{"vulnerability": "CVE-2018-100000", "sightings": [{"uuid": "c4e01ec3-862b-4e08-9027-922befe6f76a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000001", "type": "exploited", "source": "https://www.exploit-db.com/exploits/44889", "content": "", "creation_timestamp": "2018-06-13T00:00:00.000000Z"}, {"uuid": "201b81e7-ad38-41fa-8918-a26f4d681b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000006", "type": "exploited", "source": "https://www.exploit-db.com/exploits/44357", "content": "", "creation_timestamp": "2018-03-29T00:00:00.000000Z"}, {"uuid": "e4148b95-20c8-4423-beef-1fc4e37465f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000001", "type": "exploited", "source": "https://www.exploit-db.com/exploits/43775", "content": "", "creation_timestamp": "2018-01-16T00:00:00.000000Z"}, {"uuid": "70012ef8-ee8d-4d3d-9d6b-d4607e9d88e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-100000", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "f6ed7c72-f4fa-404c-a28c-bcb2fa66cf92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000006", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/exodus.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "78ea087f-8ab7-4911-bb3d-876de9d285b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-100000", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:02.000000Z"}, {"uuid": "0a59a86f-ebf1-44c3-9606-b3ccf6b58ace", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000007", "type": "seen", "source": "https://t.me/ctinow/168337", "content": "https://ift.tt/iy9qex3\nCVE-2018-1000007 | Oracle Fujitsu M10-1 cURL information disclosure (ID 1040274)", "creation_timestamp": "2024-01-15T13:36:46.000000Z"}, {"uuid": "b1fd94ce-a0ca-4bf5-a83d-168d74689cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000001", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/local/glibc_realpath_priv_esc.rb", "content": "", "creation_timestamp": "2018-06-12T21:50:04.000000Z"}, {"uuid": "0a8c5c19-5603-4260-9caa-05c82c63a0ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000007", "type": "seen", "source": "https://t.me/cibsecurity/32625", "content": "\u203c CVE-2021-27023 \u203c\n\nA flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-11-18T18:16:03.000000Z"}, {"uuid": "602ed201-c871-425c-b6b4-77680734002b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000007", "type": "seen", "source": "https://t.me/SecLabNews/1380", "content": "\u0412 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 libcurl \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2018-1000007), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0431\u0440\u0430\u0431\u043e\u0442\u043a\u043e\u0439 libcurl \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043a\u043e\u0432 \u0432 HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u0430\u0445.\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 libcurl \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438", "creation_timestamp": "2018-01-26T08:15:37.000000Z"}, {"uuid": "6e915dbc-e95b-4226-bae4-4acae0a040e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000006", "type": "seen", "source": "https://t.me/itsecalert/86", "content": "\u26a0\ufe0f Signal, Skype, Slack, Rot, Keeper and all other  Electron apps contain a remote code execution vulnerability. Electron released a fix.\n\n* Affected Desktop apps: Signal, Skype, Slack, Rot, Keeper (and many others - see https://yt.gl/electronapps)\n* Electron Apps with default prtocol handler (like myapp:// ) are vulnerable \n* The devlopers should generate an update asap\n\nAdvice: Do not click on any untrusted links. Do not allow webpages to open electron desktop apps.\n\nIf you develop (!) Electron Apps, please update to the newest versions: 1.8.2-beta.4, 1.7.11 and 1.6.16 and send an update to your customers. \nSkype (newest version) and slack (3.0.3) are already fixed.\n\"Full\" list of all Electron Apps: https://yt.gl/electronapps\n\nmacOS and Linux are not vulnerable to this issue.\nCVE-2018-1000006 \n(Severity: \ud83d\udd38 high ) More Info: https://yt.gl/p0xta\n#alert #severityhigh #electron #windows\n\nThanks to @JonasMuc and @CyborgRel from the @itsectalk admin team for reporting and gathering information on this vulernability. Please forward the info to the team responsible for updating desktop apps!", "creation_timestamp": "2018-01-24T21:13:37.000000Z"}, {"uuid": "92b0c0f1-728d-4585-ba1c-b18b76835150", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000006", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/3841", "content": "Electron Windows Protocol Handler MITM/RCE (bypass for CVE-2018-1000006 fix)\nhttps://blog.doyensec.com/2018/05/24/electron-win-protocol-handler-bug-bypass.html", "creation_timestamp": "2018-05-24T18:29:30.000000Z"}, {"uuid": "46d1252e-ff39-4af4-a9ec-c737734a535d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000006", "type": "seen", "source": "https://t.me/SecLabNews/2281", "content": "\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0430 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c Electron \u043e\u0442 GitHub \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2018-1000006, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0435\u0439 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043f\u0440\u043e\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u043d\u0430 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u041e\u0421 Windows. \u0414\u043b\u044f \u044d\u0442\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0437\u0430\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0436\u0435\u0440\u0442\u0432\u0443 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043f\u043e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 URL-\u0430\u0434\u0440\u0435\u0441\u0443.    \n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Electron \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043e \u0444\u0440\u0435\u0439\u043c\u0432\u043e\u0440\u043a\u0435", "creation_timestamp": "2018-05-25T16:27:51.000000Z"}, {"uuid": "051ec3da-bd75-4caf-945c-739ff30420b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2018-1000001", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/3018", "content": "Libc Realpath Buffer Underflow CVE-2018-1000001\nhttps://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/", "creation_timestamp": "2018-01-12T22:00:21.000000Z"}]}