{"vulnerability": "CVE-2019-1978", "sightings": [{"uuid": "11a7932d-b205-450a-a6fa-8602a810692e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/6452cc00-774a-492c-9deb-8cb978cab650", "content": "", "creation_timestamp": "2020-07-31T15:38:46.000000Z"}, {"uuid": "a7743c38-3519-495b-9e90-7bd26e964c2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/76dc1f98-7e6f-4f64-8eb9-64596fe0c5d8", "content": "", "creation_timestamp": "2020-08-02T21:10:52.000000Z"}, {"uuid": "396fa22b-0a8c-44ee-afc3-118a788026a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e1491e5-dd68-415c-a334-e3fc02de0b81", "content": "", "creation_timestamp": "2020-01-07T14:14:27.000000Z"}, {"uuid": "ade47f3e-1796-4b02-8f70-554fcddc9eeb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e149aac-b9cc-4f43-a293-0b9a0a3b4631", "content": "", "creation_timestamp": "2020-01-07T14:51:47.000000Z"}, {"uuid": "ce784d84-f88c-4bfc-80d8-af66755f834a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e1c3455-40d4-49e6-9261-14690a3b4631", "content": "", "creation_timestamp": "2020-01-13T09:36:48.000000Z"}, {"uuid": "6d6fa0a8-a6e8-44c1-a16a-6d0df3de8b81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e1edc71-8274-4af7-82bd-463702de0b81", "content": "", "creation_timestamp": "2020-01-15T09:35:00.000000Z"}, {"uuid": "c8bb41e5-3e52-48dc-bed4-fe52ad6dbd0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e21c4dc-a370-4dc2-aa49-64ca0a3b4631", "content": "", "creation_timestamp": "2020-01-17T14:31:23.000000Z"}, {"uuid": "997c9653-94ee-4c57-8631-a2c79d58533d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e1dba19-e6c0-4572-80c4-cf0d950d210f", "content": "", "creation_timestamp": "2020-01-20T18:53:45.000000Z"}, {"uuid": "c164d397-3ea2-4866-b17c-081eab14dd79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e26971e-485c-4dab-806a-0d060a3b4631", "content": "", "creation_timestamp": "2020-01-21T06:22:26.000000Z"}, {"uuid": "dd72e5a3-3e25-47be-9697-8d99d86aefaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e3008c1-d3f8-46a9-8cb9-2fcd0a3b4631", "content": "", "creation_timestamp": "2020-01-28T10:16:23.000000Z"}, {"uuid": "56ff241c-bc9b-4622-98a1-bcf31327d4d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/69b483b2-e273-4b22-bd8c-e69f675f0e85", "content": "", "creation_timestamp": "2020-07-16T18:25:54.000000Z"}, {"uuid": "f5af93f2-e063-4c3f-b664-731449f638a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/42d04e94-bf5b-427d-acc8-f5d740675941", "content": "", "creation_timestamp": "2020-10-20T15:57:21.000000Z"}, {"uuid": "6f223106-479a-41d8-9730-cb1f10628266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/77244faa-adc0-4d10-a67c-428fbf013e10", "content": "", "creation_timestamp": "2020-08-02T21:22:03.000000Z"}, {"uuid": "0f8ead7a-4368-4497-9847-32709d848a7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/cdf5325d-a9ee-4e17-becf-a55fc414d799", "content": "", "creation_timestamp": "2020-08-03T06:22:57.000000Z"}, {"uuid": "cbe22b12-a948-45d2-a5d7-7b2215f36946", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e7bb760-90f8-44f3-9481-7dc68e5d62f7", "content": "", "creation_timestamp": "2020-03-25T19:58:58.000000Z"}, {"uuid": "30d79f67-e34d-48bb-8061-7cd06af9ee23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/453274cf-e60d-452a-b88e-0bf6a5a6dae4", "content": "", "creation_timestamp": "2020-10-13T06:50:38.000000Z"}, {"uuid": "7d5579c4-2d92-485c-ae46-b59003444159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e96e4eb-4574-471d-88a6-46d702de0b81", "content": "", "creation_timestamp": "2020-04-15T10:47:10.000000Z"}, {"uuid": "c7e927a5-60ac-434e-8ac4-768219010845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/900fbe46-8598-42ef-9a36-51739019e010", "content": "", "creation_timestamp": "2020-04-20T21:15:56.000000Z"}, {"uuid": "dda0f935-c53a-40a9-b600-096e34e0b4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/86efb74f-bd24-48f7-98b0-08d9ce5010e7", "content": "", "creation_timestamp": "2020-04-20T21:16:54.000000Z"}, {"uuid": "d8517ad9-6c6f-4ebd-893b-2979182afd45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/bc44af1a-dabe-4bdf-a044-3d88d9a2e4fe", "content": "", "creation_timestamp": "2020-03-25T20:17:40.000000Z"}, {"uuid": "19383f10-0d0f-4c6f-8c5a-3f2cf347bdc1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5f850411-c103-491f-abff-9421425403cf", "content": "", "creation_timestamp": "2020-10-21T08:33:50.000000Z"}, {"uuid": "14b3e89d-f1c6-454d-a2fd-1d4b0e912cd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/bda440c6-c948-4cfd-b98a-983123adf45b", "content": "", "creation_timestamp": "2020-09-16T07:07:41.000000Z"}, {"uuid": "36ea3d6f-5ced-4945-8715-4a2c2a5fe9fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/b426aa9c-dc22-4a91-8213-f8d513405423", "content": "", "creation_timestamp": "2020-12-09T07:18:56.000000Z"}, {"uuid": "e651aca9-8d5e-43ae-a6f1-7a4b8aba1900", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/1a52c709-c427-4575-a466-9655fb23df52", "content": "", "creation_timestamp": "2020-09-16T08:37:28.000000Z"}, {"uuid": "620a0774-b787-4a7b-8032-4ae89c98226e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:17.000000Z"}, {"uuid": "6d250527-3fc0-44e4-8333-a76e997591ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "a07d46ba-8cd6-4763-8c95-a01a945024c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/3cebfa60-0eec-45fc-a6bc-c76f486fb020", "content": "", "creation_timestamp": "2020-10-09T14:11:11.000000Z"}, {"uuid": "d5f1366a-1497-40f3-b67c-48f721203cf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/0ba0508b-324b-44f7-a575-25651d60e0ff", "content": "", "creation_timestamp": "2020-10-09T14:09:44.000000Z"}, {"uuid": "8f92e866-1678-45fc-b0a2-79cd6263f5e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/f1d0c36b-7417-41f5-90f0-de15143a608b", "content": "", "creation_timestamp": "2020-10-09T13:56:55.000000Z"}, {"uuid": "753ea52f-ea71-4d51-9552-3c8adbe1b340", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/a737aa9b-5021-40fc-bca0-ef44d2333c4a", "content": "", "creation_timestamp": "2020-10-09T13:40:19.000000Z"}, {"uuid": "cc80c3a6-1120-4b89-ab1c-30b1194ff636", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/dff0a117-d14d-49e3-b750-205c67dd975a", "content": "", "creation_timestamp": "2020-10-09T14:05:26.000000Z"}, {"uuid": "a37accaa-293a-46c3-bef6-bbdb6abc1493", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/99cde00e-3660-4d55-9e9c-a3681c3ecea5", "content": "", "creation_timestamp": "2020-10-09T13:27:23.000000Z"}, {"uuid": "d6c5a4d1-74eb-48c7-a4c7-f21702ffa0cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/b336a21e-ba81-4063-92f6-cfba9ccfe7d6", "content": "", "creation_timestamp": "2020-10-09T13:57:10.000000Z"}, {"uuid": "842ca5fb-61fc-4cc3-81bf-39512ea78939", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/6cc64859-dc9d-472e-9702-c3061488e995", "content": "", "creation_timestamp": "2020-10-09T13:24:11.000000Z"}, {"uuid": "b5ff22ae-debc-424c-9a11-577013fa9bd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/11bdc66f-c953-4cfa-8469-9ddcd06a35f4", "content": "", "creation_timestamp": "2020-10-09T14:06:48.000000Z"}, {"uuid": "80ad79dc-eb3d-4770-a7e0-f1df6b480b15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/f628d96f-2958-4717-91da-e86aace4925d", "content": "", "creation_timestamp": "2020-10-13T15:16:18.000000Z"}, {"uuid": "d86b5b4e-823a-423d-a483-b8f382bcbff2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/8d121e04-9fcc-48d9-be88-3af090913786", "content": "", "creation_timestamp": "2020-10-22T19:44:03.000000Z"}, {"uuid": "01ec8f03-814c-433d-9b51-3cfd50ae5429", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/3acbad53-b1c6-4169-964c-f0f016201d7f", "content": "", "creation_timestamp": "2020-10-16T03:00:06.000000Z"}, {"uuid": "8df4242d-0db4-44ed-8e3d-24853f9cf456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/b116b034-f451-459f-9d72-bc1b63319cab", "content": "", "creation_timestamp": "2020-10-15T03:00:06.000000Z"}, {"uuid": "7ee14b67-790f-490f-bcd6-b368793b6a14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/4ea9f113-cdeb-426d-90bc-dfa618970724", "content": "", "creation_timestamp": "2020-10-09T13:23:01.000000Z"}, {"uuid": "893268e9-fb86-4c0e-b1d0-9e0e8295d65e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5362d288-c25b-43e5-9311-2ddedfe84549", "content": "", "creation_timestamp": "2020-10-22T19:51:03.000000Z"}, {"uuid": "18adf617-3b59-4a48-8455-bdba77f9d315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/d925a2ee-e7cf-46f6-bec1-ad8e19122730", "content": "", "creation_timestamp": "2020-10-20T15:58:04.000000Z"}, {"uuid": "29015042-a2b6-43db-8dd4-0db3329839c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/63ddead6-4b82-414c-ad8e-c516b950b446", "content": "", "creation_timestamp": "2021-10-25T22:30:42.000000Z"}, {"uuid": "c66a7f6c-f827-4621-a37f-0adfb1788c8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/c7d9eed5-d71b-4433-8433-3db121149d72", "content": "", "creation_timestamp": "2020-11-21T03:00:05.000000Z"}, {"uuid": "dbfacc2e-e71f-4811-a812-4397279e8a9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/24c0c150-19f9-4301-87cf-6ab59dbb3c32", "content": "", "creation_timestamp": "2022-06-13T12:11:21.000000Z"}, {"uuid": "47c0b978-bb25-4837-b9cc-10a07d301de0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/dcf911ee-17b3-4902-aa15-4ecabf2e40ce", "content": "", "creation_timestamp": "2024-09-12T10:33:13.000000Z"}, {"uuid": "5c5afade-9885-4506-8022-c49ec910b5a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/e6f3313b-3050-455d-b8c1-904c7ec804df", "content": "", "creation_timestamp": "2023-12-22T20:10:06.000000Z"}, {"uuid": "a8a3ad9e-69be-46e5-a183-6a4269d304b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971102", "content": "", "creation_timestamp": "2024-12-24T20:24:17.638844Z"}, {"uuid": "e0c3ff07-48e3-49a7-a13a-6ef0b3195630", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "f7a877d3-3911-4593-a53d-3d46cec80d5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-27)", "content": "", "creation_timestamp": "2025-01-27T00:00:00.000000Z"}, {"uuid": "204e0c8d-ed3c-47c6-a80f-d77e9e49f771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-29)", "content": "", "creation_timestamp": "2025-03-29T00:00:00.000000Z"}, {"uuid": "3e4bf9bb-e743-40c8-977a-4c1f0fe09e2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "f292b015-5eb9-4813-9a7e-47207b6cb090", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-15)", "content": "", "creation_timestamp": "2025-01-15T00:00:00.000000Z"}, {"uuid": "8a0a01ce-7c67-430f-bd6a-d58d94bf433d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-19)", "content": "", "creation_timestamp": "2025-01-19T00:00:00.000000Z"}, {"uuid": "bb005cc6-0ee1-431e-857e-052515d431af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-17)", "content": "", "creation_timestamp": "2025-01-17T00:00:00.000000Z"}, {"uuid": "39598eb1-077a-49cb-8536-458f77cf57e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-01)", "content": "", "creation_timestamp": "2025-01-01T00:00:00.000000Z"}, {"uuid": "03ef8545-4693-4f12-8c15-a2090981fb8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-24)", "content": "", "creation_timestamp": "2025-01-24T00:00:00.000000Z"}, {"uuid": "3e33717d-d7ff-4548-886a-904294fce178", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-28)", "content": "", "creation_timestamp": "2024-12-28T00:00:00.000000Z"}, {"uuid": "32123e90-7eb9-4a09-b692-d830b6a710ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-05)", "content": "", "creation_timestamp": "2025-01-05T00:00:00.000000Z"}, {"uuid": "fbb7a075-c5e2-4d38-b829-641df12289f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-10)", "content": "", "creation_timestamp": "2025-01-10T00:00:00.000000Z"}, {"uuid": "827db3f6-6cdb-4a7b-84d4-7101823751b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-25)", "content": "", "creation_timestamp": "2024-10-25T00:00:00.000000Z"}, {"uuid": "27dbafc4-e2ac-4ae6-8c17-ba4a6c26159b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-26)", "content": "", "creation_timestamp": "2024-10-26T00:00:00.000000Z"}, {"uuid": "eb2a373f-74b8-415c-bcf7-175a98a40932", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-30)", "content": "", "creation_timestamp": "2024-10-30T00:00:00.000000Z"}, {"uuid": "bd85a9b4-a0c2-4814-99c0-c28dc07771b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://bsky.app/profile/tuxpanik.bsky.social/post/3lgvfi4hek52g", "content": "", "creation_timestamp": "2025-01-29T16:32:48.884002Z"}, {"uuid": "85d102e7-0f4c-4d6a-9b17-9033e0f731a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-08)", "content": "", "creation_timestamp": "2024-11-08T00:00:00.000000Z"}, {"uuid": "63555c6a-f382-400a-87a9-5ca52329a14e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-04)", "content": "", "creation_timestamp": "2024-11-04T00:00:00.000000Z"}, {"uuid": "0f489aa9-93f8-4f0e-8464-70e5dfb035ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-05)", "content": "", "creation_timestamp": "2024-11-05T00:00:00.000000Z"}, {"uuid": "8d9cb960-89fd-407e-98f1-146ab5ac1ba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-20)", "content": "", "creation_timestamp": "2024-11-20T00:00:00.000000Z"}, {"uuid": "dbc113b8-3d9d-4530-8687-2d8851dd3cdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-19)", "content": "", "creation_timestamp": "2024-11-19T00:00:00.000000Z"}, {"uuid": "90a26e36-7599-47d6-9b4a-7ff6936be94d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-22)", "content": "", "creation_timestamp": "2024-11-22T00:00:00.000000Z"}, {"uuid": "dc8bf9c4-70b3-45cc-94f6-4cd9a091992e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-02)", "content": "", "creation_timestamp": "2024-12-02T00:00:00.000000Z"}, {"uuid": "40c84551-6d3d-465e-96a7-c7ea1e9020d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-06)", "content": "", "creation_timestamp": "2024-12-06T00:00:00.000000Z"}, {"uuid": "100933cf-439d-4346-bc09-34c927f777d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-27)", "content": "", "creation_timestamp": "2024-11-27T00:00:00.000000Z"}, {"uuid": "55668678-059b-46ef-b0bf-f7aa9b1709b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-11)", "content": "", "creation_timestamp": "2024-12-11T00:00:00.000000Z"}, {"uuid": "92c01522-68c7-4443-89a8-793c83f56686", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-18)", "content": "", "creation_timestamp": "2024-12-18T00:00:00.000000Z"}, {"uuid": "4a5cf943-c3b6-4e46-808f-71307f50d369", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-07)", "content": "", "creation_timestamp": "2025-02-07T00:00:00.000000Z"}, {"uuid": "435a3d10-d629-479a-947a-535c9cd7535c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "4546ce84-7695-47a1-a86b-6d0f3c0f36c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-05)", "content": "", "creation_timestamp": "2025-01-05T00:00:00.000000Z"}, {"uuid": "b4a9ce7e-17ab-4734-9894-588f2017cd47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-07)", "content": "", "creation_timestamp": "2025-01-07T00:00:00.000000Z"}, {"uuid": "aebbc8cb-da5a-4668-9c5e-c831a2e9fdc8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-01-26)", "content": "", "creation_timestamp": "2025-01-26T00:00:00.000000Z"}, {"uuid": "6f2dcbe7-5507-4ec6-975d-b1288c4d49e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-30)", "content": "", "creation_timestamp": "2025-03-30T00:00:00.000000Z"}, {"uuid": "47df45c6-11e4-4bfb-8091-35c1fc76958c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-08)", "content": "", "creation_timestamp": "2025-03-08T00:00:00.000000Z"}, {"uuid": "dceffe44-0121-4add-9e34-13951bec220d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "bcc73557-c698-4c77-8fa1-209ac404f5bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:15.000000Z"}, {"uuid": "2ed4c546-5db9-442c-8a01-91a8b1db2cd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-18)", "content": "", "creation_timestamp": "2025-03-18T00:00:00.000000Z"}, {"uuid": "a1af4a1b-3d61-4eec-afac-8352e3dbee68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "c7945b2e-a77f-453e-b085-c1ae1d857b63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-05)", "content": "", "creation_timestamp": "2025-03-05T00:00:00.000000Z"}, {"uuid": "5f1341a2-2195-485d-bb89-9eee50da993d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-09)", "content": "", "creation_timestamp": "2025-02-09T00:00:00.000000Z"}, {"uuid": "9d5010bb-6e84-4156-bdd5-752ad0a174c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "50a2cc40-30aa-4d8d-a542-41a9a8412fd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "f1e5fe50-7625-4b2e-8c82-76fb211a0cc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-25)", "content": "", "creation_timestamp": "2025-03-25T00:00:00.000000Z"}, {"uuid": "4a44d04e-1c11-4d80-a2a6-1318f412ed68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-04)", "content": "", "creation_timestamp": "2025-03-04T00:00:00.000000Z"}, {"uuid": "435cbe3d-be30-4444-969b-280e069caccb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "5214f9f9-48ad-4637-8c77-3d5361caeb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "4f89f703-520b-414e-bb47-4cdad7e94e51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "2d787773-ffa1-4939-9b27-088b460caa1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "5a2b09ac-f9dc-42ef-9240-dcb32448b536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "eef8d4ab-906f-483c-af12-2ccc1b32bf60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "91816ac5-b2dd-4992-a3d9-1fae51e43468", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-14)", "content": "", "creation_timestamp": "2025-02-14T00:00:00.000000Z"}, {"uuid": "6a486d2d-49e5-447c-b0ef-17228f4f6372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-09)", "content": "", "creation_timestamp": "2025-03-09T00:00:00.000000Z"}, {"uuid": "08f8ecea-a47f-4215-9334-d07301da25ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}, {"uuid": "75e8b880-2d7c-4e77-b78b-085f9581bd03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-13)", "content": "", "creation_timestamp": "2025-02-13T00:00:00.000000Z"}, {"uuid": "09e8e282-bf9c-4d52-b11d-a0684b82d425", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-07)", "content": "", "creation_timestamp": "2025-03-07T00:00:00.000000Z"}, {"uuid": "46c6f7db-c2a4-4d2a-b983-9d393ea2cea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "502b2480-6464-437a-8a2d-7c1fb7932b02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-12)", "content": "", "creation_timestamp": "2025-03-12T00:00:00.000000Z"}, {"uuid": "b49d817d-9c7b-4507-8ba2-89e9e1f2218d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "426a546d-e084-45a3-a3ba-eba5c2c33591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-10)", "content": "", "creation_timestamp": "2025-03-10T00:00:00.000000Z"}, {"uuid": "115b91e7-cf93-4e20-8a25-503b5e02068c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-12)", "content": "", "creation_timestamp": "2025-03-12T00:00:00.000000Z"}, {"uuid": "2d6dcaf6-4ec5-4957-868e-a0f4b477a40d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-16)", "content": "", "creation_timestamp": "2025-02-16T00:00:00.000000Z"}, {"uuid": "a5f0748f-047f-4080-9213-ff85bcbefa57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-16)", "content": "", "creation_timestamp": "2025-02-16T00:00:00.000000Z"}, {"uuid": "84acd72e-830e-4802-be33-65728c1fb890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-14)", "content": "", "creation_timestamp": "2025-03-14T00:00:00.000000Z"}, {"uuid": "3ab35521-a569-474c-b85f-562f2fce919d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-20)", "content": "", "creation_timestamp": "2025-02-20T00:00:00.000000Z"}, {"uuid": "9be412e2-24d7-4649-9c73-71438693f1ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-16)", "content": "", "creation_timestamp": "2025-03-16T00:00:00.000000Z"}, {"uuid": "068bfbd2-aae4-4f96-a3ce-4a34a6c0d8cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "ae261e38-51d4-4a39-b5e8-4fd45b84fdf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-07)", "content": "", "creation_timestamp": "2025-03-07T00:00:00.000000Z"}, {"uuid": "c07f2aca-074b-4cb2-8f0c-cd136c0f131d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-21)", "content": "", "creation_timestamp": "2025-02-21T00:00:00.000000Z"}, {"uuid": "c47d412e-e15d-4028-b850-185ac7661fb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "c84518d1-bf51-4d85-a4af-19cf30a863e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "e42c6399-6e67-4830-994c-4e3c50ac7141", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-21)", "content": "", "creation_timestamp": "2025-03-21T00:00:00.000000Z"}, {"uuid": "a1c0da48-6a73-49c4-bc1c-5d42b34efb1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:43.000000Z"}, {"uuid": "c71cf42d-f130-48a8-a0fd-86fc1efcd3b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-22)", "content": "", "creation_timestamp": "2025-03-22T00:00:00.000000Z"}, {"uuid": "b26f09a7-abac-4162-a1c6-798490d97d44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-23)", "content": "", "creation_timestamp": "2025-02-23T00:00:00.000000Z"}, {"uuid": "99c831c3-6f89-48bc-b5e2-c674ea925b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-11)", "content": "", "creation_timestamp": "2025-03-11T00:00:00.000000Z"}, {"uuid": "7ff9124f-233f-4979-a2db-28639d8fb1cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-20)", "content": "", "creation_timestamp": "2025-03-20T00:00:00.000000Z"}, {"uuid": "9f1da4b1-a75e-4917-b9ae-72ab6672df85", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "a5bcc2ed-78b0-4dae-9dd6-4856fd6f76b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-28)", "content": "", "creation_timestamp": "2025-02-28T00:00:00.000000Z"}, {"uuid": "cbc233a2-a45d-4f02-84c7-8e48ceafa393", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-17)", "content": "", "creation_timestamp": "2025-03-17T00:00:00.000000Z"}, {"uuid": "0033854c-aaa9-44ac-8df0-0e35f8462c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "cdb3ddeb-4304-41f3-97ca-8f6bf4ac90f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-08)", "content": "", "creation_timestamp": "2025-03-08T00:00:00.000000Z"}, {"uuid": "841a1c99-28cd-4973-874c-52aff0b8d8c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-01)", "content": "", "creation_timestamp": "2025-03-01T00:00:00.000000Z"}, {"uuid": "5b3c91cb-f78c-447c-9b76-4b74f3f7149f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "9a6a3fa6-df4a-4dbe-8aee-cc59a36e8291", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-01)", "content": "", "creation_timestamp": "2025-04-01T00:00:00.000000Z"}, {"uuid": "1d1eec9c-1ff6-42a1-8c18-81bc1ff22980", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "ff7df67f-3ae2-4168-b814-7481017823c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-04)", "content": "", "creation_timestamp": "2025-04-04T00:00:00.000000Z"}, {"uuid": "cadc662c-4b86-445a-9584-8eaa2c14401e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-28)", "content": "", "creation_timestamp": "2025-03-28T00:00:00.000000Z"}, {"uuid": "7ab30634-da0b-4cad-9a2d-1580f6cf874c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-14)", "content": "", "creation_timestamp": "2025-07-14T00:00:00.000000Z"}, {"uuid": "faa14a36-68cf-4941-bdcf-fb315ef5063a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-03)", "content": "", "creation_timestamp": "2025-04-03T00:00:00.000000Z"}, {"uuid": "fe0cdf5f-161b-4583-b2b2-776c896fcfea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-18)", "content": "", "creation_timestamp": "2025-05-18T00:00:00.000000Z"}, {"uuid": "016e0c0c-ac6e-4abc-9326-806e09699085", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-06-17)", "content": "", "creation_timestamp": "2025-06-17T00:00:00.000000Z"}, {"uuid": "73fddda3-8022-4eaa-9d90-a322317211ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-06)", "content": "", "creation_timestamp": "2025-04-06T00:00:00.000000Z"}, {"uuid": "2c34d6a4-874c-439a-b51e-b609ebd231e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-07)", "content": "", "creation_timestamp": "2025-04-07T00:00:00.000000Z"}, {"uuid": "0cd924d4-65b8-44ef-be4a-9d92cde2f0ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-08)", "content": "", "creation_timestamp": "2025-04-08T00:00:00.000000Z"}, {"uuid": "05c5f41a-f01c-46d5-abc3-99867eb32897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/dcf911ee-17b3-4902-aa15-4ecabf2e40ce", "content": "", "creation_timestamp": "2025-06-19T23:26:58.000000Z"}, {"uuid": "cb07029b-8176-4b92-aa69-5ff5cf29806b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/bc44af1a-dabe-4bdf-a044-3d88d9a2e4fe", "content": "", "creation_timestamp": "2025-05-30T15:21:10.000000Z"}, {"uuid": "ecee06b4-94db-48a1-9fca-5d322f500d80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-23)", "content": "", "creation_timestamp": "2025-05-23T00:00:00.000000Z"}, {"uuid": "570646bf-ca24-4bf4-a3f6-a7d3f69815e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-09)", "content": "", "creation_timestamp": "2025-04-09T00:00:00.000000Z"}, {"uuid": "0eaf3677-7da1-4082-a83c-a98096ea68ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-11)", "content": "", "creation_timestamp": "2025-04-11T00:00:00.000000Z"}, {"uuid": "9d49a0a4-4c89-4cd6-9d8e-e213fd47fc3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-10)", "content": "", "creation_timestamp": "2025-04-10T00:00:00.000000Z"}, {"uuid": "9fbb4c6a-327f-4591-b99b-f5c04733374a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-01)", "content": "", "creation_timestamp": "2025-07-01T00:00:00.000000Z"}, {"uuid": "72133b34-81c7-4472-a887-871da9ceb186", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-13)", "content": "", "creation_timestamp": "2025-04-13T00:00:00.000000Z"}, {"uuid": "e342a769-2c56-40e2-8cdc-64b8f8d07345", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-12)", "content": "", "creation_timestamp": "2025-04-12T00:00:00.000000Z"}, {"uuid": "61151a25-d7bb-4826-a126-76a6dd4d5e1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-26)", "content": "", "creation_timestamp": "2025-05-26T00:00:00.000000Z"}, {"uuid": "c89985fc-2a33-42bc-9ea3-d1bc8fe200eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/69b483b2-e273-4b22-bd8c-e69f675f0e85", "content": "", "creation_timestamp": "2025-05-30T20:57:10.000000Z"}, {"uuid": "32f9134a-7f2e-4971-99e7-b0cbfb5e2e83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-14)", "content": "", "creation_timestamp": "2025-04-14T00:00:00.000000Z"}, {"uuid": "2cbc7c04-cbf0-4838-8307-7f3ca00caa7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-01)", "content": "", "creation_timestamp": "2025-07-01T00:00:00.000000Z"}, {"uuid": "1b5382d6-aa48-4b08-948c-666b861f88c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "0fa4f8c0-890a-499d-9e97-f90a7f3a7f31", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-15)", "content": "", "creation_timestamp": "2025-04-15T00:00:00.000000Z"}, {"uuid": "d12b696c-69f1-41cd-9b4e-17f7f01f739f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-16)", "content": "", "creation_timestamp": "2025-04-16T00:00:00.000000Z"}, {"uuid": "6ae35ff1-125f-41ee-bba6-eaa9eae88d56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-18)", "content": "", "creation_timestamp": "2025-04-18T00:00:00.000000Z"}, {"uuid": "f0f9c71a-c78a-4330-be19-a11ecb7da512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-17)", "content": "", "creation_timestamp": "2025-04-17T00:00:00.000000Z"}, {"uuid": "b383ecc7-60fd-46fd-93d9-466729242e11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-19)", "content": "", "creation_timestamp": "2025-04-19T00:00:00.000000Z"}, {"uuid": "0d58e625-b34d-4cbd-91b9-655805e85958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "4bd1e683-802c-46f3-8ed3-5a91f1219d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-16)", "content": "", "creation_timestamp": "2025-06-16T00:00:00.000000Z"}, {"uuid": "ef059d80-0aad-4cb3-8391-9a5258f4f32a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-20)", "content": "", "creation_timestamp": "2025-04-20T00:00:00.000000Z"}, {"uuid": "f3a8c19e-555d-41c9-8785-b8cf341a3e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-21)", "content": "", "creation_timestamp": "2025-04-21T00:00:00.000000Z"}, {"uuid": "ac3ba948-5119-44c1-b6e0-f7b51a190f1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "8958c1e3-596c-4dd4-a14b-7e89c803623b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-03)", "content": "", "creation_timestamp": "2025-07-03T00:00:00.000000Z"}, {"uuid": "db5c3eb8-ea39-4422-bff1-8e20ebaaf077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-08)", "content": "", "creation_timestamp": "2025-06-08T00:00:00.000000Z"}, {"uuid": "7c97f9a4-d0b1-44b4-ba82-fcb0ff55d40a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "d1fc2279-9f77-46dc-8e41-3be9cf791088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-16)", "content": "", "creation_timestamp": "2025-05-16T00:00:00.000000Z"}, {"uuid": "09ab41ff-3e4d-493a-a98e-4eec0d4b6410", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "65d8d1ab-3475-4612-b75c-5cc0512822a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-25)", "content": "", "creation_timestamp": "2025-04-25T00:00:00.000000Z"}, {"uuid": "32adf0c7-f856-46a1-8932-ffb92f0aab7b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "08c0fece-1c9d-4a9f-bfab-02c0a23aef02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "c5d50dbf-8698-41b2-93c4-b233c184561f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "fcb27a02-2d2b-4a04-ad38-a26e66826ff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-24)", "content": "", "creation_timestamp": "2025-05-24T00:00:00.000000Z"}, {"uuid": "0809771c-99f8-4ffa-a42d-de5e690cd193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-19)", "content": "", "creation_timestamp": "2025-05-19T00:00:00.000000Z"}, {"uuid": "7a0a0d4f-ca67-4cf3-9b28-a8ae76237ebd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-27)", "content": "", "creation_timestamp": "2025-04-27T00:00:00.000000Z"}, {"uuid": "8956a7d4-ceb9-40b3-852e-f4285b743643", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-14)", "content": "", "creation_timestamp": "2025-06-14T00:00:00.000000Z"}, {"uuid": "0f4e6fc8-fe58-4c3d-a0e2-c77e23f57bb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-30)", "content": "", "creation_timestamp": "2025-06-30T00:00:00.000000Z"}, {"uuid": "50d1f557-894a-40d6-818b-2b7a5b9e5173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "e649a76c-5c3b-4729-a38e-6f3e84caa0f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-02)", "content": "", "creation_timestamp": "2025-06-02T00:00:00.000000Z"}, {"uuid": "7b28ea21-e6d5-4e43-a4c0-f180ae09ceab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-30)", "content": "", "creation_timestamp": "2025-04-30T00:00:00.000000Z"}, {"uuid": "f0ed1258-80e3-4a93-8cb0-76e5ecf9935d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-29)", "content": "", "creation_timestamp": "2025-04-29T00:00:00.000000Z"}, {"uuid": "2f864ed8-8aef-4aee-a8b4-4c8c47eb1d92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-e1523a5c-9dce464b104523e0", "content": "", "creation_timestamp": "2025-06-26T08:53:34.631954Z"}, {"uuid": "e047f51c-3ad7-439f-9460-fb4094fad4f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "53959447-449c-4f04-ac3c-48d35eefcc0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "3a717b04-7e72-4546-952e-ce418b0e71a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-02)", "content": "", "creation_timestamp": "2025-05-02T00:00:00.000000Z"}, {"uuid": "e0aea302-08fe-4598-a24c-cbf37f31bf27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-22)", "content": "", "creation_timestamp": "2025-05-22T00:00:00.000000Z"}, {"uuid": "84c469e6-2ae1-4c7a-a537-d978b8ea9000", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "bd40a3fc-8c9d-42c2-a03d-260228253081", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-03)", "content": "", "creation_timestamp": "2025-05-03T00:00:00.000000Z"}, {"uuid": "d71ba3d0-1e78-4df7-8b35-524237f9ad6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "fa496b38-4eda-4e54-9f48-5c40bd7b2d9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-04)", "content": "", "creation_timestamp": "2025-05-04T00:00:00.000000Z"}, {"uuid": "2dbb692c-70ca-4985-878d-3141000a3d27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-05)", "content": "", "creation_timestamp": "2025-05-05T00:00:00.000000Z"}, {"uuid": "d02dc0c8-c2c6-420d-94aa-0c005a8fa8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-07)", "content": "", "creation_timestamp": "2025-05-07T00:00:00.000000Z"}, {"uuid": "2ae127c0-79a9-483f-9e28-4ed2e6833729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "b6868d23-1c40-4250-b949-bad721259025", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-07)", "content": "", "creation_timestamp": "2025-05-07T00:00:00.000000Z"}, {"uuid": "d7eea487-9421-452a-914b-53720d1d1d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-02)", "content": "", "creation_timestamp": "2025-07-02T00:00:00.000000Z"}, {"uuid": "060c9e16-3a81-4412-9609-20e860a01c1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-08)", "content": "", "creation_timestamp": "2025-05-08T00:00:00.000000Z"}, {"uuid": "657f40a5-d789-4b78-92f1-1f95ba59060e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "392a9544-9a37-4b0b-afe8-b08d50647436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-17)", "content": "", "creation_timestamp": "2025-05-17T00:00:00.000000Z"}, {"uuid": "c239c77c-fce7-449e-9eeb-86e254e20fdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-08)", "content": "", "creation_timestamp": "2025-05-08T00:00:00.000000Z"}, {"uuid": "bb77ba9e-da80-44bb-8ca0-a8617556d548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-25)", "content": "", "creation_timestamp": "2025-05-25T00:00:00.000000Z"}, {"uuid": "82c47ec0-2def-401e-b960-a5533aba2e5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-10)", "content": "", "creation_timestamp": "2025-05-10T00:00:00.000000Z"}, {"uuid": "92963e92-5b0a-4abf-beb0-d9d91da61b3f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-06)", "content": "", "creation_timestamp": "2025-07-06T00:00:00.000000Z"}, {"uuid": "16e0b5d4-ad1e-4efc-86eb-3a349241d188", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-11)", "content": "", "creation_timestamp": "2025-05-11T00:00:00.000000Z"}, {"uuid": "3852463d-3c0f-42a5-8815-380ba0d12c34", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-12)", "content": "", "creation_timestamp": "2025-05-12T00:00:00.000000Z"}, {"uuid": "d46367ca-13ad-4309-8eb9-547cb3bf5460", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-27)", "content": "", "creation_timestamp": "2025-05-27T00:00:00.000000Z"}, {"uuid": "d184e29b-cdfa-4ae6-b0b4-5d7659bc5be0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-15)", "content": "", "creation_timestamp": "2025-06-15T00:00:00.000000Z"}, {"uuid": "50b59a50-e80f-496a-a5e1-90144043a6e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-29)", "content": "", "creation_timestamp": "2025-06-29T00:00:00.000000Z"}, {"uuid": "dc95ab10-e52b-4dd6-a407-5627c78b9814", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-20)", "content": "", "creation_timestamp": "2025-05-20T00:00:00.000000Z"}, {"uuid": "d9fdbac5-eb3f-44a6-b891-5a2f67faf693", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-14)", "content": "", "creation_timestamp": "2025-05-14T00:00:00.000000Z"}, {"uuid": "cccb95cc-1c18-437e-a752-e4b64566246f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-04)", "content": "", "creation_timestamp": "2025-06-04T00:00:00.000000Z"}, {"uuid": "3a0577e2-4ba9-4ead-9ded-95428fd514a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-09)", "content": "", "creation_timestamp": "2025-06-09T00:00:00.000000Z"}, {"uuid": "43cbb805-13ff-41d5-ac73-0e269d067435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-01)", "content": "", "creation_timestamp": "2025-06-01T00:00:00.000000Z"}, {"uuid": "899685b6-3569-4f22-bc4a-e7dd924788b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-17)", "content": "", "creation_timestamp": "2025-07-17T00:00:00.000000Z"}, {"uuid": "9b6fbda5-b6ba-433c-89bb-b9f4e53326c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "8b761040-6352-47b4-99f9-87526abeb32b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-18)", "content": "", "creation_timestamp": "2025-10-18T00:00:00.000000Z"}, {"uuid": "4544b84f-51c8-4cad-9c20-e62f2ba5e20f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-21)", "content": "", "creation_timestamp": "2025-07-21T00:00:00.000000Z"}, {"uuid": "0e91c616-59aa-4f4b-ba99-c4135be00b24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-20)", "content": "", "creation_timestamp": "2025-07-20T00:00:00.000000Z"}, {"uuid": "c21e0af2-f6e2-418d-9f7e-d0eeaed45787", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-23)", "content": "", "creation_timestamp": "2025-07-23T00:00:00.000000Z"}, {"uuid": "2c76d62a-b195-4c73-8661-8e30a2abbe9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "0668f241-68c9-4249-8ba3-3c8102ddb06a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-25)", "content": "", "creation_timestamp": "2025-10-25T00:00:00.000000Z"}, {"uuid": "700bf68e-d2bf-4f51-931b-b0d2e73fd709", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "f19611e4-851e-42d0-a47f-88491f6315f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "28a52913-7b71-42ea-812c-b7139c3170c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-25)", "content": "", "creation_timestamp": "2025-07-25T00:00:00.000000Z"}, {"uuid": "45f6cfd5-6a07-4e5a-a390-8f72e067c0ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "a0fbdfc2-9f17-4d67-9007-fdf1ae018b4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-27)", "content": "", "creation_timestamp": "2025-09-27T00:00:00.000000Z"}, {"uuid": "ec9083ec-3683-43e2-8481-cdb0b014a006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "ae999207-8d82-4196-98e8-a952c231fa83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-26)", "content": "", "creation_timestamp": "2025-07-26T00:00:00.000000Z"}, {"uuid": "160f9837-13fb-41ef-bc3a-84870c3132d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-02)", "content": "", "creation_timestamp": "2025-08-02T00:00:00.000000Z"}, {"uuid": "238ab0e9-980d-4cf6-a0d2-238f957c3d73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-20)", "content": "", "creation_timestamp": "2025-09-20T00:00:00.000000Z"}, {"uuid": "4bb49491-784a-4b3c-85cc-85861be3ba25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "08289195-d0c9-483c-abfc-6f0a9ee81283", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-03)", "content": "", "creation_timestamp": "2025-08-03T00:00:00.000000Z"}, {"uuid": "303e74c6-1821-47db-83c6-e09ff89eb434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-04)", "content": "", "creation_timestamp": "2025-08-04T00:00:00.000000Z"}, {"uuid": "fb6f013e-ef4e-4a06-b409-720ff31acb1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "0818b516-c8d0-4ee0-ae62-8f830490b5bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-19)", "content": "", "creation_timestamp": "2025-10-19T00:00:00.000000Z"}, {"uuid": "75b6335e-a4b7-443f-9167-602f03d422ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-06)", "content": "", "creation_timestamp": "2025-09-06T00:00:00.000000Z"}, {"uuid": "9f4b8aab-97cc-47a6-ad78-f0bb766f2244", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-21)", "content": "", "creation_timestamp": "2025-09-21T00:00:00.000000Z"}, {"uuid": "37ecd195-1c9b-4f24-b048-86094f6bc54f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-09)", "content": "", "creation_timestamp": "2025-08-09T00:00:00.000000Z"}, {"uuid": "2c9ef66d-143f-4a31-9123-876c85e9ed14", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "60f93dfd-5826-4625-a8dc-455402a2c333", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "24587a57-9a99-4393-aebe-1d9575af1caf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-28)", "content": "", "creation_timestamp": "2025-09-28T00:00:00.000000Z"}, {"uuid": "11f9349b-96ed-4285-a39c-95c257954c53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "9171b2df-ff43-4c74-be38-9460f0b44d22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "9a95d9b9-6fee-4368-adcc-62761ffcca62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-22)", "content": "", "creation_timestamp": "2025-11-22T00:00:00.000000Z"}, {"uuid": "93d7ff51-f285-4baf-99b6-2a34de50bfaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "89d577d0-e853-4c65-bef5-c7f0266b0e9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "6b035b4d-899d-452b-a79a-a0adad1eedb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "b8cdfb12-30b4-4491-abcf-784fa3002949", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-14)", "content": "", "creation_timestamp": "2025-09-14T00:00:00.000000Z"}, {"uuid": "720d89dd-ace3-45f4-ab96-5db14b41d51c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "0355a27d-df0e-4517-a300-941d7667469c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-05)", "content": "", "creation_timestamp": "2025-10-05T00:00:00.000000Z"}, {"uuid": "d7309cdd-1aab-4dec-bdf6-64c371503a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-17)", "content": "", "creation_timestamp": "2025-08-17T00:00:00.000000Z"}, {"uuid": "2065d205-2901-42fe-a1fb-69eeb00b21cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "f363e0cd-891e-4207-bda7-7ec8e27d98b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "662834e1-41b8-4a7b-88f6-4fd5261b1503", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "b2545841-7c9d-4838-a763-969b89a55860", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "e1b5d45f-8291-47c9-af0f-b20240c28c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "997a31b2-01ef-4828-bdbc-42b21d0ca998", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-26)", "content": "", "creation_timestamp": "2025-10-26T00:00:00.000000Z"}, {"uuid": "fb70d005-f4f7-4bbe-b712-6a3d62375d10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-11)", "content": "", "creation_timestamp": "2025-10-11T00:00:00.000000Z"}, {"uuid": "c6f6b0f0-b466-4170-8e25-be5cb654aa03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-19)", "content": "", "creation_timestamp": "2025-08-19T00:00:00.000000Z"}, {"uuid": "fb87ce0d-558f-4265-91e0-5513e7cacbb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-04)", "content": "", "creation_timestamp": "2025-10-04T00:00:00.000000Z"}, {"uuid": "e86a72e6-97c0-4790-95af-f36b0e280709", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-27)", "content": "", "creation_timestamp": "2025-11-27T00:00:00.000000Z"}, {"uuid": "a707d3f1-2439-4567-b4b2-b79775af8e22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-02)", "content": "", "creation_timestamp": "2025-11-02T00:00:00.000000Z"}, {"uuid": "7db6695a-14b7-4864-9662-4656c3ab9148", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "7d0f26b2-b1f8-4a21-8c62-e69afedefec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-23)", "content": "", "creation_timestamp": "2025-08-23T00:00:00.000000Z"}, {"uuid": "cef6b74c-2fab-4448-b122-7ce19b2db773", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "71684676-f9b0-48ce-aa10-ad55278d82d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "b0f5a294-4d9d-425e-bcce-027503c794be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-30)", "content": "", "creation_timestamp": "2025-11-30T00:00:00.000000Z"}, {"uuid": "909c233e-452b-4466-a11e-b4c035827d3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-24)", "content": "", "creation_timestamp": "2025-08-24T00:00:00.000000Z"}, {"uuid": "35f16e18-d83a-416a-a108-2d50c95e3060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/citrix_dir_traversal.rb", "content": "", "creation_timestamp": "2020-01-14T00:25:38.000000Z"}, {"uuid": "98bfe82a-e4e1-40f9-99b4-e2156854a09a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "e18fcc38-4f07-47ae-be16-a60c54854aa9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/freebsd/http/citrix_dir_traversal_rce.rb", "content": "", "creation_timestamp": "2021-04-16T01:02:49.000000Z"}, {"uuid": "78dd3471-dee4-458b-85ef-b2091f06d326", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "8e03480a-8553-4d0b-9310-ecbd3c132068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-29)", "content": "", "creation_timestamp": "2025-11-29T00:00:00.000000Z"}, {"uuid": "b6265979-fc73-4ac4-b868-6e9be328b8a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-31)", "content": "", "creation_timestamp": "2025-08-31T00:00:00.000000Z"}, {"uuid": "65f5251e-f930-45a7-ac74-d31f6a37f6eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-30)", "content": "", "creation_timestamp": "2025-08-30T00:00:00.000000Z"}, {"uuid": "0912682f-a084-4f3b-b75b-66fb3df377c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-02)", "content": "", "creation_timestamp": "2025-12-02T00:00:00.000000Z"}, {"uuid": "aa34e3ee-68d6-45e9-be96-a9f7767e364b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-12)", "content": "", "creation_timestamp": "2026-02-12T00:00:00.000000Z"}, {"uuid": "4fcd9231-a924-4936-b14b-1f4d33d80f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-28)", "content": "", "creation_timestamp": "2026-02-28T00:00:00.000000Z"}, {"uuid": "a3610c71-a67a-4ded-a003-f29ab5301d33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-07)", "content": "", "creation_timestamp": "2025-12-07T00:00:00.000000Z"}, {"uuid": "273074f5-383e-446d-9771-5c0cd8577bfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-06)", "content": "", "creation_timestamp": "2025-12-06T00:00:00.000000Z"}, {"uuid": "538bf614-a082-4d88-9e4a-89d0d5b5ce36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-23)", "content": "", "creation_timestamp": "2026-02-23T00:00:00.000000Z"}, {"uuid": "b5968986-816c-486b-a784-bbef673b0222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-08)", "content": "", "creation_timestamp": "2025-12-08T00:00:00.000000Z"}, {"uuid": "c8d2de58-3e54-4c9e-9ed3-6a8facd669cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-10)", "content": "", "creation_timestamp": "2026-02-10T00:00:00.000000Z"}, {"uuid": "e758f561-9352-43c7-800b-674370263e2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "c9430cc7-a7aa-4a66-9a4b-e0bf7111ea63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-09)", "content": "", "creation_timestamp": "2025-12-09T00:00:00.000000Z"}, {"uuid": "a9a644c2-75fb-4380-97ae-d034ac3ed763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-13)", "content": "", "creation_timestamp": "2025-12-13T00:00:00.000000Z"}, {"uuid": "3c4f0708-5855-4f95-8b05-b29b78386d7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "ce0cd347-cfb6-41ba-8a23-2687e4e5d483", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3me2wkrxivt2q", "content": "", "creation_timestamp": "2026-02-04T22:32:28.886730Z"}, {"uuid": "5e4a57ea-5a86-4ef1-a982-9183e0cb953f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-12)", "content": "", "creation_timestamp": "2025-12-12T00:00:00.000000Z"}, {"uuid": "fd7ad22f-1f37-4405-9e3d-fa97172f3895", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-14)", "content": "", "creation_timestamp": "2025-12-14T00:00:00.000000Z"}, {"uuid": "220f62fc-e8a9-4f7e-a988-ecab9c634f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-16)", "content": "", "creation_timestamp": "2026-02-16T00:00:00.000000Z"}, {"uuid": "f1f92bb2-2c65-4822-974d-695cf1c0be44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2019-19781", "type": "seen", "source": "https://gist.github.com/PhaedrusFlow/a7dc795d73e01f67b71a985b9a821996", "content": "", "creation_timestamp": "2026-02-09T00:13:57.000000Z"}, {"uuid": "cc41070f-21a3-48fe-b188-209bf8a4c46c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-09)", "content": "", "creation_timestamp": "2026-02-09T00:00:00.000000Z"}, {"uuid": "3ea3b9c9-a504-4011-9aec-ee63e284a748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-02)", "content": "", "creation_timestamp": "2026-02-02T00:00:00.000000Z"}, {"uuid": "7c97eb85-0bd0-412a-b59a-ef21f513409a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-19)", "content": "", "creation_timestamp": "2025-12-19T00:00:00.000000Z"}, {"uuid": "bbfb9d94-bbbe-419a-a4bb-7bfd9f57c04e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-21)", "content": "", "creation_timestamp": "2025-12-21T00:00:00.000000Z"}, {"uuid": "83fc88ea-49d6-4f5e-a2f7-ae6c1a862001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-22)", "content": "", "creation_timestamp": "2025-12-22T00:00:00.000000Z"}, {"uuid": "f076353b-385e-4b06-9bc3-dfce593d64cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "261e2b22-d703-4460-b244-22b505f76463", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-02)", "content": "", "creation_timestamp": "2026-03-02T00:00:00.000000Z"}, {"uuid": "cb5574d2-da60-4d28-bc70-62e559e19571", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-26)", "content": "", "creation_timestamp": "2025-12-26T00:00:00.000000Z"}, {"uuid": "9a08a7a4-1dd7-4dd8-9e3a-9fa11b640696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "783352bf-c98e-469a-a6ca-18270a8bea9e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-28)", "content": "", "creation_timestamp": "2025-12-28T00:00:00.000000Z"}, {"uuid": "873258d6-68d7-4b30-b0d8-51fbe357e15e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-27)", "content": "", "creation_timestamp": "2025-12-27T00:00:00.000000Z"}, {"uuid": "7fe99c95-9234-4bf0-9d36-58d8bba9ec1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-26)", "content": "", "creation_timestamp": "2026-02-26T00:00:00.000000Z"}, {"uuid": "19d10f4c-07c7-4159-bd54-34ed0be48e74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-31)", "content": "", "creation_timestamp": "2025-12-31T00:00:00.000000Z"}, {"uuid": "3da87d0c-47cd-412f-a64d-f732cd411563", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "e09f7fd5-3ae1-4b03-8404-214713e12c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-29)", "content": "", "creation_timestamp": "2025-12-29T00:00:00.000000Z"}, {"uuid": "5ebbb31e-0345-4642-b83c-70e131bb4cbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)", "content": "", "creation_timestamp": "2026-01-01T00:00:00.000000Z"}, {"uuid": "8711fd41-e9aa-4aba-b57f-0c5f1337ec19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}, {"uuid": "cbed5bff-ad38-4de4-bd39-366ea364d8d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-30)", "content": "", "creation_timestamp": "2025-12-30T00:00:00.000000Z"}, {"uuid": "d9f8c694-05e2-46a7-b918-a2a03d5e8ca2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "ab7f9f4c-b5ec-432d-9962-fdab8907ce58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "15a2ced1-1c0d-4d2d-a1ce-25cc5bf48996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-02)", "content": "", "creation_timestamp": "2026-01-02T00:00:00.000000Z"}, {"uuid": "87d8d488-f20f-4cbc-b91f-4b454815e3d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-02)", "content": "", "creation_timestamp": "2026-01-02T00:00:00.000000Z"}, {"uuid": "57340509-a47b-40d7-804b-fbbce67be6c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "1582067f-346c-464f-9d18-ff52c5dd98af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-05)", "content": "", "creation_timestamp": "2026-01-05T00:00:00.000000Z"}, {"uuid": "a59245ed-da64-46e8-8152-2bb46c930739", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "793823dc-96cc-41e7-8b62-2c3cdd54019f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-07)", "content": "", "creation_timestamp": "2026-03-07T00:00:00.000000Z"}, {"uuid": "ca510811-d6dd-4bcc-a924-2c4bcf4492f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-06)", "content": "", "creation_timestamp": "2026-01-06T00:00:00.000000Z"}, {"uuid": "5153f04c-bf88-4268-9aa3-f0f180813110", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-05)", "content": "", "creation_timestamp": "2026-03-05T00:00:00.000000Z"}, {"uuid": "ff0aee75-4a30-41b5-93e5-9c4bb7d779a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/vakava-haavoittuvuus-citrix-adc-seka-citrix-gateway-tuotteissa", "content": "", "creation_timestamp": "2019-12-18T09:20:08.000000Z"}, {"uuid": "2e944380-5a4a-4134-a394-a0f85a1672f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "e7cedcf1-b118-44cd-90bd-d3827dd53771", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "b7d87396-2899-454e-b6d3-1cc44d0cf5e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-26)", "content": "", "creation_timestamp": "2026-03-26T00:00:00.000000Z"}, {"uuid": "26d3f071-c024-4b40-868f-bb238fdbdd2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=444", "content": "", "creation_timestamp": "2020-01-13T04:00:00.000000Z"}, {"uuid": "5175487c-f627-465f-ae5d-9701e88349e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/ajankohtaista/citrix-adc-haavoittuvuutta-hyvaksikaytetaan-aktiivisesti", "content": "", "creation_timestamp": "2020-01-13T08:35:38.000000Z"}, {"uuid": "da19bec8-ca9d-4535-849f-8da76af22e53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "c03ab10e-96ab-4f97-b4bc-2c31de5e0ea6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "cf7f3aed-8cf4-4f34-8d94-85d625ae04ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-23)", "content": "", "creation_timestamp": "2026-03-23T00:00:00.000000Z"}, {"uuid": "147cbe42-0599-4885-956d-b8e667b42ab3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-26)", "content": "", "creation_timestamp": "2026-03-26T00:00:00.000000Z"}, {"uuid": "70c0f5c0-c72f-4b95-af79-7516386c55ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "6f39f140-3c2b-40f4-b3ac-3788444cb5ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-16)", "content": "", "creation_timestamp": "2026-03-16T00:00:00.000000Z"}, {"uuid": "68caefb8-717f-4d7d-8874-05d63ee36e43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-13)", "content": "", "creation_timestamp": "2026-01-13T00:00:00.000000Z"}, {"uuid": "1ee57c8a-6a81-47b5-8cc6-508000f30f81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-12)", "content": "", "creation_timestamp": "2026-03-12T00:00:00.000000Z"}, {"uuid": "3b034c1e-d7e8-42c9-a847-9aa3e5ea94db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-13)", "content": "", "creation_timestamp": "2026-01-13T00:00:00.000000Z"}, {"uuid": "06502323-5a95-40c6-b5c1-01778f101068", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-14)", "content": "", "creation_timestamp": "2026-01-14T00:00:00.000000Z"}, {"uuid": "19e1486b-00e1-44c9-b903-49ef665af92e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-13)", "content": "", "creation_timestamp": "2026-03-13T00:00:00.000000Z"}, {"uuid": "94f3d51d-bec1-40e8-a2ce-294e5ecef9c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2019-19789", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-076-01", "content": "", "creation_timestamp": "2026-03-17T12:00:00.000000Z"}, {"uuid": "0da924ef-4314-4bdb-b6f2-d0afa51c9ab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-19)", "content": "", "creation_timestamp": "2026-01-19T00:00:00.000000Z"}, {"uuid": "06279bb9-34a8-44b0-850e-f91489916763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "42f20bbe-bbba-4e3f-a774-b7f301afa7fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "357a0fcf-1f3b-46c2-91b9-a4291770895b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/e6f3313b-3050-455d-b8c1-904c7ec804df", "content": "", "creation_timestamp": "2026-01-24T01:59:20.000000Z"}, {"uuid": "7ed05f6c-4d20-4bb3-ac6a-1a9c5a309222", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-23)", "content": "", "creation_timestamp": "2026-01-23T00:00:00.000000Z"}, {"uuid": "626bcdf9-69c1-47ad-9b55-a2e0a5c17033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-26)", "content": "", "creation_timestamp": "2026-01-26T00:00:00.000000Z"}, {"uuid": "df4d4a60-5f36-4dc4-8744-bd22265fb59b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/f4fe6680-3c0a-4afb-a69d-ab1c3d5cf4e0", "content": "", "creation_timestamp": "2026-02-02T12:28:42.218135Z"}, {"uuid": "eb3c0774-9126-49c5-825f-3e746c420378", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-30)", "content": "", "creation_timestamp": "2026-03-30T00:00:00.000000Z"}, {"uuid": "cd08149a-fdf3-4629-b91d-c2f35e416140", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-11)", "content": "", "creation_timestamp": "2026-04-11T00:00:00.000000Z"}, {"uuid": "1524efeb-a771-41c3-97ef-36b76a8f9312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-06)", "content": "", "creation_timestamp": "2026-04-06T00:00:00.000000Z"}, {"uuid": "bee1daa5-c3ad-41e2-9ce1-82ae91c54354", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/cKure/2079", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Contractor working for #Iran sells exploits to hackers.\n\nPulse Secure \"Connect\" enterprise VPNs (CVE-2019-11510)\n\nFortinet VPN servers running FortiOS (CVE-2018-13379)\n\nPalo Alto Networks \"Global Protect\" VPN servers (CVE-2019-1579)\n\nCitrix \"ADC\" servers and Citrix network gateways (CVE-2019-19781)\n\nF5 Networks BIG-IP load balancers (CVE-2020-5902)\n\nhttps://www.zdnet.com/google-amp/article/iranian-hackers-are-selling-access-to-compromised-companies-on-an-underground-forum/", "creation_timestamp": "2020-09-03T12:47:35.000000Z"}, {"uuid": "c5ef8bdc-865e-45bc-bcf0-be4d1a2ea0e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/cKure/2514", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Hunting CVE-2019\u201319781(Remote Code Execution).\n\nhttps://medium.com/@pravinponnusamy/bug-hunting-cve-2019-19781-remote-code-execution-26c502b7552b", "creation_timestamp": "2020-10-13T11:37:12.000000Z"}, {"uuid": "ad5d751e-c641-4a12-99b4-806b70a14214", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-14)", "content": "", "creation_timestamp": "2026-04-14T00:00:00.000000Z"}, {"uuid": "2f741696-1e84-42a0-9fa6-26bc8a75cdf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-13)", "content": "", "creation_timestamp": "2026-04-13T00:00:00.000000Z"}, {"uuid": "0dab5404-52b4-4d6e-84b3-839b71fe40bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "789e9b71-6d24-4fa9-8eaa-3d9f5fd42af3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ptswarm/63", "content": "\ud83d\ude48\ud83d\ude49\ud83d\ude4aCitrix has removed the acknowledgement of our researcher Mikhail Klyuchnikov who discovered and reported CVE-2019-19781 - the Citrix ADC RCE!\n\nCurrent: https://support.citrix.com/article/CTX267027\n\nMar 2021: http://web.archive.org/web/20210321090412/https://support.citrix.com/article/CTX267027", "creation_timestamp": "2021-08-23T14:45:06.000000Z"}, {"uuid": "cdffd59c-9dec-480c-9945-1f3e43db9bc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/5e7cd3bc-e4b0-4682-bede-07250a95120b", "content": "", "creation_timestamp": "2026-04-19T22:20:11.000000Z"}, {"uuid": "2d583895-a1db-47c4-8ff3-52fb03583901", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "68c96fa6-fb31-4372-b36c-0f179f4b4265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-20)", "content": "", "creation_timestamp": "2026-04-20T00:00:00.000000Z"}, {"uuid": "3ab21153-4157-4bd2-8bb1-5b73e17dff5f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-27)", "content": "", "creation_timestamp": "2026-04-27T00:00:00.000000Z"}, {"uuid": "99ab9c05-3cef-41dd-b895-c5bb0ead0dbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/antichat/7612", "content": "https://github.com/trustedsec/cve-2019-19781/blob/master/citrixmash.py", "creation_timestamp": "2020-01-11T21:28:06.000000Z"}, {"uuid": "97dfa4de-f523-4c38-bf31-3bb2a9de1ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7630", "content": "\u200b\u200b\u041a\u0441\u0442\u0430\u0442\u0438 \u043e \u0445\u0430\u043d\u0438\u043f\u043e\u0442\u0430\u0445, \u0432\u043e\u0442 \u0433\u043e\u0442\u043e\u0432\u044b\u0439 \u043f\u043e\u0434 Shitrix \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f. \u041e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2019-19781.\n\n&gt; https://github.com/MalwareTech/CitrixHoneypot\n\n\u0410 \u0432\u043e\u043e\u0431\u0449\u0435, \u0434\u043b\u044f \u043b\u044e\u0431\u0438\u0442\u0435\u043b\u0435\u0439 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0448\u0442\u0443\u043a, \u0435\u0441\u0442\u044c \u0441\u0443\u043f\u0435\u0440 \u0443\u0434\u043e\u0431\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 T-Pot, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u0432 \u0441\u0447\u0438\u0442\u0430\u043d\u043d\u044b\u0435 \u043c\u0438\u043d\u0443\u0442\u044b \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u0441\u0432\u043e\u044e Honeypot-\u043b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u044e \u0441 \u043a\u0443\u0447\u0435\u0439 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u043e\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u0440\u0443\u0442\u043e\u0439 \u0432\u0438\u0437\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439. \n\n\u0414\u043b\u044f \u043b\u044e\u0431\u0438\u0442\u0435\u043b\u0435\u0439 \u043f\u043e\u0445\u0432\u0430\u0441\u0442\u0430\u0442\u044c\u0441\u044f \u043f\u0435\u0440\u0435\u0434 \u043d\u0430\u0447\u0430\u043b\u044c\u0441\u0442\u0432\u043e\u043c \u0431\u0443\u0434\u0435\u0442 \u0441\u0430\u043c\u043e\u0435 \u0442\u043e :)\n\n&gt; https://github.com/dtag-dev-sec/tpotce", "creation_timestamp": "2020-01-14T08:57:28.000000Z"}, {"uuid": "b4974bd9-c4ab-44c9-bb66-ff188f1f2ec3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/antichat/7627", "content": "\u0410 \u0432\u043e\u0442 \u0438 \u043c\u043e\u0434\u0443\u043b\u044c \u043f\u043e\u0434 Metasploit \u0434\u043b\u044f CVE-2019-19781 aka Shitrix \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438. \n\nhttps://github.com/rapid7/metasploit-framework/blob/a64b0fa9e75befc3ffdb6129e88a6f6dd4c31208/modules/exploits/unix/webapp/citrix_dir_trasversal_rce.rb", "creation_timestamp": "2020-01-13T16:01:01.000000Z"}, {"uuid": "fbc999b2-30fd-46d2-ae6f-a6db84d66a1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/antichat/7613", "content": "https://github.com/projectzeroindia/CVE-2019-19781", "creation_timestamp": "2020-01-11T21:28:19.000000Z"}, {"uuid": "2c844f05-a2e7-4180-8220-96e54d8b546b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/6580", "content": "CISA Releases Test Tool for Citrix ADC CVE-2019-19781 Vulnerability\n\nDHS CISA released a public domain tool designed to help security staff to test if their\u00a0organizations are vulnerable to ongoing attacks that might target the\u00a0CVE-2019-19781\u00a0security flaw impacting the Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway) products. [...]\n\nhttps://www.bleepingcomputer.com/news/security/cisa-releases-test-tool-for-citrix-adc-cve-2019-19781-vulnerability/", "creation_timestamp": "2020-01-13T22:17:21.000000Z"}, {"uuid": "27014ad5-a30e-4566-95a8-9a77f0f0b2af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/6571", "content": "Citrix ADC CVE-2019-19781 Exploits Released, Fix Now!\n\nNumerous working exploits for the Citrix ADC (NetScaler) CVE-2019-1978 vulnerability are finally here and have been publicly posted in numerous locations. There is no patch available for this vulnerability, but Citrix has provided mitigations, which should be applied now! [...]\n\nhttps://www.bleepingcomputer.com/news/security/citrix-adc-cve-2019-19781-exploits-released-fix-now/", "creation_timestamp": "2020-01-11T19:02:32.000000Z"}, {"uuid": "f689d7ae-e82f-466b-a7a5-5cb0d985b9fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/6571", "content": "Citrix ADC CVE-2019-19781 Exploits Released, Fix Now!\n\nNumerous working exploits for the Citrix ADC (NetScaler) CVE-2019-1978 vulnerability are finally here and have been publicly posted in numerous locations. There is no patch available for this vulnerability, but Citrix has provided mitigations, which should be applied now! [...]\n\nhttps://www.bleepingcomputer.com/news/security/citrix-adc-cve-2019-19781-exploits-released-fix-now/", "creation_timestamp": "2020-01-11T19:02:32.000000Z"}, {"uuid": "c1bcc6af-726b-4cb0-bd37-473091afbaca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6552", "content": "Attackers Are Scanning for Vulnerable Citrix Servers, Secure Now\n\nSecurity researchers have observed ongoing scans for Citrix Application Delivery Controller (NetScaler ADC) and Citrix Gateway (NetScaler Gateway) servers vulnerable to attacks exploiting CVE-2019-19781\u00a0during the last week. [...]\n\nhttps://www.bleepingcomputer.com/news/security/attackers-are-scanning-for-vulnerable-citrix-servers-secure-now/", "creation_timestamp": "2020-01-08T18:00:15.000000Z"}, {"uuid": "54e767cc-e192-4616-9c2d-3108a9bb3f26", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6614", "content": "Hackers Are Securing Citrix Servers, Backdoor Them for Access\n\nAn unknown threat actor is currently scanning for and securing vulnerable Citrix ADC servers against CVE-2019-19781 exploitation attempts, while also backdooring them for future access. [...]\n\nhttps://www.bleepingcomputer.com/news/security/hackers-are-securing-citrix-servers-backdoor-them-for-access/", "creation_timestamp": "2020-01-17T17:35:43.000000Z"}, {"uuid": "0bae9d4a-8560-447c-9a9d-03ab63c14a11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6611", "content": "Dutch Govt Suggests Turning Off Citrix ADC Devices, Mitigations May Fail\n\nMitigation recommendations for CVE-2019-19781, a currently unpatched critical flaw affecting Citrix Application Delivery Controller (ADC) and Citrix Gateway, do not have the expected effect on all product versions. [...]\n\nhttps://www.bleepingcomputer.com/news/security/dutch-govt-suggests-turning-off-citrix-adc-devices-mitigations-may-fail/", "creation_timestamp": "2020-01-17T00:09:38.000000Z"}, {"uuid": "412c32d5-fc9b-4f5d-9f40-e5964d32a1ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6645", "content": "Citrix Releases Scanner to Detect Hacked Citrix ADC Appliances\n\nCitrix released a free scanner for detecting compromised Citrix Application Delivery Controller (ADC), Citrix Gateway, and\u00a0Citrix SD-WAN WANOP\u00a0appliances by digging for indicators of compromise (IoC) collected in incident response engagements related to CVE-2019-19781 exploitation. [...]\n\nhttps://www.bleepingcomputer.com/news/security/citrix-releases-scanner-to-detect-hacked-citrix-adc-appliances/", "creation_timestamp": "2020-01-22T19:39:04.000000Z"}, {"uuid": "5190ce70-b523-4844-8ad1-3154ee90806e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6622", "content": "Citrix Patches CVE-2019-19781 Flaw in Citrix ADC 11.1 and 12.0\n\nCitrix released permanent fixes for the actively exploited CVE-2019-19781 vulnerability\u00a0impacting Citrix Application Delivery Controller (ADC), Citrix Gateway, and\u00a0Citrix SD-WAN WANOP\u00a0appliances and allowing unauthenticated attackers to perform arbitrary code execution. [...]\n\nhttps://www.bleepingcomputer.com/news/security/citrix-patches-cve-2019-19781-flaw-in-citrix-adc-111-and-120/", "creation_timestamp": "2020-01-20T00:09:03.000000Z"}, {"uuid": "013f9993-e8aa-4f25-8a55-4c00fb01129d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6859", "content": "DoppelPaymer Hacked Bretagne T\u00e9l\u00e9com Using the Citrix ADC Flaw\n\nCloud services provider\u00a0Bretagne T\u00e9l\u00e9com\u00a0was hacked by the threat actors behind the DoppelPaymer Ransomware\u00a0using an exploit that targeted servers unpatched against the CVE-2019-19781 vulnerability. [...]\n\nhttps://www.bleepingcomputer.com/news/security/doppelpaymer-hacked-bretagne-t-l-com-using-the-citrix-adc-flaw/", "creation_timestamp": "2020-02-26T19:07:36.000000Z"}, {"uuid": "96564ab4-ad00-4a90-abe6-9b90cb68d763", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6676", "content": "Ragnarok Ransomware Targets Citrix ADC, Disables Windows Defender\n\nA new ransomware called Ragnarok has been detected being used in targeted attacks against unpatched Citrix ADC servers vulnerable to the CVE-2019-19781 exploit. [...]\n\nhttps://www.bleepingcomputer.com/news/security/ragnarok-ransomware-targets-citrix-adc-disables-windows-defender/", "creation_timestamp": "2020-01-28T19:52:12.000000Z"}, {"uuid": "cc526c98-3bd7-4c06-9f09-6d52589ca50d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6666", "content": "Patching the Citrix ADC Bug Doesn't Mean You Weren't Hacked\n\nCitrix on Friday released the final patch for the critical vulnerability tracked as CVE-2019-19781 in its affected appliances. Many organizations are still at risk, though, as they continue to run Citrix servers without a fix or the advised [...]\n\nhttps://www.bleepingcomputer.com/news/security/patching-the-citrix-adc-bug-doesnt-mean-you-werent-hacked/", "creation_timestamp": "2020-01-26T17:03:46.000000Z"}, {"uuid": "3ca0efc8-8213-4f79-87f6-0d8cb8b2e109", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/true_secator/7335", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 F6 \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e\u043c \u043d\u0430\u0441\u0442\u0443\u043f\u043b\u0435\u043d\u0438\u0438 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b Kinsing (H2Miner \u0438\u00a0Resourceful Wolf) \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0437\u0430 \u0440\u0443\u0431\u0435\u0436\u043e\u043c \u0441 2019 \u0433\u043e\u0434\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0441\u0432\u043e\u0435 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043e\u0442\u00a0\u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Kinsing, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u043e\u043d\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u00a0\u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a\u0430\u0445.\n\n\u041e\u043d\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043d\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0434\u0436\u0435\u043a\u0438\u043d\u0433\u0435 - \u0437\u043b\u043e\u0443\u043f\u043e\u0442\u0440\u0435\u0431\u043b\u0435\u043d\u0438\u0438 \u0432\u044b\u0447\u0438\u0441\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0434\u043b\u044f \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u044b, \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e Monero (XMR), \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0430 \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u0438 \u0438 \u043f\u0440\u043e\u0434\u0432\u0438\u0436\u0435\u043d\u0438\u0438 \u0431\u043e\u0442\u043d\u0435\u0442\u043e\u0432.\n\n\u0411\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u0430\u0442\u0430\u043a \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043d\u044b \u0432 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435, \u0417\u0430\u043f\u0430\u0434\u043d\u043e\u0439 \u0415\u0432\u0440\u043e\u043f\u0435 \u0438 \u0410\u0437\u0438\u0438. \n\n\u0412 2024 \u0433\u043e\u0434\u0443 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438 \u043e\u0431 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0438 \u0430\u0442\u0430\u043a Kinsing, \u043d\u0435 \u043e\u0431\u043e\u0437\u043d\u0430\u0447\u0430\u044f \u0446\u0435\u043b\u044c \u0430\u0442\u0430\u043a\u0438 \u0438 \u0440\u0430\u0441\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u0435, \u0430 \u0432 2025 \u0432\u043f\u0435\u0440\u0432\u044b\u0435 \u043d\u0430\u0447\u0430\u043b\u0438 \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0442\u044c \u043f\u043e RU.\n\n\u0412\u0435\u0441\u043d\u043e\u0439 \u043e\u0434\u0438\u043d \u0438\u0437 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 F6 \u0437\u0430\u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u043b \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0441\u0432\u043e\u0438 \u0432\u043d\u0435\u0448\u043d\u0438\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430.\n\n\u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0442\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 IoCs, \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u0438 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432\u044b\u044f\u0432\u043b\u044f\u0435\u043c\u044b\u0445 TTPs \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0432\u044b\u0448\u043b\u0438 \u043d\u0430 \u0441\u043b\u0435\u0434 Kinsing.\n\n\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0446\u0435\u043b\u044c Kinsing - \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u043c\u0430\u0439\u043d\u0438\u043d\u0433\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442.\n\n\u0412 \u043e\u0442\u043b\u0438\u0447\u0438\u0435 \u043e\u0442\u00a0\u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u0430 \u0434\u0440\u0443\u0433\u0438\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043e\u043a,\u00a0Kinsing\u00a0\u043d\u0435 \u043f\u0440\u0438\u0431\u0435\u0433\u0430\u0435\u0442 \u043a\u00a0\u0444\u0438\u0448\u0438\u043d\u0433\u043e\u0432\u044b\u043c \u0430\u0442\u0430\u043a\u0430\u043c, \u0441\u043a\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u0432\u044b\u044f\u0432\u043b\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0437\u0430\u0442\u0435\u043c \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0442 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435.\n\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0447\u0430\u0441\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438: CVE-2017-9841, CVE-2019-17564, CVE-2019-19781, CVE-2020-10684, CVE-2020-17519, CVE-2020-5902, CVE-2020-9480, CVE-2021-26084, CVE-2021-41773, CVE-2021-44228, CVE-2022-24706, CVE-2022-26134, CVE-2023-35042.\n\n\u0412 \u0441\u043b\u0443\u0447\u0430\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u043e \u0436\u0435\u0440\u0442\u0432\u044b \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442\u0441\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0441\u043a\u0440\u0438\u043f\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0438\u0449\u0435\u0442 \u043c\u0430\u0439\u043d\u0435\u0440\u044b \u043a\u043e\u043d\u043a\u0443\u0440\u0435\u043d\u0442\u043e\u0432, \u0443\u0434\u0430\u043b\u044f\u0435\u0442 \u0438\u0445 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439.\n\n\u0410\u0442\u0430\u043a\u0438 Kinsing \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u044b \u043d\u0430\u00a0\u0441\u0435\u0440\u0432\u0435\u0440\u043d\u044b\u0435 Linux-\u0441\u0438\u0441\u0442\u0435\u043c\u044b, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0432\u00a0\u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0438\u00a0\u043a\u043e\u043d\u0442\u0435\u0439\u043d\u0435\u0440\u043d\u044b\u0445 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u0445\n\n\u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u00a0\u043e\u0448\u0438\u0431\u043a\u0438 \u0432\u00a0\u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u0432\u00a0\u0442\u0430\u043a\u0438\u0445 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430\u0445, \u043a\u0430\u043a Docker, Kubernetes, Redis \u0438\u00a0PostgreSQL, \u0430\u00a0\u0442\u0430\u043a\u0436\u0435 \u0432\u00a0\u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 - Apache Log4j, Tomcat, NiFi, Confluence, Citrix, WebLogic \u0438\u00a0\u0434\u0440\u0443\u0433\u0438\u0445.\n\n\u0414\u043b\u044f \u043a\u0430\u0436\u0434\u043e\u0439 \u0446\u0435\u043b\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0441\u043a\u0440\u0438\u043f\u0442\u044b (\u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440,\u00a0lh.sh\u00a0\u0434\u043b\u044f\u00a0Log4Shell), \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0440\u0430\u0437\u0432\u043e\u0440\u0430\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043c\u0430\u0439\u043d\u0435\u0440\u044b \u0438\u00a0\u0441\u0430\u043c \u0431\u0438\u043d\u0430\u0440\u043d\u0438\u043a Kinsing.\n\n\u0420\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u0438\u044f - \u0437\u0430\u043c\u0435\u0434\u043b\u0435\u043d\u0438\u0435 \u0440\u0430\u0431\u043e\u0442\u044b, \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0441\u043a\u043e\u0440\u0435\u043d\u043d\u044b\u0439 \u0438\u0437\u043d\u043e\u0441 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f (\u043e\u0442\u00a0\u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438\u00a0\u043f\u0440\u0438\u043c\u0435\u043d\u0451\u043d\u043d\u044b\u0445 \u043c\u0435\u0442\u043e\u0434\u043e\u0432 \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0434\u043e \u0438\u0442\u043e\u0433\u043e\u0432\u043e\u0439 \u0430\u0442\u0440\u0438\u0431\u0443\u0446\u0438\u0438 \u0430\u0442\u0430\u043a\u0438 \u0438\u00a0\u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439) \u0438 IOCs - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2025-08-15T16:40:05.000000Z"}, {"uuid": "ec372dfd-2b0f-4cde-9a6c-9b33cfe43dd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/HackingCiberseguridad/333", "content": "CVE-2019-19781\n\nEjecuci\u00f3n remota de c\u00f3digo (RCE) en Citrix Application Delivery Controller y Citrix Gateway\n\nVulnerabilidad en Citrix Application Delivery Controller (ADC) anteriormente conocido como NetScaler ADC y Citrix Gateway anteriormente conocido como NetScaler Gateway que, si se explota, podr\u00eda permitir que un atacante no autenticado realice la ejecuci\u00f3n de c\u00f3digo arbitrario.\n\nhttps://github.com/mpgn/CVE-2019-19781", "creation_timestamp": "2020-04-17T22:01:39.000000Z"}, {"uuid": "bd1b83f4-2942-4787-aedb-6ed6d86e21bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/BleepingComputer/6661", "content": "Citrix Releases Final Patch as Ransomware Attacks Ramp Up\n\nCitrix released the final permanent fix for the actively exploited CVE-2019-19781 vulnerability,\u00a0needed to secure all vulnerable\u00a0Citrix Application Delivery Controller (ADC), Citrix Gateway, and Citrix SD-WAN WANOP appliances. [...]\n\nhttps://www.bleepingcomputer.com/news/security/citrix-releases-final-patch-as-ransomware-attacks-ramp-up/", "creation_timestamp": "2020-01-24T20:54:27.000000Z"}, {"uuid": "34274585-688e-4a19-b6db-b171aba7ab89", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/alexmakus/4029", "content": "NSA encourages its customers to mitigate against the following publicly known vulnerabilities:\n \u25aa CVE-2018-13379 Fortinet FortiGate VPN\n \u25aa CVE-2019-9670 Synacor Zimbra Collaboration Suite\n \u25aa CVE-2019-11510 Pulse Secure Pulse Connect Secure VPN\n \u25aa CVE-2019-19781 Citrix Application Delivery Controller and Gateway\n \u25aa CVE-2020-4006 VMware Workspace ONE Access\n\n\nhttps://www.fbi.gov/news/pressrel/press-releases/russian-foreign-intelligence-service-exploiting-five-publicly-known-vulnerabilities-to-compromise-us-and-allied-networks", "creation_timestamp": "2021-04-16T05:21:30.000000Z"}, {"uuid": "ac034f03-3bcb-4494-b9e3-b5d5fb406852", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/3231", "content": "\u043d\u0435\u043c\u043d\u043e\u0436\u043a\u043e \u043f\u0440\u043e\u0445\u043b\u043e\u043f\u0430\u043b shitstorm \u0441 Citrix \u0432 \u043a\u043e\u043d\u0446\u0435 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0438. CVE-2019-19781 - RCE \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 Citrix, \u0443\u0436\u0435 \u0441 \u043a\u043e\u0434\u043e\u043c \u043d\u0430 \u0413\u0438\u0442\u0445\u0430\u0431\u0435. \u0417\u0430\u0431\u0430\u0432\u043d\u044b\u0439 \u0444\u0430\u043a\u0442, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0430\u0437\u044b\u0432\u0430\u044e\u0442 Shitrix, \u043e\u043d\u0430 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 Citrix Application Delivery Controller (ADC) \u0438 Citrix Gateway\n\nhttps://github.com/projectzeroindia/CVE-2019-19781\n\n\u0414\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435: \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0439 proof of concept \nhttps://github.com/trustedsec/cve-2019-19781\n\nCitrix \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 \u0441 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\u043c\u0438, \u043d\u043e \u043f\u0430\u0442\u0447\u0430 \u043f\u043e\u043a\u0430 \u043d\u0435\u0442, \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0431\u0430\u0433 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0439 \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0435\u043c\u0443 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b, \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e.   \nhttps://support.citrix.com/article/CTX267027\n\nShodan \u0443\u0436\u0435 \u0434\u043e\u0431\u0430\u0432\u0438\u043b \u043f\u043e\u0434\u0434\u0435\u0436\u0440\u0436\u0443 \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\nhttps://twitter.com/shodanhq/status/1216053953366056960", "creation_timestamp": "2020-01-13T15:22:42.000000Z"}, {"uuid": "20392e33-ee2e-4307-b8a4-1f5908f9d3a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/N0iSeBit/363", "content": "\u041d\u0435\u0434\u0430\u0432\u043d\u044f\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f Citrix/Netscaler (CVE-2019-19781) \u0434\u043e\u0432\u043e\u043b\u044c\u043d\u043e \u043b\u0435\u0433\u043a\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0438 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e PoC \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e \u0432 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0435 \n\ud83d\udc49 https://github.com/jas502n/CVE-2019-19781\n\ud83d\udc49 https://github.com/rapid7/metasploit-framework/blob/a64b0fa9e75befc3ffdb6129e88a6f6dd4c31208/modules/exploits/unix/webapp/citrix_dir_trasversal_rce.rb\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0432\u043e\u0434\u0438\u0442\u0441\u044f \u043a \u0442\u0438\u043f\u0438\u0447\u043d\u043e\u043c\u0443 directory traversal \u0438 \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043f\u0440\u043e\u0441\u0442\u0430\u044f \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 (\u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0435\u0435 \ud83d\udc49 https://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/). \n\n\u041e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u043e\u0431\u0435\u0449\u0430\u044e\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u0432 \u043a\u043e\u043d\u0446\u0435 \u043c\u0435\u0441\u044f\u0446\u0430, \u0442\u0430\u043a \u0447\u0442\u043e \u0432\u0441\u0435 \u043e\u0431\u043b\u0430\u0434\u0430\u0442\u0435\u043b\u0438 Citrix \u043f\u043e\u043b\u0443\u0447\u0430\u0442 \u043d\u0435\u0437\u0430\u0431\u044b\u0432\u0430\u0435\u043c\u043e\u0435 \u043d\u0430\u0447\u0430\u043b\u043e \u0433\u043e\u0434\u0430 \ud83d\ude40\ud83d\udd25", "creation_timestamp": "2020-01-14T04:50:15.000000Z"}, {"uuid": "71d03b96-ce9b-4a63-9780-53af70cb8de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/cybershit/649", "content": "\u0410 \u0432\u043e\u0442 \u0438 \u043c\u043e\u0434\u0443\u043b\u044c \u043f\u043e\u0434 Metasploit \u0434\u043b\u044f CVE-2019-19781 aka Shitrix \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438. \n\nhttps://github.com/rapid7/metasploit-framework/blob/a64b0fa9e75befc3ffdb6129e88a6f6dd4c31208/modules/exploits/unix/webapp/citrix_dir_trasversal_rce.rb", "creation_timestamp": "2020-01-13T16:56:21.000000Z"}, {"uuid": "bfa7ca56-e74d-40ad-ac17-fff96725c75e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/cybershit/648", "content": "\u0412\u0441\u0435\u043c \u043f\u0440\u0438\u0432\u0435\u0442 \u0438\u0437 2020. \u042f \u0436\u0438\u0432. \u041a\u0430\u0436\u0435\u0442\u0441\u044f \u043c\u043e\u0436\u043d\u043e \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0442\u044c.\n\n\u0417\u0430 \u043d\u043e\u0432\u043e\u0433\u043e\u0434\u043d\u0438\u0435 \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u043b\u043e, \u043f\u043e\u0447\u0442\u0438, \u0437\u0430 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 PayPal \u0438... \u043a\u043e\u043d\u0435\u0447\u043d\u043e \u0436\u0435 CVE-2019-19781 \u2014 Path traversal, \u0430 \u043f\u043e\u0442\u043e\u043c \u0438 RCE \u0432 \u0421itrix Application Delivery Controller \u0438 Citrix Gateway. \u0423\u044f\u0437\u0432\u0438\u043c\u044b \u0432\u0435\u0440\u0441\u0438\u0438: 10.5, 11.1, 12.0, 12.1, 13.0.\n\n\u0412 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0439 \u0438\u0441\u0442\u043e\u0440\u0438\u0438 \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u043e, \u0447\u0442\u043e \u043d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0435\u0449\u0435 \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u0434\u0435\u043a\u0430\u0431\u0440\u044f, \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u043d\u0430 \u0434\u043d\u044f\u0445 \u0432\u0441\u0435 \u0440\u0430\u0441\u043a\u0440\u0443\u0442\u0438\u043b\u0438 \u0434\u043e RCE, \u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0438\u0441\u044c \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u044b.\n\n\u0412\u0441\u044e \u0445\u0440\u043e\u043d\u043e\u043b\u043e\u0433\u0438\u044e \u0441\u043e\u0431\u044b\u0442\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440\u044b \u0434\u043b\u044f \u0432\u0430\u0448\u0438\u0445 IDS \u0438 SIEM, \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 \u043d\u0430 https://www.reddit.com/r/blueteamsec/comments/en4m7j/multiple_exploits_for_cve201919781_citrix/, \u0430 \u0432\u043e\u043e\u0431\u0449\u0435 \u043d\u0430\u0434\u0435\u044e\u0441\u044c \u0432\u044b \u043e\u0431\u043d\u043e\u0432\u0438\u043b\u0438\u0441\u044c.\n\n\u041c\u0430\u0442\u0435\u0440\u0438\u0430\u043b \u043f\u0440\u043e PayPal: https://medium.com/@alex.birsan/the-bug-that-exposed-your-paypal-password-539fc2896da9\n\n\u0412 \u043e\u0431\u0449\u0435\u043c, \u043f\u0440\u0430\u0437\u0434\u043d\u0438\u043a\u0438 \u0437\u0430\u0441\u044b\u043f\u0430\u044e\u0442, \u043f\u0440\u043e\u0441\u044b\u043f\u0430\u0435\u0442\u0441\u044f \u0440\u0430\u0431\u043e\u0442\u0430. \u041f\u043e\u0433\u043d\u0430\u043b\u0438!", "creation_timestamp": "2020-01-13T14:43:24.000000Z"}, {"uuid": "aa2a2eef-dbba-4973-96be-f5a5d812cbcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/cybershit/650", "content": "\u200b\u200b\u041a\u0441\u0442\u0430\u0442\u0438 \u043e \u0445\u0430\u043d\u0438\u043f\u043e\u0442\u0430\u0445, \u0432\u043e\u0442 \u0433\u043e\u0442\u043e\u0432\u044b\u0439 \u043f\u043e\u0434 Shitrix \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f. \u041e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0435\u0442 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 CVE-2019-19781.\n\n&gt; https://github.com/MalwareTech/CitrixHoneypot\n\n\u0410 \u0432\u043e\u043e\u0431\u0449\u0435, \u0434\u043b\u044f \u043b\u044e\u0431\u0438\u0442\u0435\u043b\u0435\u0439 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0448\u0442\u0443\u043a, \u0435\u0441\u0442\u044c \u0441\u0443\u043f\u0435\u0440 \u0443\u0434\u043e\u0431\u043d\u044b\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 T-Pot, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u0432 \u0441\u0447\u0438\u0442\u0430\u043d\u043d\u044b\u0435 \u043c\u0438\u043d\u0443\u0442\u044b \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u0442\u044c \u0441\u0432\u043e\u044e Honeypot-\u043b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u044e \u0441 \u043a\u0443\u0447\u0435\u0439 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u043e\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u0440\u0443\u0442\u043e\u0439 \u0432\u0438\u0437\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439. \n\n\u0414\u043b\u044f \u043b\u044e\u0431\u0438\u0442\u0435\u043b\u0435\u0439 \u043f\u043e\u0445\u0432\u0430\u0441\u0442\u0430\u0442\u044c\u0441\u044f \u043f\u0435\u0440\u0435\u0434 \u043d\u0430\u0447\u0430\u043b\u044c\u0441\u0442\u0432\u043e\u043c \u0431\u0443\u0434\u0435\u0442 \u0441\u0430\u043c\u043e\u0435 \u0442\u043e :)\n\n&gt; https://github.com/dtag-dev-sec/tpotce", "creation_timestamp": "2020-01-14T08:09:34.000000Z"}, {"uuid": "959823aa-baf9-4e2a-964f-a7967a754a08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/is_n3ws/36", "content": "\u0410\u041d\u0411 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u043e \u0430\u0442\u0430\u043a\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0432\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u043e \u043e\u0442\u0447\u0435\u0442. Top-20 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nhttps://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF\n\nGaining Remote Access: \n-----------------------------\nCVE-2019-11510: Arbitrary file read/Pulse Secure VPN\nCVE-2019-19781: RCE/Citrix ADC\nCVE-2020-8195/3/6: Unauthenticated access\nCVE-2019-0708: RCE on RDP server\nCVE-2020-5902: RCE in F5 BIG-IP\n\nAD:\n----\nCVE-2020-1472: #ZeroLogon\nCVE-2019-1040: NTLM relay bypass\n\nMDM: \n------\nCVE-2020-15505: MobileIron device management\n\nExploiting Public Facing Services:\n---------------- \nCVE-2020-1350: RCE/ DNS Servers #SigRed\nCVE-2018-6789: RCE/ Exim mail transfer\nCVE-2018-4939: RCE/ Adobe's Cold Fusion\n\nWorkstation Local Privilege Escalation:\n-------------------------\nCVE-2020-0601: ECC spoofing #CurveBall\nCVE-2019-0803: Win32k Elevation of Privilege\n\nInternal Applications:\n--------------------\nCVE-2020-0688: RCE/MS Exchange\nCVE-2020-2555: RCE/Oracle Weblogic\nCVE-2019-11580: RCE/Atlassian Crowd\nCVE-2019-18935: RCE/ASP.Net\nCVE-2015-4852: RCE/Apache\nCVE-2019-3396: Unauthorized Access/Confluence\nCVE-2020-10189: RCE/Desktop Central", "creation_timestamp": "2020-11-06T22:00:17.000000Z"}, {"uuid": "6079e116-f754-43fa-ac24-1809f94bfe39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/ExcreamOnSecurity/355", "content": "CVE-2019-19781\n\nRemote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]\n\nhttps://github.com/projectzeroindia/CVE-2019-19781\n#exploit #poc #citrix #rce", "creation_timestamp": "2020-01-11T08:03:36.000000Z"}, {"uuid": "4be2fa37-c2f3-4f12-9d5d-d45fe935ba43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/ctinow/19148", "content": "Citrix NetScaler CVE-2019-19781: What You Need to Know\n\nhttps://ift.tt/2uvu9QM", "creation_timestamp": "2020-01-08T19:42:23.000000Z"}, {"uuid": "ca437a52-b3fe-4d25-995d-9a8da5a116a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/avdno/1089", "content": "\u041f\u0440\u043e\u0441\u0442\u0438\u0442\u0435, \u0431\u0443\u0434\u0443 \u043c\u0430\u0442\u043e\u043c (\u0441)\n\n\u041f\u0438\u0434\u0430\u0440\u044b \u0438\u0437 Citrix \u0443\u0431\u0440\u0430\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Positive Technologies \u041a\u043b\u044e\u0447\u043d\u0438\u043a\u043e\u0432\u0430 \u0438 \u041c\u0435\u0434\u043e\u0432\u0430 \u0438\u0437 \u0447\u0438\u0441\u043b\u0430 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 - CVE-2019-1978 \u0438 CVE-2020-8209.\n\n\u0418\u043d\u0444\u043e\u0441\u0435\u043a \u0430\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u043d, \u0434\u0430.\n\nJe suis Positive, \u0431\u043b\u044f\u0442\u044c.", "creation_timestamp": "2021-08-24T13:26:35.000000Z"}, {"uuid": "f2d2d40a-0760-47fd-a4f7-315d85312ba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/ExcreamOnSecurity/357", "content": "Deep Dive in to Citrix ADC Remote Code Execution, CVE-2019-19781\n\nLast month, a critical vulnerability in Citrix ADC and Citrix Gateway was published under CVE-2019-19781. The vulnerability caught our attention as it suggested that an unauthenticated adversary could leverage it to compromise the device. Although the original discovery was made by Positive Technologies and Paddy Power Betfair, there were no details publicly available on how to exploit this, as such this warranted further research.\n\nhttps://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/\n#citrix #exploitation #rce", "creation_timestamp": "2020-01-11T09:38:04.000000Z"}, {"uuid": "12257e79-4dc3-4fd1-a267-a80d6232ad33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/ExcreamOnSecurity/356", "content": "CVE-2019-19781\n\nhttps://www.trustedsec.com/blog/netscaler-remote-code-execution-forensics/\nhttps://github.com/trustedsec/cve-2019-19781\n#tools #exploit #citrix", "creation_timestamp": "2020-01-11T08:07:24.000000Z"}, {"uuid": "945a9953-e62f-467f-be5f-c65423b164de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19115", "content": "VERT Threat Alert: Citrix NetScaler/ADC Critical Flaw (CVE-2019-19781)\n\nhttps://ift.tt/35zQF7M", "creation_timestamp": "2020-01-07T19:42:23.000000Z"}, {"uuid": "86a04711-843c-4650-9012-8c779b52cd24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19678", "content": "Citrix released another series of permanent CVE-2019-19781 fixes for Citrix ADC (NetScaler ADC) and Citrix Gateway versions 12.1 and 13.0.\n\nAvailable at:\n\u2022 https://t.co/dcfUAmnEH9\n\u2022 https://t.co/TkoWJryxFq\n\n\ud835\udde2\ud835\uddfb\ud835\uddf9\ud835\ude06 \ud835\ude03\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddf6\ud835\uddfc\ud835\uddfb \ud835\udfed\ud835\udfec.\ud835\udff1 \ud835\uddf9\ud835\uddf2\ud835\uddf3\ud835\ude01 \ud835\ude01\ud835\uddfc \ud835\uddfd\ud835\uddee\ud835\ude01\ud835\uddf0\ud835\uddf5. https://t.co/uuW0Ohre7Q http://twitter.com/BleepinComputer/status/1220480577788354563", "creation_timestamp": "2020-01-24T00:19:17.000000Z"}, {"uuid": "9a0ad06d-846d-42e6-bb0d-9ae36ad6dba1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19615", "content": "@serghei The CVE-2019-19781 IoC scanner can be used to identify indicators of compromise on Citrix ADC, Citrix Gateway, and Citrix SD-WAN WANOP appliances. https://t.co/mGRiqAWji9 http://twitter.com/BleepinComputer/status/1220058252332949504", "creation_timestamp": "2020-01-22T20:19:21.000000Z"}, {"uuid": "32829c12-502a-4116-967a-105a985ae9e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/ctinow/21816", "content": "Chubb has Citrix ADC (Netscaler) servers vulnerable to CVE-2019-19781 according to @bad_packets . This vulnerability has been exploited in the past to install ransomware.\nhttps://t.co/DoXko5HQ8N http://twitter.com/BleepinComputer/status/1243270388001525761", "creation_timestamp": "2020-03-26T21:17:09.000000Z"}, {"uuid": "09669a91-4857-447a-a657-e9134efcfeef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19499", "content": "RT @fjserna: Good article from @BleepinComputer around CVE-2019-19781 #citrix https://t.co/17o2pg4tEZ http://twitter.com/BleepinComputer/status/1219062535065931777", "creation_timestamp": "2020-01-20T02:16:30.000000Z"}, {"uuid": "22f9e0ab-d17d-4a93-b3ef-9ae17d827d9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19527", "content": "RT @Bartr00s: I created a simple flow-chart to assist in Citrix CVE-2019-19781 mitigation decision making. This is based on the latest information from @citrix and @ncsc_nl. https://t.co/8ZYQpkNEYF http://twitter.com/BleepinComputer/status/1219331008664915978", "creation_timestamp": "2020-01-20T20:16:25.000000Z"}, {"uuid": "ac84cb7d-2bd8-4269-b928-25c66797139c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19498", "content": "The updated timeline of expected release dates for patches against CVE-2019-19781. https://t.co/6FHK8l2S4F http://twitter.com/BleepinComputer/status/1219014738732109826", "creation_timestamp": "2020-01-19T23:16:22.000000Z"}, {"uuid": "5439140c-d354-4411-845e-3561a59043f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19249", "content": "Citrix has posted estimated release dates for the Citrix ADC / Citrix Gateway patches that resolve the CVE-2019-19781 vulnerability.\n\nThe first release will be for versions 11.1 and 12.0 on January 20th, followed by 12.1 and 13 on January 27th, and finally 10.5 on January 31st. https://t.co/dedpTMrejM http://twitter.com/BleepinComputer/status/1216246094947995648", "creation_timestamp": "2020-01-12T08:11:23.000000Z"}, {"uuid": "0f9ae834-e128-4220-a8ba-2a0a1c875c52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/ctinow/19241", "content": "Citrix ADC CVE-2019-19781 Exploits Released, Fix Now! - by @LawrenceAbrams\nhttps://t.co/17ALD3v5w1 http://twitter.com/BleepinComputer/status/1215906725775249409", "creation_timestamp": "2020-01-11T09:10:08.000000Z"}, {"uuid": "f89f95fc-118f-44bb-bd79-816840d5295f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19495", "content": "Citrix Patches CVE-2019-19781 Flaw in Citrix ADC 11.1 and 12.0 - by @serghei\nhttps://t.co/KCqdP3Z2Uw http://twitter.com/BleepinComputer/status/1219012672836001793", "creation_timestamp": "2020-01-19T22:46:07.000000Z"}, {"uuid": "c5388695-572f-4ce6-983d-c45450840eaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/ctinow/19277", "content": "CISA Releases Test Tool for Citrix ADC CVE-2019-19781 Vulnerability - by @serghei\nhttps://t.co/Lz61iQZRJN http://twitter.com/BleepinComputer/status/1216834550296387590", "creation_timestamp": "2020-01-13T22:42:22.000000Z"}, {"uuid": "f600c3ff-1813-4d59-9df7-86239065aa29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/HackingCiberseguridad/2418", "content": "CVE-2019-19781\n\nEjecuci\u00f3n remota de c\u00f3digo (RCE) en Citrix Application Delivery Controller y Citrix Gateway\n\nVulnerabilidad en Citrix Application Delivery Controller (ADC) anteriormente conocido como NetScaler ADC y Citrix Gateway anteriormente conocido como NetScaler Gateway que, si se explota, podr\u00eda permitir que un atacante no autenticado realice la ejecuci\u00f3n de c\u00f3digo arbitrario.\n\nhttps://github.com/mpgn/CVE-2019-19781", "creation_timestamp": "2020-04-18T00:01:42.000000Z"}, {"uuid": "19d73b1a-325d-455f-a7b2-9a3c0880e6f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/techteamwm/215", "content": "\u0645\u062c\u0645\u0648\u0639\u0629 \u0642\u0631\u0635\u0646\u0629 \u0625\u064a\u0631\u0627\u0646\u064a\u0629 \u062a\u062e\u062a\u0631\u0642 \u0648\u062a\u0628\u064a\u0639 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0639\u062a\u0645\u0627\u062f \u0634\u0628\u0643\u0627\u062a \u0634\u0631\u0643\u0627\u062a \u0639\u0631\u0628\u064a\u0629 \u0639\u0644\u0649 \u0627\u0644\u062f\u0627\u0631\u0643 \u0648\u064a\u0628\n\n\u0642\u0627\u0644\u062a \u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a Crowdstrike \u0641\u064a \u062a\u0642\u0631\u064a\u0631 \u0625\u0646\u0647 \u062a\u0645 \u0631\u0635\u062f \u0645\u062c\u0645\u0648\u0639\u0629 \u0642\u0631\u0635\u0646\u0629 \u0625\u064a\u0631\u0627\u0646\u064a\u0629 \u0648\u0647\u064a \u062a\u0628\u064a\u0639 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0639\u062a\u0645\u0627\u062f \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0634\u0628\u0643\u0627\u062a \u0634\u0631\u0643\u0627\u062a \u0645\u0646 \u0639\u062f\u0629 \u062f\u0648\u0644 \u0639\u0631\u0628\u064a\u0629 \u0641\u064a \u0645\u0646\u062a\u062f\u0649 \u0642\u0631\u0635\u0646\u0629 \u0639\u0644\u0649 \u0627\u0644\u062f\u0627\u0631\u0643 \u0648\u064a\u0628.\n\n\u0648\u0642\u0627\u0644\u062a \u0627\u0644\u0634\u0631\u0643\u0629 \u0625\u0646 \u0627\u0644\u0623\u0645\u0631 \u064a\u062a\u0639\u0644\u0642 \u0628\u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u0642\u0631\u0635\u0646\u0629 Pioneer Kitten \u060c \u0648\u0647\u064a \u062a\u0633\u0645\u064a\u0629 \u0628\u062f\u064a\u0644\u0629 \u0644\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u062a\u064a \u062a\u064f\u0639\u0631\u0641 \u0623\u064a\u0636\u064b\u0627 \u0628\u0627\u0633\u0645 Fox Kitten \u0648 Parisite.\n\n\u0623\u0645\u0636\u062a \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u060c \u0627\u0644\u062a\u064a \u064a\u0639\u062a\u0642\u062f \u0623\u0646\u0647\u0627 \u0645\u0631\u062a\u0628\u0637\u0629 \u0628\u0627\u0644\u0646\u0638\u0627\u0645 \u0627\u0644\u0625\u064a\u0631\u0627\u0646\u064a\u060c \u0639\u0627\u0645\u064a 2019 \u0648 2020 \u0641\u064a \u0627\u062e\u062a\u0631\u0627\u0642 \u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0639\u0628\u0631 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0641\u064a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629 \u0627\u0644\u062e\u0627\u0635\u0629 \u0648\u0645\u0639\u062f\u0627\u062a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0639\u0628\u0631 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u062a\u0627\u0644\u064a\u0629:\n\u0634\u0628\u0643\u0627\u062a VPN \u0627\u0644\u062e\u0627\u0635\u0629 \u0628\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \"\u0627\u0644\u0627\u062a\u0635\u0627\u0644\" Pulse Secure \u0640 (CVE-2019-11510)\n\u062e\u0648\u0627\u062f\u0645 Fortinet VPN \u0627\u0644\u062a\u064a \u062a\u0639\u0645\u0644 \u0628\u0646\u0638\u0627\u0645 FortiOS \u0640 (CVE-2018-13379)\n\u062e\u0648\u0627\u062f\u0645 VPN \"Global Protect\" \u0645\u0646 Palo Alto Networks \u0640 (CVE-2019-1579)\n\u062e\u0648\u0627\u062f\u0645 Citrix \"ADC\" \u0648\u0628\u0648\u0627\u0628\u0627\u062a \u0634\u0628\u0643\u0629 Citrix \u0640 (CVE-2019-19781)\n\u0645\u0648\u0627\u0632\u0646 \u0627\u0644\u062a\u062d\u0645\u064a\u0644 F5 Networks BIG-IP \u0640 (CVE-2020-5902)\n\n\u0642\u0627\u0645\u062a \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u0628\u0627\u062e\u062a\u0631\u0627\u0642 \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u0645\u0630\u0643\u0648\u0631\u0629\u060c \u0644\u0641\u062a\u062d \u0623\u0628\u0648\u0627\u0628 \u062e\u0644\u0641\u064a\u0629\u060c \u0644\u062a\u0648\u0641\u064a\u0631 \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0642\u0631\u0635\u0646\u0629 \u0625\u064a\u0631\u0627\u0646\u064a\u0629 \u0623\u062e\u0631\u0649\u060c \u0645\u062b\u0644 APT33 (Shamoon) \u0648 Oilrig (APT34) \u0648 Chafer \u060c \u0648\u0641\u0642\u064b\u0627 \u0644\u062a\u0642\u0627\u0631\u064a\u0631 \u0645\u0646 \u0634\u0631\u0643\u062a\u064a \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a ClearSky \u0648 Dragos.\n\n\u0633\u062a\u062f\u062e\u0644 \u0647\u0630\u0647 \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u0644\u0623\u062e\u0631\u0649 \u0628\u0639\u062f \u0630\u0644\u0643 \u060c \u0644\u062a\u0648\u0633\u064a\u0639 \"\u0627\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0623\u0648\u0644\u064a\" \u0627\u0644\u0630\u064a \u062a\u0645\u0643\u0646 \u0642\u0631\u0627\u0635\u0646\u0629 Pioneer Kitten \u0645\u0646 \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u064a\u0647 \u0645\u0646 \u062e\u0644\u0627\u0644 \u0627\u0644\u062a\u062d\u0631\u0643 \u0639\u0628\u0631 \u0634\u0628\u0643\u0629 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0628\u0631\u0627\u0645\u062c \u0636\u0627\u0631\u0629.\n\n\u0648\u0641\u064a \u0627\u0644\u062a\u0642\u0631\u064a\u0631 \u0627\u0644\u0630\u064a \u0635\u062f\u0631 \u062a\u0642\u0648\u0644 \u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a Crowdstrike \u0625\u0646\u0647 \u062a\u0645 \u0631\u0635\u062f Pioneer Kitten \u0623\u064a\u0636\u064b\u0627 \u0648\u0647\u064a \u062a\u0628\u064a\u0639 \u0628\u064a\u0627\u0646\u0627\u062a \u0625\u0639\u062a\u0645\u0627\u062f \u0627\u0644\u0648\u0635\u0648\u0644 \u0625\u0644\u0649 \u0628\u0639\u0636 \u0647\u0630\u0647 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0645\u062e\u062a\u0631\u0642\u0629 \u0641\u064a \u0645\u0646\u062a\u062f\u064a\u0627\u062a \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0639\u0644\u0649 \u0627\u0644\u062f\u0627\u0631\u0643 \u0648\u064a\u0628 \u0645\u0646\u0630 \u064a\u0648\u0644\u064a\u0648 2020 \u0639\u0644\u0649 \u0627\u0644\u0623\u0642\u0644.\n\n\u062a\u0639\u062a\u0642\u062f Crowdstrike \u0623\u0646 \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0629 \u062a\u062d\u0627\u0648\u0644 \u0641\u0642\u0637 \u062a\u0646\u0648\u064a\u0639 \u0645\u0635\u0627\u062f\u0631 \u0625\u064a\u0631\u0627\u062f\u0627\u062a\u0647\u0627 \u0648\u0627\u0633\u062a\u062b\u0645\u0627\u0631 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u062a\u064a \u0644\u064a\u0633 \u0644\u0647\u0627 \u0642\u064a\u0645\u0629 \u0627\u0633\u062a\u062e\u0628\u0627\u0631\u064a\u0629 \u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0645\u062e\u0627\u0628\u0631\u0627\u062a \u0627\u0644\u0625\u064a\u0631\u0627\u0646\u064a\u0629.\n\n\u062a\u0634\u0645\u0644 \u0627\u0644\u0623\u0647\u062f\u0627\u0641 \u0627\u0644\u062a\u0642\u0644\u064a\u062f\u064a\u0629 \u0644\u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u062a\u064a \u062a\u0631\u0639\u0627\u0647\u0627 \u0625\u064a\u0631\u0627\u0646 \u0634\u0631\u0643\u0627\u062a \u0648\u0645\u0624\u0633\u0633\u0627\u062a \u062d\u0643\u0648\u0645\u064a\u0629 \u0641\u064a \u0627\u0644\u0648\u0644\u0627\u064a\u0627\u062a \u0627\u0644\u0645\u062a\u062d\u062f\u0629 \u0648\u0627\u0644\u0643\u064a\u0627\u0646 \u0627\u0644\u0635\u0647\u064a\u0648\u0646\u064a \u0648\u0628\u0639\u0636 \u0627\u0644\u062f\u0648\u0644 \u0627\u0644\u0639\u0631\u0628\u064a\u0629\u060c \u0648\u062a\u0634\u0645\u0644 \u0627\u0644\u0642\u0637\u0627\u0639\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u0647\u062f\u0641\u0629 \u0639\u0627\u062f\u0629 \u0627\u0644\u062f\u0641\u0627\u0639 \u0648\u0627\u0644\u0631\u0639\u0627\u064a\u0629 \u0627\u0644\u0635\u062d\u064a\u0629 \u0648\u0627\u0644\u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062d\u0643\u0648\u0645\u064a\u0629\u060c \u0644\u0643\u0646 \u0641\u064a \u0627\u0644\u0623\u0648\u0646\u0629 \u0627\u0644\u0623\u062e\u064a\u0631\u0629 \u062a\u0648\u0633\u0639\u062a \u0627\u0644\u062d\u0645\u0644\u0629 \u0644\u062a\u0634\u0645\u0644 \u0645\u0624\u0633\u0633\u0627\u062a \u0628\u062f\u0648\u0644 \u0623\u062e\u0631\u0649 \u0623\u062e\u0631\u0649 \u0641\u064a \u0634\u0645\u0627\u0644 \u0625\u0641\u0631\u064a\u0642\u064a\u0627\u060c \u0648\u0645\u0646 \u0628\u064a\u0646\u0647\u0627 \u0645\u0624\u0633\u0633\u0627\u062a \u062c\u0632\u0627\u0626\u0631\u064a\u0629 \u0648\u0642\u062f \u0642\u0627\u0645\u062a \u0627\u0644\u0633\u0644\u0637\u0627\u062a \u0627\u0644\u062c\u0632\u0627\u0626\u0631\u064a\u0629 \u0628\u0645\u0631\u0627\u0633\u0644\u0629 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u0647\u062f\u0641\u0629 \u0644\u0625\u062a\u062e\u0627\u0630 \u0627\u0644\u062a\u062f\u0627\u0628\u064a\u0631 \u0648\u062a\u0639\u0632\u064a\u0632 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a\u060c.\n\n\u0641\u064a\u0645\u0627 \u0628\u0639\u0636 \u0627\u0644\u062f\u0648\u0644 \u0627\u0644\u0639\u0631\u0628\u064a\u0629 \u0631\u0628\u0645\u0627 \u0644\u0645 \u062a\u062a\u0641\u0637\u0646 \u0628\u0639\u062f \u0644\u0647\u0630\u0627 \u0627\u0644\u062e\u0631\u0642\u060c \u0644\u0630\u0644\u0643 \u064a\u062c\u0628 \u062a\u0646\u0628\u064a\u0647 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0633\u062a\u0639\u0645\u0644 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0625\u0641\u062a\u0631\u0627\u0636\u064a\u0629 \u0648\u0627\u0644\u0645\u0639\u062f\u0627\u062a \u0627\u0644\u0645\u0630\u0643\u0648\u0631\u0629 \u0627\u0644\u062a\u064a \u062a\u062d\u062a\u0648\u064a \u0639\u0644\u0649 \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 \u0627\u0644\u062a\u0646\u0628\u0647 \u0644\u0645\u0631\u0627\u062c\u0639\u0629 \u0625\u062c\u0631\u0627\u0626\u0627\u062a\u0647\u0627.\n\n\u062a\u0639\u062a\u0645\u062f \u0645\u062c\u0645\u0648\u0639\u0629 \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u0625\u064a\u0631\u0627\u0646\u064a\u0629 \u0639\u0644\u0649 \u0646\u0641\u0642 SSH \u060c \u0628\u0627\u0633\u062a\u062e\u062f\u0627\u0645 \u0623\u062f\u0648\u0627\u062a \u0645\u0641\u062a\u0648\u062d\u0629 \u0627\u0644\u0645\u0635\u062f\u0631 \u0645\u062b\u0644 Ngrok \u0648\u0623\u062f\u0627\u0629 \u0645\u062e\u0635\u0635\u0629 \u062a\u0633\u0645\u0649 SSHMinion. \u0648\u062a\u0633\u062a\u062e\u062f\u0645 \u0647\u0630\u0647 \u0627\u0644\u0623\u062f\u0648\u0627\u062a \u0644\u0644\u062a\u0648\u0627\u0635\u0644 \u0639\u0628\u0631 \u0628\u0631\u0648\u062a\u0648\u0643\u0648\u0644 \u0633\u0637\u062d \u0627\u0644\u0645\u0643\u062a\u0628 \u0627\u0644\u0628\u0639\u064a\u062f RDP \u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0641\u064a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629 VPN \u0648\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0634\u0628\u0643\u0629.\n\n\u0648\u064a\u0645\u0643\u0646 \u0623\u0646 \u064a\u062a\u0645 \u0625\u0633\u062a\u063a\u0644\u0627\u0644 \u0646\u0642\u0627\u0637 \u0636\u0639\u0641 \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629 \u0648\u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u0648\u0635\u0648\u0644 \u0644\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0644\u0632\u0631\u0639 \u0628\u0631\u0627\u0645\u062c \u0641\u062f\u064a\u0629 \u0628\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0625\u0633\u062a\u0631\u0627\u062a\u064a\u062c\u064a\u0629\u060c \u0648\u0647\u0648 \u0645\u0627 \u0633\u064a\u0643\u0628\u062f\u0647\u0627 \u062e\u0633\u0627\u0626\u0631 \u0643\u0628\u064a\u0631\u0629 \u0641\u064a \u0627\u0644\u0623\u0645\u0648\u0627\u0644 \u0623\u0648 \u0641\u064a \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0639\u0646\u062f \u0646\u0634\u0631\u0647\u0627 \u0623\u0648 \u062a\u0634\u0641\u064a\u0631\u0647\u0627.", "creation_timestamp": "2020-09-21T04:37:32.000000Z"}, {"uuid": "534f8dad-28c8-4e66-a2f8-ef63c5d06e07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/Ninjutsu_os/343", "content": "WINDOWS 10 PRO 2004 [19041] X64\nVersion: 2004\nBuild: 19041.450\nEdition: Pro\nArch: x64\nLang: en-US\n\n---------------------------------------------------------\nChangelog / Updates:\n\n\u2705 26/08/2020\n\nFeatures:\n\u2705 Windows 10 Pre-Installed Penetration Testing, Red Teaming.\n\u2705 More than 800 penetration testing tools.\n\u2705 Customize Windows 10 with powerful tweak and optimize to Protect your privacy.\n\u2705 Unwanted Windows components removal.\n\u2705 Disable many of the annoying features built into windows.\n\u2705 Remove/Disable many Windows programs and services.\n\u2705 Prefills the commandline.\n\u2705 Windows Terminal Powerline in PowerShell  \n\u2705 .NET Framework (4.0/4.5/4.6/4.7/4.8/2.x/3.x)\n\u2705 Optimized WINDOWS\n\u2705 Performs privacy &amp; security check of Windows 10\n\n\n\nRemove/Disables component:\n\u2705 Greenshot Apps\n\u2705 Vega Web Scanner\n\u2705 yogadns\n\u2705 Microsoft Edge Browser\n\u2705 Docker\n\u2705 Nox Android Emulator\n\u2705 COMODO Firewall\n\u2705 Winja\n\u2705 MarkdownEdit\n\u2705 Windows Apps and System Apps\n\u2705 Windows Security / Defender  / Smartscreen\n\u2705 OneDrive\n\u2705 Disable UAC (Never notify)\n\u2705 Internet Explorer 11\n\u2705 Media Features\n\u2705 Windows powershell v2\n\n\n### Updated Tools :\n\n# Antivirus Evasion Tools\n\u2705 Macro Pack-Automatize Obfuscation &amp; Generation of MS Office\n\n# Exploitation Tools\n\u2705 Goby Attack surface mapping\n\u2705 Metasploit\n\n# Information Gathering\n\u2705 subfinder\n\u2705 Sublist3r\n\u2705 FinalRecon\n\u2705 findomain\n\u2705 amass\n\u2705 gitleaks\n\u2705 EyeWitness\n\u2705 Maltego\n\n# Malware Analysis\n\u2705 Detect It Easy\n\u2705 dnSpy\n\u2705 loki\n\u2705 Process Explorer\n\n# Mobile Security Tools\n\u2705 Mobile-Security-Framework-MobSF\n\n# Proxy and Privacy Tools\n\u2705 Tor Browser\n\u2705 SimpleDNSCrypt\n\u2705 WPD\n\u2705 O&amp;O ShutUp10\n\u2705 W10Privacy\n\n# Reverse Engineering\n\u2705 x64dbg\n\u2705 dnSpy\n\n# Web Application Attack\n\u2705 WPScan-WordPress Vulnerability Scanner\n\u2705 BuprSuite \n\u2705 testssl.sh\n\u2705 commix\n\u2705 droopescan\n\u2705 sqlmap\n\u2705 nuclei\n\u2705 sslscan\n\u2705 gowitness\n\n# Wireless Attacks\n\u2705 bettercap\n\n# Utility Tools\n\u2705 chrome\n\u2705 Firefox\n\u2705 Brave\n\u2705 Sharex\n\n\n## Added Tools :\n\n# Command &amp; Control\n\u2705 LocalXpose\n\u2705 One-Lin3r\n\u2705 UPnP PortMapper\n\n# Exploitation Tools\n\u2705 HiveJack  dump Windows credentials\n\n# Information Gathering\n\u2705 IP List Generator 2 (x64)\n\n# Malware Analysis\n\u2705 AnVir Task Manager\n\u2705 Dependency Walker\n\u2705 HijackThis\n\u2705 YARA\n\n# Mobile Security Tools\n\n# Networking Attack\n\u2705 superscan\n\u2705 sipp\n\u2705 sippts\n\u2705 SIPP -VOIP Test\n\u2705 SIPVicious suite\n\u2705 sipscan\n\u2705 nbrute\n\u2705 winbox\n\u2705 SNMPCheck SNMP enumerator\n\u2705 SIP Scanner\n\u2705 OWASP-Nettacker\n\n# Password Attacks\n\u2705 ncrack\n\n# Proxy and Privacy Tools\n\u2705 privatezilla\n\u2705 Clear All Event Logs\n\u2705 BleachBit\n\u2705 TMAC (MAC Address Changer)\n\u2705 SoftEther VPN Client Manager (Free VPN)\n\u2705 tor bundle (terminal #tor)\n\n# Reverse Engineering\n\u2705 Cutter\n\n# Vulnerability Analysis\n\n# Web Application Attack\n\u2705 WS-Attacker-1.8\n\u2705 wsdigger\n\u2705 weblogicScanner\n\u2705 CMSMap CMS vulnerability scanner\n\u2705 All-in-One OS command injection\n\u2705 WSDigger -Web Services\n\n\n# Wireless Attacks\n\u2705 CommViewforWiFi\n\n# Wordlists\n\u2705 Cheatsheet-God\n\u2705 penetration-testing-cheat-sheet\n\u2705 PentesterSpecialDict\n\n# Utility Tools\n\u2705 TCPOptimizer\n\u2705 Markdown Monster\n\u2705 ccenhancer\n\u2705 Driver Easy\n\u2705 IrfanView\n\u2705 TreeSizeFree\n\n\n# Nmpa NSE :\n\n\u2705 CVE-2020-0796_new\n\u2705 smb2-capabilities_patched\n\u2705 cve-2020-1350\n\u2705 cve-2020-0796\n\u2705 http-vuln-cve2020-3452\n\u2705 http-vuln-cve2020-5902\n\u2705 http-raw-headers\n\u2705 http-vuln-cve2017-18195\n\u2705 dlink-cve-2019-13101\n\u2705 cisco-cve-2019-1937\n\u2705 abb-cve-2019-7226\n\u2705 cve_2019_1653\n\u2705 CVE-2019-19781\n\u2705 http-vuln-CVE-2019-16759\n\u2705 weblogic-CNVD-C-2019-48814\n\u2705 smb-vuln-cve-2020-0796\n\n\n### Privacy Tweaks ###\n\u2705 Block pop-ups and annoying ads on websites (Hosts)\n\u2705 Disable Inventory  Collector\n\u2705 Disable Get Even more out of windows\n\u2705 Disable app access to notificaton , account info ,email ..etc \n\u2705 Disable Telemetry\n\u2705 Disable WiFi Sense\n\u2705 Disable SmartScreen\n\u2705 Disable WebSearch\n\u2705 Disable App Suggestions\n\u2705 Disable Activity History\n\u2705 Disable Background Apps\n\u2705 Disable Sensors\n\u2705 Disable Location\n\u2705 Disable MapUpdates\n\u2705 Disable Feedback\n\u2705 Disable Tailored Experiences\n\u2705 Disable Advertising ID\n\u2705 Disable WebLangList\n\u2705 Disable Cortana\n\u2705 Disable Error Reporting\n\u2705 Disable SetP2P", "creation_timestamp": "2020-08-27T17:04:45.000000Z"}, {"uuid": "e82247d7-6146-4f9d-8de8-a00ee4e229bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/Ninjutsu_os/134", "content": "\ud83d\udd30Ninjutsu OS Info \ud83d\udd30  \n\n\nWe added 40 Nmap Scripting Engine (NSE) to Ninjutsu OS\n\nAxis_vuln_webcam\ncisco-asa-scan\nhttp-middleware-path-finder\nCVE-2018-13379\ncisco-cve-2019-1937\nhttp-pulse_ssl_vpn\nCVE-2018-20377\ncitrix\nhttp-screenshot\nphpadmin\nCVE-2018-4407\nclickjacking-prevent-check\nhttp-shellshock\nsmb-vuln-cve-2020-0796\nCVE-2018-7600_drupalgeddon\ncve_2019_1653\nhttp-vuln-CVE-2019-16759\ntomcat-cve-2017-12615\nCVE-2019-19781\ndlink-cve-2019-13101\nhttp-vuln-cve2017-18195\ntraversal\nCVE-2020-0796\ndocker_daemontcp\nhttp-waf-test\nvxworks_urgent11\nIIS-CVE-2010-2731\nfile-checker\nhttpcs_docker-daemontcp-prod\nweblogic-CNVD-C-2019-48814\nMS15-034\nfreevu\narch\nhydra\nweblogic-cve-2018-2894\nabb-cve-2019-7226\nhttp-lfi\ninfiltrator\nwinVulnDetection", "creation_timestamp": "2020-05-12T13:27:31.000000Z"}, {"uuid": "9903d6e9-cf20-414b-bea8-65fbc20ad189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/Ninjutsu_os/6563", "content": "WINDOWS 10 PRO 2004 [19041] X64\nVersion: 2004\nBuild: 19041.450\nEdition: Pro\nArch: x64\nLang: en-US\n\n---------------------------------------------------------\nChangelog / Updates:\n\n\u2705 26/08/2020\n\nFeatures:\n\u2705 Windows 10 Pre-Installed Penetration Testing, Red Teaming.\n\u2705 More than 800 penetration testing tools.\n\u2705 Customize Windows 10 with powerful tweak and optimize to Protect your privacy.\n\u2705 Unwanted Windows components removal.\n\u2705 Disable many of the annoying features built into windows.\n\u2705 Remove/Disable many Windows programs and services.\n\u2705 Prefills the commandline.\n\u2705 Windows Terminal Powerline in PowerShell  \n\u2705 .NET Framework (4.0/4.5/4.6/4.7/4.8/2.x/3.x)\n\u2705 Optimized WINDOWS\n\u2705 Performs privacy &amp; security check of Windows 10\n\n\n\nRemove/Disables component:\n\u2705 Greenshot Apps\n\u2705 Vega Web Scanner\n\u2705 yogadns\n\u2705 Microsoft Edge Browser\n\u2705 Docker\n\u2705 Nox Android Emulator\n\u2705 COMODO Firewall\n\u2705 Winja\n\u2705 MarkdownEdit\n\u2705 Windows Apps and System Apps\n\u2705 Windows Security / Defender  / Smartscreen\n\u2705 OneDrive\n\u2705 Disable UAC (Never notify)\n\u2705 Internet Explorer 11\n\u2705 Media Features\n\u2705 Windows powershell v2\n\n\n### Updated Tools :\n\n# Antivirus Evasion Tools\n\u2705 Macro Pack-Automatize Obfuscation &amp; Generation of MS Office\n\n# Exploitation Tools\n\u2705 Goby Attack surface mapping\n\u2705 Metasploit\n\n# Information Gathering\n\u2705 subfinder\n\u2705 Sublist3r\n\u2705 FinalRecon\n\u2705 findomain\n\u2705 amass\n\u2705 gitleaks\n\u2705 EyeWitness\n\u2705 Maltego\n\n# Malware Analysis\n\u2705 Detect It Easy\n\u2705 dnSpy\n\u2705 loki\n\u2705 Process Explorer\n\n# Mobile Security Tools\n\u2705 Mobile-Security-Framework-MobSF\n\n# Proxy and Privacy Tools\n\u2705 Tor Browser\n\u2705 SimpleDNSCrypt\n\u2705 WPD\n\u2705 O&amp;O ShutUp10\n\u2705 W10Privacy\n\n# Reverse Engineering\n\u2705 x64dbg\n\u2705 dnSpy\n\n# Web Application Attack\n\u2705 WPScan-WordPress Vulnerability Scanner\n\u2705 BuprSuite \n\u2705 testssl.sh\n\u2705 commix\n\u2705 droopescan\n\u2705 sqlmap\n\u2705 nuclei\n\u2705 sslscan\n\u2705 gowitness\n\n# Wireless Attacks\n\u2705 bettercap\n\n# Utility Tools\n\u2705 chrome\n\u2705 Firefox\n\u2705 Brave\n\u2705 Sharex\n\n\n## Added Tools :\n\n# Command &amp; Control\n\u2705 LocalXpose\n\u2705 One-Lin3r\n\u2705 UPnP PortMapper\n\n# Exploitation Tools\n\u2705 HiveJack  dump Windows credentials\n\n# Information Gathering\n\u2705 IP List Generator 2 (x64)\n\n# Malware Analysis\n\u2705 AnVir Task Manager\n\u2705 Dependency Walker\n\u2705 HijackThis\n\u2705 YARA\n\n# Mobile Security Tools\n\n# Networking Attack\n\u2705 superscan\n\u2705 sipp\n\u2705 sippts\n\u2705 SIPP -VOIP Test\n\u2705 SIPVicious suite\n\u2705 sipscan\n\u2705 nbrute\n\u2705 winbox\n\u2705 SNMPCheck SNMP enumerator\n\u2705 SIP Scanner\n\u2705 OWASP-Nettacker\n\n# Password Attacks\n\u2705 ncrack\n\n# Proxy and Privacy Tools\n\u2705 privatezilla\n\u2705 Clear All Event Logs\n\u2705 BleachBit\n\u2705 TMAC (MAC Address Changer)\n\u2705 SoftEther VPN Client Manager (Free VPN)\n\u2705 tor bundle (terminal #tor)\n\n# Reverse Engineering\n\u2705 Cutter\n\n# Vulnerability Analysis\n\n# Web Application Attack\n\u2705 WS-Attacker-1.8\n\u2705 wsdigger\n\u2705 weblogicScanner\n\u2705 CMSMap CMS vulnerability scanner\n\u2705 All-in-One OS command injection\n\u2705 WSDigger -Web Services\n\n\n# Wireless Attacks\n\u2705 CommViewforWiFi\n\n# Wordlists\n\u2705 Cheatsheet-God\n\u2705 penetration-testing-cheat-sheet\n\u2705 PentesterSpecialDict\n\n# Utility Tools\n\u2705 TCPOptimizer\n\u2705 Markdown Monster\n\u2705 ccenhancer\n\u2705 Driver Easy\n\u2705 IrfanView\n\u2705 TreeSizeFree\n\n\n# Nmpa NSE :\n\n\u2705 CVE-2020-0796_new\n\u2705 smb2-capabilities_patched\n\u2705 cve-2020-1350\n\u2705 cve-2020-0796\n\u2705 http-vuln-cve2020-3452\n\u2705 http-vuln-cve2020-5902\n\u2705 http-raw-headers\n\u2705 http-vuln-cve2017-18195\n\u2705 dlink-cve-2019-13101\n\u2705 cisco-cve-2019-1937\n\u2705 abb-cve-2019-7226\n\u2705 cve_2019_1653\n\u2705 CVE-2019-19781\n\u2705 http-vuln-CVE-2019-16759\n\u2705 weblogic-CNVD-C-2019-48814\n\u2705 smb-vuln-cve-2020-0796\n\n\n### Privacy Tweaks ###\n\u2705 Block pop-ups and annoying ads on websites (Hosts)\n\u2705 Disable Inventory  Collector\n\u2705 Disable Get Even more out of windows\n\u2705 Disable app access to notificaton , account info ,email ..etc \n\u2705 Disable Telemetry\n\u2705 Disable WiFi Sense\n\u2705 Disable SmartScreen\n\u2705 Disable WebSearch\n\u2705 Disable App Suggestions\n\u2705 Disable Activity History\n\u2705 Disable Background Apps\n\u2705 Disable Sensors\n\u2705 Disable Location\n\u2705 Disable MapUpdates\n\u2705 Disable Feedback\n\u2705 Disable Tailored Experiences\n\u2705 Disable Advertising ID\n\u2705 Disable WebLangList\n\u2705 Disable Cortana\n\u2705 Disable Error Reporting\n\u2705 Disable SetP2P", "creation_timestamp": "2020-08-27T17:04:45.000000Z"}, {"uuid": "1315eb04-f629-4dff-b834-0d7d0abd3542", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/Ninjutsu_os/739", "content": "\ud83d\udd30Ninjutsu OS Info \ud83d\udd30  \n\n\nWe added 40 Nmap Scripting Engine (NSE) to Ninjutsu OS\n\nAxis_vuln_webcam\ncisco-asa-scan\nhttp-middleware-path-finder\nCVE-2018-13379\ncisco-cve-2019-1937\nhttp-pulse_ssl_vpn\nCVE-2018-20377\ncitrix\nhttp-screenshot\nphpadmin\nCVE-2018-4407\nclickjacking-prevent-check\nhttp-shellshock\nsmb-vuln-cve-2020-0796\nCVE-2018-7600_drupalgeddon\ncve_2019_1653\nhttp-vuln-CVE-2019-16759\ntomcat-cve-2017-12615\nCVE-2019-19781\ndlink-cve-2019-13101\nhttp-vuln-cve2017-18195\ntraversal\nCVE-2020-0796\ndocker_daemontcp\nhttp-waf-test\nvxworks_urgent11\nIIS-CVE-2010-2731\nfile-checker\nhttpcs_docker-daemontcp-prod\nweblogic-CNVD-C-2019-48814\nMS15-034\nfreevu\narch\nhydra\nweblogic-cve-2018-2894\nabb-cve-2019-7226\nhttp-lfi\ninfiltrator\nwinVulnDetection", "creation_timestamp": "2020-05-12T13:27:34.000000Z"}, {"uuid": "2804f909-b6c8-45b2-a4a3-0f033b267d36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "Telegram/3t9M3bt6-1s_GByA-0DplMIj-ih503kIjbkPjBVaBauyLR_k", "content": "", "creation_timestamp": "2025-02-06T02:42:30.000000Z"}, {"uuid": "92b10a30-290d-477a-b3d9-7f216c14a526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/arpsyndicate/246", "content": "#ExploitObserverAlert\n\nCVE-2019-19781\n\nDESCRIPTION: Exploit Observer has 193 entries related to CVE-2019-19781. An issue was discovered in Citrix Application Delivery Controller (ADC) and Gateway 10.5, 11.1, 12.0, 12.1, and 13.0. They allow Directory Traversal.\n\nFIRST-EPSS: 0.975070000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-11-17T09:13:55.000000Z"}, {"uuid": "e0e6a9d6-96aa-469b-a57b-3b7634e2089c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "Telegram/ZkTPOT1GvH5mV0SPbNZVNob6KUYJ6yPptqmU7-VzW4JW04A", "content": "", "creation_timestamp": "2025-03-16T22:00:07.000000Z"}, {"uuid": "06457cf4-98d3-4cd0-8bbe-2763b45aeb73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/3042", "content": "\u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0435 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u044b \u0442\u0440\u0438\u0430\u0434\u043e\u0439 \u0437\u0430\u044f\u0432\u0438\u043b\u0438 \u043e \u0432\u0430\u0440\u0432\u0430\u0440\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f\u0445 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u0410\u0420\u0422 \u0432 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u0442\u0435\u043b\u0435\u043a\u043e\u043c. \u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u0434 \u0430\u0432\u0442\u043e\u0440\u0441\u0442\u0432\u043e\u043c \u0410\u041d\u0411, CISA \u0438 \u0424\u0411\u0420 \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0430\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442 \u043d\u0430\u0434\u0443\u043c\u0430\u043d\u043d\u044b\u0439 \u043f\u0440\u0435\u0434\u043b\u043e\u0433 \u0434\u043b\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u044b\u0445 \u043d\u0435\u043f\u0440\u0430\u0432\u043e\u043c\u0435\u0440\u043d\u044b\u0445 \u0441\u0430\u043d\u043a\u0446\u0438\u0439.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0430\u0432\u0442\u043e\u0440\u043e\u0432, \u043f\u0440\u043e\u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0410\u0420\u0422 \u043d\u0430\u0446\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u043d\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u043b\u0443\u0433, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043e\u0431\u0449\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 , \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432\u0441\u0435: \u043e\u0442 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 \u0434\u043e \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439, \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0441\u0431\u043e\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0412\u0441\u0435 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0435 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a, \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0438 \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0432\u043d\u0443\u0442\u0440\u0438 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0410\u0420\u0422 \u0432\u044b\u0434\u0435\u043b\u044f\u0435\u0442 \u043a\u0440\u0443\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0443\u0447\u0435\u0442\u0430. \u041f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u043a\u0440\u0430\u0434\u0443\u0442 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0431\u0430\u0437\u0430\u043c \u0434\u0430\u043d\u043d\u044b\u0445 SQL \u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c SQL-\u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u044f\u0442 \u0441\u0431\u0440\u043e\u0441 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u0441 RADIUS.\n\n\u0412\u043e\u043e\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0441\u044c \u0443\u0436\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u043c\u0438 \u0437\u0430\u043f\u0438\u0441\u044f\u043c\u0438 \u0441\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 RADIUS \u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c\u0438 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u0445\u043e\u0434\u044f\u0442 \u0443\u0441\u043f\u0435\u0448\u043d\u0443\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0432 \u0441\u0435\u0442\u0438, \u043f\u0440\u0438\u0441\u0442\u0443\u043f\u0430\u044e\u0442 \u043a \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430 \u0434\u043b\u044f \u0441\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u043d\u0430 \u043f\u043e\u0434\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u044b\u0439 \u0442\u0443\u043d\u043d\u0435\u043b\u044c, \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u044d\u0435\u0440\u043a\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0440\u0442\u043e\u0432.\n\n\u0417\u0430\u0432\u0435\u0440\u0448\u0438\u0432 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0447\u0430\u0441\u0442\u043e \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0438/\u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u044f\u043b\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0438\u0442\u044c \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u0441\u0432\u043e\u0435\u0439 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e\u0431\u044b \u0435\u0449\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 \u0441\u043a\u0440\u044b\u0442\u044c \u0441\u0432\u043e\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0438 \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f.\n\n\u0412 \u0441\u0432\u043e\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0430\u043a\u0442\u043e\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043d\u0430\u0431\u043e\u0440 \u043e\u0431\u0449\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2020 \u0433\u043e\u0434\u0430, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445: Cisco (CVE-2018-0171, CVE-2019-15271, CVE-2019-1652), Citrix (CVE-2019-19781), D-Link (CVE-2019-16920), Fortinet (CVE-2018-13382), MikroTik (CVE-2018-14847), Netgear (CVE-2017-6862), Pulse (CVE-2019-11510, CVE-2021-22893), QNAP (CVE-2019-7192-7195), Zyxel (CVE-2020-29583) \u0438 \u0434\u0440. \n\n\u042d\u0442\u043e\u0442 \u043c\u0435\u0442\u043e\u0434 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0447\u0435\u0442\u043d\u044b\u043c \u0437\u0430\u043f\u0438\u0441\u044f\u043c \u0436\u0435\u0440\u0442\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 PoC, \u0431\u0435\u0437 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u043e\u0442\u043b\u0438\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0438\u043b\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u044e\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 RouterSploit \u0438 RouterScan \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0442\u044c \u043c\u0430\u0440\u043a\u0438, \u043c\u043e\u0434\u0435\u043b\u0438 \u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\u00a0\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431, \u0442\u0430\u043a\u0430\u044f \u0442\u0430\u043a\u0442\u0438\u043a\u0430 \u0440\u0430\u0431\u043e\u0442\u044b \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u0430 \u0410\u0420\u0422 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u043e\u0431\u0448\u0438\u0440\u043d\u044b\u0435 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u044b\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0431\u043e\u043b\u0435\u0435 \u043c\u043e\u0449\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u043d\u0430 \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u043a\u0440\u0443\u0433 \u0446\u0435\u043b\u0435\u0439 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0438 \u0447\u0430\u0441\u0442\u043d\u043e\u0433\u043e \u0441\u0435\u043a\u0442\u043e\u0440\u043e\u0432 \u0421\u0428\u0410.\n\n\u0410\u0431\u0441\u0442\u0440\u0430\u0433\u0438\u0440\u0443\u044f\u0441\u044c \u043e\u0442 \u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0430\u043d\u0433\u0430\u0436\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u0439, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044e \u0431\u0443\u0434\u0443\u0442 \u0432\u043e\u0441\u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u044b \u0432\u043d\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0444\u0430\u043a\u0442\u0443\u0440\u044b \u0441\u0430\u043c\u043e\u0433\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f (\u0437\u0434\u0435\u0441\u044c).", "creation_timestamp": "2022-06-08T19:35:04.000000Z"}, {"uuid": "9fdfcc97-c068-4f57-bbac-ad43a0a6604d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "Telegram/1YemRONjdrrcg05rJAKPLqcn4MScI-DVbpT9FwczuB8KHA", "content": "", "creation_timestamp": "2020-10-20T23:09:58.000000Z"}, {"uuid": "ea544fdb-09e2-4f0b-b03c-2cd37515f169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/1066", "content": "\u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0435 \u0410\u041d\u0411 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u043e \u043e\u0442\u0447\u0435\u0442 \u0441 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435\u043c 25 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u043c\u0438 APT.\n\n\u041c\u044b, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0441\u043e\u043c\u043d\u0435\u0432\u0430\u0435\u043c\u0441\u044f, \u0447\u0442\u043e \u043a\u0442\u043e-\u0442\u043e \u0438\u0437 \u043d\u0430\u0448\u0438\u0445 \u043f\u043e\u0434\u043f\u0438\u0441\u0447\u0438\u043a\u043e\u0432 (\u043d\u0443, \u043a\u0440\u043e\u043c\u0435 \u0440\u0435\u0431\u044f\u0442 \u0438\u0437 \u0442\u0440\u0435\u0445\u0431\u0443\u043a\u0432\u0435\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0442\u043e\u0440 \u0438 \u0433\u043e\u0441\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439) \u043c\u043e\u0436\u0435\u0442 \u0441\u0442\u0430\u0442\u044c \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u043c \u0430\u0442\u0430\u043a\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432. \u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u044d\u0442\u0438 \u0436\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f, \u043d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, ransomware. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043d\u0430 \u044d\u0442\u043e\u0442 \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b \u0431\u0443\u0434\u0435\u0442 \u043f\u043e\u043b\u0435\u0437\u043d\u043e \u0432\u0441\u0435\u043c \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u044b\u043c \u043a \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0427\u0442\u043e \u0436\u0435 \u043c\u044b \u0432\u0438\u0434\u0438\u043c? \u041d\u0430 \u043f\u0435\u0440\u0432\u043e\u043c \u043c\u0435\u0441\u0442\u0435, \u043e\u0436\u0438\u0434\u0430\u0435\u043c\u043e, CVE-2019-11510 - \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Pulse VPN. \u041d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0439 \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u0441\u0435\u0440\u0432\u0435\u0440, \u0441\u0443\u0434\u044f \u043f\u043e \u0432\u0441\u0435\u043c\u0443, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043f\u0440\u0438\u0447\u0438\u043d\u043e\u0439 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u0432 ransomware \u0447\u0443\u0442\u044c \u043b\u0438 \u043d\u0435 \u0432 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0435 \u0441\u043b\u0443\u0447\u0430\u0435\u0432.\n\n\u0414\u0430\u043b\u044c\u0448\u0435 - CVE-2020-5902, \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 BIG-IP \u043e\u0442 F5 Networks, \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 (RCE) \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0445\u0430\u043a\u0435\u0440\u0430. \n\n\u0415\u0449\u0435 \u043e\u0434\u043d\u0430 \u043b\u044e\u0431\u0438\u043c\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439 - CVE-2019-19781 \u0432 Citrix ADC, \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a RCE.\n\n\u0421\u0440\u0435\u0434\u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 SIGRed, \u0438 Zerologon \u0438 \u043c\u043d\u043e\u0433\u0438\u0435 \u0434\u0440\u0443\u0433\u0438\u0435.\n\n\u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0440\u0430\u0441\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0442\u044c \u044d\u0442\u043e\u0442 \u0441\u043f\u0438\u0441\u043e\u043a \u043a\u0430\u043a \u043d\u0430\u0431\u043e\u0440 \u0442\u043e\u0447\u0435\u043a \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043f\u0440\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0432\u043d\u0435\u0448\u043d\u0435\u0433\u043e \u043f\u0435\u0440\u0438\u043c\u0435\u0442\u0440\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u0418 \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0434\u0438\u043d \u043c\u043e\u043c\u0435\u043d\u0442 \u043d\u0430\u0441 \u043f\u0435\u0447\u0430\u043b\u0438\u0442 - \u0437\u043d\u0430\u044f \u043c\u0430\u043d\u0435\u0440\u0443 \u0440\u0430\u0431\u043e\u0442\u044b \u0410\u041d\u0411 \u043c\u043e\u0436\u043d\u043e \u0441\u043c\u0435\u043b\u043e \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0442\u044c, \u0447\u0442\u043e \u0435\u0441\u043b\u0438 \u043e\u043d\u0438 \u043e\u0442\u043a\u0440\u044b\u0442\u043e \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0442\u0435\u0445 \u0438\u043b\u0438 \u0438\u043d\u044b\u0445 \u0434\u044b\u0440\u043e\u043a, \u0437\u043d\u0430\u0447\u0438\u0442 \u0441\u0430\u043c\u0438 \u0438\u0445 \u0442\u043e\u0447\u043d\u043e \u043d\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442. \u0423 \u043d\u0438\u0445 \u0434\u0440\u0443\u0433\u0438\u0435 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0445\u043e\u0434\u0443.", "creation_timestamp": "2020-10-21T11:00:18.000000Z"}, {"uuid": "c96022ab-f2e9-47ee-8515-a90475f38ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "Telegram/gEm47e_4a-n1c9I7aJ5-_T6bZuQfezDpvmeU5o1Tz3dRMg", "content": "", "creation_timestamp": "2020-10-20T14:14:32.000000Z"}, {"uuid": "978801ba-ae14-414b-951c-da5e373ad689", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/true_secator/2034", "content": "\u0424\u0430\u0433\u0433\u043e\u0442\u044b \u0438\u0437 Citrix \u0434\u0430\u043b\u0438 \u0437\u0430\u0434\u043d\u044e\u044e (\u0445\u0435-\u0445\u0435) \u0438 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u0438\u043c\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Positive Technologies \u0441\u0440\u0435\u0434\u0438 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 CVE-2019-1978 \u0438 CVE-2020-8209.\n\n\u0412\u043e\u0442 \u0447\u0442\u043e \u043c\u0430\u0442 \u0436\u0438\u0432\u043e\u0442\u0432\u043e\u0440\u044f\u0449\u0438\u0439 \u0434\u0435\u043b\u0430\u0435\u0442!\n\n\u0410 \u0435\u0441\u043b\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e, \u0442\u043e \u043c\u044b \u0440\u0430\u0434\u044b, \u0447\u0442\u043e \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u043a\u043e\u043c\u044c\u044e\u043d\u0438\u0442\u0438 \u0432\u044b\u0440\u0430\u0437\u0438\u043b\u043e \u0441\u0432\u043e\u0435 \u043d\u0435\u0433\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0435 \u043a \u0442\u0430\u043a\u043e\u0439 \u043d\u0435\u0441\u043f\u0440\u0430\u0432\u0435\u0434\u043b\u0438\u0432\u043e\u0441\u0442\u0438, \u0430 Citrix \u0431\u044b\u043b\u0438 \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d\u044b \u043d\u0430 \u044d\u0442\u043e \u043e\u0442\u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u0442\u044c.", "creation_timestamp": "2021-08-25T11:49:08.000000Z"}, {"uuid": "fb4eed3b-b344-4d6c-8568-3020e774fb6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/true_secator/2030", "content": "\u041f\u0440\u043e\u0441\u0442\u0438\u0442\u0435, \u0431\u0443\u0434\u0443 \u043c\u0430\u0442\u043e\u043c (\u0441)\n\n\u041f\u0438\u0434\u0430\u0440\u044b \u0438\u0437 Citrix \u0443\u0431\u0440\u0430\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Positive Technologies \u041a\u043b\u044e\u0447\u043d\u0438\u043a\u043e\u0432\u0430 \u0438 \u041c\u0435\u0434\u043e\u0432\u0430 \u0438\u0437 \u0447\u0438\u0441\u043b\u0430 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 - CVE-2019-1978 \u0438 CVE-2020-8209.\n\n\u0418\u043d\u0444\u043e\u0441\u0435\u043a \u0430\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u043d, \u0434\u0430.\n\nJe suis Positive, \u0431\u043b\u044f\u0442\u044c.", "creation_timestamp": "2021-08-24T10:15:28.000000Z"}, {"uuid": "b5ad1a02-3a8d-4af4-9f90-c64b5df12dda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/2018", "content": "\u200b\u200b\u0422\u0440\u0438 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430\u0437\u0430\u0434 \u0431\u0435\u043b\u043e\u0440\u0443\u0441\u0441\u043a\u0438\u0435 \u041a\u0438\u0431\u0435\u0440-\u041f\u0430\u0440\u0442\u0438\u0437\u0430\u043d\u044b \u043b\u043e\u043c\u0430\u043d\u0443\u043b\u0438 \u0410\u0418\u0421 \u041f\u0430\u0441\u043f\u043e\u0440\u0442 \u0431\u0435\u043b\u043e\u0440\u0443\u0441\u0441\u043a\u043e\u0433\u043e \u041c\u0412\u0414. \u041d\u043e\u0432\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u0433\u0440\u043e\u043c\u043a\u0430\u044f \u0438 \u043f\u0440\u043e\u0448\u043b\u0430 \u043f\u043e \u043c\u043d\u043e\u0433\u0438\u043c \u043d\u043e\u0432\u043e\u0441\u0442\u043d\u044b\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c. \n\n\u041a\u0430\u043a \u043f\u0438\u0448\u0443\u0442 \u043f\u0440\u043e \u044d\u0442\u043e \u0437\u0430\u0440\u0443\u0431\u0435\u0436\u043d\u044b\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0440\u0435\u0441\u0443\u0440\u0441\u044b - \"\u0440\u0430\u0437\u0440\u043e\u0437\u043d\u0435\u043d\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u0436\u0438\u0432\u0443\u0449\u0438\u0445 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0441\u0442\u0440\u0430\u043d\u044b \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e \u0440\u0435\u0436\u0438\u043c\u0435, \u0447\u0442\u043e\u0431\u044b \u0432\u043c\u0435\u0448\u0430\u0442\u044c\u0441\u044f \u0432 \u043d\u0443\u0436\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0432 \u0435\u0433\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0438 \u0441\u0432\u0435\u0440\u0433\u043d\u0443\u0442\u044c \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e\". \u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u0430 \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u0432\u044b\u0441\u0442\u0443\u043f\u0430\u0435\u0442 \u0437\u0430\u043c\u0435\u0441\u0442\u0438\u0442\u0435\u043b\u044c \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0430 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u0446\u0438\u0444\u0440\u043e\u0432\u043e\u0439 \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0438\u0441\u0442\u0438\u043a\u0438 \u043f\u0440\u0438 \u041d\u0410\u0422\u041e \u041b\u0443\u043a\u0430\u0441 \u0410\u043d\u0434\u0440\u044e\u043a\u0430\u0439\u0442\u0438\u0441.\n\n\u041d\u0430\u043c \u0442\u0430\u043a\u043e\u0439 \u0434\u0438\u0441\u043a\u0443\u0440\u0441 \u043e\u0447\u0435\u043d\u044c \u0434\u0430\u0436\u0435 \u043d\u0440\u0430\u0432\u0438\u0442\u0441\u044f, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0438\u043c \u043f\u043e\u0434\u0430\u0432\u0430\u0442\u044c \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0432 \u0441\u0445\u043e\u0436\u0435\u043c \u043a\u043b\u044e\u0447\u0435.\n\n\u041a\u0430\u043a \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044e \u0423\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0433\u0435\u043d\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0438\u043d\u0441\u043f\u0435\u043a\u0442\u043e\u0440\u0430 \u0421\u0428\u0410 (OIG), \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u0411\u044e\u0440\u043e \u043f\u0435\u0440\u0435\u043f\u0438\u0441\u0438 \u043d\u0430\u0441\u0435\u043b\u0435\u043d\u0438\u044f (USCB) \u0431\u044b\u043b\u0438 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u044b 11 \u044f\u043d\u0432\u0430\u0440\u044f 2020 \u0433\u043e\u0434\u0430 .\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0441\u0435\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Citrix ADC. \u0410\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0440\u044f\u0434\u0443 \u0441\u0435\u0442\u0435\u0439 USCB, \u043d\u043e, \u043f\u043e \u0443\u0432\u0435\u0440\u0435\u043d\u0438\u044f\u043c OIG, \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u043c \u0441 \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043f\u0435\u0440\u0435\u043f\u0438\u0441\u0438 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u043d\u0430\u0440\u043e\u0434\u043e\u043d\u0430\u0441\u0435\u043b\u0435\u043d\u0438\u044f \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438.\n\n\u041f\u0440\u0438 \u0432\u0441\u0435\u043c \u044d\u0442\u043e\u043c \u0430\u0442\u0430\u043a\u0430 \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0430\u0441\u044c \u043d\u0435\u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u043e\u0439 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u0432\u0443\u0445 \u0441 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u044c, \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u0432\u0448\u0438\u0435 \u0438\u043c\u0435\u043b\u0438 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c USCB.\n\n\u041a\u0442\u043e-\u0436\u0435 \u0441\u0442\u043e\u044f\u043b \u0437\u0430 \u0430\u0442\u0430\u043a\u043e\u0439? \u0421\u0443\u0434\u044f \u043f\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044e CVE-2019-19781 \u0432 Citrix ADC \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u043e\u0433\u043e \u0432\u0435\u043a\u0442\u043e\u0440\u0430 \u0430\u0442\u0430\u043a\u0438, \u0437\u0430 \u043d\u0430\u043f\u0430\u0434\u0435\u043d\u0438\u0435\u043c \u043d\u0430 USCB \u0441\u0442\u043e\u044f\u043b\u0430  \u0440\u0430\u0437\u0440\u043e\u0437\u043d\u0435\u043d\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0430 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432, \u0436\u0438\u0432\u0443\u0449\u0438\u0445 \u0437\u0430 \u043f\u0440\u0435\u0434\u0435\u043b\u0430\u043c\u0438 \u0421\u0428\u0410, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u0431 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u043e\u043c \u0440\u0435\u0436\u0438\u043c\u0435, \u0447\u0442\u043e\u0431\u044b \u0432\u043c\u0435\u0448\u0430\u0442\u044c\u0441\u044f \u0432 \u043d\u0443\u0436\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0432 \u0435\u0433\u043e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0438 \u0441\u0432\u0435\u0440\u0433\u043d\u0443\u0442\u044c \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e.\n\n\u041f\u0440\u0430\u0432\u0434\u0430 \u043f\u043e\u0447\u0435\u043c\u0443-\u0442\u043e \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0435 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043d\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u0438\u0445 \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0438\u0437 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u043e\u0439 \u043f\u0440\u043e\u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u044b APT 41.", "creation_timestamp": "2021-08-19T11:47:27.000000Z"}, {"uuid": "756322d2-2cd9-40b3-8fd2-002215b6eedc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/812", "content": "\u0412 \u043a\u043e\u043d\u0446\u0435 \u0438\u044e\u043d\u044f \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440 ransomware Maze \u0441\u043b\u043e\u043c\u0430\u043b LG \u0438 \u0440\u0430\u0437\u043c\u0435\u0441\u0442\u0438\u043b \u0432 \u0441\u0435\u0442\u0438 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u0432\u0437\u043b\u043e\u043c\u0430, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u0431\u044b\u043b\u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0448\u0438\u0432\u043e\u043a \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 LG, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0435 \u043a\u043e\u0434\u044b \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u0412\u0447\u0435\u0440\u0430 Maze \u0432\u044b\u043a\u0438\u043d\u0443\u043b\u0438 \u0432 \u0441\u0435\u0442\u044c 50 \u0413\u0431 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0438\u0445 LG. \u042d\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0434\u043d\u043e - \u043a\u043e\u0440\u0435\u0439\u0446\u044b \u043e\u0442\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043f\u043b\u0430\u0442\u0438\u0442\u044c \u0432\u044b\u043a\u0443\u043f. \u0422\u0430\u043a\u0430\u044f \u043f\u043e\u0437\u0438\u0446\u0438\u044f \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u0443\u0432\u0430\u0436\u0435\u043d\u0438\u0435, \u0445\u043e\u0442\u044f \u0438 \u043d\u0430 \u0444\u043e\u043d\u0435 \u0432\u043e\u043f\u0440\u043e\u0441\u043e\u0432 \u043a \u0438\u043d\u0444\u043e\u0441\u0435\u043a\u0443 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438.\n\n\u041f\u0440\u0430\u0432\u0434\u0430, \u043f\u043e \u0443\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044e \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0441\u0442\u043e\u0432 ZDNet, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u0438 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0438\u043c \u0432 \u043f\u0438\u0441\u044c\u043c\u0435, \u0447\u0442\u043e \u043a\u0430\u043a \u0442\u0430\u043a\u043e\u0432\u043e\u0433\u043e \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0435 \u0431\u044b\u043b\u043e, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \"\u0443 LG \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0437\u043d\u0430\u0447\u0438\u043c\u044b\u0439 \u0431\u0438\u0437\u043d\u0435\u0441\" - \u043e\u043d\u0438 \u043f\u0440\u043e\u0441\u0442\u043e \u0443\u043a\u0440\u0430\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e. \u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0447\u0442\u043e \u0441\u043c\u0435\u043b\u043e\u0441\u0442\u044c \u043a\u043e\u0440\u0435\u0439\u0441\u043a\u043e\u0433\u043e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0438\u043c\u0435\u043d\u043d\u043e \u0441 \u044d\u0442\u0438\u043c.\n\n\u041d\u0443 \u0430 \u0432 \u0434\u043e\u0432\u0435\u0441\u043e\u043a \u043a LG \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b \u043c\u0430\u0441\u0441\u0438\u0432 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Xerox \u0440\u0430\u0437\u043c\u0435\u0440\u043e\u043c \u0432 25 \u0441 \u043b\u0438\u0448\u043d\u0438\u043c \u0413\u0431. \u0422\u043e\u0436\u0435 \u043d\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0432 \u043c\u0438\u0440\u043e\u0432\u043e\u043c \u0441\u043f\u0438\u0441\u043a\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u0438\u043a\u0438.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Bad Packets \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u043e\u0431\u0430 \u0432\u0437\u043b\u043e\u043c\u0430 \u0431\u044b\u043b\u0438 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u044b \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0435 Citrix ADC, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043a CVE-2019-19781, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c \u0435\u0449\u0435 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 \u044d\u0442\u043e\u0433\u043e \u0433\u043e\u0434\u0430.\n\n\"\u041a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u0433\u043e\u0434\u0430 \u043d\u0435 \u0430\u043f\u0434\u0435\u0439\u0442\u0438\u043b Citrix ADC \u0438 \u043f\u043e\u0442\u0435\u0440\u044f\u043b \u0434\u0435\u0441\u044f\u0442\u043a\u0438 \u0433\u0438\u0433\u0430\u0431\u0430\u0439\u0442 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445\". \u041a\u0430\u0440\u0442\u0438\u043d\u043a\u0443 \u043a \u043f\u043e\u0434\u043f\u0438\u0441\u0438 \u043f\u043e\u0434\u0431\u0435\u0440\u0438\u0442\u0435 \u0441\u0430\u043c\u0438.", "creation_timestamp": "2020-08-04T14:11:55.000000Z"}, {"uuid": "0195fc85-2201-49bc-bd46-d03d3741ddd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/50", "content": "\u041f\u043e\u0445\u043e\u0436\u0435 \u043c\u044b \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043c\u0441\u044f \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044f\u043c\u0438 \u0432\u043e\u0439\u043d\u044b \u0437\u0430 \u043a\u043e\u0440\u043c\u043e\u0432\u0443\u044e \u0431\u0430\u0437\u0443.\n\n\u041a\u0430\u043a \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438 FireEye \u043d\u0435\u043a\u0438\u0439 \u0445\u0430\u043a\u0435\u0440, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2019-19781 \u0432 Citrix, \u0438\u043d\u0441\u0442\u0430\u043b\u043b\u0438\u0440\u0443\u0435\u0442 \u043a\u043e\u0434, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u044b\u0447\u0438\u0449\u0430\u0435\u0442 \u0441 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u044b \u0438 \u0431\u043b\u043e\u043a\u0438\u0440\u0443\u0435\u0442 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f. \u041e\u0434\u043d\u0430\u043a\u043e \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0431\u044d\u043a\u0434\u043e\u0440 \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u0437\u043d\u0430\u0435\u0442 \u043f\u0430\u0440\u043e\u043b\u044c\u043d\u0443\u044e \u0444\u0440\u0430\u0437\u0443.\n\nhttp://www.fireeye.com/blog/threat-research/2020/01/vigilante-deploying-mitigation-for-citrix-netscaler-vulnerability-while-maintaining-backdoor.html", "creation_timestamp": "2020-01-19T09:32:30.000000Z"}, {"uuid": "3fc7d0b4-dad8-424a-a8fc-6b5fd8b615b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/951", "content": "\u200b\u200b\u041d\u0430\u043c \u0441\u043e\u0432\u0441\u0435\u043c \u043d\u0435 \u043d\u0440\u0430\u0432\u0438\u0442\u0441\u044f, \u043a\u043e\u0433\u0434\u0430 \u043d\u0430\u0448\u0438 \u043f\u0435\u0441\u0441\u0438\u043c\u0438\u0441\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0432\u0430\u043d\u0433\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430\u0447\u0438\u043d\u0430\u044e\u0442 \u0441\u0431\u044b\u0432\u0430\u0442\u044c\u0441\u044f. \u041f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u043c\u044b \u0438\u0445 \u043f\u0438\u0448\u0435\u043c \u043d\u0435 \u0440\u0430\u0434\u0438 \u0445\u0430\u0439\u043f\u0430, \u0430 \u0434\u043b\u044f \u0442\u043e\u0433\u043e, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0440\u0430\u0442\u0438\u0442\u044c \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435 \u043f\u0440\u0438\u043d\u0438\u043c\u0430\u044e\u0449\u0438\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0435 \u043b\u044e\u0434\u0435\u0439 (\u043c\u044b \u043e\u0447\u0435\u043d\u044c \u043d\u0430\u0434\u0435\u0435\u043c\u0441\u044f, \u0447\u0442\u043e \u043e\u043d\u0438 \u0438\u0445 \u0447\u0438\u0442\u0430\u044e\u0442) \u043d\u0430 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0432 \u043e\u0442\u0440\u0430\u0441\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e\u0439 \u0441\u043c\u0435\u043d\u044b \u0441\u0430\u043c\u043e\u0433\u043e \u043f\u043e\u0434\u0445\u043e\u0434\u0430 \u043a \u043f\u043e\u0441\u0442\u0440\u043e\u0435\u043d\u0438\u044e \u0438\u043d\u0444\u043e\u0441\u0435\u043a\u0430.\n\n\u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u043a\u043e\u0433\u0434\u0430 \u043c\u044b 10 \u0434\u043d\u0435\u0439 \u043d\u0430\u0437\u0430\u0434 \u043f\u0438\u0441\u0430\u043b\u0438 \u043f\u0440\u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u0443\u044e \u0433\u0438\u0431\u0435\u043b\u044c \u043b\u044e\u0434\u0435\u0439 \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u043c\u044b \u0434\u0430\u0436\u0435 \u043d\u0435 \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u043b\u0438, \u0447\u0442\u043e \u044d\u0442\u043e \u0441\u043b\u0443\u0447\u0438\u0442\u0441\u044f \u0442\u0430\u043a \u0441\u043a\u043e\u0440\u043e.\n\n\u0412\u0447\u0435\u0440\u0430 \u043d\u0435\u043c\u0435\u0446\u043a\u0438\u0435 \u0432\u043b\u0430\u0441\u0442\u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438, \u0447\u0442\u043e 10 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u044f \u0441\u0435\u0442\u044c \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0441\u043a\u043e\u0439 \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u044b \u0432 \u0414\u044e\u0441\u0441\u0435\u043b\u044c\u0434\u043e\u0440\u0444\u0435 (UKD) \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0430\u0442\u0430\u043a\u0435 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043d\u0435\u043d\u0430\u0437\u0432\u0430\u043d\u043d\u043e\u0433\u043e ransomware, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0418\u0422-\u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u044b \u0432\u044b\u0448\u043b\u0438 \u0438\u0437 \u0441\u0442\u0440\u043e\u044f \u0438 \u043e\u043a\u0430\u0437\u0430\u043d\u0438\u0435 \u043f\u043b\u0430\u043d\u043e\u0432\u043e\u0439 \u0438 \u043d\u0435\u043e\u0442\u043b\u043e\u0436\u043d\u043e\u0439 \u043c\u0435\u0434\u0438\u0446\u0438\u043d\u0441\u043a\u043e\u0439 \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u0442\u0430\u043b\u043e \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0424\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u0438 (BSI), \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u043d\u0438\u043a\u043b\u0438 \u0432 \u0441\u0435\u0442\u044c \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 Citrix \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2019-19781, \u043f\u0430\u0442\u0447 \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b \u0432\u044b\u043f\u0443\u0449\u0435\u043d \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c \u0435\u0449\u0435 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 (!) 2020 \u0433\u043e\u0434\u0430.\n\n\u0418\u0437-\u0437\u0430 \u043e\u0442\u043a\u0430\u0437\u0430 \u043e\u0442 \u043e\u043a\u0430\u0437\u0430\u043d\u0438\u044f \u043d\u0435\u043e\u0442\u043b\u043e\u0436\u043d\u043e\u0439 \u043f\u043e\u043c\u043e\u0449\u0438 \u0436\u0435\u043d\u0449\u0438\u043d\u0443, \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0432 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0443\u044e \u043f\u044f\u0442\u043d\u0438\u0446\u0443 \u043f\u043e\u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0441\u0440\u043e\u0447\u043d\u0430\u044f \u0433\u043e\u0441\u043f\u0438\u0442\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f, \u043f\u0440\u0438\u0448\u043b\u043e\u0441\u044c \u0432\u0435\u0441\u0442\u0438 \u0432 \u0434\u0440\u0443\u0433\u0443\u044e \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u0443, \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0443\u044e\u0441\u044f \u0432 32 \u043a\u0438\u043b\u043e\u043c\u0435\u0442\u0440\u0430\u0445, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u043f\u0430\u0446\u0438\u0435\u043d\u0442\u043a\u0430 \u0443\u043c\u0435\u0440\u043b\u0430.\n\n\u041f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a \u043f\u043e\u043b\u0438\u0446\u0438\u044f \u0441\u0432\u044f\u0437\u0430\u043b\u0430\u0441\u044c \u043f\u043e \u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u043a\u043e\u043d\u0442\u0430\u043a\u0442\u0443 \u0441 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u043c ransomware \u0438 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0438 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043b\u0438 \u0441\u0435\u0442\u044c, \u043f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0443\u044e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0441\u043a\u043e\u0439 \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u0435, \u0430 \u043d\u0435 \u0441\u0430\u043c\u043e\u043c\u0443 \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0443, \u0445\u0430\u043a\u0435\u0440\u044b \u043f\u0435\u0440\u0435\u0434\u0430\u043b\u0438 \u043a\u043b\u044e\u0447 \u0434\u043b\u044f \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0443\u0448\u043b\u0438 \u0438\u0437 \u044d\u0444\u0438\u0440\u0430. \u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0442\u0435\u0445\u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u0435\u0442\u044c UKD.\n\n\u041d\u0435\u043c\u0435\u0446\u043a\u0430\u044f \u043f\u0440\u043e\u043a\u0443\u0440\u0430\u0442\u0443\u0440\u0430 \u0440\u0430\u0441\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u043e\u0437\u0431\u0443\u0436\u0434\u0435\u043d\u0438\u044f \u0443\u0433\u043e\u043b\u043e\u0432\u043d\u043e\u0433\u043e \u0434\u0435\u043b\u0430 \u043f\u043e \u0444\u0430\u043a\u0442\u0443 \u043d\u0435\u043f\u0440\u0435\u0434\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0431\u0438\u0439\u0441\u0442\u0432\u0430 \u043f\u043e \u043d\u0435\u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u043e\u0441\u0442\u0438. \u0415\u0441\u0442\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 \u0445\u0430\u043a\u0435\u0440\u043e\u0432. \n\n\u0410 \u043c\u044b, \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u044f\u0441\u044c \u043a \u0442\u0435\u043c\u0435 \u0441\u0432\u043e\u0435\u0433\u043e \u043f\u043e\u0441\u0442\u0430, \u043d\u0430 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u044b \u0441\u043e\u0441\u043b\u0430\u043b\u0438\u0441\u044c \u0432 \u043d\u0430\u0447\u0430\u043b\u0435, \u0441\u043f\u0440\u043e\u0441\u0438\u043c - \u0430 \u043f\u043e\u043d\u0435\u0441\u0435\u0442 \u043b\u0438 \u043a\u0430\u043a\u043e\u0435-\u043d\u0438\u0431\u0443\u0434\u044c \u0432\u0437\u044b\u0441\u043a\u0430\u043d\u0438\u0435 \u0447\u0435\u043b\u043e\u0432\u0435\u043a, \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0437\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 Citrix? \u0418 \u0435\u0433\u043e \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c? \u0418 \"\u0443\u0441\u043f\u0435\u0448\u043d\u044b\u0439\" \u0442\u043e\u043f-\u043c\u0435\u043d\u0435\u0434\u0436\u043c\u0435\u043d\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043d\u0435 \u0441\u043c\u043e\u0433 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u0442\u044c \u0433\u0440\u0430\u043c\u043e\u0442\u043d\u044b\u0439 \u0431\u0438\u0437\u043d\u0435\u0441-\u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0430\u0443\u0434\u0438\u0442\u0430 \u0418\u0411, \u043f\u043e\u043c\u043e\u0433\u0430\u044e\u0449\u0438\u0439 \u0432\u044b\u044f\u0432\u043b\u044f\u0442\u044c \u043a\u0430\u043a \u0440\u0430\u0437 \u0442\u0430\u043a\u0438\u0435 \u043a\u043e\u0441\u044f\u043a\u0438?\n\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u043a\u0442\u043e-\u0442\u043e \u0441\u043a\u0430\u0436\u0435\u0442, \u0447\u0442\u043e \u043c\u044b \u043e\u0445\u0440\u0435\u043d\u0435\u043b\u0438 \u0438 \u0442\u0440\u0435\u0431\u0443\u0435\u043c \u043b\u0438\u043d\u0447\u0438\u0432\u0430\u0442\u044c \u043d\u0435\u0432\u0438\u043d\u043d\u044b\u0445 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432. \u041d\u043e \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u0443\u0442 \u043d\u0430\u0434\u043e \u043d\u0435 \u043f\u0440\u0438\u0432\u044b\u0447\u043d\u043e\u0439 \u0442\u043e\u0447\u043a\u043e\u0439 \u0437\u0440\u0435\u043d\u0438\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0441\u043f\u0443\u0441\u0442\u044f \u0440\u0443\u043a\u0430\u0432\u0430 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u044c\u0441\u044f \u043a \u043f\u043e\u0434\u043e\u0431\u043d\u043e\u043c\u0443 \u0440\u0430\u0437\u0434\u043e\u043b\u0431\u0430\u0439\u0441\u0442\u0432\u0443, \u0430 \u0438\u043c\u0435\u044e\u0449\u0438\u043c\u0438\u0441\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c\u0438. \u0410 \u043e\u043d\u0438 \u0442\u0430\u043a\u043e\u0432\u044b, \u0447\u0442\u043e \u0438\u0437-\u0437\u0430 \u043d\u0435\u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0438 9 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0443\u043c\u0435\u0440 \u0447\u0435\u043b\u043e\u0432\u0435\u043a (\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0441 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430 ransomware, \u0440\u0430\u0437\u0443\u043c\u0435\u0435\u0442\u0441\u044f, \u043d\u0438\u043a\u0442\u043e \u043d\u0435 \u0441\u043d\u0438\u043c\u0430\u0435\u0442).\n\n\u0410 \u0432\u043e\u0442 \u043f\u043e\u0441\u043b\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u043d\u0430\u043a\u0430\u0437\u0430\u043d\u0438\u0439 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u043d\u0430\u0447\u043d\u0443\u0442 \u0431\u043e\u043b\u0435\u0435 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u044c\u0441\u044f \u043a \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043d\u0435 \u0441\u043e\u0433\u043b\u0430\u0448\u0430\u0442\u044c\u0441\u044f \u043d\u0430 \u043a\u043e\u043f\u0435\u0435\u0447\u043d\u044b\u0435 \u0437\u0430\u0440\u043f\u043b\u0430\u0442\u044b \u043f\u043e\u0434 \u0434\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u044d\u0442\u043e\u0439 \u0441\u0430\u043c\u043e\u0439 \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0438 \u0432\u044b\u043d\u0443\u0436\u0434\u0430\u0442\u044c \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u0439 \u043f\u0440\u0438\u0441\u043b\u0443\u0448\u0438\u0432\u0430\u0442\u044c\u0441\u044f \u043a \u0441\u0432\u043e\u0435\u043c\u0443 \u043c\u043d\u0435\u043d\u0438\u044e \u043f\u043e\u0434 \u0443\u0433\u0440\u043e\u0437\u043e\u0439 \u0443\u0445\u043e\u0434\u0430, \u0447\u0442\u043e \u0432 \u0438\u0442\u043e\u0433\u0435 \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u0442 \u043a \u043d\u043e\u0440\u043c\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0432 \u0438\u043d\u0444\u043e\u0441\u0435\u043a\u0435. \u0425\u043e\u0442\u044f \u0438 \u0446\u0435\u043d\u043e\u0439 \u0433\u043e\u0440\u0430\u0437\u0434\u043e \u0431\u043e\u043b\u044c\u0448\u0438\u0445 \u0437\u0430\u0442\u0440\u0430\u0442 \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0431\u0438\u0437\u043d\u0435\u0441\u0430.\n\n\u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u043e\u043b\u044c\u0448\u0438\u043d\u0441\u0442\u0432\u043e \u043d\u0430\u0437\u043e\u0432\u0435\u0442 \u043d\u0430\u0448\u0438 \u043c\u044b\u0441\u043b\u0438 \u0443\u0442\u043e\u043f\u0438\u0447\u043d\u044b\u043c\u0438, \u043d\u043e \u044d\u0442\u043e \u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0439 \u0440\u0430\u0437\u0443\u043c\u043d\u044b\u0439 \u043f\u0443\u0442\u044c \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f. \u0418\u043d\u0430\u0447\u0435 \u043b\u044e\u0434\u0438 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0442 \u0443\u043c\u0438\u0440\u0430\u0442\u044c.", "creation_timestamp": "2020-09-18T11:33:33.000000Z"}, {"uuid": "8ded5c31-5588-4c65-9e70-69ea39502fa2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/true_secator/856", "content": "\u0418 \u043e\u043f\u044f\u0442\u044c ransomware.\n\nCarnival Corp, \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u0439 \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440  \u043a\u0440\u0443\u0438\u0437\u043d\u044b\u0445 \u043b\u0430\u0439\u043d\u0435\u0440\u043e\u0432 \u0432 \u043c\u0438\u0440\u0435, \u0432\u043b\u0430\u0434\u0435\u044e\u0449\u0438\u0439 \u0444\u043b\u043e\u0442\u043e\u043c \u0438\u0437 600 \u0441\u0443\u0434\u043e\u0432 \u0438 \u0438\u043c\u0435\u044e\u0449\u0438\u0439 \u0434\u043e\u0445\u043e\u0434 \u0431\u043e\u043b\u0435\u0435 20 \u043c\u043b\u0440\u0434. \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432 \u0432 2019 \u0433\u043e\u0434\u0443, \u0441\u0442\u0430\u043b \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f.\n\n\u0412 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0435, \u043f\u043e\u0434\u0430\u043d\u043d\u043e\u043c \u0432 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0443\u044e \u041a\u043e\u043c\u0438\u0441\u0441\u0438\u044e \u043f\u043e \u0446\u0435\u043d\u043d\u044b\u043c \u0431\u0443\u043c\u0430\u0433\u0430\u043c (SEC), \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e 15 \u0430\u0432\u0433\u0443\u0441\u0442\u0430 \u043e\u0434\u0438\u043d \u0438\u0437 \u0431\u0440\u0435\u043d\u0434\u043e\u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u0438 \u0431\u044b\u043b \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u043d \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u043e\u043c \u043d\u0435\u043d\u0430\u0437\u0432\u0430\u043d\u043d\u043e\u0433\u043e ransomware, \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u0447\u0435\u0433\u043e \u0447\u0430\u0441\u0442\u044c \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043b\u0438\u0447\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438 \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u043e\u0432 Carnival Corp., \u0431\u044b\u043b\u0430 \u043f\u043e\u0445\u0438\u0449\u0435\u043d\u0430 \u0438 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0430.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c Carnival \u043e\u0436\u0438\u0434\u0430\u044e\u0442, \u0447\u0442\u043e \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043f\u0430\u0441\u0442\u044c \u0432 \u043f\u0430\u0431\u043b\u0438\u043a, \u0430 \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u0432\u044b\u043a\u0443\u043f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f\u043c \u0437\u0430\u043f\u043b\u0430\u0447\u0435\u043d \u043d\u0435 \u0431\u044b\u043b.\n\n\u0418 \u043c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u0431\u044b \u043f\u043e\u0436\u0430\u043b\u0435\u0442\u044c \u043d\u0435\u0441\u0447\u0430\u0441\u0442\u043d\u044b\u0445 \u0441\u0443\u0434\u043e\u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0435\u0432, \u0434\u0430 \u0432\u043e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Bad Packets \u043f\u043e\u0434\u0441\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442, \u0447\u0442\u043e \u0432\u0437\u043b\u043e\u043c, \u0441\u043a\u043e\u0440\u0435\u0435 \u0432\u0441\u0435\u0433\u043e, \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0435\u043b \u043f\u043e \u043f\u0440\u0438\u0447\u0438\u043d\u0435 \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u0443 Carnival Corp. \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 CVE-2019-19781 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Citrix, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u0444\u0430\u0435\u0440\u0432\u043e\u043b\u043e\u0432 \u043e\u0442 Palo Alto Networks, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0435\u0440\u0435\u0434 CVE- 2020-2021.\n\n\u0414\u043b\u044f \u043f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u044f - \u043f\u0435\u0440\u0432\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f\u0445 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 2020 \u0433\u043e\u0434\u0430, \u0430 \u0432\u0442\u043e\u0440\u0430\u044f - \u0432 \u043a\u043e\u043d\u0446\u0435 \u0438\u044e\u043d\u044f. \u0418 \u0435\u0441\u043b\u0438 \"\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u0435\" \u0442\u043e\u043f-\u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u044b \u043c\u0443\u043b\u044c\u0442\u0438\u043c\u0438\u043b\u043b\u0438\u0430\u0440\u0434\u043d\u043e\u0433\u043e \u0431\u0438\u0437\u043d\u0435\u0441\u0430 \u043d\u0435 \u0432 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0438 \u043d\u0430\u043b\u0430\u0434\u0438\u0442\u044c \u0442\u0430\u043a\u043e\u0439 \u044d\u043b\u0435\u043c\u0435\u043d\u0442\u0430\u0440\u043d\u044b\u0439 \u0431\u0438\u0437\u043d\u0435\u0441-\u043f\u0440\u043e\u0446\u0435\u0441\u0441, \u043a\u0430\u043a \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0438\u043c\u0435\u044e\u0449\u0435\u0433\u043e\u0441\u044f \u041f\u041e, \u0442\u043e \u043e\u043d\u0438 \u0441\u0430\u043c\u0438 \u0441\u0435\u0431\u0435 \u0431\u0443\u0440\u0430\u0442\u0438\u043d\u044b.", "creation_timestamp": "2020-08-18T14:46:22.000000Z"}, {"uuid": "1d66a027-c8a2-4ae8-a6a9-d4198475f48b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/736", "content": "\u200b\u200b\u041f\u043e\u043c\u043d\u0438\u0442\u0441\u044f, \u043d\u0435 \u0434\u0430\u043b\u0435\u0435 \u043a\u0430\u043a \u0437\u0438\u043c\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u043e\u0431\u0441\u0443\u0436\u0434\u0430\u043b\u0430\u0441\u044c 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2019-19781 \u0432 Citrix ADC \u0438 Citrix Gateway, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0430\u0441\u044c \u043d\u0435\u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u043e\u0439 \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 \u043c\u0435\u0441\u044f\u0446\u0430 \u0438 \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u043c\u0438 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u043c\u0438 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u043f\u0440\u043e\u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c\u0438, \u0434\u043b\u044f \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f \u0432 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0443\u044e\u0449\u0438\u0435 \u0438\u0445 \u0441\u0435\u0442\u0438.\n\n\u0422\u0430\u043a \u0442\u0443\u0442 \u043d\u043e\u0432\u044b\u0445 \u0434\u044b\u0440\u043e\u043a \u043f\u043e\u0434\u0432\u0435\u0437\u043b\u0438.\n\n\u0421\u0435\u0433\u043e\u0434\u043d\u044f Citrix \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f Citrix ADC, Citrix Gateway  \u0430 \u0442\u0430\u043a\u0436\u0435 Citrix SD-WAN WANOP, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u043e\u0441\u044c \u0446\u0435\u043b\u044b\u0445 11 \u043d\u043e\u0432\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0445 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438, \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435. \u0412 \u043e\u0431\u0449\u0435\u043c, \u0434\u0435\u043b\u0430\u0442\u044c \u0432\u0441\u0435, \u0447\u0442\u043e\u0431\u044b \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e \u043a\u043e\u043c\u0444\u043e\u0440\u0442\u043d\u043e \u043f\u0440\u043e\u043d\u0438\u043a\u0430\u0442\u044c \u0432 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0441\u0435\u0442\u0438.\n\n\u041f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c, \u043a\u0430\u043a \u0438 \u043f\u0440\u0438\u043d\u044f\u0442\u043e \u0432 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445, \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u043e \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \"\u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u044d\u0442\u0438\u0445 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\" \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0435\u043c\u0443 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e. \u0412\u0438\u0434\u0438\u043c\u043e, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0438\u0434\u0435\u0442 \u043d\u0435\u0430\u043a\u0442\u0438\u0432\u043d\u0430\u044f, \u0432\u044f\u043b\u0430\u044f \u0442\u0430\u043a\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0438\u0434\u0435\u0442.\n\n\u041a\u0430\u043a-\u0431\u044b \u0442\u0430\u043c \u043d\u0438 \u0431\u044b\u043b\u043e, \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043e, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432\u0441\u0435 \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u044b\u0435 \u0434\u043e\u043b\u0436\u043d\u044b \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0430\u043f\u0434\u0435\u0439\u0442.", "creation_timestamp": "2020-07-07T18:17:17.000000Z"}, {"uuid": "79322357-9119-49df-a4bc-5f27311287dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/962", "content": "\u041f\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044e BleepingComputer, \u0438\u0442\u0430\u043b\u044c\u044f\u043d\u0441\u043a\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Luxottica, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0443\u043f\u043d\u0435\u0439\u0448\u0438\u043c \u0432 \u043c\u0438\u0440\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c \u043e\u0447\u043a\u043e\u0432, \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0435, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u0435\u043b\u0430 \u043a \u043e\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0432 \u0418\u0442\u0430\u043b\u0438\u0438 \u0438 \u041a\u0438\u0442\u0430\u0435.\n\nLuxottica \u0432\u043b\u0430\u0434\u0435\u0435\u0442 \u0442\u0430\u043a\u0438\u043c\u0438 \u0431\u0440\u0435\u043d\u0434\u0430\u043c\u0438 \u043e\u0447\u043a\u043e\u0432 \u043a\u0430\u043a Ray-Ban, Oakley, Oliver Peoples, Ferrari, Michael Kors, Bulgari, Armani, Prada \u0438 Chanel. \u0412\u044b\u0440\u0443\u0447\u043a\u0430 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 2019 \u0433\u043e\u0434\u0443 \u0441\u043e\u0441\u0442\u0430\u0432\u0438\u043b\u0430 9,4 \u043c\u043b\u0440\u0434 \u0434\u043e\u043b\u043b\u0430\u0440\u043e\u0432.\n\n\u0412 \u043f\u044f\u0442\u043d\u0438\u0446\u0443 \u0441\u0430\u0439\u0442\u044b \u0431\u0440\u0435\u043d\u0434\u043e\u0432 Ray-Ban, Sunglass Hut, LensCrafters, EyeMed \u0438 Pearle Vision \u0432\u044b\u0448\u043b\u0438 \u0438\u0437 \u0441\u0442\u0440\u043e\u044f. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u043f\u043e\u0440\u0442\u0430\u043b\u044b one. luxotrica. com \u0438 university. luxottica. com. \u0410 \u0432\u0447\u0435\u0440\u0430 \u0438\u0442\u0430\u043b\u044c\u044f\u043d\u0441\u043a\u0438\u0435 \u0421\u041c\u0418 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438, \u0447\u0442\u043e \u0441\u043e\u0442\u0440\u0443\u0434\u043d\u0438\u043a\u0438 \u0440\u044f\u0434\u0430 \u0438\u0442\u0430\u043b\u044c\u044f\u043d\u0441\u043a\u0438\u0445 \u043e\u0444\u0438\u0441\u043e\u0432 Luxottica \u0431\u044b\u043b\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u044b \u0434\u043e\u043c\u043e\u0439 \u0432 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \"\u0441\u0431\u043e\u0435\u043c \u0418\u0422-\u0441\u0438\u0441\u0442\u0435\u043c\".\n\n\u0427\u0442\u043e \u044d\u0442\u043e \u0432\u0441\u0435 \u043d\u0430\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442? \u0421\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u043e, \u0432\u0435\u0440\u043d\u043e, \u0430\u0442\u0430\u043a\u0443 ransomware. \u0422\u0435\u043c \u0431\u043e\u043b\u0435\u0435, \u0447\u0442\u043e \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Bad Packets \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0441\u0442\u0430\u043c BleepingComputer, \u0447\u0442\u043e \u0443 Luxottica \u0441\u0442\u043e\u044f\u043b \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u044b\u0439 Citrix ADX, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043f\u0435\u0440\u0435\u0434 CVE-2019-19781. \n\n\u042d\u0442\u043e \u0442\u0430 \u0441\u0430\u043c\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0438\u0437-\u0437\u0430 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0431\u044b\u043b\u0430 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u0430 \u0441\u0435\u0442\u044c \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0441\u043a\u043e\u0439 \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u044b \u0432 \u0414\u044e\u0441\u0441\u0435\u043b\u044c\u0434\u043e\u0440\u0444\u0435, \u043f\u043e \u043f\u0440\u0438\u0447\u0438\u043d\u0435 \u0447\u0435\u0433\u043e \u0443\u043c\u0435\u0440 \u043f\u0430\u0446\u0438\u0435\u043d\u0442, \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u043d\u0435\u043e\u0442\u043b\u043e\u0436\u043d\u0443\u044e \u043f\u043e\u043c\u043e\u0449\u044c.\n\n\u041c\u0435\u0436\u0434\u0443 \u0442\u0435\u043c, CVE-2019-19781 \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c \u0435\u0449\u0435 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 2020 \u0433\u043e\u0434\u0430. \"\u042d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c\" \u0432\u043e \u0432\u0441\u0435\u0439 \u043a\u0440\u0430\u0441\u0435.", "creation_timestamp": "2020-09-22T14:03:00.000000Z"}, {"uuid": "ccc4f3f3-f9ce-4f6f-8e18-12f0f36d9c9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/true_secator/974", "content": "\u0418\u0437 \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u0441\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u0430 \u043f\u0440\u0438\u0445\u043e\u0434\u044f\u0442 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u0438\u043d\u0441\u0430\u0439\u0434\u044b \u043f\u043e \u043f\u043e\u0432\u043e\u0434\u0443 \u0430\u0442\u0430\u043a\u0438 ransoware DoppelPaymer \u043d\u0430 \u0441\u0435\u0442\u044c \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0441\u043a\u043e\u0439 \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u044b \u0432 \u0414\u044e\u0441\u0441\u0435\u043b\u044c\u0434\u043e\u0440\u0444\u0435 (UKD), \u0432 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043f\u043e\u0433\u0438\u0431 \u043d\u0435 \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0438\u0439 \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0439 \u043d\u0435\u043e\u0442\u043b\u043e\u0436\u043d\u043e\u0439 \u043f\u043e\u043c\u043e\u0449\u0438 \u043f\u0430\u0446\u0438\u0435\u043d\u0442.\n\n\u041a\u043e\u0433\u0434\u0430 \u0432 \u044f\u043d\u0432\u0430\u0440\u0435 2020 \u0433\u043e\u0434\u0430 \u043f\u043e\u044f\u0432\u0438\u043b\u0430\u0441\u044c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2019-19781 \u0432 Citrix ADC \u0445\u0430\u043a\u0435\u0440\u044b \u0432\u0441\u0435\u0445 \u043c\u0430\u0441\u0442\u0435\u0439 \u0441\u0442\u0430\u043b\u0438 \u0441\u0440\u043e\u0447\u043d\u043e \u043f\u044b\u043b\u0435\u0441\u043e\u0441\u0438\u0442\u044c \u0441\u0435\u0442\u044c \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432. \u0422\u043e\u0433\u0434\u0430 \u0436\u0435 \u0431\u044b\u043b \u0432\u0437\u043b\u043e\u043c\u0430\u043d \u0441\u0435\u0440\u0432\u0435\u0440 UKD, \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0447\u0435\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u043d\u0438\u043a\u043b\u0438 \u0432 \u0441\u0435\u0442\u044c \u0431\u043e\u043b\u044c\u043d\u0438\u0446\u044b. \u0410\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u044b UKD \u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0438\u043b\u0438 \u0441\u0432\u043e\u0439 Citrix, \u043d\u043e \u0431\u044d\u043a\u0434\u043e\u0440 \u0443\u0436\u0435 \u0441\u0438\u0434\u0435\u043b \u0432\u043d\u0443\u0442\u0440\u0438.\n\n\u0410 \u0443\u0436\u0435 \u0432 \u043a\u043e\u043d\u0446\u0435 \u043b\u0435\u0442\u0430 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0441\u0435\u0442\u0438 UKD \u0431\u044b\u043b \u043f\u0440\u043e\u0434\u0430\u043d \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0443 DoppelPaymer \u043f\u043e\u0434 \u0432\u0438\u0434\u043e\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0432 \u0441\u0435\u0442\u044c \u0423\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0432\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u0445 \u0431\u043e\u043b\u044c\u043d\u0438\u0447\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439 \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u044b ransomware \u043d\u0435 \u0437\u0430\u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043e\u0432\u0430\u043d\u044b \u0438 \u0442\u0430\u043a\u0438\u0435 \u0431\u044d\u043a\u0434\u043e\u0440\u044b \u043d\u0435 \u043f\u043e\u043a\u0443\u043f\u0430\u044e\u0442. \n\n\u042d\u0442\u043e \u0447\u0430\u0441\u0442\u0438\u0447\u043d\u043e \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442\u0441\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0435\u0439 \u043d\u0435\u043c\u0435\u0446\u043a\u043e\u0439 \u0433\u0430\u0437\u0435\u0442\u044b Aachener Zeitung, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0430, \u0447\u0442\u043e Citrix ADC \u0431\u043e\u043b\u044c\u043d\u0438\u0447\u043d\u043e\u0439 \u0441\u0435\u0442\u0438 \u0431\u044b\u043b \u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d \u0435\u0449\u0435 \u0437\u0438\u043c\u043e\u0439. \u0410 \u0442\u0430\u043a\u0436\u0435 \u0442\u0435\u043c, \u0447\u0442\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440 DoppelPaymer \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u043e\u043e\u0431\u0449\u0438\u043b \u043a\u043b\u044e\u0447 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u043d\u0435\u043c\u0435\u0446\u043a\u0438\u043c \u0432\u043b\u0430\u0441\u0442\u044f\u043c \u043a\u0430\u043a \u0442\u043e\u043b\u044c\u043a\u043e \u0431\u044b\u043b \u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u0432 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u043e \u0442\u043e\u043c, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u043b\u0430\u0441\u044c \u0438\u043c\u0435\u043d\u043d\u043e \u0441\u0435\u0442\u044c UKD.\n\n\u041c\u044b \u0434\u0443\u043c\u0430\u0435\u043c, \u0447\u0442\u043e \u0438\u0437 \u044d\u0442\u043e\u0433\u043e \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u0435.\n\n\u0412\u043e-\u043f\u0435\u0440\u0432\u044b\u0445, Evil Corp., \u043a\u0443\u043f\u0438\u0432\u0448\u0438\u0435 \u0434\u043e\u0441\u0442\u0443\u043f \u0432 \u0441\u0435\u0442\u044c UKD, \u0431\u0443\u0434\u0443\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e \u0440\u0430\u0437\u0431\u0438\u0440\u0430\u0442\u044c\u0441\u044f \u0441 \u043f\u0440\u043e\u0434\u0430\u0432\u0446\u043e\u043c. \u0415\u0441\u043b\u0438 \u0438\u0445, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u043d\u0435 \u043f\u0440\u0438\u0431\u0435\u0440\u0443\u0442 \u043f\u0435\u0440\u0432\u044b\u043c\u0438.\n\n\u041f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e, \u0432\u043e-\u0432\u0442\u043e\u0440\u044b\u0445, \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0437\u0430\u043f\u0440\u043e\u0441 \u0438\u0437 \u0413\u0435\u0440\u043c\u0430\u043d\u0438\u0438 \u0432 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0438 Evil Corp. \u0438 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043f\u0440\u0430\u0432\u043e\u043e\u0445\u0440\u0430\u043d\u0438\u0442\u0435\u043b\u0438 \u043e\u043a\u0430\u0436\u0443\u0442\u0441\u044f \u0432 \u0449\u0435\u043a\u043e\u0442\u043b\u0438\u0432\u043e\u0439 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0438. \u0418\u0431\u043e \u0441\u043b\u043e\u0436\u043d\u043e \u0431\u0443\u0434\u0435\u0442 \u0434\u0435\u043b\u0430\u0442\u044c \u0432\u0438\u0434, \u0447\u0442\u043e \u043d\u0430\u0439\u0442\u0438 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u043e\u043d\u0438 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442, \u043a\u043e\u0433\u0434\u0430 \u0442\u0435 \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u043d\u043e \u043e\u0442\u043a\u0440\u044b\u0442\u043e \u0440\u0430\u0441\u0441\u0435\u043a\u0430\u044e\u0442 \u043f\u043e \u041c\u043e\u0441\u043a\u0432\u0435 \u043d\u0430 \u041b\u0430\u043c\u0431\u043e.\n\n\u0418 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435. \u041c\u044b \u0432\u043f\u043e\u043b\u043d\u0435 \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u0435\u043c, \u0447\u0442\u043e \u0432\u0441\u0435 \u044d\u0442\u043e - \u043e\u0441\u043e\u0437\u043d\u0430\u043d\u043d\u0430\u044f \u043f\u0440\u043e\u0432\u043e\u043a\u0430\u0446\u0438\u044f  \u043e\u0434\u043d\u043e\u0439 \u0437\u0430\u043e\u043a\u0435\u0430\u043d\u0441\u043a\u043e\u0439 \u0442\u0440\u0435\u0445\u0431\u0443\u043a\u0432\u0435\u043d\u043d\u043e\u0439 \u043a\u043e\u043d\u0442\u043e\u0440\u044b, \u0434\u0435\u0442\u0438\u0449\u0435\u043c \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f APT Equation. \u0422\u0430\u043a\u0438\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0432 \u0438\u0445 \u0441\u0442\u0438\u043b\u0435, \u0434\u0430 \u0438 \u043c\u043e\u043c\u0435\u043d\u0442 \u0432\u044b\u0431\u0440\u0430\u043d \u0443\u0436 \u0431\u043e\u043b\u044c\u043d\u043e \u0443\u0434\u0430\u0447\u043d\u043e. \u041f\u043e\u044d\u0442\u043e\u043c\u0443 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e, \u0447\u0442\u043e \u0434\u0430\u0436\u0435 \u043d\u0438\u043a\u0430\u043a\u043e\u0433\u043e \u0437\u0430\u043f\u0440\u043e\u0441\u0430 \u043e\u0442 \u043d\u0435\u043c\u0435\u0446\u043a\u0438\u0445 \u0432\u043b\u0430\u0441\u0442\u0435\u0439 \u043d\u0435 \u0431\u0443\u0434\u0435\u0442, \u0430 \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435\u0434\u0443\u0435\u0442 n+1 \u0438\u0442\u0435\u0440\u0430\u0446\u0438\u044f \u0441\u0430\u043d\u043a\u0446\u0438\u0439.", "creation_timestamp": "2020-09-25T10:02:04.000000Z"}, {"uuid": "0703dc5f-e21f-4c6e-b010-964a42357127", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19788", "type": "seen", "source": "https://t.me/ctinow/208981", "content": "https://ift.tt/tLAJbe5\nCVE-2019-19788 | Opera Web Browser prior 54.0.2669.49432 on Android Sandbox origin validation", "creation_timestamp": "2024-03-15T17:56:48.000000Z"}, {"uuid": "951578ca-1967-4a74-b2ed-8287925f9cc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/techpwnews/546", "content": "APT41 Using New Speculoos Backdoor to Target Organizations Globally\n\nUnit 42 identifies new payload, named Speculoos, exploiting CVE-2019-19781 to target organizations around the world, including state government in the United States.\nThe post APT41 Using New Speculoos Backdoor to Target Organizations Globally appeared first on Unit42....\n\nContinue reading at Unit42", "creation_timestamp": "2020-05-03T01:23:38.000000Z"}, {"uuid": "4880ac75-86e4-4428-b90a-47fda14b3431", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/ctinow/178775", "content": "https://ift.tt/jaQxV7c\nCVE-2019-1978 | Cisco Firepower Threat Defense Software Stream Reassembly improper authentication (cisco-sa-20190816-ftd-srb)", "creation_timestamp": "2024-02-04T10:41:30.000000Z"}, {"uuid": "95d65b29-ab1a-4bc1-a73b-7384c8caf49c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19782", "type": "seen", "source": "https://t.me/ctinow/205378", "content": "https://ift.tt/u7AHIxz\nCVE-2019-19782 | AceaXe Plus 1.0 FTP Client Response buffer overflow", "creation_timestamp": "2024-03-12T08:41:52.000000Z"}, {"uuid": "20e54546-c710-444d-8911-9f4f89bafc77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19783", "type": "seen", "source": "https://t.me/ctinow/205708", "content": "https://ift.tt/NdF5TE0\nCVE-2019-19783 | Cyrus IMAP up to 2.5.14/3.0.12/3.1.7 Sieve Script Command imap/lmtp_sieve.c autosieve_createfolder input validation (USN-4566-1)", "creation_timestamp": "2024-03-12T14:41:38.000000Z"}, {"uuid": "99de95d8-8a5f-4684-b4b6-d35f19ce415b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19787", "type": "seen", "source": "https://t.me/ctinow/205381", "content": "https://ift.tt/CdeFASI\nCVE-2019-19787 | ATasm 1.06 m65 File setparse.c get_signed_expression out-of-bounds write (FEDORA-2021-681b6ea532)", "creation_timestamp": "2024-03-12T08:41:55.000000Z"}, {"uuid": "606c1863-86c6-428b-b8c3-98ec88757ae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19786", "type": "seen", "source": "https://t.me/ctinow/205380", "content": "https://ift.tt/0pVjdt8\nCVE-2019-19786 | ATasm 1.06 m65 File setparse.c parse_expr out-of-bounds write (FEDORA-2021-681b6ea532)", "creation_timestamp": "2024-03-12T08:41:54.000000Z"}, {"uuid": "8ed27e3b-1010-4b11-af3e-e3ec59dc21a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19785", "type": "seen", "source": "https://t.me/ctinow/205379", "content": "https://ift.tt/uEqA6D8\nCVE-2019-19785 | ATasm 1.06 m65 File asm.c to_comma out-of-bounds write (FEDORA-2021-681b6ea532)", "creation_timestamp": "2024-03-12T08:41:53.000000Z"}, {"uuid": "c9ee0d25-f9a3-4c0c-952f-79e5593f861b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "Telegram/0sD_EyHySREvSWLaWKL-XHqTqDduPkHhIy1vEKF4pCPQbv8", "content": "", "creation_timestamp": "2020-10-28T02:58:38.000000Z"}, {"uuid": "4bf8effb-c17d-4cc5-a9b0-b1bb90406aca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/DerechodelaRed/3489", "content": "Top 5 vulnerabilidades explotadas por el Servicio de Inteligencia Exterior de Rusia (SVR) seg\u00fan la NSA:\n\n- CVE-2018-13379 Fortinet FortiGate VPN\n- CVE-2019-9670 Synacor Zimbra\n- CVE-2019-11510 Pulse Secure VPN\n- CVE-2019-19781 Citrix Application\n- CVE-2020-4006 VMware Workspace \n\nhttps://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2573391/russian-foreign-intelligence-service-exploiting-five-publicly-known-vulnerabili/", "creation_timestamp": "2021-04-15T19:41:19.000000Z"}, {"uuid": "e6659ec9-c4b1-4a65-a369-0aaae7b8c608", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}, {"uuid": "f9540dea-88db-45e4-982d-c593e295828c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/34791", "content": "Organizations Quick to Patch Critical Citrix ADC Vulnerability\nhttp://feedproxy.google.com/~r/Securityweek/~3/d6Ygjw74mB8/organizations-quick-patch-critical-citrix-adc-vulnerability\n\nMore than 80 percent of organizations impacted by CVE-2019-19781, a critical vulnerability in the Citrix Application Delivery Controller (ADC) and Gateway, have already taken steps to secure their deployments.\u00a0\nread more (https://www.securityweek.com/organizations-quick-patch-critical-citrix-adc-vulnerability)", "creation_timestamp": "2020-02-07T19:21:50.000000Z"}, {"uuid": "ff4c7cc0-4f2f-4464-b3ec-e5d2bb965439", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19788", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/623", "content": "Analysis of Opera for Android vulnerability to a sandboxed cross-origin iframe bypass attack (CVE-2019-19788)\nhttps://blog.confiant.com/trending-client-side-innovations-in-malvertising-payloads-914d9f614ed1", "creation_timestamp": "2020-01-23T10:35:10.000000Z"}, {"uuid": "27d1ce46-2156-4ac9-a600-f39d27d2cf1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/33984", "content": "Researchers spotted active scans targeting Application Delivery Controller and Citrix Gateway to exploit Critical Vulnerability CVE-2019-19781. This vulnerability can be exploited remotely, successful exploitation allows an unauthenticated attacker to perform arbitrary code execution. The vulnerability was discovered by Mikhail Klyuchnikov, it may create a serious threat for organizations deployed with Citrix Application Delivery Controller and [\u2026]\nThe post Hackers Scanning for Citrix Servers Vulnerable to Remote Code Execution (https://gbhackers.com/citrix-gateway/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-01-10T01:31:47.000000Z"}, {"uuid": "0b38302f-ab56-4dfb-9b67-43bb9a0bc79b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/34024", "content": "Citrix remote code execution vulnerability was published last month, the vulnerability can be tracked as CVE-2019-19781. It may create a serious threat for organizations deployed with Citrix Application Delivery Controller and gateway. An advisory was released by Citrix detailing the configuration changes to mitigate the vulnerability. The following are the affected versions. Citrix ADC and [\u2026]\nThe post PoC Exploit Code Released for Citrix ACD and Gateway Remote Code Execution Vulnerability (https://gbhackers.com/citrix-remote-code-execution/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-01-12T07:27:08.000000Z"}, {"uuid": "0110debe-2854-4cea-a719-f568cd5b1bd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/information_security_channel/39020", "content": "Citrix Patches 11 Vulnerabilities in Networking Products\nhttp://feedproxy.google.com/~r/Securityweek/~3/QNF4T-1pdMA/citrix-patches-11-vulnerabilities-networking-products\n\nCitrix informed customers on Tuesday that it has patched 11 vulnerabilities in its ADC, Gateway, and SD-WAN networking products, and highlighted that the flaws are not related to CVE-2019-19781, which has been exploited in many attacks.\nread more (https://www.securityweek.com/citrix-patches-11-vulnerabilities-networking-products)", "creation_timestamp": "2020-07-07T22:01:41.000000Z"}, {"uuid": "235c1332-9069-4b4e-9b30-cb3f88a84442", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/information_security_channel/34066", "content": "CISA has released a new tool for administrators and users to check for Citrix Application Delivery Controller (ADC) and Citrix Gateway vulnerability. The vulnerability can be tracked as CVE-2019-19781, it allows an unauthenticated remote attacker to execute arbitrary code on the vulnerable system. Tool for Testing CISA has published a tool that allows users and [\u2026]\nThe post CISA Releases Test Tool for Citrix ADC and Gateway Vulnerability \u2013 Sysadmins Can Test Now (https://gbhackers.com/citrix-test-tool/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-01-14T13:01:23.000000Z"}, {"uuid": "9588a93c-5f20-42c0-8d9c-cfc46b9722fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/34211", "content": "Citrix Released Permanent Fixes for the Actively Exploited CVE-2019-19781 Flaw in ADC 11.1 and 12.0\nhttps://gbhackers.com/citrix-permanent-fixes/", "creation_timestamp": "2020-01-21T01:01:26.000000Z"}, {"uuid": "e96f2908-ef21-4b9c-9ae5-ba9fa9fbb3ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/34213", "content": "Citrix released permanent fixes for CVE-2019-19781 Flaw in ADC 11.1 and 12.0, which would allow an unauthenticated remote attacker to execute arbitrary code on the vulnerable system. The vulnerability was discovered by Dmitry Serebryannikov from Positive Technologies and the severity of the vulnerability is high. The following are the affected versions. Citrix ADC and Citrix [\u2026]\nThe post Citrix Released Permanent Fixes for the Actively Exploited CVE-2019-19781 Flaw in ADC 11.1 and 12.0 (https://gbhackers.com/citrix-permanent-fixes/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-01-21T01:01:26.000000Z"}, {"uuid": "db79b5da-383a-40d9-b0bc-9a99b4150e58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/34366", "content": "Citrix Releases More Patches for Exploited Flaw, Tool to Detect Compromise\nhttp://feedproxy.google.com/~r/Securityweek/~3/dx0SWfX24kE/citrix-releases-more-patches-exploited-flaw-tool-detect-compromise\n\nCitrix has released a new set of patches for the recently disclosed CVE-2019-19781 vulnerability and partnered with FireEye for a tool that tells users if their systems have been compromised via the security flaw.\nread more (https://www.securityweek.com/citrix-releases-more-patches-exploited-flaw-tool-detect-compromise)", "creation_timestamp": "2020-01-24T16:08:23.000000Z"}, {"uuid": "d55b2344-4703-48de-8408-acd473346ea4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/information_security_channel/34457", "content": "Attacks on ADC Ramp Up as Citrix Releases Remaining Patches\nhttp://feedproxy.google.com/~r/Securityweek/~3/P9RwJ-KZWHo/attacks-adc-ramp-citrix-releases-remaining-patches\n\nCitrix has released the full set of patches for the recently disclosed security flaw tracked as CVE-2019-19781, but attacks on vulnerable systems are ramping up.\nread more (https://www.securityweek.com/attacks-adc-ramp-citrix-releases-remaining-patches)", "creation_timestamp": "2020-01-27T20:46:06.000000Z"}, {"uuid": "371d09c8-7a4b-4e7e-960d-a7ec14090948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/xakep_ru/8577", "content": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Citrix\n\n\u041d\u0430 GitHub \u043f\u043e\u044f\u0432\u0438\u043b\u0438\u0441\u044c \u0441\u0440\u0430\u0437\u0443 \u0434\u0432\u0430 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442\u0430 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2019-19781, \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u043e\u0439 \u043d\u0435\u0434\u0430\u0432\u043d\u043e \u0432 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u0445 Citrix.\n\nhttps://xakep.ru/2020/01/13/citrix-pocs/", "creation_timestamp": "2020-01-13T20:20:16.000000Z"}, {"uuid": "95a969d6-d7f5-4d86-a9cc-fbaa096c9d8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/thehackernews/580", "content": "A month after disclosing existence of a critical RCE vulnerability (CVE-2019-19781) in Citrix ADC &amp; Gateway software\u2014also under active ATTACKS\u2014the company finally today released the 1st batch of security patches for versions 11.1 &amp; 12.0\n\nRead \u27a4 https://thehackernews.com/2020/01/citrix-adc-patch-update.html", "creation_timestamp": "2024-02-22T04:02:12.000000Z"}, {"uuid": "73e2c8a0-08b7-4b84-ab76-1239b51db3c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/thehackernews/604", "content": "Iranian hackers are exploiting unpatched 1-day enterprise VPN vulnerabilities to compromise network of organizations worldwide and implant backdoors for cyber espionage.\n\n\u27a1\ufe0f Pulse Secure Connect: CVE-2019-11510\n\u27a1\ufe0f Palo Alto Networks: CVE-2019-1579\n\u27a1\ufe0f Fortinet FortiOS: CVE-2018-13379\n\u27a1\ufe0f Citrix: CVE-2019-19781\n\nRead: https://thehackernews.com/2020/02/iranian-hackers-vpn-vulnerabilities.html", "creation_timestamp": "2020-02-18T16:19:32.000000Z"}, {"uuid": "d31bbbf6-6005-4770-8de8-f7edce4bd835", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/thehackernews/575", "content": "Watch Out, SysAdmins!\n\nWeaponized PoC exploits for critical RCE vulnerability (CVE-2019-19781) in Citrix ADC and Gateway products have been released to the public.\n\nhttps://t.co/CPyzL9SBAr\n\n\u2014 Over 125,400 publicly accessible Citrix servers,\n\u2014 No patch available, just mitigation. https://t.co/7vnISlqbWN", "creation_timestamp": "2020-01-11T12:35:15.000000Z"}, {"uuid": "f8ab805e-5854-45c6-925a-a995d0941c8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/xakep_ru/8623", "content": "Citrix \u0438 FireEye \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 Citrix \u0438 FireEye \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u0432 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0440\u0430\u043d\u0435\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c\u044e CVE-2019-19781, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Citrix Application Delivery Controller (ADC), Citrix Gateway, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u0432\u0435 \u0440\u0430\u043d\u043d\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Citrix SD-WAN WANOP.\n\nhttps://xakep.ru/2020/01/23/citrix-fireeye-tool/", "creation_timestamp": "2020-01-23T14:35:41.000000Z"}, {"uuid": "61391a76-976c-4ffc-ad99-436b966f8793", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/xakep_ru/8701", "content": "\u041e\u043a\u043e\u043b\u043e 80% \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Citrix\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2019-19781, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0440\u044f\u0434 \u0432\u0435\u0440\u0441\u0438\u0439 Citrix Application Delivery Controller (ADC), Citrix Gateway, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0434\u0432\u0435 \u0441\u0442\u0430\u0440\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Citrix SD-WAN WANOP, \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043e\u043f\u0430\u0441\u043d\u0430, \u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043f\u0430\u0442\u0447\u0435\u0439 \u0438\u0434\u0435\u0442 \u043f\u043e\u043b\u043d\u044b\u043c \u0445\u043e\u0434\u043e\u043c.\n\nhttps://xakep.ru/2020/02/11/citrix-patches/", "creation_timestamp": "2020-02-11T09:40:10.000000Z"}, {"uuid": "cebc4981-469c-4d86-89d8-ebbf8591af3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6254", "content": "Deep Dive in to Citrix ADC Remote Code Execution, CVE-2019-19781\nhttps://www.mdsec.co.uk/2020/01/deep-dive-to-citrix-adc-remote-code-execution-cve-2019-19781/", "creation_timestamp": "2020-01-11T15:11:42.000000Z"}, {"uuid": "4cd3b2cc-2c06-453e-a802-2ad12650f1d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19788", "type": "seen", "source": "https://t.me/thebugbountyhunter/3707", "content": "Analysis of Opera for Android vulnerability to a sandboxed cross-origin iframe bypass attack (CVE-2019-19788)\nhttps://blog.confiant.com/trending-client-side-innovations-in-malvertising-payloads-914d9f614ed1", "creation_timestamp": "2020-01-23T11:38:07.000000Z"}, {"uuid": "e4affb58-f755-4118-99e1-e277923a3c29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/thebugbountyhunter/3662", "content": "Enumerating, Analyzing, and Exploiting The Citrix ADC RCE - CVE-2019-19781 https://www.youtube.com/watch?v=v_qpiebydk4", "creation_timestamp": "2020-01-13T11:38:16.000000Z"}, {"uuid": "baa2d5cf-8aac-4ee8-92cf-312694a6a4cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/SecLabNews/10736", "content": "\u041f\u0440\u043e\u0441\u0442\u0438\u0442\u0435, \u0431\u0443\u0434\u0443 \u043c\u0430\u0442\u043e\u043c (\u0441)\n\n\u041f\u0438\u0434\u0430\u0440\u044b \u0438\u0437 Citrix \u0443\u0431\u0440\u0430\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Positive Technologies \u041a\u043b\u044e\u0447\u043d\u0438\u043a\u043e\u0432\u0430 \u0438 \u041c\u0435\u0434\u043e\u0432\u0430 \u0438\u0437 \u0447\u0438\u0441\u043b\u0430 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 - CVE-2019-1978 \u0438 CVE-2020-8209.\n\n\u0418\u043d\u0444\u043e\u0441\u0435\u043a \u0430\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u043d, \u0434\u0430.\n\nJe suis Positive, \u0431\u043b\u044f\u0442\u044c.", "creation_timestamp": "2021-08-24T10:38:21.000000Z"}, {"uuid": "c1e4e608-9f54-4dd8-878e-7df8b2f1e791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/S_E_Reborn/922", "content": "\u041f\u0440\u043e\u0441\u0442\u0438\u0442\u0435, \u0431\u0443\u0434\u0443 \u043c\u0430\u0442\u043e\u043c (\u0441)\n\n\u041f\u0438\u0434\u0430\u0440\u044b \u0438\u0437 Citrix \u0443\u0431\u0440\u0430\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Positive Technologies \u041a\u043b\u044e\u0447\u043d\u0438\u043a\u043e\u0432\u0430 \u0438 \u041c\u0435\u0434\u043e\u0432\u0430 \u0438\u0437 \u0447\u0438\u0441\u043b\u0430 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 - CVE-2019-1978 \u0438 CVE-2020-8209.\n\n\u0418\u043d\u0444\u043e\u0441\u0435\u043a \u0430\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u043d, \u0434\u0430.\n\nJe suis Positive, \u0431\u043b\u044f\u0442\u044c.", "creation_timestamp": "2021-08-24T10:56:15.000000Z"}, {"uuid": "3a657d0c-eebb-47d5-bd82-d5fb2c9c2e56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/thebugbountyhunter/4785", "content": "Bug Hunting: CVE-2019\u201319781(Remote Code Execution)\n\nhttps://medium.com/@pravinponnusamy/bug-hunting-cve-2019-19781-remote-code-execution-26c502b7552b", "creation_timestamp": "2023-03-02T11:37:22.000000Z"}, {"uuid": "4bab5152-22ef-44f2-97d8-b2d620c80803", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/Russian_OSINT/875", "content": "\u200b\u200b\ud83d\ude94 \u0424\u0411\u0420 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043f\u0438\u0441\u043e\u043a 30 \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 2 \u0433\u043e\u0434\u0430\n\nCVE-2021-26855: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26857: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26858: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-27065: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-22893: It is an Improper Authentication vulnerability that is marked as critical\nCVE-2021-22894: It is a buffer overflow vulnerability that enables an attacker to execute arbitrary code\nCVE-2021-22899: It is a command injection vulnerability that enables an attacker to execute remote code\nCVE-2021-22900: It is an Improper Control of Generation of Code vulnerability\nCVE-2021-27101: It is an Improper Neutralization of Special Elements used in an SQL Command\nCVE-2021-27102: It is an Improper Neutralization of Special Elements used in an OS Command\nCVE-2021-27103: It is a Server-Side Request Forgery (SSRF) vulnerability\nCVE-2021-27104: It is an Improper Neutralization of Special Elements used in an OS Command vulnerability\nCVE-2021-21985: It is an Improper Input Validation vulnerability\nCVE-2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019)\nCVE-2020-12812: It is an Improper Authentication vulnerability\nCVE-2019-5591: It is a Missing Authentication for Critical Function vulnerability\nCVE-2019-19781: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2019-11510: It is an Improper Limitation of a Pathname to a Restricted Directory\nCVE 2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2020-5902: It is an Inclusion of Functionality from Untrusted Control Sphere and Improper Limitation of a Pathname to a Restricted Directory vulnerability \nCVE 2020-15505: It is an Insufficient Information vulnerability\nCVE-2017-11882: It is a Microsoft Office Memory Corruption vulnerability that enables an attacker to execute arbitrary code.\nCVE-2019-11580: It is an Insufficient Information vulnerability\nCVE-2018-7600: It is an Improper Input Validation vulnerability\nCVE 2019-18935: It is a Deserialization of Untrusted Data vulnerability\nCVE-2019-0604: It is a Microsoft SharePoint Remote Code Execution Vulnerability\nCVE-2020-0787: It is a Windows Background Intelligent Transfer Service Elevation of Privilege vulnerability\nCVE-2020-1472: It is a Netlogon Elevation of Privilege vulnerability \nCVE-2020-15505: It is an Insufficient Information vulnerability\nCVE-2020-0688: It is a Use of Hard-coded Credentials vulnerability", "creation_timestamp": "2021-07-29T17:59:02.000000Z"}, {"uuid": "06b6e7f7-e783-4b87-8d91-f11cf2e688d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/526", "content": "#exploit\n1. Apache Solr - RCE via Velocity template\nhttps://github.com/jas502n/solr_rce\n\n2. CVE-2019-19781:\nCitrixmash PoC Exploit\nhttps://github.com/trustedsec/cve-2019-19781", "creation_timestamp": "2024-10-14T21:46:26.000000Z"}, {"uuid": "f501a3d8-4c67-413e-ad15-ea55a5894315", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-1978", "type": "seen", "source": "https://t.me/S_E_Reborn/925", "content": "\u0424\u0430\u0433\u0433\u043e\u0442\u044b \u0438\u0437 Citrix \u0434\u0430\u043b\u0438 \u0437\u0430\u0434\u043d\u044e\u044e (\u0445\u0435-\u0445\u0435) \u0438 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u043b\u0438 \u0438\u043c\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 Positive Technologies \u0441\u0440\u0435\u0434\u0438 \u0430\u0432\u0442\u043e\u0440\u043e\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 CVE-2019-1978 \u0438 CVE-2020-8209.\n\n\u0412\u043e\u0442 \u0447\u0442\u043e \u043c\u0430\u0442 \u0436\u0438\u0432\u043e\u0442\u0432\u043e\u0440\u044f\u0449\u0438\u0439 \u0434\u0435\u043b\u0430\u0435\u0442!\n\n\u0410 \u0435\u0441\u043b\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e, \u0442\u043e \u043c\u044b \u0440\u0430\u0434\u044b, \u0447\u0442\u043e \u0438\u043d\u0444\u043e\u0441\u0435\u043a \u043a\u043e\u043c\u044c\u044e\u043d\u0438\u0442\u0438 \u0432\u044b\u0440\u0430\u0437\u0438\u043b\u043e \u0441\u0432\u043e\u0435 \u043d\u0435\u0433\u0430\u0442\u0438\u0432\u043d\u043e\u0435 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0435 \u043a \u0442\u0430\u043a\u043e\u0439 \u043d\u0435\u0441\u043f\u0440\u0430\u0432\u0435\u0434\u043b\u0438\u0432\u043e\u0441\u0442\u0438, \u0430 Citrix \u0431\u044b\u043b\u0438 \u0432\u044b\u043d\u0443\u0436\u0434\u0435\u043d\u044b \u043d\u0430 \u044d\u0442\u043e \u043e\u0442\u0440\u0435\u0430\u0433\u0438\u0440\u043e\u0432\u0430\u0442\u044c.", "creation_timestamp": "2021-08-25T11:51:58.000000Z"}, {"uuid": "2f6c450e-99fd-46cd-afee-7ff823fd1b95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1902", "content": "#Analytics\nTop-10 exploited vulnerabilities in January-July 2020:\n1. MVPower DVR Remote Code Execution*\n2. Dasan GPON Router Authentication Bypass (CVE-2018-10561)*\n3. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346)\u00a0\n4. HTTP Headers Remote Code Execution (CVE-2020-13756)*\n5. Arbitrary code execution vulnerability in Citrix VPN (CVE-2019-19781)*\n6. Draytek Vigor Command Injection (CVE-2020-8515)*\n7. Command Injection Over HTTP Payload\n8. SQL Injection (several techniques)\n9. RCE on MS Exchange Server (CVE-2020-0688)*\n10. Web Server Exposed Git Repository Information Disclosure\n\n* - Description/PoC available on Cybersecurity Technologies channel ...", "creation_timestamp": "2020-12-18T17:23:40.000000Z"}, {"uuid": "de7dfac1-c5b8-434a-9305-958348bd7372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/1376", "content": "#Threat_Research\nA Second Look at CVE-2019-19781\n(Citrix NetScaler/ADC)\nhttps://blog.fox-it.com/2020/07/01/a-second-look-at-cve-2019-19781-citrix-netscaler-adc", "creation_timestamp": "2024-11-02T15:43:56.000000Z"}, {"uuid": "e58d0b2e-e257-4f64-9343-a5c85074e24e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "Telegram/QPFWeH47f30WyH_0einn8ZWFKtQfrrjQ4d0DnTwx1kpIB-M", "content": "", "creation_timestamp": "2020-01-14T15:14:45.000000Z"}, {"uuid": "7bd57710-ddcf-4d41-8629-05b0f3176931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/2753", "content": "#Analytics\n1. Most Innovative Research:\nBaseSAFE: Baseband SAnitized Fuzzing through Emulation\nhttps://arxiv.org/abs/2005.07797\n]-&gt; Web Cache Deception in the Wild:\nhttps://t.me/cybersecuritytechnologies/2723\n\n2. Best Server-Side Bug:\nRCE in Citrix ADC (CVE-2019-19781)\nhttps://swarm.ptsecurity.com/remote-code-execution-in-citrix-adc\n]-&gt; PoC: https://t.me/cybersecuritytechnologies/527 \n\n3. Best Privilege Escalation Bug:\nExploiting the \"noowners\" Flag - APFS Privilege Escalation\nhttps://t.me/cybersecuritytechnologies/2293\n\n4. Best Client-Side Bug:\nZero-Click iMessage Exploit\nhttps://t.me/cybersecuritytechnologies/987\n\n5. Best Cryptographic Attack:\nTPM Fail: TPM Meets Timing and Lattice Attacks\nhttps://t.me/cybersecuritytechnologies/468", "creation_timestamp": "2022-02-22T02:55:29.000000Z"}, {"uuid": "703b715d-0d7b-44f6-b113-18fda7273361", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-04)", "content": "", "creation_timestamp": "2026-05-04T00:00:00.000000Z"}, {"uuid": "00311c9f-db0f-46a3-a7e2-c86d7da63fa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "https://t.me/cibsecurity/9693", "content": "\u274c Critical Citrix RCE Flaw Still Threatens 1,000s of Corporate LANs \u274c\n\nRCE and myriad other types of attacks could take aim at the 19 percent of vulnerable companies that haven't yet patched CVE-2019-19781.\n\n\ud83d\udcd6 Read\n\nvia \"Threatpost\".", "creation_timestamp": "2020-02-07T16:42:20.000000Z"}, {"uuid": "5ac8125c-2123-42a4-bdd3-42a882994530", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-04)", "content": "", "creation_timestamp": "2026-05-04T00:00:00.000000Z"}, {"uuid": "fa32ec75-9523-43c9-ae75-fb4324c1b33c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "MISP/453274cf-e60d-452a-b88e-0bf6a5a6dae4", "content": "", "creation_timestamp": "2026-05-07T22:28:58.000000Z"}, {"uuid": "edac6cab-8a86-4c08-825b-78e303a1ee92", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2019-19781", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-05-07)", "content": "", "creation_timestamp": "2026-05-07T00:00:00.000000Z"}]}