15T00:00:00.000000Z"}, {"uuid": "3919d52d-42dc-48d1-8559-209ae6b5e6bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-05)", "content": "", "creation_timestamp": "2025-07-05T00:00:00.000000Z"}, {"uuid": "cef6585a-2c5f-4b4f-9da9-b3d959c5138a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-07)", "content": "", "creation_timestamp": "2025-07-07T00:00:00.000000Z"}, {"uuid": "724be7de-f2d6-4865-ac2c-f5929731fc54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://gist.github.com/edgarcosta/934eb264e54da84a497ce3f607ba247b", "content": "", "creation_timestamp": "2025-05-27T19:35:23.000000Z"}, {"uuid": "6553bee5-80b8-49ea-bced-fae1e7b71e0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://bsky.app/profile/kooteksec.bsky.social/post/3lqhsbnof2c22", "content": "", "creation_timestamp": "2025-05-31T12:56:38.354577Z"}, {"uuid": "4e042d8c-33a5-4d0f-98cb-9793a73b87d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-14)", "content": "", "creation_timestamp": "2025-06-14T00:00:00.000000Z"}, {"uuid": "b397be2d-33bf-4d59-b412-41dd089f1a6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3lqj7m3wi7j2s", "content": "", "creation_timestamp": "2025-06-01T02:27:40.289296Z"}, {"uuid": "d6a12ed4-5ad5-41fb-b4b8-d215d48acfba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "e8551ce2-28e8-43fb-9a69-f5bf66a4f488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-31)", "content": "", "creation_timestamp": "2025-05-31T00:00:00.000000Z"}, {"uuid": "78197f9f-d38f-445a-9c01-1618780d7088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-20)", "content": "", "creation_timestamp": "2025-06-20T00:00:00.000000Z"}, {"uuid": "9d5f299a-5c3b-4499-b817-9e7cf59c90a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "86537453-3b95-4ef5-b6c8-49d937a412c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "73c42e5a-3db7-4e8e-acd7-712e98854e2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-15)", "content": "", "creation_timestamp": "2025-06-15T00:00:00.000000Z"}, {"uuid": "36640794-aecd-417f-aed3-14c55f6d8e0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "ce0f3b26-471a-445e-aea1-419b06d91475", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-11)", "content": "", "creation_timestamp": "2025-07-11T00:00:00.000000Z"}, {"uuid": "361ffbd5-8546-41b4-908e-d622b5e6c114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "2e194fc5-041d-4101-bf8c-6c22af8e649f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-20)", "content": "", "creation_timestamp": "2025-09-20T00:00:00.000000Z"}, {"uuid": "f8ac9c5a-a5ac-413d-a815-b28fb3c007e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "c74b1ba9-211e-4606-bca0-064d49bc74ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-27)", "content": "", "creation_timestamp": "2025-09-27T00:00:00.000000Z"}, {"uuid": "7a107ce1-a987-4ce0-9fc2-731860c12307", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "5c40ad71-3106-4b8d-9773-3a704bdb3003", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-01)", "content": "", "creation_timestamp": "2025-08-01T00:00:00.000000Z"}, {"uuid": "4a3a6dcf-0233-48e2-92ab-4ca58e462d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-03)", "content": "", "creation_timestamp": "2025-08-03T00:00:00.000000Z"}, {"uuid": "0376a2e2-945f-40a2-a66a-f6821d93991b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-09)", "content": "", "creation_timestamp": "2025-09-09T00:00:00.000000Z"}, {"uuid": "437a27ac-b533-4cd0-9857-59e0148e7677", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "48cff287-1ede-488c-bd02-20ea65a91e56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "cc26013e-62f4-46c4-9a16-30a61cacafe1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-08)", "content": "", "creation_timestamp": "2025-10-08T00:00:00.000000Z"}, {"uuid": "2f2ebe15-f047-4478-9a26-61c8e1188a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "1f265908-04fb-4fa4-a167-70aa2d085e60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "bb8e97dc-0c95-47a3-9c1f-9f77f081c188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-17)", "content": "", "creation_timestamp": "2025-09-17T00:00:00.000000Z"}, {"uuid": "83d791c2-986f-4d0f-a597-70dccf6d408b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "393a5a2f-43c3-4e0d-839b-d1928bcc6830", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "fd474f50-c2ac-41b4-822e-fd9a603b2a48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-22)", "content": "", "creation_timestamp": "2025-11-22T00:00:00.000000Z"}, {"uuid": "7665ea79-c35d-4bc3-a688-ee8426018715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "d0881ace-b770-4c27-b158-2f3cfb6702ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "1d650df8-4447-4e6a-8d0e-bd9d5d047eff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-10)", "content": "", "creation_timestamp": "2025-11-10T00:00:00.000000Z"}, {"uuid": "69d11c6f-fc7f-437c-90a3-462aa183ad2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "010de7af-24c5-4602-a148-66f3f597b233", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://gist.github.com/meirdev/9456cc133c7718206f32c0d5528671a4", "content": "", "creation_timestamp": "2025-10-27T14:41:05.000000Z"}, {"uuid": "30443c9a-ae3f-4cc5-8717-0c90c6cc1870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-26)", "content": "", "creation_timestamp": "2025-11-26T00:00:00.000000Z"}, {"uuid": "fee2ea43-d4d0-4edc-a428-39a78817f709", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-29)", "content": "", "creation_timestamp": "2025-08-29T00:00:00.000000Z"}, {"uuid": "add87202-5151-4790-b1c4-be59b52bd398", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "2edd4031-3d63-41d6-9d80-13f4496e7bcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "e9596b33-02e9-41be-9e95-d7eb576dc9e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://gist.github.com/Darkcrai86/53f0a7891edc400e45024d1ea17f1763", "content": "", "creation_timestamp": "2025-09-02T10:34:43.000000Z"}, {"uuid": "625ea834-d76a-4897-9766-fd6931720845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "3c3a120a-47e8-4946-9404-db1c8e612cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-30)", "content": "", "creation_timestamp": "2025-08-30T00:00:00.000000Z"}, {"uuid": "af9563ee-c127-4f1d-8db7-c19fbc59842f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/struts2_rest_xstream.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "e3d98d66-e9f6-4109-8fe7-d82640988038", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-02)", "content": "", "creation_timestamp": "2025-09-02T00:00:00.000000Z"}, {"uuid": "ba522f43-a6be-4440-bb94-fe72d305fa77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-04)", "content": "", "creation_timestamp": "2025-09-04T00:00:00.000000Z"}, {"uuid": "cf9a7ba6-ff84-41c3-a5ab-f578c08b8128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-06)", "content": "", "creation_timestamp": "2025-12-06T00:00:00.000000Z"}, {"uuid": "03cf4dff-6c88-46e6-8f48-90a5adad78a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-10)", "content": "", "creation_timestamp": "2026-02-10T00:00:00.000000Z"}, {"uuid": "4dd3400d-a6ae-408b-936c-abfebd698ea5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-10)", "content": "", "creation_timestamp": "2025-12-10T00:00:00.000000Z"}, {"uuid": "9312a137-6ea3-4461-9975-ff2012a18044", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-05)", "content": "", "creation_timestamp": "2025-12-05T00:00:00.000000Z"}, {"uuid": "0d320c18-6aed-4e6a-92c4-59e267a3c04c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-26)", "content": "", "creation_timestamp": "2025-12-26T00:00:00.000000Z"}, {"uuid": "e202491b-9ee8-47ba-ab8f-5a9436f7caa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-02-08)", "content": "", "creation_timestamp": "2026-02-08T00:00:00.000000Z"}, {"uuid": "7e2fab75-8244-470d-a6e6-ac2537a218e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-15)", "content": "", "creation_timestamp": "2025-12-15T00:00:00.000000Z"}, {"uuid": "531cb6f6-cebd-42f5-b2f5-40e77c2f1272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-24)", "content": "", "creation_timestamp": "2026-02-24T00:00:00.000000Z"}, {"uuid": "10c3a1c2-5850-4dd7-89ae-f02fd6e016c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)", "content": "", "creation_timestamp": "2025-12-28T00:00:00.000000Z"}, {"uuid": "37e7eab4-1ca9-4c05-9f50-db2f5ea10a53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "188102d2-0bea-4f6f-8a84-f69fc308d764", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-09)", "content": "", "creation_timestamp": "2026-01-09T00:00:00.000000Z"}, {"uuid": "27af20c8-c377-43b6-813e-ba69b75f3f74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "9ffcd7db-1ad8-4c4b-a324-0d4b0b998497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "092d5de2-aa5c-4def-8011-901ba27205cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "b8222298-0b32-46c1-b4a3-c6b4f5f96108", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "61e9fa3a-97b2-42cd-b9c0-67684ca26786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://gist.github.com/winterswang/4908fd900e5f5a047bafb32001894038", "content": "", "creation_timestamp": "2026-03-11T04:03:33.000000Z"}, {"uuid": "aa9206b2-27cd-41fb-940f-7142a63ff8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-22)", "content": "", "creation_timestamp": "2026-03-22T00:00:00.000000Z"}, {"uuid": "f403309b-d531-4855-a817-aa4bb191200f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-28)", "content": "", "creation_timestamp": "2026-03-28T00:00:00.000000Z"}, {"uuid": "f1006f71-7a7f-4e22-9463-29e3d7c7cf46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-18)", "content": "", "creation_timestamp": "2026-03-18T00:00:00.000000Z"}, {"uuid": "072800a3-17ec-40de-9ff7-c65f9fdbc71f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "b3965864-1e32-4b1c-91bf-9fb9505c56c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-25)", "content": "", "creation_timestamp": "2026-03-25T00:00:00.000000Z"}, {"uuid": "e7d6a4ae-1e6d-493c-80bd-fbdb29eb9f23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "b1bbcc6c-e897-4365-89fd-70dff16fedb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-22)", "content": "", "creation_timestamp": "2026-03-22T00:00:00.000000Z"}, {"uuid": "e1af1372-fb77-444d-9f53-d06dc66bbcec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "edec35e5-3bbb-4fef-945d-19bb76e4a786", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-04)", "content": "", "creation_timestamp": "2026-04-04T00:00:00.000000Z"}, {"uuid": "abe93a26-eaf5-48a9-a820-44f45019d84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/01911cfd-2234-48c3-98f6-6d9119ac7a76", "content": "", "creation_timestamp": "2026-02-02T12:28:34.854786Z"}, {"uuid": "346a4623-dc49-4f18-b72b-ec068d1fbbec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/arpsyndicate/218", "content": "#ExploitObserverAlert\n\nCVE-2017-9805\n\nDESCRIPTION: Exploit Observer has 143 entries related to CVE-2017-9805. The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.\n\nFIRST-EPSS: 0.975450000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2023-11-17T06:14:03.000000Z"}, {"uuid": "03788d44-3370-4a21-ae11-1770e4a8f01d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "Telegram/_HKumtfHc9JdLY9gBOb1BIR_S0Q3O9PjMhvVQ3DoXbkkV4c", "content": "", "creation_timestamp": "2026-01-05T03:00:06.000000Z"}, {"uuid": "e0361ed9-b25a-4dc5-98d8-66c400932270", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-07)", "content": "", "creation_timestamp": "2026-04-07T00:00:00.000000Z"}, {"uuid": "aa4ed9f3-0b49-45cc-ae76-5ae53a4a88ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-08)", "content": "", "creation_timestamp": "2026-04-08T00:00:00.000000Z"}, {"uuid": "8266b4c6-975a-470a-80e2-6139c4a313c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "https://github.com/google/tsunami-security-scanner-plugins/tree/master/google/detectors/rce/cve20179805", "content": "", "creation_timestamp": "2021-02-05T21:43:47.000000Z"}, {"uuid": "df2cd769-5be6-45a2-8a4a-73494d80f92f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "56aeb613-b5a0-44bb-a98e-0b514732ee96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "https://t.me/webamoozir/2276", "content": "\u0634\u0631\u06a9\u062a Equifax \u0645\u062f\u0639\u06cc \u0634\u062f\u0647 \u06a9\u0647 \u062a\u0648\u0633\u0637 0day \u0628\u0631 \u0631\u0648\u06cc \u0645\u062d\u0635\u0648\u0644Apache Struts CVE-2017-9805 \u0647\u06a9\u0631 \u0647\u0627 \u062a\u0648\u0646\u0633\u062a\u0646 \u0628\u0647 \u0627\u06cc\u0646 \u0634\u0631\u06a9\u062a \u0646\u0641\u0648\u0630 \u06a9\u0646\u0646 \u0648\u0644\u06cc \u0628\u0644\u0627\u06af \u0622\u067e\u0627\u0686\u06cc \u062a\u0627\u06a9\u06cc\u062f \u06a9\u0631\u062f \u06a9\u0647 \u0639\u062f\u0645 \u0628\u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0628\u0647 \u0645\u0648\u0642\u0639 \u062f\u0644\u06cc\u0644 \u0627\u06cc\u0646 \u062d\u0627\u062f\u062b\u0647 \u0628\u0648\u062f\u0647.\n@webamoozir", "creation_timestamp": "2017-09-10T16:23:40.000000Z"}, {"uuid": "c596bd40-a4ae-45da-a6c0-29ca742b7e45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/3799", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2017-9805\n\ud83d\udd25 CVSS Score: 8.1 (CVSS_V3)\n\ud83d\udd39 Description: The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.\n\ud83d\udccf Published: 2018-10-16T19:37:56Z\n\ud83d\udccf Modified: 2025-02-07T17:42:07Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2017-9805\n2. https://github.com/apache/struts/commit/19494718865f2fb7da5ea363de3822f87fbda26\n3. https://github.com/apache/struts/commit/6dd6e5cfb7b5e020abffe7e8091bd63fe97c10a\n4. https://blogs.apache.org/foundation/entry/apache-struts-statement-on-equifax\n5. https://bugzilla.redhat.com/show_bug.cgi?id=1488482\n6. https://cwiki.apache.org/confluence/display/WW/S2-052\n7. https://github.com/apache/struts\n8. https://lgtm.com/blog/apache_struts_CVE-2017-9805\n9. https://security.netapp.com/advisory/ntap-20170907-0001\n10. https://struts.apache.org/docs/s2-052.html\n11. https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170907-struts2\n12. https://web.archive.org/web/20170909031344/http://www.securityfocus.com/bid/100609\n13. https://web.archive.org/web/20170922053119/http://www.securitytracker.com/id/1039263\n14. https://www.exploit-db.com/exploits/42627\n15. https://www.kb.cert.org/vuls/id/112992\n16. http://www.oracle.com/technetwork/security-advisory/alert-cve-2017-9805-3889403.html\n17. http://www.securityfocus.com/bid/100609\n18. http://www.securitytracker.com/id/1039263", "creation_timestamp": "2025-02-07T18:02:56.000000Z"}, {"uuid": "bd36be63-78f5-49ab-8903-6d11453126a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/alexmakus/1352", "content": "\u041f\u0440\u0438\u0432\u0435\u0442! \u041d\u0435\u0442, \u043d\u0435 \u0434\u043e\u0436\u0434\u0451\u0442\u0435\u0441\u044c, \u044f \u0432\u0441\u0451-\u0442\u0430\u043a\u0438 \u0435\u0449\u0451 \u0436\u0438\u0432\u043e\u0439, \u0445\u043e\u0442\u044f \u0438 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043f\u043e\u0440\u0435\u0437\u0430\u043d\u043d\u044b\u0439 \u043f\u043e\u0441\u043b\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0434\u043d\u0435\u0439 \u0432 \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u0435. \u041d\u043e \u0432\u0447\u0435\u0440\u0430 \u044f \u0432\u0441\u0451-\u0442\u0430\u043a\u0438 \u0434\u043e\u0435\u0445\u0430\u043b \u0434\u043e\u043c\u043e\u0439 \u0438 \u0440\u0435\u0434\u0430\u043a\u0446\u0438\u044f \u043a\u0430\u043d\u0430\u043b\u0430 \u0432 \u043b\u0438\u0446\u0435 \u043c\u0435\u043d\u044f \u043f\u043e\u0441\u0442\u0430\u0440\u0430\u0435\u0442\u0441\u044f \u0432\u043e\u0437\u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u044b\u0435 \u0442\u0440\u0430\u043d\u0441\u043b\u044f\u0446\u0438\u0438 \u0438\u0437 \u043c\u0438\u0440\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0435\u0439. \u0421\u0430\u043c\u0430\u044f \u0431\u043e\u043b\u044c\u0448\u0430\u044f \u043d\u043e\u0432\u043e\u0441\u0442\u044c \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 - \u044d\u0442\u043e \u0432\u0437\u043b\u043e\u043c \u0441\u0430\u0439\u0442\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Equifax, \u0447\u0435\u0440\u0435\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0433\u043b\u0438 \u0443\u0442\u0435\u0447\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0430 143 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u0430 \u0447\u0435\u043b\u043e\u0432\u0435\u043a \u0432 \u0421\u0428\u0410. \u0412\u043e\u0442 \u0430\u043d\u043e\u043d\u0441 \u043e\u0442 \u0441\u0430\u043c\u043e\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 (https://investor.equifax.com/news-and-events/news/2017/09-07-2017-213000628), \u0442\u0430\u043c \u0432 \u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u044b\u0445 \u0444\u043e\u0440\u043c\u0443\u043b\u0438\u0440\u043e\u0432\u043a\u0430\u0445 \u043f\u043e\u043a\u0430 \u043d\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442\u0441\u044f \u0443\u0442\u0435\u0447\u043a\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 143 \u043c\u043b\u043d \u0447\u0435\u043b\u043e\u0432\u0435\u043a, \u043d\u043e \u0432\u0441\u0435 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c. Equifax - \u0447\u0430\u0441\u0442\u043d\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0430 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0445 \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u0435\u0439, \u0438 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u044d\u0442\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0431\u0430\u043d\u043a\u0438 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u044e\u0442 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u043e \u0442\u043e\u043c, \u0434\u0430\u0432\u0430\u0442\u044c \u043b\u0438 \u043a\u0440\u0435\u0434\u0438\u0442 \u0447\u0435\u043b\u043e\u0432\u0435\u043a\u0443, \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0442\u044c \u0431\u0430\u043d\u043a\u043e\u0432\u0441\u043a\u0443\u044e \u043a\u0430\u0440\u0442\u0443, \u043f\u043e\u0434\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u0434\u043e\u0433\u043e\u0432\u043e\u0440 \u0430\u0440\u0435\u043d\u0434\u044b \u0436\u0438\u043b\u044c\u044f \u0441 \u043d\u0438\u043c \u0438 \u043f\u0440\u043e\u0447. \u0412 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u0442\u0451\u043a\u0448\u0435\u0439 \u0431\u0430\u0437\u0435 - \u0412\u0421\u042f \u0416\u0418\u0417\u041d\u042c \u043c\u043d\u043e\u0433\u0438\u0445 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0445 \u0436\u0438\u0442\u0435\u043b\u0435\u0439, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u0438 \u0430\u0434\u0440\u0435\u0441\u0430, \u0438 \u0437\u0430\u043a\u0430\u043d\u0447\u0438\u0432\u0430\u044f \u043d\u043e\u043c\u0435\u0440\u043e\u043c \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0441\u0442\u0440\u0430\u0445\u043e\u0432\u0430\u043d\u0438\u044f, \u043a \u043a\u043e\u0442\u043e\u0440\u043e\u043c\u0443 \u043f\u0440\u0438\u0432\u044f\u0437\u0430\u043d\u043e \u0432\u043e\u043e\u0431\u0449\u0435 \u0432\u0441\u0451! \u041f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u044c\u0442\u0435 \u0441\u0435\u0431\u0435, \u0447\u0442\u043e \u0443\u0442\u0435\u043a\u043b\u0430 \u0432\u0441\u044f \u0431\u0430\u0437\u0430 \u0413\u043e\u0441\u0443\u0441\u043b\u0443\u0433, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, \u0434\u0430 \u0438 \u0442\u043e \u043e\u043d\u043e \u043d\u0435 \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u0442 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043e\u0432. (\u0422\u0430\u043a \u043a\u0430\u043a \u044f \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043f\u043e\u043b\u0443\u0447\u0430\u043b \u043a\u0440\u0435\u0434\u0438\u0442 \u043d\u0430 \u043f\u043e\u043a\u0443\u043f\u043a\u0443 \u0434\u043e\u043c\u0430, \u0442\u043e \u0438 \u043c\u043e\u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u0442\u0430\u043c \u0442\u043e\u0447\u043d\u043e \u0435\u0441\u0442\u044c. \u0411\u043e\u043b\u0435\u0435 \u0442\u043e\u0433\u043e, \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u043c\u043d\u0435 \u043f\u0440\u0438\u0448\u043b\u0438 \u0441\u0442\u0440\u0430\u043d\u043d\u044b\u0435 \u043f\u0438\u0441\u044c\u043c\u0430 \u043e\u0442 \u0431\u0430\u043d\u043a\u0430 \u0441 \u0444\u043e\u0440\u043c\u0443\u043b\u0438\u0440\u043e\u0432\u043a\u043e\u0439 \u00ab\u043c\u044b \u043d\u0435 \u043c\u043e\u0436\u0435\u043c \u0432\u0430\u043c \u0441\u0435\u0439\u0447\u0430\u0441 \u0432\u044b\u0434\u0430\u0442\u044c \u043a\u0440\u0435\u0434\u0438\u0442\u00bb, \u0438 \u044f \u043f\u043e\u0434\u043e\u0437\u0440\u0435\u0432\u0430\u044e, \u0447\u0442\u043e \u044d\u0442\u0438 \u0441\u043e\u0431\u044b\u0442\u0438\u044f \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0432\u043f\u043e\u043b\u043d\u0435 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u044f \u044d\u0442\u043e \u0432\u044b\u044f\u0441\u043d\u044f\u044e \u0441\u0435\u0439\u0447\u0430\u0441 \u0441 \u0431\u0430\u043d\u043a\u043e\u043c). \u0412 \u043b\u044e\u0431\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435, \u0443\u0442\u0435\u0447\u043a\u0430 \u043e\u0447\u0435\u043d\u044c \u043f\u043b\u043e\u0445\u0430\u044f, \u043d\u043e \u043f\u043e\u043a\u0430 \u0447\u0442\u043e 100% \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u0435\u0439 \u043d\u0435\u0442, \u0438 \u0432\u0441\u043f\u043b\u044b\u0432\u0430\u044e\u0449\u0438\u0435 \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435 \u043f\u043e\u043a\u0430 \u0447\u0442\u043e \u043e\u043a\u0430\u0437\u044b\u0432\u0430\u043b\u0438\u0441\u044c \u0444\u0435\u0439\u043a\u0430\u043c\u0438. \u0415\u0441\u0442\u044c \u043f\u043e\u0434\u043e\u0437\u0440\u0435\u043d\u0438\u0435, \u0447\u0442\u043e \u0441\u0430\u0439\u0442 \u0431\u044b\u043b \u0432\u0437\u043b\u043e\u043c\u0430\u043d \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2017-9805 \u0432 Apache Struts, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043a\u0430\u043a \u0440\u0430\u0437 \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u0430\u0432\u0433\u0443\u0441\u0442\u0430. \u0418 \u0432\u0435\u0434\u044c \u0434\u0430\u043b\u044c\u0448\u0435 \u0431\u0443\u0434\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0445\u0443\u0436\u0435 :(", "creation_timestamp": "2017-09-12T15:46:55.000000Z"}, {"uuid": "168b4b75-38ef-4765-9f69-7302285f2ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/arpsyndicate/1246", "content": "#ExploitObserverAlert\n\nCVE-2017-9805\n\nDESCRIPTION: Exploit Observer has 146 entries related to CVE-2017-9805. The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.\n\nFIRST-EPSS: 0.975450000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2023-12-04T16:09:30.000000Z"}, {"uuid": "ce614921-872b-48ce-92c5-acc509c8a196", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-17)", "content": "", "creation_timestamp": "2026-04-17T00:00:00.000000Z"}, {"uuid": "def85f9d-1269-4678-8a44-9d69ad14bdd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "Telegram/I4QXvTJeRDV5NcpIh8IerA_QNnV17BE-kDbczPJ6Liofbic", "content": "", "creation_timestamp": "2025-12-14T03:00:05.000000Z"}, {"uuid": "48a343ca-cd4b-409e-b765-23660edb94ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "https://t.me/Master_X_Cha/5666", "content": "\u0644\u0627\u0632\u0645 \u062a\u062a\u0623\u0643\u062f \u0625\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0644\u064a \u0628\u062a\u0642\u0648\u0645 \u0628\u0640 Deserialization \u0644\u064a\u0647\u0627 \u0645\u0635\u062f\u0631 \u0645\u0648\u062b\u0648\u0642\u060c \u064a\u0639\u0646\u064a \u062a\u062a\u062c\u0646\u0628 \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0628\u064a\u0627\u0646\u0627\u062a \u062c\u0627\u064a\u0629 \u0645\u0646 \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u064a\u0646 \u0623\u0648 \u0645\u0635\u0627\u062f\u0631 \u063a\u064a\u0631 \u0645\u0639\u0631\u0648\u0641\u0629.\n\n3. \u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a:\n\n\u0644\u0627\u0632\u0645 \u062a\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0642\u0628\u0644 \u0645\u0627 \u062a\u0628\u062f\u0623 \u0641\u064a \u0641\u0643\u0647\u0627. \u0645\u062b\u0644\u0627\u064b\u060c \u0644\u0648 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u062c\u0627\u064a\u0629 \u0645\u0646 HTTP request \u0623\u0648 \u0645\u0646 \u0642\u0627\u0639\u062f\u0629 \u0628\u064a\u0627\u0646\u0627\u062a\u060c \u062a\u0623\u0643\u062f \u0645\u0646 \u0625\u0646\u0647\u0627 \u0645\u062a\u0648\u0627\u0641\u0642\u0629 \u0645\u0639 \u0627\u0644\u0635\u064a\u063a\u0629 \u0627\u0644\u0645\u062a\u0648\u0642\u0639\u0629 \u0642\u0628\u0644 \u0641\u0643\u0647\u0627.\n\n4. \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0627\u0644\u0640 Digital Signatures:\n\n\u0644\u0648 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0644\u064a \u0628\u062a\u0633\u062a\u0642\u0628\u0644\u0647\u0627 \u0645\u0646 \u0645\u0635\u062f\u0631 \u0628\u0639\u064a\u062f (remote) \u0623\u0648 \u063a\u064a\u0631 \u0645\u0648\u062b\u0648\u0642\u060c \u062d\u0627\u0648\u0644 \u062a\u0633\u062a\u062e\u062f\u0645 digital signatures \u0639\u0644\u0649 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0634\u0627\u0646 \u062a\u0636\u0645\u0646 \u0625\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0645\u0627 \u062a\u0645\u0634 \u0627\u0644\u062a\u0644\u0627\u0639\u0628 \u0641\u064a\u0647\u0627.\n\n5. \u062a\u0641\u0639\u064a\u0644 \u0627\u0644\u0640 Sandboxing:\n\n\u062d\u0637 \u0627\u0644\u0639\u0645\u0644\u064a\u0627\u062a \u0648\u0627\u0644\u0640 Deserialization \u0641\u064a \u0628\u064a\u0626\u0629 \u0645\u0646\u0639\u0632\u0644\u0629 (sandbox)\u060c \u0628\u062d\u064a\u062b \u0644\u0648 \u062d\u0635\u0644 \u0623\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644\u060c \u064a\u0643\u0648\u0646 \u0645\u062d\u0635\u0648\u0631 \u0641\u064a \u0628\u064a\u0626\u0629 \u0645\u063a\u0644\u0642\u0629 \u0645\u0627 \u062a\u0623\u062b\u0631\u0634 \u0639\u0644\u0649 \u0627\u0644\u0646\u0638\u0627\u0645 \u0643\u0644\u0647.\n\n6. \u0641\u062d\u0635 \u0627\u0644\u0643\u0648\u062f \u0628\u0634\u0643\u0644 \u062f\u0648\u0631\u064a:\n\n\u0644\u0627\u0632\u0645 \u062a\u0639\u0645\u0644 \u0641\u062d\u0635 \u062f\u0648\u0631\u064a (Code Review) \u0639\u0644\u0649 \u062a\u0637\u0628\u064a\u0642\u0627\u062a\u0643 \u0639\u0634\u0627\u0646 \u062a\u0643\u062a\u0634\u0641 \u0623\u064a \u062b\u063a\u0631\u0627\u062a \u0645\u0645\u0643\u0646 \u062a\u0643\u0648\u0646 \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a \u0639\u0645\u0644\u064a\u0629 Deserialization.\n\n\n\u0623\u062f\u0648\u0627\u062a \u0644\u0627\u0643\u062a\u0634\u0627\u0641 \u0648\u0627\u0633\u062a\u063a\u0644\u0627\u0644 Deserialization\n\n1. ysoserial:\n\n\u0623\u062f\u0627\u0629 \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 \u0628\u062a\u0633\u0627\u0639\u062f\u0643 \u0639\u0644\u0649 \u0628\u0646\u0627\u0621 Payloads \u0644\u0640 Deserialization \u0641\u064a Java.\n\n\u062a\u0642\u062f\u0631 \u062a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0639\u0634\u0627\u0646 \u062a\u0648\u0644\u062f Payloads \u062a\u0633\u062a\u063a\u0644 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u062f\u064a.\n\n\u0645\u062b\u0627\u0644:\n\njava -jar ysoserial.jar CommonsCollections1 \"calc.exe\"\n\n2. Burp Suite Extensions:\n\n\u0641\u064a Burp Suite \u0641\u064a\u0647 \u0625\u0636\u0627\u0641\u0627\u062a \u0632\u064a Java Deserialization Scanner \u0628\u062a\u0633\u0627\u0639\u062f\u0643 \u062a\u0643\u062a\u0634\u0641 \u062b\u063a\u0631\u0627\u062a Deserialization.\n\n3. PHPGGC:\n\n\u0623\u062f\u0627\u0629 \u062e\u0627\u0635\u0629 \u0628\u0640 PHP \u0628\u062a\u0633\u0627\u0639\u062f\u0643 \u0641\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u0640 Deserialization \u0639\u0646 \u0637\u0631\u064a\u0642 \u062a\u062c\u0645\u064a\u0639 \u0633\u0644\u0627\u0633\u0644 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0644\u0640 unserialize().\n\n4. Deserialization Scanner:\n\n\u0641\u064a\u0647 \u0623\u062f\u0648\u0627\u062a \u0632\u064a Deserialization Scanner \u0627\u0644\u0644\u064a \u0628\u062a\u0639\u0645\u0644 \u0641\u062d\u0635 \u062a\u0644\u0642\u0627\u0626\u064a \u0644\u0644\u062a\u0637\u0628\u064a\u0642\u0627\u062a \u0639\u0634\u0627\u0646 \u062a\u0643\u062a\u0634\u0641 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u062f\u064a.\n\n\n\n\u0623\u0645\u062b\u0644\u0629 \u062d\u0642\u064a\u0642\u064a\u0629 \u0644\u062b\u063a\u0631\u0629 Deserialization\n\nCVE-2017-9805 (Apache Struts2):\n\n\u0627\u0644\u062b\u063a\u0631\u0629 \u062f\u064a \u0643\u0627\u0646\u062a \u0645\u0648\u062c\u0648\u062f\u0629 \u0641\u064a Apache Struts2 \u0641\u064a REST Plugin\u060c \u0648\u0643\u0627\u0646\u062a \u0628\u062a\u0633\u0645\u062d \u0644\u0644\u0645\u0647\u0627\u062c\u0645\u064a\u0646 \u0628\u062a\u0646\u0641\u064a\u0630 \u0623\u0648\u0627\u0645\u0631 \u0639\u0646 \u0628\u064f\u0639\u062f \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Deserialization.\n\nCVE-2015-4852 (WebLogic Server):\n\n\u0643\u0627\u0646\u062a \u0641\u064a WebLogic Server \u0648\u0633\u0645\u062d\u062a \u0628\u062a\u0646\u0641\u064a\u0630 \u0623\u0643\u0648\u0627\u062f \u0639\u0646 \u0628\u064f\u0639\u062f \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 Deserialization \u0644\u0643\u0627\u0626\u0646\u0627\u062a Java \u063a\u064a\u0631 \u0622\u0645\u0646\u0629.\n\n\n\u062e\u0627\u062a\u0645\u0629\n\n\u062b\u063a\u0631\u0629 Deserialization \u0648\u0627\u062d\u062f\u0629 \u0645\u0646 \u0627\u0644\u062b\u063a\u0631\u0627\u062a \u0627\u0644\u062e\u0637\u064a\u0631\u0629 \u0627\u0644\u0644\u064a \u0645\u0645\u0643\u0646 \u062a\u0639\u0631\u0636 \u062a\u0637\u0628\u064a\u0642\u0643 \u0623\u0648 \u0633\u064a\u0631\u0641\u0631\u0643 \u0644\u0644\u0627\u062e\u062a\u0631\u0627\u0642. \u0627\u0644\u0645\u0641\u062a\u0627\u062d \u0644\u0644\u062d\u0645\u0627\u064a\u0629 \u0645\u0646\u0647\u0627 \u0647\u0648 \u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0645\u0643\u062a\u0628\u0627\u062a \u0622\u0645\u0646\u0629\u060c \u0648\u0627\u0644\u062a\u062d\u0642\u0642 \u0645\u0646 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0628\u0639\u0646\u0627\u064a\u0629 \u0642\u0628\u0644 \u0641\u0643\u0647\u0627\u060c \u0648\u0623\u064a\u0636\u064b\u0627 \u0641\u062d\u0635 \u0627\u0644\u0643\u0648\u062f \u0628\u0634\u0643\u0644 \u062f\u0648\u0631\u064a. \u0644\u0648 \u062d\u0628\u064a\u062a \u062a\u062d\u0645\u064a \u0646\u0641\u0633\u0643 \u0628\u0634\u0643\u0644 \u0623\u0641\u0636\u0644\u060c \u0645\u0646 \u0627\u0644\u0645\u0647\u0645 \u0623\u0646 \u062a\u0644\u062a\u0632\u0645 \u0628\u0623\u0641\u0636\u0644 \u0645\u0645\u0627\u0631\u0633\u0627\u062a \u0627\u0644\u0623\u0645\u0627\u0646 \u0641\u064a \u0627\u0644\u062a\u0639\u0627\u0645\u0644 \u0645\u0639 \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0645\u064f\u0633\u0644\u0633\u0644\u0629.", "creation_timestamp": "2025-04-24T05:54:18.000000Z"}, {"uuid": "e585147f-cf18-4556-b94f-d9dbcd5d0143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/arpsyndicate/1518", "content": "#ExploitObserverAlert\n\nCVE-2017-9805\n\nDESCRIPTION: Exploit Observer has 148 entries related to CVE-2017-9805. The REST Plugin in Apache Struts 2.1.1 through 2.3.x before 2.3.34 and 2.5.x before 2.5.13 uses an XStreamHandler with an instance of XStream for deserialization without any type filtering, which can lead to Remote Code Execution when deserializing XML payloads.\n\nFIRST-EPSS: 0.975450000\nNVD-IS: 5.9\nNVD-ES: 2.2", "creation_timestamp": "2023-12-06T17:32:56.000000Z"}, {"uuid": "df396f51-3720-42eb-a8bb-8ec9264608a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/netrunnerz/424", "content": "Apache-Struts-v4\nCVE-2013-2251\nCVE-2017-5638\nCVE-2017-9805\nCVE-2018-11776\nCVE-2019-0230\n\n\u0421\u043a\u0440\u0438\u043f\u0442 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 5 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0435 RCE \u0432 Apache Struts. \u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u043e\u043d \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f PHP shell.\n\n#CVE #POC", "creation_timestamp": "2023-02-14T17:30:31.000000Z"}, {"uuid": "744da2b2-e83a-49f1-8a87-0cb90eadf1d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "https://t.me/ToolsLinuxvalid/24130", "content": "CVE-2017-9805 is a critical vulnerability in Apache Struts 2's Rest Plugin, allowing attackers to execute remote code via a specially crafted XML payload. If exploited, this vulnerability can lead to unauthorized system access and compromise vulnerable applications.\n\n\n\n\n\n\n\nhttps://github.com/FarizDevloper/CVE-2017-2024/tree/main", "creation_timestamp": "2025-01-03T22:18:39.000000Z"}, {"uuid": "68be086b-471f-4677-9fdb-882dbe3ee9d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/HackerOne/985", "content": "https://lgtm.com/blog/apache_struts_CVE-2017-9805", "creation_timestamp": "2017-09-06T07:05:34.000000Z"}, {"uuid": "cfa12845-03b3-4458-9874-9f9298a9d040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/true_secator/2035", "content": "\u200b\u200b\u0410\u0434\u043c\u0438\u043d\u0430\u043c \u043d\u0430 \u0437\u0430\u043c\u0435\u0442\u043a\u0443! \n\n\u0415\u0441\u043b\u0438 \u0432\u044b \u043d\u0435 \u0437\u043d\u0430\u043b\u0438 \u0447\u0435\u043c \u0441\u0435\u0431\u044f \u0437\u0430\u043d\u044f\u0442\u044c \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u0431\u0443\u0434\u043d\u0438, \u0442\u043e \u0441\u0430\u043c\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0440\u0435\u0432\u0438\u0437\u0438\u044e \u0441\u0435\u0442\u0435\u0439 \u0441\u0432\u043e\u0435\u0439 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 Trend Micro \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u0430\u0440\u0441\u0435\u043d\u0430\u043b \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438\u0437 \u0422\u041e\u041f-15 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 Linux:\n\n- CVE-2017-9805: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043b\u0430\u0433\u0438\u043d\u0430 REST \u0434\u043b\u044f Apache Struts 2, XStream RCE.\n- CVE-2018-7600: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Drupal Core RCE.\n- CVE-2020-14750: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Oracle WebLogic Server RCE.\n- CVE-2020-25213: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE \u043f\u043b\u0430\u0433\u0438\u043d\u0430 WordPress File Manager (wp-file-manager).\n- CVE-2020-17496: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE \u0432  \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0435 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0432 vBulletin subwidgetConfig\n- CVE-2020-11651: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0431\u0430\u0433\u043e\u0432 \u0432 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 SaltStack Salt.\n- CVE-2017-12611: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE \u0432 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0438 OGNL \u0432 Apache Struts.\n- CVE-2017-7657: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0446\u0435\u043b\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u043c \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0434\u043b\u0438\u043d\u044b \u0431\u043b\u043e\u043a\u0430 Eclipse Jetty.\n- CVE-2021-29441: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 Alibaba Nacos AuthFilter.\n- CVE-2020-14179: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Atlassian Jira, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438.\n- CVE-2013-4547: Nginx \u0441\u043e\u0437\u0434\u0430\u043b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043e\u0431\u0445\u043e\u0434\u0430 \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0432 \u0441\u0442\u0440\u043e\u043a\u0435 URI.\n- CVE-2019-0230: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Apache Struts 2 RCE.\n- CVE-2018-11776: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c RCE \u0432 \u0432\u044b\u0440\u0430\u0436\u0435\u043d\u0438\u0438 OGNL \u0432 Apache Struts.\n- CVE-2020-7961: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0439 \u0434\u0435\u0441\u0435\u0440\u0438\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 Liferay Portal.\n\n\u0420\u0430\u0431\u043e\u0442\u043d\u0435\u043c, \u043f\u043e\u0436\u0430\u043b\u0443\u0439.", "creation_timestamp": "2021-08-25T13:22:18.000000Z"}, {"uuid": "273d7cb5-b1a7-4412-8c6c-0639b9c18427", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/information_security_channel/8834", "content": "Three Apache Struts vulnerabilities\u2014CVE-2017-9793, CVE-2017-9804 and CVE-2017-9805\u2014affect many Cisco products\u2026 https://t.co/UB7hHa6G5e", "creation_timestamp": "2017-09-14T10:03:18.000000Z"}, {"uuid": "f159c17b-591f-4bb0-b8e6-eaad1cdfbd7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/information_security_channel/8564", "content": "CVE-2017-9805 \u2013 Apache Struts 2 Remote Code Execution Vulnerability by Quick Heal Security Labs\nhttp://blogs.quickheal.com/cve-2017-9805-apache-struts-2-remote-code-execution-vulnerability-quick-heal-security-labs/\n\nA critical remote code execution vulnerability has been discovered in famous web application framework Apache Struts, which allows attackers to execute arbitrary code. To address this issue, Apache Struts has issued a security advisory and CVE-2017-9805 has been assigned to it. The attacker may use this vulnerability to target organizations...\nThe post CVE-2017-9805 \u2013 Apache Struts 2 Remote Code Execution Vulnerability by Quick Heal Security Labs (http://blogs.quickheal.com/cve-2017-9805-apache-struts-2-remote-code-execution-vulnerability-quick-heal-security-labs/) appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice (http://blogs.quickheal.com/).", "creation_timestamp": "2017-09-07T11:08:40.000000Z"}, {"uuid": "1059a5ff-9eda-4394-ab94-4db657bbddbf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/information_security_channel/8664", "content": "CVE-2017-9805 was announced in Sep, whereas #Equifax hack was happened in July. So if hackers had Apache Struts flaw as 0-Day, it's serious.", "creation_timestamp": "2017-09-09T18:25:05.000000Z"}, {"uuid": "bdccf57d-94e2-4640-8259-2103b12ecfbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "https://t.me/webpwn/148", "content": "\u0412\u0436\u0443\u0445 \u0438 Apache Struts \u0441\u043d\u043e\u0432\u0430 \u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430!\n\nhttps://github.com/luc10/struts-rce-cve-2017-9805\nhttps://github.com/wvu-r7/metasploit-framework/blob/5ea83fee5ee8c23ad95608b7e2022db5b48340ef/modules/exploits/multi/http/struts2_rest_xstream.rb", "creation_timestamp": "2017-09-06T11:05:58.000000Z"}, {"uuid": "df87a36b-51bd-46c5-b6af-0a64483b043d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}, {"uuid": "990923a9-0a0d-41a8-a2d3-d7ed5b612615", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-03)", "content": "", "creation_timestamp": "2026-05-03T00:00:00.000000Z"}, {"uuid": "989dffa1-1ae5-46be-a734-b6fea2b74dd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "https://t.me/anti_malware/550", "content": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043e\u00a0\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 web-\u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430\u00a0Apache Struts 2.5.13, \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f web-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u043d\u0430 \u044f\u0437\u044b\u043a\u0435 Java \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u0440\u0430\u0434\u0438\u0433\u043c\u044b Model-View-Controller. \u0412 \u0441\u043e\u0441\u0442\u0430\u0432 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439\u00a0\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00a0(CVE-2017-9805), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\nvia Anti-Malware.ru - \u041d\u043e\u0432\u043e\u0441\u0442\u0438 \u0438 \u0441\u0442\u0430\u0442\u044c\u0438 \u043f\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 - http://ift.tt/2xNYEhO", "creation_timestamp": "2017-09-06T12:56:14.000000Z"}, {"uuid": "57e1d0c3-6969-437a-901a-7e6c2ab6d676", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/77", "content": "\u041e\u0447\u0435\u0440\u0435\u0434\u043d\u0430\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Apache Struts\n\u041e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 | Exploit | CVE-2017-9805", "creation_timestamp": "2017-09-06T11:10:48.000000Z"}, {"uuid": "4215767e-eaab-4c17-bbc0-dc94c5e0a029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-9805", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-01)", "content": "", "creation_timestamp": "2026-05-01T00:00:00.000000Z"}]}