{"vulnerability": "CVE-2019-0604", "sightings": [{"uuid": "871d01ed-60dd-4c96-aecc-4bddee74be84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5cd499b7-5584-4d95-864b-d56f950d210f", "content": "", "creation_timestamp": "2019-05-09T21:21:51.000000Z"}, {"uuid": "44baa8ad-13cc-4165-96de-2ff4371ac633", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5cf0f134-f504-42dd-b11e-9071950d210f", "content": "", "creation_timestamp": "2019-05-31T11:27:02.000000Z"}, {"uuid": "68968dce-a2b5-475e-b7bb-13cb70daa90e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5e177c85-7c2c-498e-8012-0a188e5d62f7", "content": "", "creation_timestamp": "2020-01-09T19:19:06.000000Z"}, {"uuid": "39542524-76df-4c48-a85c-04920adb289f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5e25a007-6b88-42a0-bf0e-1a3e0a3b4631", "content": "", "creation_timestamp": "2020-01-20T13:12:08.000000Z"}, {"uuid": "942047b1-fe89-4424-8f0f-7fcb7c2a181a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5e393489-29e4-46d2-a33b-0bca0a3b4631", "content": "", "creation_timestamp": "2020-02-04T09:16:27.000000Z"}, {"uuid": "54e86663-82ac-4811-a479-0399f1b33f7a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5e3b16f2-38d0-4902-8ce1-72f60a3b4631", "content": "", "creation_timestamp": "2020-02-05T19:28:13.000000Z"}, {"uuid": "023a5bbf-e017-4944-b9d6-c27e4dc0d17b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5c642a56-2440-4af0-8bfd-6e4a0a021402", "content": "", "creation_timestamp": "2019-02-13T14:35:52.000000Z"}, {"uuid": "2731e44f-f38c-4a28-9629-8d2226d23845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/c95a138d-61bb-11e9-833b-0050568e34e1", "content": "", "creation_timestamp": "2021-06-01T13:10:06.000000Z"}, {"uuid": "99b91ab4-5117-4953-ae1d-09329296164c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/b426aa9c-dc22-4a91-8213-f8d513405423", "content": "", "creation_timestamp": "2020-12-09T07:18:56.000000Z"}, {"uuid": "88e26ab6-b246-4422-aa97-b48f1b077751", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5044853f-8569-4631-9821-a3c66c3195fb", "content": "", "creation_timestamp": "2020-10-09T14:11:29.000000Z"}, {"uuid": "802d22f3-1826-40b3-9c06-c0c9383d2725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/ce765372-8442-43e6-b9bb-0743f20f2153", "content": "", "creation_timestamp": "2021-08-11T13:07:37.000000Z"}, {"uuid": "e6917ed6-6cdc-4222-96d2-efb5320a7319", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "c5324134-97ba-45b9-b1ea-cc2986e1e619", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "881a6c75-306e-4735-b9a1-0d31b9735f33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/574d166f-10d7-4fe4-b4ad-44db63e2d6a7", "content": "", "creation_timestamp": "2020-10-09T14:46:33.000000Z"}, {"uuid": "f704a35e-8aa1-4e78-8c6f-c594d2f36278", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/5c568b5c-1417-480d-8a98-0d0815eadd22", "content": "", "creation_timestamp": "2020-10-09T15:09:22.000000Z"}, {"uuid": "3d738d3d-6ed3-400b-bb36-60fb37ab3c50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/63ddead6-4b82-414c-ad8e-c516b950b446", "content": "", "creation_timestamp": "2021-10-25T22:32:43.000000Z"}, {"uuid": "7386ad05-819e-46ac-aeed-906cccb30e4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/9d7b319c-03ed-4e6c-ae8c-08aed3dc72fc", "content": "", "creation_timestamp": "2024-05-22T12:22:12.000000Z"}, {"uuid": "7482bccb-28d4-45fb-83e3-b5b9e5695c85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/dbed03e0-eb16-4f8b-87aa-f080ca118e91", "content": "", "creation_timestamp": "2024-02-27T16:56:26.000000Z"}, {"uuid": "336a8b8a-5315-4617-b4ff-9da2600ecb8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/2d562e90-b9ab-4d73-8722-7d20567675d7", "content": "", "creation_timestamp": "2024-11-14T06:07:08.000000Z"}, {"uuid": "3754be64-e9df-43c2-a17a-03dfd5d277ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970979", "content": "", "creation_timestamp": "2024-12-24T20:22:35.760745Z"}, {"uuid": "5378def9-3cfe-4ed9-97c4-d7f04effad7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:41.000000Z"}, {"uuid": "13088591-12ff-4a3e-9935-c57b542bbe65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-06T13:54:20.000000Z"}, {"uuid": "cf8a02dc-3000-4044-a19e-e2584326de42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "MISP/1413a78e-c0b3-4092-97e7-909fb9773448", "content": "", "creation_timestamp": "2025-08-14T11:44:24.000000Z"}, {"uuid": "efff3fc0-a30c-4cc9-ad5b-14e6e4d6f225", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/d41ef7ed-39b6-4408-a718-2c3bce5fc99e", "content": "", "creation_timestamp": "2025-03-03T08:51:11.190614Z"}, {"uuid": "3c3792c2-cc97-46ef-833c-1caf8f52feba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/ajankohtaista/sharepointin-haavoittuvuutta-kaytetaan-hyvaksi-myos-suomessa", "content": "", "creation_timestamp": "2019-06-06T12:25:45.000000Z"}, {"uuid": "cfffd0d5-fb22-4a79-b2dc-699950a1aab0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/news4hack/351", "content": "Zero Day Initiative \u2014 CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability\nhttps://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-24T17:22:41.000000Z"}, {"uuid": "a6327589-141f-4492-9ed3-6d540fa887be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/itsec_news/1400", "content": "\u200b\u26a1\ufe0f \u0417\u0430 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u043e\u0439 \u043d\u0430 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e \u0410\u043b\u0431\u0430\u043d\u0438\u0438 \u0441\u0442\u043e\u044f\u0442 4 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438.\n\n\ud83d\udcac 15 \u0438\u044e\u043b\u044f 2022 \u0433\u043e\u0434\u0430 4 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u043f\u0440\u043e\u0432\u0435\u043b\u0438 \u0440\u0430\u0437\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u0443\u044e \u0430\u0442\u0430\u043a\u0443 \u043d\u0430 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043e\u043d\u043b\u0430\u0439\u043d-\u0441\u0435\u0440\u0432\u0438\u0441\u044b \u0438 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u044b \u0410\u043b\u0431\u0430\u043d\u0438\u0438, \u0432\u044b\u0432\u0435\u0434\u044f \u0438\u0445 \u0438\u0437 \u0441\u0442\u0440\u043e\u044f.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Microsoft, \u0430\u0442\u0430\u043a\u0430 \u0441\u043e\u0441\u0442\u043e\u044f\u043b\u0430 \u0438\u0437 4 \u044d\u0442\u0430\u043f\u043e\u0432, \u0437\u0430 \u043a\u0430\u0436\u0434\u044b\u0439 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0442\u0432\u0435\u0447\u0430\u043b\u0438 \u0440\u0430\u0437\u043d\u044b\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438:\n\nDEV-0861 \u2014 \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0438 \u0434\u0430\u043d\u043d\u044b\u043c. \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u044d\u0442\u0430 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 EUROPIUM \u2013 \u0431\u0430\u043d\u0434\u043e\u0439 \u0445\u0430\u043a\u0435\u0440\u043e\u0432, \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0449\u0435\u0439 \u043d\u0430 \u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0438 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0418\u0440\u0430\u043d\u0430 (MOIS). \u0412 \u043e\u0442\u0447\u0435\u0442\u0435 Microsoft \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0441\u044f, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043c\u043e\u0433\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0430\u043b\u0431\u0430\u043d\u0441\u043a\u0438\u043c \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f CVE-2019-0604 \u2014 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 SharePoint, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0432 \u043c\u0430\u0440\u0442\u0435 2019 \u0433\u043e\u0434\u0430. \u041a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434, \u0432\u043d\u0435\u0434\u0440\u044f\u044e\u0449\u0438\u0439 \u0432\u0435\u0431-\u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0435\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0444\u0430\u0439\u043b\u043e\u0432, \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0445 \u043a\u043e\u043c\u0430\u043d\u0434 \u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c \u0436\u0435\u0440\u0442\u0432\u044b \u0432 \u043c\u0430\u0435 2021 \u0433\u043e\u0434\u0430, \u0430 \u0432 \u043f\u0435\u0440\u0438\u043e\u0434 \u0441 \u043e\u043a\u0442\u044f\u0431\u0440\u044f 2021 \u0433\u043e\u0434\u0430 \u043f\u043e \u044f\u043d\u0432\u0430\u0440\u044c 2022 \u0433\u043e\u0434\u0430 \u043a\u0440\u0430\u043b\u0438 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u043f\u0438\u0441\u044c\u043c\u0430 \u0447\u0438\u043d\u043e\u0432\u043d\u0438\u043a\u043e\u0432 \u0438\u0437 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u043e\u0439 \u0441\u0435\u0442\u0438.\n\nDEV-0166 \u2014 \u043f\u043e\u0445\u0438\u0442\u0438\u043b\u0430 \u043d\u0443\u0436\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435;\n\nDEV-0133 \u2014 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0430 IT-\u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0436\u0435\u0440\u0442\u0432\u044b;\n\nDEV-0842 \u2014 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u043b\u0430 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u041f\u041e \u0438 \u0432\u0430\u0439\u043f\u0435\u0440. \u041d\u0430 \u044d\u0442\u043e\u043c \u044d\u0442\u0430\u043f\u0435 \u0432\u0441\u0435 \u043f\u0440\u043e\u0448\u043b\u043e \u0442\u0430\u043a \u0436\u0435, \u043a\u0430\u043a \u0438 \u0432 \u0445\u043e\u0434\u0435 \u0434\u0440\u0443\u0433\u0438\u0445 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a, \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u043c\u044b\u0445 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u043c \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430\u043c: \u0441\u043d\u0430\u0447\u0430\u043b\u0430 \u0431\u044b\u043b\u043e \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u043e \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0435 \u041f\u041e, \u0430 \u043f\u043e\u0442\u043e\u043c \u0432\u0430\u0439\u043f\u0435\u0440, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0439 \u043a\u043b\u044e\u0447 \u0438 \u0434\u0440\u0430\u0439\u0432\u0435\u0440 EldoS RawDisk, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u044b\u043b \u0440\u0430\u043d\u0435\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d \u0432 \u0434\u0440\u0443\u0433\u043e\u0439 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0435 2019 \u0433\u043e\u0434\u0430. \u0412\u0430\u0439\u043f\u0435\u0440, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 DEV-0842 \u0431\u044b\u043b \u043f\u043e\u0434\u043f\u0438\u0441\u0430\u043d \u043d\u0435\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c \u0446\u0438\u0444\u0440\u043e\u0432\u044b\u043c \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u043c \u043e\u0442 Kuwait Telecommunications Company KSC.\n\n\u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f, \u0432\u0440\u0435\u043c\u044f \u0438 \u0432\u044b\u0431\u043e\u0440 \u0446\u0435\u043b\u0435\u0439, \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0441\u0434\u0435\u043b\u0430\u043b\u0438 \u0432\u044b\u0432\u043e\u0434, \u0447\u0442\u043e \u0432\u0441\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u043f\u043e\u0434 \u044d\u0433\u0438\u0434\u043e\u0439 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430, \u043a\u0430\u043a \u0431\u044b \u043e\u043d\u043e \u043d\u0435 \u043e\u0442\u043a\u0440\u0435\u0449\u0438\u0432\u0430\u043b\u043e\u0441\u044c \u043e\u0442 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0435\u0434\u0448\u0435\u0433\u043e. Microsoft \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0430, \u0447\u0442\u043e \u0442\u0430\u043a\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u043c\u0435\u0441\u0442\u044c\u044e \u0437\u0430 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0443, \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0418\u0437\u0440\u0430\u0438\u043b\u0435\u043c \u0438 \u041e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u043c\u043e\u0434\u0436\u0430\u0445\u0435\u0434\u043e\u0432 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u043d\u0430\u0440\u043e\u0434\u0430 \u2014 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u043e\u0439, \u0441\u0442\u0440\u0435\u043c\u044f\u0449\u0435\u0439\u0441\u044f \u0441\u0432\u0435\u0440\u0433\u043d\u0443\u0442\u044c \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0435 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e.\n\n#\u0410\u043b\u0431\u0430\u043d\u0438\u044f #\u0425\u0430\u043a\u0435\u0440\u044b #\u041a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\n\n\ud83d\udd14 CryptoYozh", "creation_timestamp": "2022-09-11T12:19:26.000000Z"}, {"uuid": "d9fc3b23-2688-41c9-85e7-ce1655299342", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/antichat/4119", "content": "CVE-2019-0604: DETAILS OF A MICROSOFT SHAREPOINT RCE VULNERABILITY\nhttps://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-23T18:43:00.000000Z"}, {"uuid": "d2a4ff9e-6d25-46cb-a5df-d7890b0ea793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/critical_bug/272", "content": "https://hackerone.com/reports/534630\n\n\u042d\u0442\u043e\u0442 \u0440\u0435\u043f\u043e\u0440\u0442 \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442 \u043e \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2019-0604 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Microsoft SharePoint, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438\u043b\u0438 \u0432\u0432\u043e\u0434\u0438\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440. \u0412 \u0440\u0435\u043f\u043e\u0440\u0442\u0435 \u043e\u043f\u0438\u0441\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0448\u0430\u0433\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438 \u0434\u0430\u0435\u0442\u0441\u044f \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u044f \u043f\u043e \u0435\u0435 \u0432\u043e\u0441\u043f\u0440\u043e\u0438\u0437\u0432\u0435\u0434\u0435\u043d\u0438\u044e. \u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0432 \u0440\u0435\u043f\u043e\u0440\u0442\u0435 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043c\u043e\u0447\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0441\u0438\u0441\u0442\u0435\u043c, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 Microsoft SharePoint, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u044f\u0442\u044c \u043c\u0435\u0440\u044b \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u0412\u043b\u0438\u044f\u043d\u0438\u0435 \u044d\u0442\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0446\u0435\u043d\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a \u0432\u044b\u0441\u043e\u043a\u043e\u0435, \u0442\u0430\u043a \u043a\u0430\u043a \u044d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u0432 \u0441\u0435\u0442\u0438.", "creation_timestamp": "2023-04-08T10:55:40.000000Z"}, {"uuid": "8472fc63-98fc-4782-ae32-3521e19e3618", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/28267577-9f07-41a2-b7a4-c0a44f4a84c2", "content": "", "creation_timestamp": "2026-02-02T12:28:57.114298Z"}, {"uuid": "c27136d0-a5ce-4734-95b3-f8b07a7751b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/antichat/4821", "content": "CVE-2019-0604 | Microsoft SharePoint Remote Code Execution Vulnerability\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604\nhttps://pastebin.com/raw/bUFPhucZ", "creation_timestamp": "2019-05-09T11:11:20.000000Z"}, {"uuid": "30e436d7-13cf-41f6-a9d8-620efd3b2560", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/antichat/4157", "content": "CVE-2019-0604: DETAILS OF A MICROSOFT SHAREPOINT RCE VULNERABILITY\nhttps://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-26T09:52:24.000000Z"}, {"uuid": "0e756324-534a-4a74-b901-4ed18dd566ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7705", "content": "Desharialize: Easy mode to Exploit CVE-2019-0604 (Sharepoint XML Deserialization Unauthenticated RCE)\nhttps://github.com/Voulnet/desharialize", "creation_timestamp": "2020-01-22T17:32:47.000000Z"}, {"uuid": "5be22bd5-3403-462d-96f1-514624d50aa4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/antichat/4167", "content": "CVE-2019-0604: DETAILS OF A MICROSOFT SHAREPOINT RCE VULNERABILITY\nhttps://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-26T16:56:54.000000Z"}, {"uuid": "a2a5622e-4baa-46f8-96b1-0928f2c8960f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/CyberGovIL/631", "content": "\u05e2\u05d3\u05db\u05d5\u05df: \u05d6\u05d9\u05d4\u05d5\u05d9 \u05e0\u05e1\u05d9\u05d5\u05e0\u05d5\u05ea \u05d7\u05d5\u05d6\u05e8\u05d9\u05dd \u05dc\u05e0\u05d9\u05e6\u05d5\u05dc \u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2019-0604 \u05d1\u05de\u05de\u05e9\u05e7\u05d9 SharePoint\n\n\u05d1\u05d7\u05d5\u05d3\u05e9 \u05d0\u05e4\u05e8\u05d9\u05dc \u05e4\u05e8\u05e1\u05dd \u05d4-CERT \u05d4\u05dc\u05d0\u05d5\u05de\u05d9 \u05d4\u05ea\u05e8\u05e2\u05d4 \u05d0\u05d5\u05d3\u05d5\u05ea \u05e0\u05e1\u05d9\u05d5\u05e0\u05d5\u05ea \u05e0\u05d9\u05e6\u05d5\u05dc \u05e9\u05dc \u05d7\u05d5\u05dc\u05e9\u05d4 CVE-2019-0604 \u05d1\u05d0\u05de\u05e6\u05e2\u05d5\u05ea \u05db\u05dc\u05d9 \u05d1\u05e9\u05dd ChinaChopper \u05d0\u05dc \u05de\u05d5\u05dc \u05de\u05de\u05e9\u05e7\u05d9 SharePoint \u05d4\u05d7\u05e9\u05d5\u05e4\u05d9\u05dd \u05dc\u05d0\u05d9\u05e0\u05d8\u05e8\u05e0\u05d8, \u05dc\u05e9\u05dd \u05d4\u05e2\u05dc\u05d0\u05ea Webshell.\n\n\u05dc\u05d0\u05d7\u05e8\u05d5\u05e0\u05d4 \u05d6\u05d5\u05d4\u05d5 \u05e0\u05e1\u05d9\u05d5\u05e0\u05d5\u05ea \u05d7\u05d5\u05d6\u05e8\u05d9\u05dd \u05dc\u05e0\u05d9\u05e6\u05d5\u05dc \u05d7\u05d5\u05dc\u05e9\u05d4 \u05d6\u05d5, \u05d5\u05e2\u05dc \u05db\u05df \u05d4\u05d4\u05ea\u05e8\u05e2\u05d4 \u05de\u05d5\u05e4\u05e6\u05ea \u05d1\u05e9\u05e0\u05d9\u05ea \u05d5\u05e2\u05de\u05d4 \u05d4\u05d4\u05de\u05dc\u05e6\u05d4 \u05dc\u05d4\u05d8\u05de\u05d9\u05e2 \u05d0\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05de\u05d5\u05e6\u05e8 SharePoint \u05e9\u05e4\u05d5\u05e8\u05e1\u05dd \u05e2\u05dc-\u05d9\u05d3\u05d9 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8.", "creation_timestamp": "2019-12-12T18:56:43.000000Z"}, {"uuid": "998c8859-bd2a-4bea-bcb8-55a45ed1b828", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/ctinow/11279", "content": "Microsoft SharePoint Bug Exploited in the Wild A number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say. https://www.darkreading.com/endpoint/microsoft-sharepoint-bug-exploited-in-the-wild/d/d-id/1334683?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple", "creation_timestamp": "2019-05-10T19:57:27.000000Z"}, {"uuid": "c1059f88-2d2b-447f-b2aa-49fcf5acc8fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/rootdr_research/167", "content": "\u0633\u0644\u0627\u0645 \u0628\u0647 \u0647\u0645\u0647 \u0639\u0632\u06cc\u0632\u0627\u0646 \u062f\u0631 \u0647\u0641\u062a\u0647 \u0686\u0647\u0644 \u0648 \u062f\u0648\u0645 \u0627\u0632 \u0628\u0631\u0646\u0627\u0645\u0647 GO-TO CVE \u0628\u0647 \u0627\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc RCE \u0631\u0648\u06cc \u06cc\u06a9\u06cc \u0645\u062d\u0635\u0648\u0644\u0627\u062a \u0645\u0639\u0631\u0648\u0641 \u0628\u0647 \u0646\u0627\u0645 SharePoint \u067e\u0631\u062f\u0627\u062e\u062a\u0647 \u0627\u06cc\u0645. \n\n\ud83d\udcf1 Week: 42\n \ud83d\udd0d CVE: CVE-2019-0604\n \ud83d\udcbb Type: \ud83c\udff9Remote Code Execution\n \ud83d\udee0 CMS: SharePoint", "creation_timestamp": "2025-03-12T00:01:02.000000Z"}, {"uuid": "419fcec1-0f29-4589-b895-2873da369b16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/ctinow/19426", "content": "RT @campuscodi: Scoop: FBI says nation-state actors have breached two US municipalities\n\n* Hackers used the CVE-2019-0604 SharePoint vulnerability\n* Cities were not named\n* Chinese APTs have historically abused this bug last year\n\nhttps://t.co/NL2FW9nsSL https://t.co/V4S1s6QHK4 http://twitter.com/BleepinComputer/status/1217929621846609920", "creation_timestamp": "2020-01-16T23:20:20.000000Z"}, {"uuid": "69bf5c7a-20ef-49da-a099-4180dd406f97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/ctinow/20056", "content": "SharePoint Bug Proves Popular Weapon for Nation-State Attacks Thousands of servers could be exposed to SharePoint vulnerability CVE-2019-0604, recently used in cyberattacks against Middle East government targets. https://www.darkreading.com/cloud/sharepoint-bug-proves-popular-weapon-for-nation-state-attacks/d/d-id/1336967?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple", "creation_timestamp": "2020-02-05T00:40:18.000000Z"}, {"uuid": "19b89a9b-2321-4978-b77d-fcb6fc78913c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://t.me/HackerOne/2403", "content": "https://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-24T15:21:55.000000Z"}, {"uuid": "f7b16ea3-87fc-4eff-b25b-c1277ed9f74c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/true_secator/3405", "content": "\u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432 \u0421\u0428\u0410 \u0432 \u043f\u044f\u0442\u043d\u0438\u0446\u0443 \u043e\u0431\u044a\u044f\u0432\u0438\u043b\u043e \u043e \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u0445 \u043f\u0440\u043e\u0442\u0438\u0432 \u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u0430 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0438 \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0418\u0440\u0430\u043d\u0430 (MOIS) \u0438  \u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430 \u042d\u0441\u043c\u0430\u0438\u043b\u0430 \u0425\u0430\u0442\u0438\u0431\u0430.\n\n\u041f\u043e\u0432\u043e\u0434\u043e\u043c \u043f\u043e\u0441\u043b\u0443\u0436\u0438\u043b\u0438 \u0432\u044b\u0432\u043e\u0434\u044b Microsoft, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u043e\u0441\u0442\u043e\u044f\u0432\u0448\u0435\u0439\u0441\u044f 15 \u0438\u044e\u043b\u044f 2022 \u0433\u043e\u0434\u0430 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043e\u043d\u043b\u0430\u0439\u043d-\u0441\u0435\u0440\u0432\u0438\u0441\u044b \u0438 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0432\u0435\u0431-\u0441\u0430\u0439\u0442\u044b \u0410\u043b\u0431\u0430\u043d\u0438\u0438 \u0437\u0430\u044f\u0432\u0438\u043b\u0438 \u043e \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u043a \u043a\u0438\u0431\u0435\u0440\u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0443 \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0445 \u0410\u0420\u0422.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Microsoft, \u0430\u0442\u0430\u043a\u0430 \u0441\u043e\u0441\u0442\u043e\u044f\u043b\u0430 \u0438\u0437 \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u044d\u0442\u0430\u043f\u043e\u0432, \u0437\u0430 \u043a\u0430\u0436\u0434\u044b\u0439 \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0442\u0432\u0435\u0447\u0430\u043b\u0438 \u0440\u0430\u0437\u043d\u044b\u0435 \u0433\u0440\u0443\u043f\u043f\u044b. \u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f, \u0432\u0440\u0435\u043c\u044f \u0438 \u0432\u044b\u0431\u043e\u0440 \u0446\u0435\u043b\u0435\u0439, \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0441\u0434\u0435\u043b\u0430\u043b\u0438 \u0432\u044b\u0432\u043e\u0434, \u0447\u0442\u043e \u0432\u0441\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0438 \u043f\u043e\u0434 \u044d\u0433\u0438\u0434\u043e\u0439 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430.\n\n\u0422\u0430\u043a, DEV-0133 (\u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u043a\u0430\u043a\u00a0Lyceum\u00a0\u0438\u043b\u0438 Siamese Kitten) \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0436\u0435\u0440\u0442\u0432\u044b, DEV-0842 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u043b \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0443-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c \u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0434\u043b\u044f \u043e\u0447\u0438\u0441\u0442\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445. \u0412 \u0442\u043e \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a DEV-0861 \u043f\u043e\u043b\u0443\u0447\u0438\u043b \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0438 \u0443\u0434\u0430\u043b\u0438\u043b \u0434\u0430\u043d\u043d\u044b\u0435, \u0430 DEV-0166 (\u0430\u043a\u0430\u00a0IntrudingDivisor) \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u043e\u0432\u0430\u043b \u0434\u0430\u043d\u043d\u044b\u0435.\n\n\u0421\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u0430\u043b\u0431\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0435\u043b \u0435\u0449\u0435 \u0432 \u043c\u0430\u0435 2021 \u0433\u043e\u0434\u0430 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u043c\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 SharePoint (CVE-2019-0604) \u0441 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0439 \u0443\u0442\u0435\u0447\u043a\u043e\u0439 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u044b \u0438\u0437 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0432 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 2021 \u0438 \u044f\u043d\u0432\u0430\u0440\u0435 2022 \u0433.\n\n\u0420\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0443\u0447\u0430\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u0432 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438 \u043a\u0440\u0430\u0436\u0435 \u0434\u0430\u043d\u043d\u044b\u0445 \u0431\u044b\u043b\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 Europium (\u0430\u043a\u0430 APT34, Cobalt Gypsy, Helix Kitten \u0438\u043b\u0438 OilRig).\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u043f\u0430\u0440\u0430\u043b\u043b\u0435\u043b\u044c\u043d\u0430\u044f \u0432\u043e\u043b\u043d\u0430 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0430\u0441\u044c \u0432 \u043f\u0435\u0440\u0438\u043e\u0434 \u0441 \u043d\u043e\u044f\u0431\u0440\u044f 2021 \u0433\u043e\u0434\u0430 \u043f\u043e \u043c\u0430\u0439 2022 \u0433\u043e\u0434\u0430, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c\u00a0Jason.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u044f \u043f\u043e\u0432\u043b\u0435\u043a\u043b\u0438 \u0437\u0430 \u0441\u043e\u0431\u043e\u0439 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 ransomware \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c ROADSWEEP \u0438 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u043b\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445, \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u043c\u043e\u0433\u043e ZeroCleare.\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0437\u0430 \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0435 \u0438 \u043a\u0440\u0430\u0436\u0443 \u0434\u0430\u043d\u043d\u044b\u0445, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0440\u0430\u043d\u0435\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0438\u0435\u0441\u044f \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u043c\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u041f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u043a \u044d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0430\u0440\u0446\u0438\u0438 \u0430\u043a\u0442\u043e\u0440\u044b \u0431\u044b\u043b\u0438 \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u044b \u0438 \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u0441\u0435\u043a\u0442\u043e\u0440\u044b \u0438 \u0441\u0442\u0440\u0430\u043d\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0442 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0430\u043c \u0418\u0440\u0430\u043d\u0430.\n\nMicrosoft \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0438 \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043b\u0438 \u043f\u043e\u0441\u043b\u0435 \u0441\u0435\u0440\u0438\u0438 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u043d\u0430 \u0418\u0440\u0430\u043d, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u043e\u0439 \u0445\u0430\u043a\u0442\u0438\u0432\u0438\u0441\u0442\u043e\u0432, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441 \u00ab\u041c\u0443\u0434\u0436\u0430\u0445\u0435\u0434\u0438\u043d-\u044d-\u0425\u0430\u043b\u043a\u00bb (MEK), \u0432 \u043f\u0435\u0440\u0432\u0443\u044e \u043d\u0435\u0434\u0435\u043b\u044e \u0438\u044e\u043b\u044f 2022 \u0433\u043e\u0434\u0430.\n\nMEK, \u0442\u0430\u043a\u0436\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0430\u044f \u043a\u0430\u043a \u041d\u0430\u0440\u043e\u0434\u043d\u0430\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f \u043c\u043e\u0434\u0436\u0430\u0445\u0435\u0434\u043e\u0432 \u0418\u0440\u0430\u043d\u0430 (PMOI), \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0438\u0440\u0430\u043d\u0441\u043a\u0443\u044e \u0434\u0438\u0441\u0441\u0438\u0434\u0435\u043d\u0442\u0441\u043a\u0443\u044e \u0433\u0440\u0443\u043f\u043f\u0443, \u0431\u0430\u0437\u0438\u0440\u0443\u044e\u0449\u0443\u044e\u0441\u044f \u0432 \u0410\u043b\u0431\u0430\u043d\u0438\u0438.\n\n\u041c\u0438\u043d\u0438\u0441\u0442\u0435\u0440\u0441\u0442\u0432\u043e \u0438\u043d\u043e\u0441\u0442\u0440\u0430\u043d\u043d\u044b\u0445 \u0434\u0435\u043b \u0418\u0440\u0430\u043d\u0430\u00a0\u043e\u0442\u0432\u0435\u0440\u0433\u043b\u043e \u043e\u0431\u0432\u0438\u043d\u0435\u043d\u0438\u044f\u00a0\u0432 \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u043a \u0430\u0442\u0430\u043a\u0430\u043c \u043d\u0430 \u0410\u043b\u0431\u0430\u043d\u0438\u044e, \u043d\u0430\u0437\u0432\u0430\u0432 \u0438\u0445 \u0431\u0435\u0437\u043e\u0441\u043d\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0441\u0443\u0434\u0438\u043b\u043e \u0441\u0430\u043d\u043a\u0446\u0438\u0438, \u043e\u0431\u0432\u0438\u043d\u0438\u0432\u00a0\u0421\u0428\u0410 \u0432 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0435 \u00ab\u0442\u0435\u0440\u0440\u043e\u0440\u0438\u0441\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0441\u0435\u043a\u0442\u044b\u00bb \u041c\u0415\u041a.\n\n\u0418 \u043d\u0435 \u0437\u0440\u044f, \u0432\u0435\u0434\u044c \u0430\u043d\u0433\u0430\u0436\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0430\u044f \u0430\u0442\u0440\u0438\u0431\u0443\u0446\u0438\u044f Microsoft, \u043a\u0430\u043a \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d\u0430 \u0441\u043a\u043e\u0440\u0435\u0435 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u043e\u043c \u0441 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u0430\u043c\u0438 \u0438 \u043a\u043e\u043d\u0432\u0435\u0439\u0435\u0440\u043e\u043c \u043f\u043e\u0434\u0440\u044f\u0434\u043e\u0432 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u041c\u0438\u043d\u043e\u0431\u043e\u0440\u043e\u043d\u044b \u0421\u0428\u0410, \u043d\u0435\u0436\u0435\u043b\u0438 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u043e\u043c \u043e\u0431\u044a\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u0439 \u0438 \u0433\u043b\u0443\u0431\u043e\u043a\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430.", "creation_timestamp": "2022-09-12T20:37:34.000000Z"}, {"uuid": "a5e6068f-fe88-4812-8a6b-3f15433b9716", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/true_secator/1659", "content": "Pondurance \u0441\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u0441 Trend Micro \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043d\u043e\u0432\u0438\u043d\u043a\u0435 ransomware \u043f\u043e\u0434 \u0443\u0441\u043b\u043e\u0432\u043d\u044b\u043c \u043d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c Hello (WickrMe), \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0435\u0439 \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043f\u043e\u0434\u00a0CVE-2019-0604 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438\u00a0\u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft\u00a0SharePoint. \u041f\u043e\u0445\u043e\u0436\u0435, \u0447\u0442\u043e SharePoint \u0442\u0435\u043f\u0435\u0440\u044c \u043f\u0440\u0438\u0441\u043e\u0435\u0434\u0438\u043d\u0438\u043b\u0438\u0441\u044c \u043a \u0441\u043f\u0438\u0441\u043a\u0443 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0434\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0441\u0435\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0448\u043b\u044e\u0437\u044b Citrix, \u0431\u0430\u043b\u0430\u043d\u0441\u0438\u0440\u043e\u0432\u0449\u0438\u043a\u0438 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 F5 BIG-IP, \u043f\u043e\u0447\u0442\u043e\u0432\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Microsoft Exchange, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u0435\u0442\u0438 VPN Pulse Secure, Fortinet \u0438 Palo Alto Network.\n\n\u041f\u0435\u0440\u0432\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438 \u0431\u0430\u043d\u0434\u044b Hello (WickrMe) \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0435\u0449\u0435 \u0432 \u043a\u043e\u043d\u0446\u0435 2020 \u0433\u043e\u0434\u0430. \u0422\u043e\u0433\u0434\u0430 \u0433\u0440\u0443\u043f\u043f\u0430 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0441\u0432\u043e\u0439 \u043d\u0435\u0439\u043c\u0438\u043d\u0433 \u0438\u0437-\u0437\u0430 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u044b\u0445 \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u043e\u0432 Wickr \u0434\u043b\u044f \u043e\u0431\u043c\u0435\u043d\u0430 \u043c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u043c\u0438, \u0447\u0442\u043e\u0431\u044b \u043a\u043e\u043d\u0442\u0430\u043a\u0442\u043e\u0432 \u0441 \u0436\u0435\u0440\u0442\u0432\u0430\u043c\u0438 \u0438 \u043e\u0431\u0441\u0443\u0436\u0434\u0435\u043d\u0438\u044f \u0432\u044b\u043a\u0443\u043f\u0430.\n\n\u041e\u0448\u0438\u0431\u043a\u0430, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 Microsoft \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u043b\u0430 \u0435\u0449\u0435 \u0433\u043e\u0434 \u043d\u0430\u0437\u0430\u0434, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c SharePoint \u0447\u0435\u0440\u0435\u0437 \u0432\u0435\u0431-\u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0443, \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0431\u044d\u043a\u0434\u043e\u0440 (Cobalt Strike) \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u0432 PowerShell, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0438\u0442\u043e\u0433\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044e\u0442 \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 - ransomware Hello. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b \u0434\u043b\u044f \u044d\u0442\u043e\u0439 \u043e\u0448\u0438\u0431\u043a\u0438 \u0441\u0442\u0430\u043b\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0410\u0420\u042227 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a \u0435\u0449\u0435 \u0432 \u043c\u0430\u0435 2019, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u0438 \u043f\u043e\u043f\u0430\u043b\u0438 \u0432 \u0441\u0435\u0442\u044c.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e, \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Bad Packets, \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 SharePoint \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u043d\u0435 \u0444\u0438\u043a\u0441\u0438\u0440\u0443\u044e\u0442\u0441\u044f, \u0432\u043f\u043e\u043b\u043d\u0435 \u043e\u0436\u0438\u0434\u0430\u0435\u043c\u044b \u0430\u0442\u0430\u043a\u0438 Hello (WickrMe) \u043f\u0443\u0442\u0435\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u0436\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0431\u044d\u043a\u0434\u043e\u0440\u043e\u0432 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 SharePoint. \u0415\u0441\u043b\u0438 \u0432\u044b \u0435\u0449\u0435 \u043d\u0435 \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u043b\u0438 \u043e\u0448\u0438\u0431\u043a\u0438 SharePoint - \u0437\u043d\u0430\u0447\u0438\u0442 \u0443 \u0432\u0430\u0441 \u0435\u0441\u0442\u044c \u0432\u0440\u0435\u043c\u044f, \u0447\u0442\u043e\u0431\u044b \u043e\u0437\u0430\u0431\u043e\u0442\u0438\u0442\u044c\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439  . \u041d\u0443 \u0430, \u043c\u044b \u0436\u0434\u0451\u043c \u043a\u043e\u0433\u0434\u0430 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u044b  Hello (WickrMe) \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u00ab\u0431\u0440\u043e\u043a\u0435\u0440\u0430 \u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430\u00bb \u0434\u043b\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u0432 \u0430\u0442\u0430\u043a.", "creation_timestamp": "2021-04-28T14:40:42.000000Z"}, {"uuid": "61313bff-93d6-4d52-847b-beaf41155448", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/information_security_channel/27385", "content": "Microsoft SharePoint Bug Exploited in the Wild\nhttps://www.darkreading.com/endpoint/microsoft-sharepoint-bug-exploited-in-the-wild/d/d-id/1334683?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\n\nA number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say.", "creation_timestamp": "2019-05-10T20:05:34.000000Z"}, {"uuid": "faf0e909-5068-42ec-b54b-d6f1b0504472", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/information_security_channel/27392", "content": "Hackers Actively Targeting Microsoft SharePoint Servers Via CVE-2019-0604 Exploit\nhttps://gbhackers.com/hackers-microsoft-sharepoint-servers/", "creation_timestamp": "2019-05-11T07:42:02.000000Z"}, {"uuid": "19601ceb-8aea-4a50-ada4-055fa520f566", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/information_security_channel/27394", "content": "Hackers are actively exploiting a recently patched critical remote code execution vulnerability in SharePoint Server versions to inject China Chopper web shell which allows hackers to inject and issue various commands. Canadian and Saudi Arabian cybersecurity raised awareness about the ongoing attack targeting the outdated systems. The vulnerability affects all the versions of the versions [\u2026]\nThe post Hackers Actively Targeting Microsoft SharePoint Servers Via CVE-2019-0604 Exploit (https://gbhackers.com/hackers-microsoft-sharepoint-servers/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2019-05-11T07:42:03.000000Z"}, {"uuid": "c06fec5e-7965-4946-ac4b-97f188adc784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/information_security_channel/34682", "content": "SharePoint Bug Proves Popular Weapon for Nation-State Attacks\nhttps://www.darkreading.com/cloud/sharepoint-bug-proves-popular-weapon-for-nation-state-attacks/d/d-id/1336967?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\n\nThousands of servers could be exposed to SharePoint vulnerability CVE-2019-0604, recently used in cyberattacks against Middle East government targets.", "creation_timestamp": "2020-02-05T00:26:28.000000Z"}, {"uuid": "a89ae3df-ce7e-490b-a57b-6f24ba49c14d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/SecLabNews/4886", "content": "\u0418\u0411-\u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0438\u0437 \u041a\u0430\u043d\u0430\u0434\u044b \u0438 \u0421\u0430\u0443\u0434\u043e\u0432\u0441\u043a\u043e\u0439 \u0410\u0440\u0430\u0432\u0438\u0438 \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0438 \u043e \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Microsoft SharePoint, \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0449\u0438\u0445\u0441\u044f \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 \u0434\u0432\u0443\u0445 \u043d\u0435\u0434\u0435\u043b\u044c. \u0412 \u0445\u043e\u0434\u0435 \u0430\u0442\u0430\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2019-0604.    \n\u0421\u0435\u0440\u0432\u0435\u0440\u044b Microsoft SharePoint \u043d\u0430\u0445\u043e\u0434\u044f\u0442\u0441\u044f \u043f\u043e\u0434 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u044b\u043c\u0438 \u0430\u0442\u0430\u043a\u0430\u043c\u0438", "creation_timestamp": "2019-05-13T08:23:50.000000Z"}, {"uuid": "d575617b-5dc8-49a3-95b9-16f109f7ab16", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://t.me/canyoupwnme/5306", "content": "CVE-2019-0604: DETAILS OF A MICROSOFT SHAREPOINT RCE VULNERABILITY\nhttps://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-23T19:42:30.000000Z"}, {"uuid": "61de4f83-29b1-47b0-a0d5-dd5f2329c765", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://t.me/canyoupwnme/5314", "content": "CVE-2019-0604: DETAILS OF A MICROSOFT SHAREPOINT RCE VULNERABILITY\nhttps://www.thezdi.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2019-03-26T10:30:22.000000Z"}, {"uuid": "303219f8-fdd3-4872-995e-b0b3b37363de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/5503", "content": "CVE-2019-0604 | Microsoft SharePoint Remote Code Execution Vulnerability\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-0604\nhttps://pastebin.com/raw/bUFPhucZ", "creation_timestamp": "2019-05-09T13:09:40.000000Z"}, {"uuid": "3e1eec79-1cd7-43df-a843-ea3c819f8bb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/xakep_ru/10702", "content": "\u0412\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Microsoft SharePoint\n\n\u0421\u0435\u0440\u0432\u0435\u0440\u044b Microsoft SharePoint \u043f\u043e\u043f\u043e\u043b\u043d\u0438\u043b\u0438 \u0434\u043b\u0438\u043d\u043d\u044b\u0439 \u0441\u043f\u0438\u0441\u043e\u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043a\u0430\u043a \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0441\u0435\u0442\u0438.\n\nhttps://xakep.ru/2021/04/28/cve-2019-0604/", "creation_timestamp": "2021-04-28T16:10:15.000000Z"}, {"uuid": "f9d3ac39-e99c-483c-a56f-47f0192f94e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://t.me/Russian_OSINT/875", "content": "\u200b\u200b\ud83d\ude94 \u0424\u0411\u0420 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043f\u0438\u0441\u043e\u043a 30 \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 2 \u0433\u043e\u0434\u0430\n\nCVE-2021-26855: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26857: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26858: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-27065: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-22893: It is an Improper Authentication vulnerability that is marked as critical\nCVE-2021-22894: It is a buffer overflow vulnerability that enables an attacker to execute arbitrary code\nCVE-2021-22899: It is a command injection vulnerability that enables an attacker to execute remote code\nCVE-2021-22900: It is an Improper Control of Generation of Code vulnerability\nCVE-2021-27101: It is an Improper Neutralization of Special Elements used in an SQL Command\nCVE-2021-27102: It is an Improper Neutralization of Special Elements used in an OS Command\nCVE-2021-27103: It is a Server-Side Request Forgery (SSRF) vulnerability\nCVE-2021-27104: It is an Improper Neutralization of Special Elements used in an OS Command vulnerability\nCVE-2021-21985: It is an Improper Input Validation vulnerability\nCVE-2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019)\nCVE-2020-12812: It is an Improper Authentication vulnerability\nCVE-2019-5591: It is a Missing Authentication for Critical Function vulnerability\nCVE-2019-19781: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2019-11510: It is an Improper Limitation of a Pathname to a Restricted Directory\nCVE 2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2020-5902: It is an Inclusion of Functionality from Untrusted Control Sphere and Improper Limitation of a Pathname to a Restricted Directory vulnerability \nCVE 2020-15505: It is an Insufficient Information vulnerability\nCVE-2017-11882: It is a Microsoft Office Memory Corruption vulnerability that enables an attacker to execute arbitrary code.\nCVE-2019-11580: It is an Insufficient Information vulnerability\nCVE-2018-7600: It is an Improper Input Validation vulnerability\nCVE 2019-18935: It is a Deserialization of Untrusted Data vulnerability\nCVE-2019-0604: It is a Microsoft SharePoint Remote Code Execution Vulnerability\nCVE-2020-0787: It is a Windows Background Intelligent Transfer Service Elevation of Privilege vulnerability\nCVE-2020-1472: It is a Netlogon Elevation of Privilege vulnerability \nCVE-2020-15505: It is an Insufficient Information vulnerability\nCVE-2020-0688: It is a Use of Hard-coded Credentials vulnerability", "creation_timestamp": "2021-07-29T17:59:02.000000Z"}, {"uuid": "045bd85b-278d-489c-b364-b714133d393d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/thebugbountyhunter/3507", "content": "Store Development Resource Center was vulnerable to a Remote Code Execution - Unauthenticated Remote Command Injection (CVE-2019-0604)\nhttps://hackerone.com/reports/536134", "creation_timestamp": "2019-12-13T02:34:10.000000Z"}, {"uuid": "36c2afb5-eab1-4592-ac76-8b2150cdf793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/3704", "content": "Desharialize: Easy mode to Exploit CVE-2019-0604 (Sharepoint XML Deserialization Unauthenticated RCE)\nhttps://github.com/Voulnet/desharialize", "creation_timestamp": "2020-01-22T18:29:54.000000Z"}, {"uuid": "0decd244-912c-4cdb-8d36-254f76800ad7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/156", "content": "#exploit\n1. CVE-2019-6447:\nES File Explorer Open Port Vulnerability\nhttps://github.com/fs0c131y/ESFileExplorerOpenPortVuln\n\n2. CVE-2018-0708:\nCommand injection in networking of QNAP Q'center Virtual Appliance &lt;=1.7.1063 could allow authenticated users to run arbitrary commands\nhttps://github.com/ntkernel0/CVE-2019-0708\n\n3. CVE-2019-0604:\nMicrosoft SharePoint RCE Vulnerability\nhttps://www.zerodayinitiative.com/blog/2019/3/13/cve-2019-0604-details-of-a-microsoft-sharepoint-rce-vulnerability", "creation_timestamp": "2024-10-10T11:12:45.000000Z"}, {"uuid": "325e70e8-f557-47f9-b0ab-e4343bf2d06f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/cibsecurity/9605", "content": "\ud83d\udd74 SharePoint Bug Proves Popular Weapon for Nation-State Attacks \ud83d\udd74\n\nThousands of servers could be exposed to SharePoint vulnerability CVE-2019-0604, recently used in cyberattacks against Middle East government targets.\n\n\ud83d\udcd6 Read\n\nvia \"Dark Reading: \".", "creation_timestamp": "2020-02-05T00:23:04.000000Z"}, {"uuid": "72f7d6a9-e463-49f7-81a4-087451e1cd8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-0604", "type": "exploited", "source": "https://t.me/cibsecurity/4250", "content": "\ud83d\udd74 Microsoft SharePoint Bug Exploited in the Wild \ud83d\udd74\n\nA number of reports show CVE-2019-0604 is under active attack, Alien Labs researchers say.\n\n\ud83d\udcd6 Read\n\nvia \"Dark Reading: \".", "creation_timestamp": "2019-05-10T19:55:32.000000Z"}]}