{"vulnerability": "CVE-2020-0688", "sightings": [{"uuid": "8d10558e-c102-4507-ae44-cb04e0b2fab1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/42d04e94-bf5b-427d-acc8-f5d740675941", "content": "", "creation_timestamp": "2020-10-20T15:57:21.000000Z"}, {"uuid": "950e5889-6cfd-44c2-b611-147fdeb5c3fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/5f850411-c103-491f-abff-9421425403cf", "content": "", "creation_timestamp": "2020-10-21T08:33:50.000000Z"}, {"uuid": "7e58130a-ec39-4879-9cfe-cc7f710f04bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/23e6786e-b796-48cc-8bb6-0e1ddb595c8a", "content": "", "creation_timestamp": "2020-10-16T06:26:20.000000Z"}, {"uuid": "85f40a2c-1b0c-4aaf-861e-9928123677ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/b426aa9c-dc22-4a91-8213-f8d513405423", "content": "", "creation_timestamp": "2020-12-09T07:18:56.000000Z"}, {"uuid": "1417b411-6830-4d0b-999d-fe23d55ef897", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/1a52c709-c427-4575-a466-9655fb23df52", "content": "", "creation_timestamp": "2020-09-16T08:37:28.000000Z"}, {"uuid": "463e3dae-93b5-4b1b-bba8-85c85447c90f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/d11a348d-a113-494f-bb63-24caad723c86", "content": "", "creation_timestamp": "2021-07-02T06:58:55.000000Z"}, {"uuid": "1502cac7-b7bf-48fd-95d9-c567c2fd73da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "7fcc2524-450b-48eb-ab10-982a39e5d0cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "b1062bfa-4120-4dce-a6a4-af815f2c02de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/8d121e04-9fcc-48d9-be88-3af090913786", "content": "", "creation_timestamp": "2020-10-22T19:44:03.000000Z"}, {"uuid": "26b2c139-1151-4bc1-ba79-54ed8d584fea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/6cc64859-dc9d-472e-9702-c3061488e995", "content": "", "creation_timestamp": "2020-10-09T13:24:11.000000Z"}, {"uuid": "5f3ac0ab-c6de-4aeb-a136-570be922fc12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/f3a6ce68-c792-4551-b363-d4bdf4361ea6", "content": "", "creation_timestamp": "2020-11-06T15:50:03.000000Z"}, {"uuid": "f46ba7f9-8b45-42ce-8e54-12be27e65625", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/d925a2ee-e7cf-46f6-bec1-ad8e19122730", "content": "", "creation_timestamp": "2020-10-20T15:58:04.000000Z"}, {"uuid": "67f7199d-6a07-4198-885b-a25ec67e1949", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/53d4062f-0578-4f43-a001-4ec62b36396e", "content": "", "creation_timestamp": "2020-11-06T19:00:04.000000Z"}, {"uuid": "e5db9ddf-a381-4815-a56a-a1efcd3572a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/5362d288-c25b-43e5-9311-2ddedfe84549", "content": "", "creation_timestamp": "2020-10-22T19:51:03.000000Z"}, {"uuid": "7272cc27-4136-40ad-ad6f-38050034d4f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/c7d9eed5-d71b-4433-8433-3db121149d72", "content": "", "creation_timestamp": "2020-11-21T03:00:05.000000Z"}, {"uuid": "f7502f84-cbf4-4de9-a019-e7a4e03e8b58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://www.exploit-db.com/exploits/48168", "content": "", "creation_timestamp": "2020-03-05T00:00:00.000000Z"}, {"uuid": "6d24a2f4-a0e3-4bd3-8b20-98d38d7b7456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971023", "content": "", "creation_timestamp": "2024-12-24T20:23:11.098049Z"}, {"uuid": "86605600-9bb1-4c9a-ad51-f35626cbc397", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:44.000000Z"}, {"uuid": "d1971854-fbcb-4c72-af00-879b3b307678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-33a5b322-edec4ab2ec03d1b2", "content": "", "creation_timestamp": "2025-07-17T12:42:48.641504Z"}, {"uuid": "8ee7482c-6c62-41f4-ae44-b815d5bd1f72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:44.000000Z"}, {"uuid": "a98170bd-c27f-44b2-83d1-60dc4e48f8f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:20.000000Z"}, {"uuid": "ef3a17d5-b835-4970-a3be-990a7da3221b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/23e6786e-b796-48cc-8bb6-0e1ddb595c8a", "content": "", "creation_timestamp": "2025-04-10T17:09:39.000000Z"}, {"uuid": "fb258209-d05d-4fd0-900f-e6a32bc44834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lu7lgfexds2w", "content": "", "creation_timestamp": "2025-07-18T04:13:25.501613Z"}, {"uuid": "0c12149c-1d6e-4f36-83af-7fc83323671d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/http/exchange_ecp_viewstate.rb", "content": "", "creation_timestamp": "2020-03-03T23:32:10.000000Z"}, {"uuid": "4b736e49-b690-4e05-8e6e-6340e49ed7b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://threatintel.cc/2025/07/18/ghostcontainer-backdoor-targets-microsoft-exchange.html", "content": "", "creation_timestamp": "2025-07-18T11:06:52.000000Z"}, {"uuid": "5fab587f-0ca6-4cad-bf0d-3868a27169f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/2bd9190a-6af7-48ef-a3d4-0c4d9255f199", "content": "", "creation_timestamp": "2026-02-02T12:28:51.196316Z"}, {"uuid": "3d453fd1-e744-4932-a26e-b6412aea3ea1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://bsky.app/profile/jos1264.social.skynetcloud.site.ap.brid.gy/post/3luo33ab6h4w2", "content": "", "creation_timestamp": "2025-07-23T22:30:55.286725Z"}, {"uuid": "6f1ae586-d2db-4fb9-a90f-12c49c90db5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "MISP/ab0b745f-bbd5-338e-8b92-97dd0c757e9d", "content": "", "creation_timestamp": "2025-08-31T03:01:04.000000Z"}, {"uuid": "59d45a35-4bde-4f18-8564-14f7efcf9725", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=458", "content": "", "creation_timestamp": "2020-03-11T04:00:00.000000Z"}, {"uuid": "9893fe98-d7fd-4dbb-95f8-e811ffcc5fd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/cyberbannews_ir/1082", "content": "\ud83d\udce2 \u0628\u0627\u0632\u062a\u0627\u0628\n\n\n\ud83d\udd39\u0647\u06a9\u0631 \u0631\u0648\u0633 \u062f\u0631\u0627\u067e \u0628\u0627\u06a9\u0633 \u0645\u062d\u06a9\u0648\u0645 \u0634\u062f/\n\u06cc\u06a9 \u0647\u06a9\u0631 \u0631\u0648\u0633 \u0628\u0647 \u062c\u0631\u0645 \u062d\u0645\u0644\u0647 \u0633\u0627\u06cc\u0628\u0631\u06cc \u0628\u0647 \u0633\u0627\u06cc\u062a \u0647\u0627\u06cc \u0645\u0634\u0647\u0648\u0631\u06cc \u0647\u0645\u0686\u0648\u0646 \u062f\u0631\u0627\u067e \u0628\u0627\u06a9\u0633\u060c \u0644\u06cc\u0646\u06a9\u062f \u0627\u06cc\u0646 \u0648 \u0641\u0648\u0631\u0645 \u0627\u0633\u067e\u0631\u06cc\u0646\u06af \u0645\u062d\u06a9\u0648\u0645 \u0634\u062f. \u0648\u06cc \u0642\u0631\u0627\u0631 \u0627\u0633\u062a \u0627\u0632 \u0634\u0647\u0631\u06cc\u0648\u0631 \u0645\u0627\u0647 \u062f\u0648\u0631\u0647 \u0645\u062d\u06a9\u0648\u0645\u06cc\u062a \u062e\u0648\u062f \u0631\u0627 \u0637\u06cc \u06a9\u0646\u062f.\n\n\ud83d\udd39\u062a\u062e\u0631\u06cc\u0628 \u0641\u06cc\u0628\u0631 \u0646\u0648\u0631\u06cc \u0634\u0647\u0631\u062f\u0627\u0631\u06cc \u0648 \u0642\u0637\u0639 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0628\u0631\u062e\u06cc \u0633\u0627\u06cc\u062a \u0647\u0627\u06cc \u0627\u06cc\u0631\u0627\u0646\u06cc/\n\u0633\u0627\u0632\u0645\u0627\u0646 \u0641\u0646\u0627\u0648\u0631\u06cc \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0634\u0647\u0631\u062f\u0627\u0631\u06cc \u062a\u0647\u0631\u0627\u0646\u060c \u0633\u0631\u0642\u062a \u0648 \u062a\u062e\u0631\u06cc\u0628 \u0628\u062e\u0634\u06cc \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0641\u06cc\u0628\u0631 \u0646\u0648\u0631\u06cc \u0634\u0647\u0631\u062f\u0627\u0631\u06cc \u0631\u0627 \u062f\u0644\u06cc\u0644 \u0642\u0637\u0639 \u062f\u0633\u062a\u0631\u0633\u06cc \u0634\u0628 \u06af\u0630\u0634\u062a\u0647 \u0628\u0647 \u0628\u0631\u062e\u06cc \u0633\u0627\u06cc\u062a\u200c\u0647\u0627\u06cc \u0627\u06cc\u0631\u0627\u0646\u06cc \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f.\n\n\ud83d\udd39\u067e\u0631\u062a\u0627\u0628 \u0645\u0627\u0647\u0648\u0627\u0631\u0647 \u0647\u0627\u06cc \u0627\u0633\u062a\u0627\u0631\u0644\u06cc\u0646\u06a9 \u0628\u0631\u0627\u06cc \u0633\u0648\u0645\u06cc\u0646 \u0628\u0627\u0631 \u0644\u063a\u0648 \u0634\u062f/\n\u0631\u0648\u0632 \u06af\u0630\u0634\u062a\u0647 \u0633\u0648\u0645\u06cc\u0646 \u0639\u0645\u0644\u06cc\u0627\u062a \u067e\u0631\u062a\u0627\u0628 \u062f\u0647\u0645\u06cc\u0646 \u0645\u062d\u0645\u0648\u0644\u0647 \u0645\u0627\u0647\u0648\u0627\u0631\u0647 \u0647\u0627\u06cc \u0627\u06cc\u0646\u062a\u0631\u0646\u062a\u06cc \u0627\u0633\u062a\u0627\u0631\u0644\u06cc\u0646\u06a9 \u0644\u063a\u0648 \u0634\u062f.\n\n\ud83d\udd39\u0633\u0631\u0648\u06cc\u0633 \u0631\u0648\u0645\u06cc\u0646\u06af \u0628\u062f\u0648\u0646 \u0627\u0637\u0644\u0627\u0639 \u0645\u0634\u062a\u0631\u06a9\u0627\u0646 \u0641\u0639\u0627\u0644 \u0646\u0645\u06cc\u200c\u0634\u0648\u062f/\n\u0645\u062f\u06cc\u0631\u0639\u0627\u0645\u0644 \u0634\u0631\u06a9\u062a \u0645\u062e\u0627\u0628\u0631\u0627\u062a \u0627\u0646\u062a\u0634\u0627\u0631 \u0628\u0631\u062e\u06cc \u0627\u062e\u0628\u0627\u0631 \u062f\u0631 \u0645\u0648\u0631\u062f \u0641\u0639\u0627\u0644\u200c\u0633\u0627\u0632\u06cc \u0633\u0631\u0648\u06cc\u0633 \u0631\u0648\u0645\u06cc\u0646\u06af \u062a\u0648\u0633\u0637 \u0627\u067e\u0631\u0627\u062a\u0648\u0631\u0647\u0627 \u0628\u062f\u0648\u0646 \u0627\u0637\u0644\u0627\u0639 \u0645\u0634\u062a\u0631\u06a9\u0627\u0646 \u0631\u0627 \u062a\u06a9\u0630\u06cc\u0628 \u06a9\u0631\u062f \u0648 \u06af\u0641\u062a: \u062a\u0639\u0631\u0641\u0647\u200c\u0647\u0627\u06cc \u0631\u0648\u0645\u06cc\u0646\u06af \u062a\u0646\u0647\u0627 \u062f\u0631 \u0635\u0648\u0631\u062a \u062e\u0631\u0648\u062c \u0627\u0632 \u06a9\u0634\u0648\u0631 \u0645\u062d\u0627\u0633\u0628\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\ud83d\udd39\u0647\u0648\u0634 \u0645\u0635\u0646\u0648\u0639\u06cc \u0633\u0631\u0637\u0627\u0646 \u0631\u0627 \u062a\u0634\u062e\u06cc\u0635 \u0645\u06cc\u200c\u062f\u0647\u062f/\n\u06cc\u06a9 \u062a\u06cc\u0645 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a\u06cc \u0628\u06cc\u0646\u200c\u0627\u0644\u0645\u0644\u0644\u06cc \u0628\u0647 \u0633\u0631\u067e\u0631\u0633\u062a\u06cc \u062f\u0627\u0646\u0634\u0645\u0646\u062f\u0627\u0646 \u0686\u06cc\u0646\u06cc\u060c \u06cc\u06a9 \u0645\u062f\u0644 \u063a\u0631\u0628\u0627\u0644\u06af\u0631\u06cc \u0633\u0631\u06cc\u0639 \u0648 \u062f\u0642\u06cc\u0642 \u0631\u0627 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u063a\u062f\u062f \u0644\u0646\u0641\u0627\u0648\u06cc \u062a\u0647\u06cc\u0647\u200c\u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0645\u06cc\u200c\u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u067e\u0632\u0634\u06a9\u0627\u0646 \u062f\u0631 \u0645\u0639\u0627\u0644\u062c\u0647 \u0633\u0631\u0637\u0627\u0646 \u06a9\u0645\u06a9 \u06a9\u0646\u062f.\n\n\ud83d\udd39\u0627\u0646\u062a\u0634\u0627\u0631 \u0627\u0628\u0632\u0627\u0631 \u0622\u0634\u06a9\u0627\u0631\u0633\u0627\u0632 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc CVE-\u06f2\u06f0\u06f2\u06f0-\u06f0\u06f6\u06f8\u06f8\n\u0645\u0631\u06a9\u0632 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0627\u0641\u062a\u0627 \u0628\u0627 \u0647\u0645\u06a9\u0627\u0631\u06cc \u0634\u0631\u06a9\u062a \u0631\u0647\u0627 \u0627\u0642\u062f\u0627\u0645 \u0628\u0647 \u062a\u0648\u0644\u06cc\u062f \u06cc\u06a9 \u0627\u0628\u0632\u0627\u0631 \u0622\u0634\u06a9\u0627\u0631\u0633\u0627\u0632 \u0628\u0631\u0627\u06cc \u0634\u0646\u0627\u0633\u0627\u06cc\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0634\u0646\u0627\u0633\u0647 CVE-\u06f2\u06f0\u06f2\u06f0-\u06f0\u06f6\u06f8\u06f8 \u0648 \u062a\u0634\u062e\u06cc\u0635 \u0634\u0648\u0627\u0647\u062f \u0646\u0641\u0648\u0630 \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0622\u0646\u060c \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n\n\ud83d\udd39\u0628\u0632\u0631\u06af\u200c\u062a\u0631\u06cc\u0646 \u067e\u0631\u0648\u0698\u0647 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u0628\u0627\u0646\u06a9\u06cc \u06a9\u0634\u0648\u0631 \u0628\u0627 \u0645\u0648\u0641\u0642\u06cc\u062a \u0627\u0646\u062c\u0627\u0645 \u0634\u062f/\n\u06cc\u06a9\u06cc \u0627\u0632 \u067e\u0631\u0648\u0698\u0647\u200c\u0647\u0627\u06cc \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631\u06cc \u067e\u06cc\u0686\u06cc\u062f\u0647 \u0648 \u0628\u0632\u0631\u06af \u0635\u0646\u0639\u062a \u0628\u0627\u0646\u06a9\u06cc \u06a9\u0634\u0648\u0631 \u062f\u0631 \u0628\u0627\u0646\u06a9 \u0633\u067e\u0647 \u0628\u0627 \u0645\u0648\u0641\u0642\u06cc\u062a \u0627\u0646\u062c\u0627\u0645 \u0634\u062f.\n\n\ud83d\udd39\u06af\u0648\u06af\u0644 \u0631\u0648\u06cc \u0627\u0633\u067e\u06cc\u06a9\u0631 \u0647\u0648\u0634\u0645\u0646\u062f \u062c\u062f\u06cc\u062f Nest \u06a9\u0627\u0631 \u0645\u06cc\u200c\u06a9\u0646\u062f/\n\u062f\u0631\u062d\u0627\u0644\u06cc\u200c\u06a9\u0647 \u0628\u0631\u062e\u06cc \u0634\u0627\u06cc\u0639\u0627\u062a \u0627\u0632 \u0627\u062d\u062a\u0645\u0627\u0644 \u0633\u0627\u062e\u062a \u0627\u0633\u067e\u06cc\u06a9\u0631 \u062c\u062f\u06cc\u062f \u062e\u0627\u0646\u0648\u0627\u062f\u0647\u200c\u06cc Nest \u06af\u0648\u06af\u0644 \u062e\u0628\u0631 \u0645\u06cc\u200c\u062f\u0627\u062f\u0646\u062f\u060c \u0627\u0647\u0627\u0644\u06cc \u0645\u0627\u0646\u062a\u06cc\u0646\u200c\u0648\u06cc\u0648 \u0631\u0633\u0645\u0627\u064b \u0645\u0647\u0631 \u062a\u0623\u06cc\u06cc\u062f\u06cc \u0628\u0631 \u0634\u0627\u06cc\u0639\u0627\u062a \u0632\u062f\u0646\u062f.\n\n\ud83d\udd39\u0627\u062d\u062a\u0645\u0627\u0644 \u062a\u0639\u0648\u06cc\u0642 \u0627\u062a\u0631\u06cc\u0648\u0645 \u06f2.\u06f0 \u062a\u0627 \u0633\u0627\u0644 \u06f2\u06f0\u06f2\u06f1\u061b \u0648\u06cc\u062a\u0627\u0644\u06cc\u06a9 \u0645\u0648\u0627\u0641\u0642 \u0646\u06cc\u0633\u062a/\n\u0628\u0631\u0627\u0633\u0627\u0633 \u0627\u0638\u0647\u0627\u0631\u0627\u062a \u062a\u0648\u0633\u0639\u0647\u200c\u062f\u0647\u0646\u062f\u06af\u0627\u0646\u06cc \u06a9\u0647 \u0631\u0648\u06cc \u0646\u0633\u062e\u0647 \u062f\u0648\u0645 \u0627\u062a\u0631\u06cc\u0648\u0645 \u06a9\u0627\u0631 \u0645\u06cc\u200c\u06a9\u0646\u0646\u062f\u060c \u0645\u0645\u06a9\u0646 \u0627\u0633\u062a \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u0641\u0627\u0632 \u06f0 \u0627\u06cc\u0646 \u0646\u0633\u062e\u0647 \u062a\u0627 \u0627\u0648\u0627\u06cc\u0644 \u0633\u0627\u0644 \u06f2\u06f0\u06f2\u06f1 \u0628\u0647 \u062a\u0639\u0648\u06cc\u0642 \u0628\u06cc\u0641\u062a\u062f.\n\n\ud83d\udd39\u0647\u0648\u0634 \u0645\u0635\u0646\u0648\u0639\u06cc \u0628\u0647 \u06cc\u0627\u0641\u062a\u0646 \u0645\u0648\u0642\u0639\u06cc\u062a \u062c\u0631\u0627\u062d\u06cc \u06a9\u0645\u06a9 \u0645\u06cc \u06a9\u0646\u062f/\n\u062f\u0631 \u062a\u0627\u0632\u0647\u200c\u062a\u0631\u06cc\u0646 \u062a\u062d\u0642\u06cc\u0642\u0627\u062a \u0635\u0648\u0631\u062a \u06af\u0631\u0641\u062a\u0647\u060c \u0647\u0648\u0634 \u0645\u0635\u0646\u0648\u0639\u06cc \u0628\u0647 \u067e\u0632\u0634\u06a9\u0627\u0646 \u0627\u0631\u062a\u0648\u067e\u062f\u06cc \u0628\u0631\u0627\u06cc \u06cc\u0627\u0641\u062a\u0646 \u0645\u0648\u0642\u0639\u06cc\u062a \u062c\u0631\u0627\u062d\u06cc \u06a9\u0645\u06a9 \u0645\u06cc \u06a9\u0646\u062f.\n\n\ud83d\udd39\u06a9\u0648\u06cc\u0646 \u0628\u06cc\u0633 \u0628\u0647 \u062f\u0646\u0628\u0627\u0644 \u0639\u0631\u0636\u0647 \u0639\u0645\u0648\u0645\u06cc \u0633\u0647\u0627\u0645 \u062e\u0648\u062f/\n\u0627\u0633\u062a\u0627\u0631\u062a\u0627\u067e \u062d\u0648\u0632\u0647 \u062a\u062d\u0644\u06cc\u0644 \u062f\u0627\u062f\u0647\u060c \u067e\u0627\u0644\u0627\u0646\u062a\u06cc\u0631 \u060c\u06a9\u0647 \u0645\u0639\u0645\u0648\u0644\u0627\u064b \u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u062f\u0631 \u062e\u0641\u0627 \u0627\u0646\u062c\u0627\u0645 \u0645\u06cc\u200c\u062f\u0647\u062f\u060c \u0627\u0639\u0644\u0627\u0645 \u06a9\u0631\u062f\u0647 \u0628\u0648\u062f \u06a9\u0647 \u0628\u0647\u200c\u0635\u0648\u0631\u062a \u062e\u0635\u0648\u0635\u06cc \u062f\u0631\u062e\u0648\u0627\u0633\u062a \u0639\u0631\u0636\u0647 \u0627\u0648\u0644\u06cc\u0647 \u0633\u0647\u0627\u0645 \u0631\u0627 \u062b\u0628\u062a \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n\n\ud83d\udd39\u0634\u06cc\u0648\u0647\u200c\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0627\u0631\u0632\u0647\u0627\u06cc \u062f\u06cc\u062c\u06cc\u062a\u0627\u0644 \u062a\u062f\u0648\u06cc\u0646 \u0645\u06cc\u200c\u0634\u0648\u062f/\n\u0631\u06cc\u06cc\u0633 \u0633\u062a\u0627\u062f \u0645\u0628\u0627\u0631\u0632\u0647 \u0628\u0627 \u0642\u0627\u0686\u0627\u0642 \u06a9\u0627\u0644\u0627 \u0648 \u0627\u0631\u0632 \u06af\u0641\u062a: \u0634\u06cc\u0648\u0647\u200c\u0646\u0627\u0645\u0647\u200c\u0647\u0627\u06cc \u0631\u0645\u0632\u0627\u0631\u0632\u0647\u0627 \u0628\u0647\u200c\u0645\u0646\u0638\u0648\u0631 \u0635\u06cc\u0627\u0646\u062a \u0627\u0632 \u0633\u0631\u0645\u0627\u06cc\u0647\u200c\u0647\u0627\u06cc \u06a9\u0634\u0648\u0631 \u062a\u0646\u0638\u06cc\u0645 \u0648 \u062a\u062f\u0648\u06cc\u0646 \u0645\u06cc\u200c\u0634\u0648\u062f.\n\n\n#\u0641\u0646\u0627\u0648\u0631\u06cc\n#\u0647\u0648\u0634_\u0645\u0635\u0646\u0648\u0639\u06cc\n#\u0627\u0645\u0646\u06cc\u062a_\u0634\u0628\u06a9\u0647\n#\u062c\u0631\u0645_\u0633\u0627\u06cc\u0628\u0631\u06cc\n#\u0634\u0628\u06a9\u0647_\u0627\u062c\u062a\u0645\u0627\u0639\u06cc\n#\u062c\u0646\u06af_\u0633\u0627\u06cc\u0628\u0631\u06cc \n#\u06a9\u0631\u0648\u0646\u0627\n#\u0627\u0645\u0646\u06cc\u062a\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc\n#\u0627\u0628\u0632\u0627\u0631_\u0647\u0648\u0634\u0645\u0646\u062f \n#\u06cc\u0648\u062a\u06cc\u0648\u0628\n#\u0641\u06cc\u0633_\u0628\u0648\u06a9 \n#\u062a\u0648\u0626\u06cc\u062a\u0631 \n\n\n\u2705\u0628\u0631\u0627\u06cc \u062e\u0648\u0627\u0646\u062f\u0646 \u0645\u062a\u0646 \u06a9\u0627\u0645\u0644 \u0627\u062e\u0628\u0627\u0631 \u0628\u0647 \u0633\u0627\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u0628\u0627\u0646 \u0645\u0631\u0627\u062c\u0639\u0647 \u0646\u0645\u0627\u0626\u06cc\u062f:\nhttps://Www.cyberbannews.com/\n\n@cyberbannews_ir", "creation_timestamp": "2020-07-13T03:48:37.000000Z"}, {"uuid": "ad7f703b-c021-4f9a-b07e-57d4583345c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/true_secator/7246", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 IR \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 Microsoft Exchange \u0432 \u0410\u0437\u0438\u0438 \u0441 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u044d\u043a\u0434\u043e\u0440\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0433\u043e \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 GhostContainer.\n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u044b\u043b \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d \u0438\u0437-\u0437\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 N-day.\n\n\u041f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f RCE-\u043e\u0448\u0438\u0431\u043a\u0430 \u0432 Exchange Server (CVE-2020-0688 \u0441 CVSS: 8,8).\n\n\u0423\u0433\u043b\u0443\u0431\u043b\u0435\u043d\u043d\u043e\u0435 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0441\u043b\u043e\u0436\u043d\u043e\u0433\u043e \u043c\u043d\u043e\u0433\u043e\u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u044f\u0442\u044c, \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043c\u043e\u0434\u0443\u043b\u0435\u0439.\u00a0\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b \u0443\u043a\u043b\u043e\u043d\u0435\u043d\u0438\u044f \u0438 \u043c\u0430\u0441\u043a\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0434 \u043e\u0431\u044b\u0447\u043d\u044b\u0439 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0447\u0442\u043e\u0431\u044b \u043d\u0435 \u0432\u044b\u0434\u0435\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0430 \u0444\u043e\u043d\u0435 \u043e\u0431\u044b\u0447\u043d\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432.\u00a0\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 GhostContainer \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c Exchange, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0440\u044f\u0434 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0448\u0435\u043b\u043b-\u043a\u043e\u0434, \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b, \u0447\u0438\u0442\u0430\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0438\u0445, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0431\u0430\u0439\u0442-\u043a\u043e\u0434 .NET. \n\n\u0424\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u043c\u043e\u0434\u0443\u043b\u044c \u0432\u0435\u0431-\u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u0442\u0443\u043d\u043d\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u0411\u044d\u043a\u0434\u043e\u0440 GhostContainer \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0441 \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \u04212 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439.\n\n\u0412\u043c\u0435\u0441\u0442\u043e \u044d\u0442\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u043a \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0438\u0437\u0432\u043d\u0435, \u0430 \u0435\u0433\u043e \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0432 \u043e\u0431\u044b\u0447\u043d\u044b\u0445 \u0432\u0435\u0431-\u0437\u0430\u043f\u0440\u043e\u0441\u0430\u0445 Exchange.\n\n\u041e\u0431\u0440\u0430\u0437\u0435\u0446, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0432 \u044d\u0442\u043e\u0439 APT-\u0430\u0442\u0430\u043a\u0435, \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0433\u043e \u0441\u0445\u043e\u0434\u0441\u0442\u0432\u0430 \u0441 \u043a\u0430\u043a\u0438\u043c-\u043b\u0438\u0431\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e, \u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0430\u0442\u0430\u043a\u0443 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u043b\u0438 \u0441\u0432\u043e\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u0433\u0440\u043e\u0437\u0443 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c, \u043d\u043e \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0430\u043a\u0442\u043e\u0440 \u043e\u0431\u043b\u0430\u0434\u0430\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u043a\u0432\u0430\u043b\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0433\u043b\u0443\u0431\u043e\u043a\u043e\u043c\u0443 \u043f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u044e Microsoft Exchange Server \u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u044b\u0432\u0430\u0442\u044c \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 \u043f\u0440\u043e\u0434\u0432\u0438\u043d\u0443\u0442\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u043a\u0438\u0431\u0435\u0440\u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0430.\n\n\u0422\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u044f \u041b\u041a \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u044d\u0442\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0447\u0430\u0441\u0442\u044c\u044e APT-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0433\u043e\u0441\u0441\u0435\u043a\u0442\u043e\u0440 \u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0410\u0437\u0438\u0438.\n\n\u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u0438\u0437\u0443\u0447\u0430\u0442\u044c \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0430\u0442\u0430\u043a \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u043a\u043b\u0430\u0441\u0442\u0435\u0440 \u0443\u0433\u0440\u043e\u0437.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u043e\u0433\u043e \u043e\u0431\u0440\u0430\u0437\u0446\u0430 GhostContainer (App_Web_Container_1.dll) - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2025-07-18T11:50:11.000000Z"}, {"uuid": "ed4b937f-b7ad-4e03-927a-f04ea48b708b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/CyberGovIL/666", "content": "\u05e2\u05d3\u05db\u05d5\u05df \u05d4\u05d0\u05d1\u05d8\u05d7\u05d4 \u05d4\u05d7\u05d5\u05d3\u05e9\u05d9 \u05e9\u05dc \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 - \u05de\u05e8\u05e5 2020\n\n\u05d1-10 \u05dc\u05d7\u05d5\u05d3\u05e9 \u05e4\u05e8\u05e1\u05de\u05d4 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05db-115 \u05e2\u05d3\u05db\u05d5\u05e0\u05d9 \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d1\u05ea\u05d5\u05db\u05e0\u05d5\u05ea \u05e0\u05ea\u05de\u05db\u05d5\u05ea. 26 \u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05de\u05e1\u05d5\u05d5\u05d2\u05d5\u05ea \u05db\u05e7\u05e8\u05d9\u05d8\u05d9\u05d5\u05ea.\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05d9\u05d5\u05ea \u05d4\u05d7\u05de\u05d5\u05e8\u05d5\u05ea \u05d1\u05d9\u05d5\u05ea\u05e8 \u05e2\u05dc\u05d5\u05dc\u05d5\u05ea \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d4\u05e4\u05e2\u05dc\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 (RCE).\n\n\u05ea\u05d6\u05db\u05d5\u05e8\u05ea - \u05d1\u05d7\u05d5\u05d3\u05e9 \u05e4\u05d1\u05e8\u05d5\u05d0\u05e8, \u05e4\u05e8\u05e1\u05de\u05d4 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u05dc\u05e9\u05e8\u05ea\u05d9 Exchange, \u05d4\u05de\u05e1\u05d5\u05de\u05df CVE-2020-0688.\n\n\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7, \u05d5\u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05e4\u05e2\u05d5\u05dc \u05dc\u05d1\u05d7\u05d9\u05e0\u05ea \u05d5\u05d4\u05ea\u05e7\u05e0\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05d6\u05d4 \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9.\n\n\u05d1\u05e2\u05d3\u05db\u05d5\u05df \u05d7\u05d5\u05d3\u05e9 \u05de\u05e8\u05e5, \u05e4\u05e8\u05e1\u05de\u05d4 \u05de\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8 \u05de\u05d9\u05d3\u05e2 (\u05dc\u05dc\u05d0 \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4) \u05dc\u05d2\u05d1\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d1\u05de\u05d9\u05de\u05d5\u05e9 \u05e4\u05e8\u05d5\u05d8\u05d5\u05e7\u05d5\u05dc SMBv3.\n\n\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05e0\u05d9\u05ea\u05e0\u05ea \u05dc\u05de\u05d9\u05de\u05d5\u05e9 \u05db\u05ea\u05d5\u05dc\u05e2\u05ea. \u05d9\u05e6\u05d5\u05d9\u05df \u05db\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d1\u05e4\u05e8\u05d5\u05d8\u05d5\u05e7\u05d5\u05dc SMB \u05d0\u05e4\u05e9\u05e8\u05d4 \u05d0\u05ea \u05de\u05d9\u05de\u05d5\u05e9 \u05d4\u05ea\u05d5\u05dc\u05e2\u05d9\u05dd WannaCry \u05d5- NotPetya \u05d1\u05e9\u05e0\u05ea 2017.\n\n\u05e8\u05d0\u05d5 \u05e4\u05e8\u05d8\u05d9\u05dd \u05d1\u05e1\u05e2\u05d9\u05e3 \"\u05d3\u05e8\u05db\u05d9 \u05d4\u05ea\u05de\u05d5\u05d3\u05d3\u05d5\u05ea\" \u05dc\u05d4\u05dc\u05df.\n\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d1\u05d7\u05d5\u05df \u05d4\u05e2\u05d3\u05db\u05d5\u05e0\u05d9\u05dd \u05d1\u05e1\u05d1\u05d9\u05d1\u05ea \u05e0\u05d9\u05e1\u05d5\u05d9, \u05d5\u05dc\u05d4\u05ea\u05e7\u05d9\u05e0\u05dd \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9.", "creation_timestamp": "2020-03-11T12:32:55.000000Z"}, {"uuid": "8b74fe94-f273-40b2-a6f9-4beef31a36c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5127", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1awebshell\n\u63cf\u8ff0\uff1acve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output\nURL\uff1ahttps://github.com/w4fz5uck5/cve-2020-0688-webshell-upload-technique\n\n\u6807\u7b7e\uff1a#webshell", "creation_timestamp": "2023-09-12T13:14:11.000000Z"}, {"uuid": "de6d1966-363e-4df8-be5b-f5436cf8475b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/tech_b0lt_Genona/1925", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Rapid7 \u0441\u043f\u0443\u0441\u0442\u044f \u043f\u0430\u0440\u0443 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0441\u0432\u043e\u0439 web-\u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 Project Sonar, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0432\u0441\u0435 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Exchange \u0432 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0435. \u0418 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u044b \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u0432\u0435\u0441\u044c\u043c\u0430 \u043f\u0435\u0447\u0430\u043b\u044c\u043d\u044b\u043c\u0438.\n\n\u0418\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c, \u0447\u0442\u043e \u043f\u043e \u043c\u0435\u043d\u044c\u0448\u0435\u0439 \u043c\u0435\u0440\u0435 357 629 (82,5%) \u0438\u0437 433 464 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Exchange \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u043e\u0442\u043a\u0440\u044b\u0442\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-0688.\n\n\u0421\u0432\u044b\u0448\u0435 350 000 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043f\u0435\u0440\u0435\u0434 CVE-2020-0688 \nhttps://habr.com/ru/company/cloud4y/blog/512952/", "creation_timestamp": "2020-07-30T23:22:56.000000Z"}, {"uuid": "155e6057-3f29-4850-83d8-cfb46fe68748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/BleepingComputer/7111", "content": "80% of all exposed Exchange servers still unpatched for critical flaw\n\nMore than 350,000 of all Microsoft Exchange servers currently exposed on the Internet haven't yet been patched against the\u00a0CVE-2020-0688\u00a0post-auth remote code execution vulnerability affecting\u00a0all supported Microsoft Exchange Server versions. [...]\n\nhttps://www.bleepingcomputer.com/news/security/80-percent-of-all-exposed-exchange-servers-still-unpatched-for-critical-flaw/", "creation_timestamp": "2020-04-06T22:07:55.000000Z"}, {"uuid": "eef30ec8-f6bb-4804-bb5e-c956c7e0f91b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/BleepingComputer/6860", "content": "Hackers Scanning for Vulnerable Microsoft Exchange Servers, Patch Now!\n\nAttackers are actively scanning the Internet for Microsoft Exchange Servers vulnerable to the CVE-2020-0688 remote code execution vulnerability patched by Microsoft two weeks ago. [...]\n\nhttps://www.bleepingcomputer.com/news/security/hackers-scanning-for-vulnerable-microsoft-exchange-servers-patch-now/", "creation_timestamp": "2020-02-26T21:36:00.000000Z"}, {"uuid": "23bf12fe-6aa7-4644-9f6b-ccfced9b4f63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/BleepingComputer/8225", "content": "Over 247K Exchange servers unpatched for actively exploited flaw\n\nMore than 247,000 Microsoft Exchange servers\u00a0are to be\u00a0patched\u00a0against the\u00a0CVE-2020-0688\u00a0post-auth remote code execution (RCE) vulnerability impacting all Exchange Server versions under support. [...]\n\nhttps://www.bleepingcomputer.com/news/security/over-247k-exchange-servers-unpatched-for-actively-exploited-flaw/", "creation_timestamp": "2020-09-29T20:44:30.000000Z"}, {"uuid": "ceb32a91-b77a-4b36-9685-32b68bc52040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/S_E_Reborn/5767", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u041b\u0430\u0431\u043e\u0440\u0430\u0442\u043e\u0440\u0438\u0438 \u041a\u0430\u0441\u043f\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0440\u0430\u0441\u043a\u0440\u044b\u043b\u0438 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u043e\u0439 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 IR \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 Microsoft Exchange \u0432 \u0410\u0437\u0438\u0438 \u0441 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0431\u044d\u043a\u0434\u043e\u0440\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0435\u0433\u043e \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 GhostContainer.\n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0431\u044b\u043b \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d \u0438\u0437-\u0437\u0430 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 N-day.\n\n\u041f\u0440\u0435\u0434\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f RCE-\u043e\u0448\u0438\u0431\u043a\u0430 \u0432 Exchange Server (CVE-2020-0688 \u0441 CVSS: 8,8).\n\n\u0423\u0433\u043b\u0443\u0431\u043b\u0435\u043d\u043d\u043e\u0435 \u0438\u0437\u0443\u0447\u0435\u043d\u0438\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u043f\u0440\u0438\u0432\u0435\u043b\u043e \u043a \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0441\u043b\u043e\u0436\u043d\u043e\u0433\u043e \u043c\u043d\u043e\u0433\u043e\u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0434\u0438\u043d\u0430\u043c\u0438\u0447\u0435\u0441\u043a\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u044f\u0442\u044c, \u0434\u043e\u0431\u0430\u0432\u043b\u044f\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043c\u043e\u0434\u0443\u043b\u0435\u0439.\u00a0\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u043e\u0432 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b \u0443\u043a\u043b\u043e\u043d\u0435\u043d\u0438\u044f \u0438 \u043c\u0430\u0441\u043a\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0434 \u043e\u0431\u044b\u0447\u043d\u044b\u0439 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0447\u0442\u043e\u0431\u044b \u043d\u0435 \u0432\u044b\u0434\u0435\u043b\u044f\u0442\u044c\u0441\u044f \u043d\u0430 \u0444\u043e\u043d\u0435 \u043e\u0431\u044b\u0447\u043d\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432.\u00a0\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 GhostContainer \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c Exchange, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0438\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0440\u044f\u0434 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0448\u0435\u043b\u043b-\u043a\u043e\u0434, \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0444\u0430\u0439\u043b\u044b, \u0447\u0438\u0442\u0430\u0442\u044c \u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0438\u0445, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u0431\u0430\u0439\u0442-\u043a\u043e\u0434 .NET. \n\n\u0424\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b \u0442\u0430\u043a\u0436\u0435 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u043c\u043e\u0434\u0443\u043b\u044c \u0432\u0435\u0431-\u043f\u0440\u043e\u043a\u0441\u0438 \u0438 \u0442\u0443\u043d\u043d\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\n\u0411\u044d\u043a\u0434\u043e\u0440 GhostContainer \u043d\u0435 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0441 \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \u04212 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043e\u0439.\n\n\u0412\u043c\u0435\u0441\u0442\u043e \u044d\u0442\u043e\u0433\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u043a \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u0443 \u0438\u0437\u0432\u043d\u0435, \u0430 \u0435\u0433\u043e \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043a\u0440\u044b\u0432\u0430\u044e\u0442\u0441\u044f \u0432 \u043e\u0431\u044b\u0447\u043d\u044b\u0445 \u0432\u0435\u0431-\u0437\u0430\u043f\u0440\u043e\u0441\u0430\u0445 Exchange.\n\n\u041e\u0431\u0440\u0430\u0437\u0435\u0446, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0432 \u044d\u0442\u043e\u0439 APT-\u0430\u0442\u0430\u043a\u0435, \u043d\u0435 \u0438\u043c\u0435\u0435\u0442 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0433\u043e \u0441\u0445\u043e\u0434\u0441\u0442\u0432\u0430 \u0441 \u043a\u0430\u043a\u0438\u043c-\u043b\u0438\u0431\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e, \u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u0430\u0442\u0430\u043a\u0443 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043d\u0435 \u0440\u0430\u0441\u043a\u0440\u044b\u0432\u0430\u043b\u0438 \u0441\u0432\u043e\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0443\u0433\u0440\u043e\u0437\u0443 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c, \u043d\u043e \u0441\u0447\u0438\u0442\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0430\u043a\u0442\u043e\u0440 \u043e\u0431\u043b\u0430\u0434\u0430\u0435\u0442 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u043a\u0432\u0430\u043b\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0435\u0439 \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0433\u043b\u0443\u0431\u043e\u043a\u043e\u043c\u0443 \u043f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u044e Microsoft Exchange Server \u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u043e\u0431\u0440\u0430\u0437\u043e\u0432\u044b\u0432\u0430\u0442\u044c \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 \u043a\u043e\u0434 \u0432 \u043f\u0440\u043e\u0434\u0432\u0438\u043d\u0443\u0442\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u043a\u0438\u0431\u0435\u0440\u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0430.\n\n\u0422\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u044f \u041b\u041a \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u044d\u0442\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0447\u0430\u0441\u0442\u044c\u044e APT-\u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0433\u043e\u0441\u0441\u0435\u043a\u0442\u043e\u0440 \u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0447\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0432 \u0410\u0437\u0438\u0438.\n\n\u0412 \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u0438\u0437\u0443\u0447\u0430\u0442\u044c \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u0430\u0442\u0430\u043a \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0442\u044c \u043a\u043b\u0430\u0441\u0442\u0435\u0440 \u0443\u0433\u0440\u043e\u0437.\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0440\u0430\u0437\u0431\u043e\u0440 \u043d\u0430\u0439\u0434\u0435\u043d\u043d\u043e\u0433\u043e \u043e\u0431\u0440\u0430\u0437\u0446\u0430 GhostContainer (App_Web_Container_1.dll) - \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2025-07-18T17:29:56.000000Z"}, {"uuid": "50accbb9-498a-4d86-8b1d-f87d0b744776", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "Telegram/C3dLOex4qKF8CrF74Ro2jk8I9HmXrLWpS6IVMSsoWA8-ZJQ", "content": "", "creation_timestamp": "2025-08-04T21:00:05.000000Z"}, {"uuid": "39553793-0973-47db-889b-8d719971e631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/standardhacker/108", "content": "\u05d0\u05d4\u05d1\u05ea\u05d9 \u05d0\u05ea \u05d4\u05de\u05e7\u05d5\u05e8 \u05d4\u05d6\u05d4: https://www.trustedsec.com/blog/detecting-cve-20200688-remote-code-execution-vulnerability-on-microsoft-exchange-server/\n\u05d9\u05e9 \u05e4\u05d4 \u05e4\u05d9\u05e8\u05d5\u05d8 \u05de\u05de\u05e9 \u05d8\u05d5\u05d1 \u05e2\u05dc \u05d0\u05d9\u05da \u05dc\u05d6\u05d4\u05d5\u05ea CVE-2020-0688. \u05dc\u05de\u05d9 \u05e9\u05dc\u05d0 \u05de\u05db\u05d9\u05e8, \u05de\u05d3\u05d5\u05d1\u05e8 \u05d1Exploit \u05dcOWA (\u05e9\u05e8\u05ea \u05d4\u05de\u05d9\u05d9\u05dc\u05d9\u05dd \u05e9\u05dc \u05de\u05d9\u05d9\u05e7\u05e8\u05d5\u05e1\u05d5\u05e4\u05d8) \u05d4\u05de\u05e7\u05e0\u05d4 \u05d4\u05e8\u05e6\u05ea \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7. \n\u05d9\u05e9 \u05d2\u05dd \u05dc\u05d9\u05e0\u05e7 \u05dc\u05e8\u05e4\u05d5\u05d6\u05d9\u05d8\u05d5\u05e8\u05d9 \u05d1-Github \u05e2\u05dd \u05d4-PoC. \u05dc\u05de\u05d9 \u05e9\u05e8\u05d5\u05e6\u05d4 \u05d9\u05d5\u05ea\u05e8 \u05d5\u05d9\u05d6\u05d5\u05d0\u05dc\u05d9 - \u05d9\u05e9 \u05d2\u05dd \u05e1\u05e8\u05d8\u05d5\u05e0\u05d9\u05dd \u05d1\u05d9\u05d5\u05d8\u05d9\u05d5\u05d1. \n\u05dc\u05de\u05d4 \u05db\u05d3\u05d0\u05d9 \u05dc\u05dc\u05de\u05d5\u05d3 \u05e2\u05dc \u05d4\u05d0\u05e7\u05e1\u05e4\u05dc\u05d5\u05d9\u05d8 \u05d4\u05d6\u05d4? \n\u05d4\u05d5\u05d0 \u05e0\u05de\u05e6\u05d0 \u05d1\u05e9\u05d9\u05de\u05d5\u05e9 \u05e8\u05d7\u05d1 \u05e2\"\u05d9 \u05dc\u05d0 \u05de\u05e2\u05d8 \u05e7\u05d1\u05d5\u05e6\u05d5\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4. \u05d1\u05e2\u05d9\u05e7\u05e8 \u05de\u05e9\u05de\u05e9 \u05dc\u05d4\u05e8\u05e6\u05d4 \u05e9\u05dc webshell \u05d0\u05d5 reverse shell \u05db\u05d3\u05d9 \u05dc\u05d4\u05e9\u05ea\u05dc\u05d8 \u05e2\u05dc \u05d4\u05e9\u05e8\u05ea \u05d5\u05dc\u05d4\u05de\u05e9\u05d9\u05da \u05dc\u05ea\u05d6\u05d5\u05d6\u05d4 \u05d1\u05e8\u05e9\u05ea (lateral movement). \n\u05e9\u05d1\u05ea \u05e9\u05e7\u05d8\u05d4 \u05d7\u05d1\u05e8\u05d9\u05dd (:", "creation_timestamp": "2020-12-11T18:22:01.000000Z"}, {"uuid": "57419a07-a218-4004-9f73-db895c5972b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/bizone_channel/213", "content": "\u041f\u043e\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0432 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435 \u0437\u043d\u0430\u043d\u0438\u0439 \u0434\u043b\u044f \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u043d\u0430 \u0441\u0430\u0439\u0442\u0435 Cyber Polygon\n\n\ud83d\udce9\u041c\u044b \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u043c \u0446\u0438\u043a\u043b, \u043f\u043e\u0441\u0432\u044f\u0449\u0435\u043d\u043d\u044b\u0439 \u043c\u0435\u0442\u043e\u0434\u0430\u043c \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u043d\u0430 \u043f\u043e\u0447\u0442\u043e\u0432\u044b\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 Microsoft Exchange.\n\n\u0412 \u043d\u043e\u0432\u043e\u043c \u0433\u0430\u0439\u0434\u0435 \u043c\u044b \u043f\u043e\u0433\u043e\u0432\u043e\u0440\u0438\u043b\u0438 \u043e \u043c\u0435\u0442\u043e\u0434\u0430\u0445 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0434\u0440\u0443\u0433\u0438\u0445 \u043d\u0430\u0448\u0443\u043c\u0435\u0432\u0448\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 MS Exchange, \u0430 \u0438\u043c\u0435\u043d\u043d\u043e CVE-2020-0688, CVE-2020-16875 \u0438 CVE-2021-24085.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e \u0447\u0442\u043e \u044d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0435 \u0442\u0430\u043a\u0438\u0435 \u0441\u0432\u0435\u0436\u0438\u0435, \u043a\u0430\u043a ProxyLogon, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0442 \u0438\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c. \u0410 \u0435\u0441\u043b\u0438 \u0437\u0430\u043c\u0435\u0442\u0438\u0442\u044c \u0438\u0445 \u0432\u043e\u0432\u0440\u0435\u043c\u044f, \u043c\u043e\u0436\u043d\u043e \u0441\u0432\u0435\u0441\u0442\u0438 \u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c\u0443 \u043d\u0435\u0433\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u043e\u0442 \u0430\u0442\u0430\u043a\u0438 \u2014 \u0438\u043b\u0438 \u0432\u043e\u0432\u0441\u0435 \u0438\u0445 \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c. \u0412 \u0441\u0442\u0430\u0442\u044c\u0435 \u043c\u044b \u043f\u043e\u043a\u0430\u0437\u0430\u043b\u0438, \u043a\u0430\u043a \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0442\u0438\u043b\u0438\u0442 \u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 Exchange \u043c\u043e\u0436\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0443\u043a\u0430\u0437\u0430\u043d\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043b\u0435\u0434\u044b \u0430\u0442\u0430\u043a, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u0432 \u043f\u0440\u043e\u0448\u043b\u043e\u043c.\n\n\u0415\u0449\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 \u0437\u043d\u0430\u043d\u0438\u0439 \u0438 \u043f\u0440\u0430\u043a\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043d\u0430\u0432\u044b\u043a\u043e\u0432 \u2014 \u043d\u0430 \u043c\u0435\u0436\u0434\u0443\u043d\u0430\u0440\u043e\u0434\u043d\u043e\u043c \u0442\u0440\u0435\u043d\u0438\u043d\u0433\u0435 Cyber Polygon 9 \u0438\u044e\u043b\u044f. \n\u0412\u0430\u0441 \u0436\u0434\u0443\u0442 \u0432\u044b\u0441\u0442\u0443\u043f\u043b\u0435\u043d\u0438\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u043c\u0438\u0440\u043e\u0432\u044b\u0445 \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u043e\u0432 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0442\u0440\u0435\u043d\u0438\u043d\u0433 \u0434\u043b\u044f \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0432\u0438\u0434\u0435\u043e\u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b.\n\n\ud83d\udc49\u0417\u0430\u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u0443\n\n#msexchange", "creation_timestamp": "2021-06-23T13:27:52.000000Z"}, {"uuid": "8aad141c-c66e-4516-8d9b-de9e797cfce6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/hybgl/39", "content": "#cve #exchange  #rce\n\n[\u0423\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 Exchange CVE-2020-0688]\n\nhttps://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys", "creation_timestamp": "2020-02-26T12:03:25.000000Z"}, {"uuid": "5222f92c-ca48-44b0-9754-367f3ca627aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/hybgl/157", "content": "#cve #exchange #rce\n\n[ \u0435\u0449\u0435 \u043e\u0434\u0438\u043d \"\u0441\u0434\u0435\u043b\u0430\u0442\u044c \u0445\u043e\u0440\u043e\u0448\u043e\" \u043d\u0430 CVE-2020-0688 ]\n\nhttps://github.com/zcgonvh/CVE-2020-0688", "creation_timestamp": "2020-04-15T19:28:16.000000Z"}, {"uuid": "114ece1f-296a-401c-9c9d-bb9bf9062ec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/is_n3ws/36", "content": "\u0410\u041d\u0411 \u043f\u0440\u043e\u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u043e \u0430\u0442\u0430\u043a\u0438 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0432\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u043e \u043e\u0442\u0447\u0435\u0442. Top-20 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nhttps://media.defense.gov/2020/Oct/20/2002519884/-1/-1/0/CSA_CHINESE_EXPLOIT_VULNERABILITIES_UOO179811.PDF\n\nGaining Remote Access: \n-----------------------------\nCVE-2019-11510: Arbitrary file read/Pulse Secure VPN\nCVE-2019-19781: RCE/Citrix ADC\nCVE-2020-8195/3/6: Unauthenticated access\nCVE-2019-0708: RCE on RDP server\nCVE-2020-5902: RCE in F5 BIG-IP\n\nAD:\n----\nCVE-2020-1472: #ZeroLogon\nCVE-2019-1040: NTLM relay bypass\n\nMDM: \n------\nCVE-2020-15505: MobileIron device management\n\nExploiting Public Facing Services:\n---------------- \nCVE-2020-1350: RCE/ DNS Servers #SigRed\nCVE-2018-6789: RCE/ Exim mail transfer\nCVE-2018-4939: RCE/ Adobe's Cold Fusion\n\nWorkstation Local Privilege Escalation:\n-------------------------\nCVE-2020-0601: ECC spoofing #CurveBall\nCVE-2019-0803: Win32k Elevation of Privilege\n\nInternal Applications:\n--------------------\nCVE-2020-0688: RCE/MS Exchange\nCVE-2020-2555: RCE/Oracle Weblogic\nCVE-2019-11580: RCE/Atlassian Crowd\nCVE-2019-18935: RCE/ASP.Net\nCVE-2015-4852: RCE/Apache\nCVE-2019-3396: Unauthorized Access/Confluence\nCVE-2020-10189: RCE/Desktop Central", "creation_timestamp": "2020-11-06T22:00:17.000000Z"}, {"uuid": "3f59c84c-5be6-4d02-9e0d-9f79e801613e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/TheMalware_Team/2559", "content": "\u0647\u0627\u0643\u0631\u0632 \u064a\u062d\u0635\u0644\u0648\u0646 \u0639\u0644\u0649 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u062d\u0633\u0627\u0633\u0629 \u062d\u0648\u0644 \u062a\u0637\u0648\u064a\u0631 \u0627\u0644\u0623\u0633\u0644\u062d\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629\n\n\u0627\u062e\u062a\u0631\u0642 \u0647\u0627\u0643\u0631\u0632 \u0631\u0648\u0633 \u0634\u0631\u0643\u0627\u062a \u062f\u0641\u0627\u0639\u064a\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0645\u062a\u0639\u0627\u0642\u062f\u0629 \u0645\u0639 \u0648\u0632\u0627\u0631\u0629 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0648\u062d\u0635\u0644\u0648\u0627 \u0639\u0644\u0649 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u062d\u0633\u0627\u0633\u0629 \u062d\u0648\u0644 \u062a\u0637\u0648\u064a\u0631 \u0648\u0646\u0634\u0631 \u0627\u0644\u0623\u0633\u0644\u062d\u0629 \u0627\u0644\u0623\u0645\u064a\u0631\u0643\u064a\u0629.\n\n\u0648\u0623\u0648\u0636\u062d \u0645\u0643\u062a\u0628 \u0627\u0644\u062a\u062d\u0642\u064a\u0642\u0627\u062a \u0627\u0644\u0641\u064a\u062f\u0631\u0627\u0644\u064a \u0648\u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0642\u0648\u0645\u064a \u0648\u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0641\u064a \u0628\u064a\u0627\u0646 \u0645\u0634\u062a\u0631\u0643 \u0623\u0646 \u0627\u0644\u062c\u0647\u0627\u062a \u0627\u0644\u0641\u0627\u0639\u0644\u0629 \u062a\u0645\u0643\u0646\u062a \u0645\u0646 \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u0649 \u0645\u0639\u0644\u0648\u0645\u0627\u062a \u062d\u0633\u0627\u0633\u0629 \"\u062a\u0648\u0641\u0631 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u0644\u062d\u0635\u0648\u0644 \u0639\u0644\u064a\u0647\u0627 \u0646\u0638\u0631\u0629 \u0634\u062f\u064a\u062f\u0629 \u0627\u0644\u0623\u0647\u0645\u064a\u0629 \u0639\u0644\u0649 \u062a\u0637\u0648\u064a\u0631 \u0645\u0646\u0635\u0627\u062a \u0627\u0644\u0623\u0633\u0644\u062d\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0648\u0627\u0644\u062c\u062f\u0627\u0648\u0644 \u0627\u0644\u0632\u0645\u0646\u064a\u0629 \u0644\u0644\u0646\u0634\u0631 \u060c \u0648\u0645\u0648\u0627\u0635\u0641\u0627\u062a \u0627\u0644\u0645\u0631\u0643\u0628\u0627\u062a \u060c \u0648\u062e\u0637\u0637 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0644\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0648\u062a\u0643\u0646\u0648\u0644\u0648\u062c\u064a\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a.\"\n\n\u062a\u0634\u0645\u0644 \u0627\u0644\u0643\u064a\u0627\u0646\u0627\u062a \u0627\u0644\u062a\u064a \u062a\u0639\u0631\u0636\u062a \u0644\u0644\u062e\u0631\u0642 \u0627\u0644\u0634\u0631\u0643\u0627\u062a \u0627\u0644\u0645\u0634\u0627\u0631\u0643\u0629 \u0641\u064a \u0623\u0646\u0638\u0645\u0629 \u0627\u0644\u0642\u064a\u0627\u062f\u0629 \u0648\u0627\u0644\u0633\u064a\u0637\u0631\u0629 \u0648\u0627\u0644\u0627\u062a\u0635\u0627\u0644\u0627\u062a \u0648\u0627\u0644\u0642\u062a\u0627\u0644 \u060c \u0627\u0644\u0645\u0631\u0627\u0642\u0628\u0629 \u0648\u0627\u0644\u0627\u0633\u062a\u0637\u0644\u0627\u0639 \u060c \u062a\u0637\u0648\u064a\u0631 \u0627\u0644\u0623\u0633\u0644\u062d\u0629 \u0648\u0627\u0644\u0635\u0648\u0627\u0631\u064a\u062e \u060c \u062a\u0635\u0645\u064a\u0645 \u0627\u0644\u0645\u0631\u0643\u0628\u0627\u062a \u0648\u0627\u0644\u0637\u0627\u0626\u0631\u0627\u062a \u060c \u0648\u062a\u0637\u0648\u064a\u0631 \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0627\u062a \u0648\u062a\u062d\u0644\u064a\u0644\u0627\u062a \u0627\u0644\u0628\u064a\u0627\u0646\u0627\u062a \u0648\u0627\u0644\u062f\u0639\u0645 \u0627\u0644\u0644\u0648\u062c\u064a\u0633\u062a\u064a.\n\n\u0623\u0648\u0636\u062d \u0627\u0644\u0628\u064a\u0627\u0646 \u0627\u0644\u0645\u0634\u062a\u0631\u0643 \u0623\u0646 \u062d\u0645\u0644\u0629 \u0627\u0644\u062a\u062c\u0633\u0633 \u0642\u062f \u0628\u062f\u0623\u062a \u0645\u0646\u0630 \u0639\u0627\u0645\u064a\u0646 \u0639\u0644\u0649 \u0627\u0644\u0623\u0642\u0644 \u0627\u0639\u062a\u0628\u0627\u0631\u064b\u0627 \u0645\u0646 \u064a\u0646\u0627\u064a\u0631 2020 \u060c \u0648\u0634\u0645\u0644\u062a \u0643\u0644 \u0627\u0644\u0641\u0631\u0648\u0639 \u0627\u0644\u0639\u0633\u0643\u0631\u064a\u0629 \u0627\u0644\u0623\u0645\u064a\u0631\u0643\u064a\u0629 \u0628\u0645\u0627 \u0641\u064a \u0630\u0644\u0643 \u0627\u0644\u0642\u0648\u0627\u062a \u0627\u0644\u062c\u0648\u064a\u0629 \u0648\u0627\u0644\u062c\u064a\u0634 \u0648\u0627\u0644\u0628\u062d\u0631\u064a\u0629 \u0648\u0627\u0644\u0641\u0636\u0627\u0621.\n\n\u0641\u064a\u0645\u0627 \u064a\u0644\u064a \u0628\u0639\u0636 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u063a\u064a\u0631 \u0645\u0635\u062d\u062d\u0629 \u0644\u062f\u0649 \u0645\u0642\u0627\u0648\u0644\u064a \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u064a\u0646 \u0627\u0644\u062a\u064a \u0627\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0627\u0644\u0645\u0647\u0627\u062c\u0645\u0648\u0646 \u0644\u0644\u0648\u0635\u0648\u0644 \u0627\u0644\u0623\u0648\u0644\u064a \u0648\u0631\u0641\u0639 \u0627\u0644\u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a:\nCVE-2018-13379 \nCVE-2020-0688 \nCVE-2020-17144", "creation_timestamp": "2023-02-16T17:16:41.000000Z"}, {"uuid": "2cec1cf0-4411-4a97-b00f-d4829e09f8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/techteamwm/105", "content": "\u0647\u0627\u0643\u0631\u0632 \u064a\u062e\u062a\u0631\u0642\u0648\u0646 \u062e\u0648\u0627\u062f\u0645 Microsoft Exchange\n\n\u0627\u0633\u062a\u063a\u0644\u062a \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u062e\u062a\u0631\u0627\u0642 \u0645\u062a\u0639\u062f\u062f\u0629 \u062a\u062f\u0639\u0645\u0647\u0627 \u062d\u0643\u0648\u0645\u0627\u062a \u062b\u063a\u0631\u0629 \u0623\u0645\u0646\u064a\u0629 \u0635\u062d\u062d\u062a\u0647\u0627 \u0634\u0631\u0643\u0629 \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u062e\u0644\u0627\u0644 \u0627\u0644\u0634\u0647\u0631 \u0627\u0644\u0645\u0627\u0636\u064a \u0641\u064a \u062e\u0648\u0627\u062f\u0645 \u0628\u0631\u064a\u062f Microsoft Exchange\u060c \u062d\u064a\u062b \u062c\u0631\u0649 \u0631\u0635\u062f \u0645\u062d\u0627\u0648\u0644\u0627\u062a \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0644\u0623\u0648\u0644 \u0645\u0631\u0629 \u0628\u0648\u0627\u0633\u0637\u0629 \u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0627\u0644\u0628\u0631\u064a\u0637\u0627\u0646\u064a\u0629 Volexity.\n\n\u0648\u0628\u062d\u0633\u0628 \u062a\u0642\u0627\u0631\u064a\u0631\u060c \u0641\u0642\u062f \u0631\u0641\u0636\u062a \u0634\u0631\u0643\u0629 \"Volexity\" \u0630\u0643\u0631 \u0623\u0633\u0645\u0627\u0621 \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u062a\u064a \u062a\u0633\u062a\u063a\u0644 \u0627\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \"CVE-2020-0688\" \u0641\u064a \"Microsoft Exchange\"\u060c \u0628\u064a\u0646\u0645\u0627 \u0648\u0635\u0641 \u0645\u0635\u062f\u0631 \u0645\u0646 \u0648\u0632\u0627\u0631\u0629 \u0627\u0644\u062f\u0641\u0627\u0639 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629\u060c \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u0644\u0647\u0627\u0643\u0631\u0632 \u0628\u0623\u0646\u0647\u0627 \u062a\u0636\u0645 \u062c\u0645\u064a\u0639 \u0627\u0644\u0644\u0627\u0639\u0628\u064a\u0646 \u0627\u0644\u0643\u0628\u0627\u0631\u060c \u0631\u0627\u0641\u0636\u064b\u0627 \u062a\u0633\u0645\u064a\u0629 \u0627\u0644\u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0623\u0648 \u0627\u0644\u0628\u0644\u062f\u0627\u0646.\n\n\u0648\u0643\u0627\u0646\u062a \u0634\u0631\u0643\u0629 \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0642\u062f \u0623\u0635\u062f\u0631\u062a \u062a\u0635\u062d\u064a\u062d\u064b\u0627 \u0644\u0644\u062e\u0637\u0623 \u0641\u064a 11 \u0641\u0628\u0631\u0627\u064a\u0631 \u0627\u0644\u0645\u0627\u0636\u0649\u060c \u0648\u062d\u0630\u0631\u062a \u0645\u0633\u0624\u0648\u0644\u064a \u0627\u0644\u0646\u0638\u0627\u0645 \u0645\u0646 \u0647\u0630\u0647 \u0627\u0644\u0645\u0634\u0643\u0644\u0629\u060c \u0643\u0645\u0627 \u0637\u0627\u0644\u0628\u062a \u0628\u062a\u062b\u0628\u064a\u062a \u0627\u0644\u062a\u0635\u062d\u064a\u062d \u0641\u064a \u0623\u0642\u0631\u0628 \u0648\u0642\u062a \u0645\u0645\u0643\u0646\u060c \u0648\u0630\u0644\u0643 \u0641\u064a \u0638\u0644 \u062a\u0648\u0642\u0639\u0647\u0627 \u062d\u062f\u0648\u062b \u0647\u062c\u0645\u0627\u062a \u0641\u064a \u0627\u0644\u0645\u0633\u062a\u0642\u0628\u0644\u060c \u062d\u064a\u062b \u062a\u0635\u0627\u0639\u062f\u062a \u0627\u0644\u0623\u0645\u0648\u0631 \u0628\u062d\u0644\u0648\u0644 \u0646\u0647\u0627\u064a\u0629 \u0641\u0628\u0631\u0627\u064a\u0631 \u0639\u0646\u062f\u0645\u0627 \u0646\u0634\u0631\u062a \u0645\u0628\u0627\u062f\u0631\u0629 \"Zero Day\" \u062a\u0642\u0631\u064a\u0631 \u062a\u0642\u0646\u0649 \u064a\u0634\u0631\u062d \u0627\u0644\u062e\u0637\u0623 \u0628\u0627\u0644\u062a\u0641\u0635\u064a\u0644 \u0648\u0643\u064a\u0641\u064a\u0629 \u0639\u0645\u0644\u0647.\n\n\u062d\u064a\u062b \u0643\u0627\u0646 \u0647\u0630\u0627 \u0627\u0644\u062a\u0642\u0631\u064a\u0631 \u0628\u0645\u062b\u0627\u0628\u0629 \u062a\u062d\u0630\u064a\u0631 \u0644\u0644\u0628\u0627\u062d\u062b\u064a\u0646 \u0641\u064a \u0645\u062c\u0627\u0644 \u0627\u0644\u0623\u0645\u0646\u060c \u0627\u0644\u0630\u064a\u0646 \u0627\u0633\u062a\u062e\u062f\u0645\u0648\u0627 \u0627\u0644\u0645\u0639\u0644\u0648\u0645\u0627\u062a \u0627\u0644\u0648\u0627\u0631\u062f\u0629 \u0636\u0645\u0646 \u0627\u0644\u062a\u0642\u0631\u064a\u0631 \u062d\u062a\u0649 \u064a\u062a\u0645\u0643\u0646\u0648\u0627 \u0645\u0646 \u0627\u062e\u062a\u0628\u0627\u0631 \u062e\u0648\u0627\u062f\u0645\u0647\u0645\u060c \u0648\u0643\u0645\u0627 \u0647\u0648 \u0627\u0644\u062d\u0627\u0644 \u0641\u064a \u0627\u0644\u0639\u062f\u064a\u062f \u0645\u0646 \u0627\u0644\u062d\u0627\u0644\u0627\u062a \u0627\u0644\u0623\u062e\u0631\u0649 \u0645\u0646 \u0642\u0628\u0644\u060c \u0625\u0630 \u0628\u0645\u062c\u0631\u062f \u0623\u0646 \u0623\u0635\u0628\u062d\u062a \u0627\u0644\u062a\u0641\u0627\u0635\u064a\u0644 \u0627\u0644\u062a\u0642\u0646\u064a\u0629 \u0639\u0627\u0645\u0629\u060c \u0628\u062f\u0623 \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u0648\u0646 \u0623\u064a\u0636\u064b\u0627 \u0628\u0627\u0644\u062a\u062d\u0631\u0643.\n\n\u0648\u0628\u062d\u0633\u0628 \u0634\u0631\u0643\u0629 \"Volexity\"\u060c \u0641\u0642\u062f \u062a\u062d\u0648\u0644\u062a \u0639\u0645\u0644\u064a\u0627\u062a \u062a\u0641\u062d\u0635 \u0627\u0644\u0625\u0646\u062a\u0631\u0646\u062a \u0628\u062d\u062b\u064b\u0627 \u0639\u0646 \u062e\u0648\u0627\u062f\u0645 \"Microsoft Exchange\" \u0625\u0644\u0649 \u0647\u062c\u0645\u0627\u062a \u0641\u0639\u0644\u064a\u0629 \u0645\u0646 \u0642\u0628\u0644 \"APT\" \u0623\u0648 \u0627\u0644\u062a\u0647\u062f\u064a\u062f\u0627\u062a \u0627\u0644\u0645\u0633\u062a\u0645\u0631\u0629 \u0627\u0644\u0645\u062a\u0642\u062f\u0645\u0629\u060c \u0648\u0647\u0648 \u0645\u0635\u0637\u0644\u062d \u064a\u0633\u062a\u062e\u062f\u0645 \u0644\u0648\u0635\u0641 \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0627\u0644\u0642\u0631\u0635\u0646\u0629 \u0627\u0644\u062a\u064a \u062a\u0631\u0639\u0627\u0647\u0627 \u0627\u0644\u062f\u0648\u0644\u0629\u060c \u0648\u0645\u0646 \u0627\u0644\u0645\u062a\u0648\u0642\u0639 \u0623\u064a\u0636\u064b\u0627 \u0623\u0646 \u062a\u062d\u0630\u0648 \u062d\u0630\u0648\u0647\u0627 \u0645\u062c\u0645\u0648\u0639\u0627\u062a \u0623\u062e\u0631\u0649.", "creation_timestamp": "2020-03-09T19:45:47.000000Z"}, {"uuid": "984e7fa6-cc67-4cc1-ae52-061a1c6cd9bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2885", "content": "Tools - Hackers Factory\n\n\u200b\u200bEF/CF\n\nthe Extremely Fast (ethereum smart) Contract Fuzzer\n\nhttps://github.com/uni-due-syssec/efcf-framework\n\n#cybersecurity #infosec\n\n\u200b\u200bPatchlessInlineExecute-Assembly\n\nPorting of InlineExecute-Assembly to load .NET assembly in process but with patchless AMSI and ETW bypass using hardware breakpoint.\n\nhttps://github.com/VoldeSec/PatchlessInlineExecute-Assembly\n\n#infosec #pentesting #redteam\n\n\u200b\u200bpdnscollect\n\nBrowser extension and local listener PoC for collecting your own DNS data while browsing\n\nhttps://github.com/olihough86/pdnscollect\n\n#cybersecurity #infosec\n\n\u200b\u200btheHarvester\n\nA simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using multiple public resources that include:\n\nhttps://github.com/laramies/theHarvester\n\n#best #infosec #pentesting #redteam\n\n\u200b\u200bPowerMayhem\n\nhttps://github.com/jungawagat/powermayhem\n\n#infosec #pentesting #redteam\n\nRoboDroid\n\nA cutting-edge software tool designed to simplify the process of managing (and very soon also deploying) Android machines for usage in Cyber Range environments. With RoboDroid, users can easily set up and customize pre-defined behaviors for their Android machines, allowing them to create complex cyber attack scenarios and test their defenses against a wide range of threats.\n\nhttps://github.com/cybersecsi/robodroid\n\n#cybersecurity #infosec #android\n\n\u200b\u200bDynamicFinder\n\nA DLL sideloading utility. DynamicFinder will search every running process for DLL sideloading opportunities.\n\nhttps://github.com/SecurityAndStuff/DynamicFinder\n\n#infosec #pentesting #redteam\n\n\u200b\u200bcve-2020-0688\n\nhttps://github.com/Ridter/cve-2020-0688\n\n#infosec #pentesting\n\nGVision\n\nA reverse image search app that use Google Cloud Vision API to detect landmarks and web entities from images, helping you gather valuable information quickly and easily.\n\nhttps://github.com/GONZOsint/gvision\n\n#OSINT #infosec #infosecurity\n\n\u200b\u200bExegol\n\nCommunity-driven hacking environment, powerful and yet simple enough to be used by anyone in day to day engagements. Exegol is the best solution to deploy powerful hacking environments securely, easily, professionally. \n\nExegol fits pentesters, CTF players, bug bounty hunters, researchers, beginners and advanced users, defenders, from stylish macOS users and corporate Windows pros to UNIX-like power users.\n\nhttps://github.com/ThePorgs/Exegol\n\n#infosec #pentesting #redteam\n\n\u200b\u200bDiscover\n\nCustom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload creation using Metasploit. For use with Kali Linux.\n\nhttps://github.com/leebaird/discover\n\n#infosec #pentesting #redteam\n\n#cybersecurity #Infosec #cybersec #dilagrafie #activism #cyber\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-04-17T12:47:56.000000Z"}, {"uuid": "0d81230d-77f6-45a3-97c9-e59c270b81dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "Telegram/gML51QAekWIiB278on55PmNfqHz9xdWxpfzRSLLQ4gz7EDWn", "content": "", "creation_timestamp": "2025-02-06T02:42:29.000000Z"}, {"uuid": "a6a1269a-bd42-486c-a39c-dc5618b85208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/arpsyndicate/999", "content": "#ExploitObserverAlert\n\nCVE-2020-0688\n\nDESCRIPTION: Exploit Observer has 150 entries related to CVE-2020-0688. A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.\n\nFIRST-EPSS: 0.972010000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-03T18:25:50.000000Z"}, {"uuid": "adb8366f-d9ad-49f6-8399-9dfd752003ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/arpsyndicate/605", "content": "#ExploitObserverAlert\n\nCVE-2020-0688\n\nDESCRIPTION: Exploit Observer has 150 entries related to CVE-2020-0688. A remote code execution vulnerability exists in Microsoft Exchange software when the software fails to properly handle objects in memory, aka 'Microsoft Exchange Memory Corruption Vulnerability'.\n\nFIRST-EPSS: 0.972010000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-27T22:52:02.000000Z"}, {"uuid": "821a2250-4e25-425e-bcbb-265a2ca3e8d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/reconshell/289", "content": "CVE-2020-0688 Microsoft Exchange Remote Code Execution With POC\n\n#CVE-2020-0688 #RCE #RemoteCodeExecution #Vulnerability #YSoSerial\n\nhttps://reconshell.com/cve-2020-0688-microsoft-exchange-remote-code-execution-with-poc/", "creation_timestamp": "2021-01-12T21:02:02.000000Z"}, {"uuid": "151de24f-9977-4bb0-97c9-d6328f25321d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/SecLabNews/8900", "content": "\u0411\u043e\u043b\u0435\u0435 \u0447\u0435\u043c 247 \u0442\u044b\u0441. \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (CVE-2020-0688).      \n247 \u0442\u044b\u0441. \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043a \u0430\u0442\u0430\u043a\u0430\u043c", "creation_timestamp": "2020-09-30T19:41:53.000000Z"}, {"uuid": "182e7a9d-f906-440a-b9b6-2ea1f71a8bfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/true_secator/1053", "content": "Clearsky \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0442\u0447\u0435\u0442 \u043e \u043d\u043e\u0432\u043e\u0439 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 QuickSand \u0437\u0430 \u0430\u0432\u0442\u043e\u0440\u0441\u0442\u0432\u043e\u043c \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0439 APT MuddyWater, \u043e \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0433\u043e\u0432\u043e\u0440\u044f\u0442 \u043f\u0440\u044f\u043c\u043e, \u0447\u0442\u043e \u043e\u043d\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u041a\u0421\u0418\u0420 (\u041a\u043e\u0440\u043f\u0443\u0441 \u0441\u0442\u0440\u0430\u0436\u0435\u0439 \u0438\u0441\u043b\u0430\u043c\u0441\u043a\u043e\u0439 \u0440\u0435\u0432\u043e\u043b\u044e\u0446\u0438\u0438). \u0418 \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u043b\u0438 \u0432 \u043d\u0435\u043c \u0442\u0430\u043a\u0443\u044e \u0442\u0435\u043e\u0440\u0438\u044e \u0437\u0430\u0433\u043e\u0432\u043e\u0440\u043e\u0432, \u0447\u0442\u043e \u0434\u0438\u0432\u0443 \u0434\u0430\u0435\u0448\u044c\u0441\u044f.\n\nQuickSand \u0431\u044b\u043b\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0430 \u0432 \u0441\u0435\u043d\u0442\u044f\u0431\u0440\u0435 \u0438 \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u0430 \u043d\u0430 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439. \u0425\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0434\u0432\u0430 \u0432\u0435\u043a\u0442\u043e\u0440\u0430 \u0430\u0442\u0430\u043a\u0438 - \u0431\u0430\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u0444\u0438\u0448\u0438\u043d\u0433 \u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e CVE-2020-0688, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0435\u0439 \u043a RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Microsoft Exchange, \u0434\u043b\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043b\u0435\u0437\u043d\u043e\u0439 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u043e\u0439 \u0441\u0435\u0442\u0438.\n \n\u0412 \u043e\u0431\u043e\u0438\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0432 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u043c \u0438\u0442\u043e\u0433\u0435 \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u043b\u0438 \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a PowGoop.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 TTPs, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a \u0441\u0438\u0433\u043d\u0430\u0442\u0443\u0440\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0438\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0438 \u0441\u0445\u043e\u0434\u0441\u0442\u0432\u0430 \u0432 \u043a\u043e\u0434\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043e\u0432, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u044c MuddyWater \u043a \u0430\u0442\u0430\u043a\u0435 QuickSand. \u0412 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0441\u0445\u043e\u0434\u0441\u0442\u0432\u043e \u043a\u043e\u0434\u0430 \u0438\u043c\u0435\u0435\u0442\u0441\u044f \u0432 PowGoop \u0438 \u043f\u0440\u0438\u043f\u0438\u0441\u044b\u0432\u0430\u0435\u043c\u043e\u043c \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0435 MoriAgent (\u0442\u0443\u0442 \u0442\u043e\u0436\u0435 \u0435\u0441\u0442\u044c \u0442\u043e\u043d\u043a\u043e\u0441\u0442\u0438, \u043d\u043e \u043e\u0431 \u044d\u0442\u043e\u043c \u043d\u0435\u043c\u043d\u043e\u0433\u043e \u043f\u043e\u0437\u0436\u0435). \n\n\u0418 \u0432\u043e\u0442 \u0434\u0430\u043b\u044c\u0448\u0435 \u0432 \u043f\u0440\u0438\u043b\u0438\u0447\u043d\u043e\u043c \u043d\u0430 \u043f\u0435\u0440\u0432\u044b\u0439 \u0432\u0437\u0433\u043b\u044f\u0434 \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0438 \u0431\u0440\u0438\u0442\u0430\u043d\u0446\u0435\u0432 \u043d\u0430\u0447\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0442\u0440\u0435\u0448 \u0438 \u0441\u043e\u0434\u043e\u043c\u0438\u044f.\n\n\u0417\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a PowGoop \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u043b\u0441\u044f Palo Alto Networks \u043a\u0430\u043a \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439\u0441\u044f \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0432 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0441\u0435\u0442\u044c ransomware  Thanos. \u042d\u0442\u043e \u0442\u043e\u0442 \u0441\u0430\u043c\u044b\u0439 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0434\u043e\u043b\u0436\u0435\u043d \u0431\u044b\u043b \u0437\u0430\u043c\u0435\u043d\u044f\u0442\u044c MBR \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e \u0432\u044b\u043f\u043b\u0430\u0442\u0435 \u0432\u044b\u043a\u0443\u043f\u0430, \u043d\u043e \u0438\u0437-\u0437\u0430 \u043e\u0448\u0438\u0431\u043e\u043a \u0432 \u043a\u043e\u0434\u0435 \u043d\u0435 \u0441\u043c\u043e\u0433, - \u043c\u044b \u043f\u0438\u0441\u0430\u043b\u0438 \u043f\u0440\u043e \u044d\u0442\u043e \u0437\u0434\u0435\u0441\u044c.\n\n\u0412\u044b\u0432\u043e\u0434 \u043e \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u043c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 PowGoop \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 Thanos \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u0438\u0437 Palo Alto \u0441\u0434\u0435\u043b\u0430\u043b\u0438 \u0432 \u0441\u0438\u043b\u0443 \"\u0435\u0434\u0438\u043d\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u0441\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430\" - \u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u044f \u0432 \u0438\u043c\u0435\u043d\u0438 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043f\u0435\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0441 \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a\u043e\u043c LogicalDuckBill, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 Thanos.\n\n\u0418 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 \u043e\u0434\u043d\u043e\u0433\u043e \u043b\u0438\u0448\u044c \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0435\u043d\u0438\u044f Palo Alto, \u0447\u0442\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e PowGoop \u043c\u043e\u0436\u0435\u0442 \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c\u0441\u044f ransomware Thanos, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0434\u043e\u043b\u0436\u043d\u043e \u0441\u0442\u0438\u0440\u0430\u0442\u044c MBR (\u0430 \u043d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 \u043d\u0435 \u0441\u0442\u0438\u0440\u0430\u0435\u0442), \u0440\u0435\u0441\u0435\u0440\u0447\u0435\u0440\u044b \u0438\u0437 ClearSky \u0440\u0430\u0437\u0432\u0435\u0440\u043d\u0443\u043b\u0438 \u0446\u0435\u043b\u044b\u0439 \u0433\u0435\u043e\u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0440\u043e\u043c\u0430\u043d \u043e \u0442\u043e\u043c, \u043a\u0430\u043a \u0437\u043b\u044b\u0435 \u0438\u0440\u0430\u043d\u0441\u043a\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0445\u043e\u0442\u044f\u0442 \u043d\u0430\u043d\u0435\u0441\u0442\u0438 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u0435 \u0443\u0449\u0435\u0440\u0431\u0430 \u0441\u0432\u043e\u0438\u043c \u0438\u0437\u0440\u0430\u0438\u043b\u044c\u0441\u043a\u0438\u043c \u0432\u0438\u0437\u0430\u0432\u0438 \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0430\u044f \u0438\u0445 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u044b. \u0420\u0430\u0437\u0443\u043c\u0435\u0435\u0442\u0441\u044f, \u043d\u0438 \u043e\u0434\u043d\u043e\u0433\u043e \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u043d\u0438\u044f \u0441\u043b\u043e\u0432\u0430 \"\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\" \u0432 \u0447\u0430\u0441\u0442\u0438 \u0441\u0432\u044f\u0437\u0438 PowGoop \u0438 Thanos \u0432 \u0438\u0445 \u043e\u0442\u0447\u0435\u0442\u0435 \u043d\u0435\u0442, \u0442\u043e\u043b\u044c\u043a\u043e \u0443\u0432\u0435\u0440\u0435\u043d\u043d\u0430\u044f \u043a\u043e\u043d\u0441\u0442\u0430\u0442\u0430\u0446\u0438\u044f \u0444\u0430\u043a\u0442\u0430.\n\n\u041f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u044b \u043b\u0438 \u043a \u0430\u0442\u0430\u043a\u0435 \u0438\u0440\u0430\u043d\u0446\u044b? \u0421 \u043e\u0447\u0435\u043d\u044c \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u044c\u044e - \u0434\u0430. \u041f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u0438\u0442 \u043b\u0438 \u0438\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0447\u0438\u043a PowGoop? \u041e\u043f\u044f\u0442\u044c \u0436\u0435, \u0441\u043a\u043e\u0440\u0435\u0435 \u0432\u0441\u0435\u0433\u043e - \u0434\u0430. \u0422\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u0438\u0447\u0435\u043c \u0442\u0443\u0442 Thanos \u0438 \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0435\u043d\u0438\u0435 MBR?\n\n\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e ClearSky \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u043a\u0430\u043a\u0438\u043c\u0438-\u0442\u043e \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u043c\u0438, \u043d\u043e \u0442\u043e\u0433\u0434\u0430 \u0438\u0445 \u043d\u0430\u0434\u043e \u0432\u044b\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0442\u044c \u0432 \u043f\u0430\u0431\u043b\u0438\u043a. \u0410 \u043f\u043e\u043a\u0430 \u043c\u044b \u043a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u0441\u043f\u0440\u043e\u0441\u0438\u043c - \u0433\u0434\u0435 TTPs?", "creation_timestamp": "2020-10-16T13:21:33.000000Z"}, {"uuid": "607dafc1-7150-477b-8556-1c64f588c479", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "Telegram/0sD_EyHySREvSWLaWKL-XHqTqDduPkHhIy1vEKF4pCPQbv8", "content": "", "creation_timestamp": "2020-10-28T02:58:38.000000Z"}, {"uuid": "354f7480-15c5-4748-a00f-92820913eb5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/2735", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 #Microsoft #Exchange server Remote #CodeExecution [#RCE] reported via anonymous researcher.\n\nhttps://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys", "creation_timestamp": "2020-09-16T17:28:31.000000Z"}, {"uuid": "b66ad1f4-239e-4211-b49f-815409fda1b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/xakep_ru/8778", "content": "\u0425\u0430\u043a\u0435\u0440\u044b \u0441\u043a\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u0441\u0435\u0442\u044c \u0432 \u043f\u043e\u0438\u0441\u043a\u0430\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange\n\n\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0449\u0443\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Microsoft Exchange, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u043f\u0435\u0440\u0435\u0434 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u043e\u0439 CVE-2020-0688, \u043a\u043e\u0442\u043e\u0440\u0443\u044e Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0432\u0435 \u043d\u0435\u0434\u0435\u043b\u0438 \u043d\u0430\u0437\u0430\u0434.\n\nhttps://xakep.ru/2020/02/28/cve-2020-0688/", "creation_timestamp": "2020-02-28T13:35:07.000000Z"}, {"uuid": "aef17b26-b9c2-42dc-823f-815e20eb6063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/haccking/4802", "content": "\u200b\u200b#\u041d\u043e\u0432\u043e\u0441\u0442\u0438\n\n1. \u0411\u0430\u0433\u0438 \u0432 \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c HP Support Assistant \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0442 \u043c\u0430\u0448\u0438\u043d\u0430\u043c \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...\n\n2. \u0422\u044b\u0441\u044f\u0447\u0438 Android-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u0438, \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438 \u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...\n\n3. Facebook \u043f\u044b\u0442\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u043f\u0438\u0442\u044c \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0435 \u041f\u041e \u0443 NSO Group.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...\n\n4. 82,5% \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043a CVE-2020-0688.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...", "creation_timestamp": "2020-04-08T08:00:25.000000Z"}, {"uuid": "f315f7b8-41b6-40a8-96cc-9032ea38fd66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/pwnwiki_zhchannel/157", "content": "CVE-2020-0688 \u5fae\u8edfEXCHANGE\u670d\u52d9\u9060\u7a0b\u4ee3\u78bc\u57f7\u884c\u6f0f\u6d1e\nhttps://www.pwnwiki.org/index.php?title=CVE-2020-0688_%E5%BE%AE%E8%BB%9FEXCHANGE%E6%9C%8D%E5%8B%99%E9%81%A0%E7%A8%8B%E4%BB%A3%E7%A2%BC%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E", "creation_timestamp": "2021-09-21T06:42:48.000000Z"}, {"uuid": "d1173ee2-f0b6-4950-a038-e2f27735f5c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/haccking/71103", "content": "\u200b\u200b#\u041d\u043e\u0432\u043e\u0441\u0442\u0438\n\n1. \u0411\u0430\u0433\u0438 \u0432 \u043f\u0440\u0435\u0434\u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c HP Support Assistant \u0443\u0433\u0440\u043e\u0436\u0430\u044e\u0442 \u043c\u0430\u0448\u0438\u043d\u0430\u043c \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...\n\n2. \u0422\u044b\u0441\u044f\u0447\u0438 Android-\u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0442 \u043c\u0430\u0441\u0442\u0435\u0440-\u043f\u0430\u0440\u043e\u043b\u0438, \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u044b\u0435 \u043a\u043b\u044e\u0447\u0438 \u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...\n\n3. Facebook \u043f\u044b\u0442\u0430\u043b\u0430\u0441\u044c \u043a\u0443\u043f\u0438\u0442\u044c \u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0435 \u041f\u041e \u0443 NSO Group.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...\n\n4. 82,5% \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043a CVE-2020-0688.\n\u0427\u0438\u0442\u0430\u0442\u044c \u0434\u0430\u043b\u0435\u0435...", "creation_timestamp": "2020-04-08T06:00:28.000000Z"}, {"uuid": "2f52937b-9696-4d1c-8f8d-587084b82453", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/information_security_channel/35748", "content": "Multiple APT actors attempting to exploit recently patched remote code execution bug in exchange email servers. The vulnerability can be tracked as CVE-2020-0688. It affects all versions of the exchange server. The bug resides in the Exchange Control Panel (ECP) component, which can be used to manage mailboxes, Distribution Groups, Contacts at the mailbox level [\u2026]\nThe post Multiple APT Actors Exploiting Microsoft Exchange Email Servers Vulnerability to Take Over the Server (https://gbhackers.com/apt-exchange-email-servers/) appeared first on GBHackers On Security (https://gbhackers.com/).", "creation_timestamp": "2020-03-10T07:19:50.000000Z"}, {"uuid": "676f4f9d-a0b6-47d0-affa-8ad5ade2d420", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/xakep_ru/8969", "content": "\u0411\u043e\u043b\u0435\u0435 350 000 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u0432\u0441\u0435 \u0435\u0449\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043f\u0435\u0440\u0435\u0434 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c \u0431\u0430\u0433\u043e\u043c\n\n\u0425\u0430\u043a\u0435\u0440\u044b \u043d\u0430\u0447\u0430\u043b\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 CVE-2020-0688 \u0435\u0449\u0435 \u0432 \u043d\u0430\u0447\u0430\u043b\u0435 \u043c\u0430\u0440\u0442\u0430 2020 \u0433\u043e\u0434\u0430, \u043e\u0434\u043d\u0430\u043a\u043e \u0431\u043e\u043b\u0435\u0435 80% \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0440\u0430\u0431\u043e\u0442\u0430\u044e\u0442 \u0431\u0435\u0437 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0438 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439.\n\nhttps://xakep.ru/2020/04/08/exchange-rce/", "creation_timestamp": "2020-04-08T21:35:07.000000Z"}, {"uuid": "8491cc11-bf2e-47c8-b1f2-bcfcbd6c3ab9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/6305", "content": "CVE-2020-0688: REMOTE CODE EXECUTION ON MICROSOFT EXCHANGE SERVER THROUGH FIXED CRYPTOGRAPHIC KEYS\nhttps://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys", "creation_timestamp": "2020-02-27T09:20:02.000000Z"}, {"uuid": "d61c206f-0642-430e-9709-829e20f3a2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/1902", "content": "#Analytics\nTop-10 exploited vulnerabilities in January-July 2020:\n1. MVPower DVR Remote Code Execution*\n2. Dasan GPON Router Authentication Bypass (CVE-2018-10561)*\n3. OpenSSL TLS DTLS Heartbeat Information Disclosure (CVE-2014-0160; CVE-2014-0346)\u00a0\n4. HTTP Headers Remote Code Execution (CVE-2020-13756)*\n5. Arbitrary code execution vulnerability in Citrix VPN (CVE-2019-19781)*\n6. Draytek Vigor Command Injection (CVE-2020-8515)*\n7. Command Injection Over HTTP Payload\n8. SQL Injection (several techniques)\n9. RCE on MS Exchange Server (CVE-2020-0688)*\n10. Web Server Exposed Git Repository Information Disclosure\n\n* - Description/PoC available on Cybersecurity Technologies channel ...", "creation_timestamp": "2020-12-18T17:23:40.000000Z"}, {"uuid": "e4a0e160-d313-44f4-b50c-23836a2bd94d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/SecLabNews/6972", "content": "\u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0441\u043a\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u0421\u0435\u0442\u044c \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange, \u0441\u043e\u0434\u0435\u0440\u0436\u0430\u0449\u0438\u0445 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2020-0688. \u0415\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 SYSTEM \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0438 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0435\u0433\u043e.    \n\u041f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0441\u043a\u0430\u043d\u0438\u0440\u0443\u044e\u0442 \u0421\u0435\u0442\u044c \u043d\u0430 \u043f\u0440\u0435\u0434\u043c\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange", "creation_timestamp": "2020-02-27T13:20:02.000000Z"}, {"uuid": "440f1b39-ffcd-4acb-a973-9ddd34ccc536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/SecLabNews/7294", "content": "\u0411\u043e\u043b\u0435\u0435 35 \u0442\u044b\u0441. \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u043d\u044b\u0445 \u043a \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0443 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043a \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u0432 \u0444\u0435\u0432\u0440\u0430\u043b\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2020-0688.    \n82,5% \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043a CVE-2020-0688", "creation_timestamp": "2020-04-07T10:00:19.000000Z"}, {"uuid": "24de70a4-ecca-4062-9453-4123d01fee4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "seen", "source": "https://t.me/Russian_OSINT/875", "content": "\u200b\u200b\ud83d\ude94 \u0424\u0411\u0420 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043f\u0438\u0441\u043e\u043a 30 \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 2 \u0433\u043e\u0434\u0430\n\nCVE-2021-26855: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26857: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26858: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-27065: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-22893: It is an Improper Authentication vulnerability that is marked as critical\nCVE-2021-22894: It is a buffer overflow vulnerability that enables an attacker to execute arbitrary code\nCVE-2021-22899: It is a command injection vulnerability that enables an attacker to execute remote code\nCVE-2021-22900: It is an Improper Control of Generation of Code vulnerability\nCVE-2021-27101: It is an Improper Neutralization of Special Elements used in an SQL Command\nCVE-2021-27102: It is an Improper Neutralization of Special Elements used in an OS Command\nCVE-2021-27103: It is a Server-Side Request Forgery (SSRF) vulnerability\nCVE-2021-27104: It is an Improper Neutralization of Special Elements used in an OS Command vulnerability\nCVE-2021-21985: It is an Improper Input Validation vulnerability\nCVE-2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019)\nCVE-2020-12812: It is an Improper Authentication vulnerability\nCVE-2019-5591: It is a Missing Authentication for Critical Function vulnerability\nCVE-2019-19781: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2019-11510: It is an Improper Limitation of a Pathname to a Restricted Directory\nCVE 2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2020-5902: It is an Inclusion of Functionality from Untrusted Control Sphere and Improper Limitation of a Pathname to a Restricted Directory vulnerability \nCVE 2020-15505: It is an Insufficient Information vulnerability\nCVE-2017-11882: It is a Microsoft Office Memory Corruption vulnerability that enables an attacker to execute arbitrary code.\nCVE-2019-11580: It is an Insufficient Information vulnerability\nCVE-2018-7600: It is an Improper Input Validation vulnerability\nCVE 2019-18935: It is a Deserialization of Untrusted Data vulnerability\nCVE-2019-0604: It is a Microsoft SharePoint Remote Code Execution Vulnerability\nCVE-2020-0787: It is a Windows Background Intelligent Transfer Service Elevation of Privilege vulnerability\nCVE-2020-1472: It is a Netlogon Elevation of Privilege vulnerability \nCVE-2020-15505: It is an Insufficient Information vulnerability\nCVE-2020-0688: It is a Use of Hard-coded Credentials vulnerability", "creation_timestamp": "2021-07-29T17:59:02.000000Z"}, {"uuid": "2cbdf2be-a1d5-4ed7-8d4e-d075b59ba343", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/699", "content": "#exploit \nCVE-2020-0688: \nRCE on MS Exchange Server Through Fixed Cryptographic Keys\nhttps://www.zerodayinitiative.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys", "creation_timestamp": "2024-10-08T20:59:48.000000Z"}, {"uuid": "20ec27fe-ef81-440c-948b-81b365335124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-0688", "type": "exploited", "source": "https://t.me/CyberSecurityTechnologies/716", "content": "#info                                                                                                                                                 Multiple Exploits now out for CVE-2020-0688 - the Microsoft Exchange deserialization vuln\n\nMicrosoft:\nhttps://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-0688\nZDI:\nhttps://www.thezdi.com/blog/2020/2/24/cve-2020-0688-remote-code-execution-on-microsoft-exchange-server-through-fixed-cryptographic-keys\nSigma Rules:\nhttps://github.com/NVISO-BE/sigma-public/blob/web_exchange_cve_2020_0688_exploit/rules/web/web_exchange_cve_2020_0688_exploit.yml\nOther Detection:\nhttps://www.trustedsec.com/blog/detecting-cve-20200688-remote-code-execution-vulnerability-on-microsoft-exchange-server/\nExploits:\nhttps://github.com/Ridter/cve-2020-0688\nhttps://github.com/random-robbie/cve-2020-0688\nhttps://github.com/Jumbo-WJB/CVE-2020-0688\nhttps://github.com/Yt1g3r/CVE-2020-0688_EXP\nOther:\nCERT-FR (French) alert - https://www.cert.ssi.gouv.fr/alerte/CERTFR-2020-ALE-007/", "creation_timestamp": "2024-10-09T23:26:30.000000Z"}]}