{"vulnerability": "CVE-2021-22893", "sightings": [{"uuid": "ae79b857-6fa2-4e84-bdad-afb057ad7cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/db607906-454d-4d4e-9f13-e52366b26b31", "content": "", "creation_timestamp": "2021-04-20T16:04:08.000000Z"}, {"uuid": "a80f7b5c-02cf-4496-a1aa-299dc26269d0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/ee566c2b-ada5-48ef-b38b-2621f50d3f2e", "content": "", "creation_timestamp": "2021-04-22T08:48:55.000000Z"}, {"uuid": "31e407c8-02f7-43be-9df1-84fe1f7df203", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:19.000000Z"}, {"uuid": "3c471ed9-b699-43bc-a9b3-f8a18e54ff38", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "80ea5139-7f4c-443c-81c0-88c0d2e9afcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/24c0c150-19f9-4301-87cf-6ab59dbb3c32", "content": "", "creation_timestamp": "2022-06-13T13:15:21.000000Z"}, {"uuid": "17ad6cfe-8eb8-49d4-808c-e200e79c9c12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/63ddead6-4b82-414c-ad8e-c516b950b446", "content": "", "creation_timestamp": "2021-10-25T22:30:42.000000Z"}, {"uuid": "21e9fe8d-eb08-4fb7-b42c-658778861cf2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/234daefa-6a93-4240-80b8-23582ad75013", "content": "", "creation_timestamp": "2021-08-25T15:53:12.000000Z"}, {"uuid": "831da104-2dac-46f2-a669-c3f9c3b7d559", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2970954", "content": "", "creation_timestamp": "2024-12-24T20:22:15.348616Z"}, {"uuid": "b849cc05-3ce0-4cf8-b144-9838891301bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:52.000000Z"}, {"uuid": "1d862c3c-115b-42f9-8afb-9d3c682d3151", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_12/2021", "content": "", "creation_timestamp": "2021-04-20T15:25:01.000000Z"}, {"uuid": "36e787dc-8be3-44ae-9cbc-11ee72ef26ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:12:57.000000Z"}, {"uuid": "d3f8e08d-823b-46d7-97de-0a44f1c6b735", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=570", "content": "", "creation_timestamp": "2021-04-21T04:00:00.000000Z"}, {"uuid": "c6667881-fb0c-4e57-99b1-08870e88845c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/72c35bf6-7057-405a-94cc-48705015b766", "content": "", "creation_timestamp": "2026-02-02T12:28:59.955646Z"}, {"uuid": "408b5867-baba-4d5a-9f7d-c885a0e20dfa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1384", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProof On Concept \u2014 Pulse Secure CVE-2021-22893\nURL\uff1ahttps://github.com/thomsdev/CVE-2021-22893", "creation_timestamp": "2022-01-25T16:37:47.000000Z"}, {"uuid": "97512b97-9cda-44b6-b982-aaac92f6323e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/348", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. \nURL\uff1ahttps://github.com/AlAIAL90/CVE-2021-38085", "creation_timestamp": "2021-08-20T02:37:24.000000Z"}, {"uuid": "519771ae-33de-4bc7-866e-a0007b56a334", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://t.me/cKure/5021", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 CVE-2021-22893: Advice on Pulse Connect Secure RCE Vulnerability.\n\nhttps://www.ncsc.gov.uk/news/advice-on-pulse-connect-secure-rce-vulnerability", "creation_timestamp": "2021-04-23T00:34:09.000000Z"}, {"uuid": "803aa4de-455b-48f1-8f87-b8c65416d060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/347", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. \nURL\uff1ahttps://github.com/AlAIAL90/CVE-2021-0002", "creation_timestamp": "2021-08-20T02:32:53.000000Z"}, {"uuid": "291aa7e6-4bde-4b40-ac5d-10d51f3b4c4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/343", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893. \nURL\uff1ahttps://github.com/ZephrFish/CVE-2021-22893", "creation_timestamp": "2021-08-19T15:12:45.000000Z"}, {"uuid": "51ddc61d-f431-438b-a56b-e1eae2868c72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/636", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1aProof On Concept \u2014 Pulse Secure CVE-2021-22893\nURL\uff1ahttps://github.com/oxctdev/CVE-2021-22893", "creation_timestamp": "2021-10-03T21:49:02.000000Z"}, {"uuid": "7920e35c-edb3-41e3-b2da-333c9431ec7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/r0_jobs/271", "content": "Buy CVE-2021-22893 PoC https://forum.reverse4you.org/t/buy-cve-2021-22893-poc/13006 #expdev #buy", "creation_timestamp": "2021-05-07T22:31:52.000000Z"}, {"uuid": "589a7d6b-760d-423e-bc4a-e374b39aa660", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/cKure/4958", "content": "\u25a0\u25a0\u25a1\u25a1\u25a1 Zero-Day: SA44784 - 2021-04: Out-of-Cycle Advisory: Pulse Connect Secure RCE Vulnerability (CVE-2021-22893)\n\nhttps://kb.pulsesecure.net/pkb_mobile#article/l:en_US/SA44784/s\n\nhttps://www.fireeye.com/blog/threat-research/2021/04/suspected-apt-actors-leverage-bypass-techniques-pulse-secure-zero-day.html", "creation_timestamp": "2021-04-21T06:06:05.000000Z"}, {"uuid": "8592899d-48f2-46fc-9280-a90662ffdb28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/CyberGovIL/1213", "content": "\u05d4\u05ea\u05e8\u05e2\u05d4 \u05d3\u05d7\u05d5\u05e4\u05d4: \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1\u05e6\u05d9\u05d5\u05d3 VPN \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Com5502 |  PULSE\n\n\u05e7\u05d9\u05d9\u05de\u05ea \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1\u05e6\u05d9\u05d5\u05d3 VPN  \u05de\u05e1\u05d5\u05d2 Pulse Connect Secure (PCS).\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05de\u05d6\u05d5\u05d4\u05d4 \u05db-CVE-2021-22893. \u05e6\u05d9\u05d5\u05df CVSS 10.0.\n\n\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05d3\u05d9\u05d5\u05d5\u05d7\u05d9\u05dd \u05db\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05e7\u05d1\u05d5\u05e6\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05d3\u05d9\u05e0\u05ea\u05d9\u05ea \u05dc\u05ea\u05e7\u05d9\u05e4\u05ea \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e3 \u05de\u05e2\u05e7\u05e3 \u05e9\u05dc \u05de\u05e0\u05d2\u05e0\u05d5\u05df \u05d4\u05d4\u05d6\u05d3\u05d4\u05d5\u05ea \u05dc\u05e6\u05d9\u05d5\u05d3, \u05d2\u05dd \u05d0\u05dd \u05e0\u05e2\u05e9\u05d4 \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1-multifactor authentication.\n\n\u05d0\u05d9\u05df \u05e2\u05d3\u05d9\u05d9\u05df \u05e2\u05d3\u05db\u05d5\u05df \u05e2\u05d1\u05d5\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5, \u05d5\u05e2\u05dc \u05e4\u05d9 \u05d4\u05e4\u05e8\u05e1\u05d5\u05de\u05d9\u05dd \u05e2\u05d3\u05db\u05d5\u05df \u05e6\u05e4\u05d5\u05d9 \u05d1\u05ea\u05d7\u05d9\u05dc\u05ea \u05d7\u05d5\u05d3\u05e9 \u05de\u05d0\u05d9.\n\n\u05dc\u05e2\u05ea \u05e2\u05ea\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e1\u05d9\u05e4\u05e7\u05d4 \u05e7\u05d5\u05d1\u05e5 XML \u05d4\u05de\u05e0\u05d8\u05e8\u05dc \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1\u05e9\u05ea\u05d9 \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8 \u05d5\u05de\u05d0\u05e4\u05e9\u05e8 \u05e0\u05d8\u05e8\u05d5\u05dc \u05d5\u05e7\u05d8\u05d5\u05e8 \u05d4\u05ea\u05e7\u05d9\u05e4\u05d4.\n\n\u05d4\u05ea\u05db\u05d5\u05e0\u05d5\u05ea \u05e9\u05d9\u05e0\u05d5\u05d8\u05e8\u05dc\u05d5 \u05d4\u05df:\n\u00b7         Windows File Share Browser\n\u00b7         Pulse Secure Collaboration\n\n\u05d9\u05e9 \u05dc\u05e2\u05e7\u05d5\u05d1 \u05d0\u05d7\u05e8 \u05d4\u05d5\u05e8\u05d0\u05d5\u05ea \u05d4\u05d4\u05ea\u05e7\u05e0\u05d4 \u05d1\u05e7\u05d9\u05e9\u05d5\u05e8 \u05dc\u05d4\u05dc\u05df.\n\n\u05d1\u05e0\u05d5\u05e1\u05e3 \u05e1\u05d9\u05e4\u05e7\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05db\u05dc\u05d9 \u05dc\u05d1\u05d3\u05d9\u05e7\u05ea \u05d4-Integrity \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8. \u05d4\u05db\u05dc\u05d9 \u05d0\u05de\u05d5\u05e8 \u05dc\u05d6\u05d4\u05d5\u05ea \u05e7\u05d1\u05e6\u05d9\u05dd \u05e9\u05e9\u05d5\u05e0\u05d5 \u05d0\u05d5 \u05e0\u05d5\u05e1\u05e4\u05d5 \u05dc\u05de\u05d5\u05e6\u05e8 \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd.\n\n\u05e7\u05d5\u05d1\u05e5 \u05d4-XML \u05d5\u05db\u05dc\u05d9 \u05d4\u05d1\u05d3\u05d9\u05e7\u05d4 \u05e0\u05d9\u05ea\u05e0\u05d9\u05dd \u05dc\u05d4\u05d5\u05e8\u05d3\u05d4 \u05de\u05d4\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05d4\u05d1\u05d0\u05d9\u05dd:\n\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/\n\nhttps://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44755\n\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05e7\u05e8\u05d5\u05d0 \u05d4\u05d9\u05d8\u05d1 \u05d0\u05ea \u05d4\u05ea\u05d9\u05e2\u05d5\u05d3 \u05d4\u05e0\u05dc\u05d5\u05d5\u05d4 \u05dc\u05db\u05dc\u05d9 \u05d5\u05dc-Workaround \u05e9\u05e4\u05e8\u05e1\u05de\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05d8\u05e8\u05dd \u05d4\u05e4\u05e2\u05dc\u05ea\u05dd.\n\n\u05d4\u05d7\u05d1\u05e8\u05d4 \u05d2\u05dd \u05e6\u05d9\u05d9\u05e0\u05d4 \u05d0\u05ea \u05e8\u05e9\u05d9\u05de\u05ea \u05d4-URL \u05d4\u05e4\u05d2\u05d9\u05e2\u05d9\u05dd:\n^/+dana/+meeting\n^/+dana/+fb/+smb\n^/+dana-cached/+fb/+smb\n^/+dana-ws/+namedusers\n^/+dana-ws/+metric\n\n\u05d4\u05de\u05dc\u05e6\u05d5\u05ea:\n\u05d0\u05dd \u05d1\u05d0\u05e4\u05e9\u05e8\u05d5\u05ea\u05db\u05dd \u05dc\u05d4\u05e9\u05d1\u05d9\u05ea \u05d1\u05d0\u05d5\u05e4\u05df \u05d6\u05de\u05e0\u05d9 \u05d0\u05ea 2 \u05d4\u05ea\u05db\u05d5\u05e0\u05d5\u05ea \u05d4\u05e0\u05d6\u05db\u05e8\u05d5\u05ea \u2013 \u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d1\u05d7\u05d5\u05df \u05e4\u05ea\u05e8\u05d5\u05df \u05d6\u05d4 \u05d5\u05dc\u05d9\u05d9\u05e9\u05de\u05d5 \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9.\n\u05d0\u05dd \u05d1\u05d9\u05db\u05d5\u05dc\u05ea\u05db\u05dd \u05dc\u05d4\u05d2\u05d1\u05d9\u05dc \u05d4\u05d2\u05d9\u05e9\u05d4 \u05dc\u05e6\u05d9\u05d5\u05d3 \u05dc\u05db\u05ea\u05d5\u05d1\u05d5\u05ea \u05de\u05d5\u05db\u05e8\u05d5\u05ea \u05d1\u05dc\u05d1\u05d3 \u05e2\u05d3 \u05dc\u05e4\u05e8\u05e1\u05d5\u05dd \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u2013 \u05e0\u05d9\u05ea\u05df \u05dc\u05d1\u05d7\u05d5\u05df \u05e4\u05ea\u05e8\u05d5\u05df \u05d6\u05d4 \u05d5\u05dc\u05d9\u05d9\u05e9\u05de\u05d5 \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9. \u05d4\u05e1\u05d9\u05db\u05d5\u05df \u05d4\u05e9\u05d9\u05d5\u05e8\u05d9 \u05d1\u05de\u05e7\u05e8\u05d4 \u05d6\u05d4 \u05d4\u05d5\u05d0 \u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05d4\u05db\u05ea\u05d5\u05d1\u05d5\u05ea \u05d4\u05de\u05d5\u05e8\u05e9\u05d5\u05ea.\n\u05d4\u05d2\u05d1\u05dc\u05ea \u05d4\u05d2\u05d9\u05e9\u05d4 \u05dc\u05de\u05d3\u05d9\u05e0\u05d5\u05ea \u05de\u05e1\u05d5\u05d9\u05de\u05d5\u05ea \u05d4\u05d9\u05e0\u05d4 \u05e4\u05ea\u05e8\u05d5\u05df \u05d7\u05dc\u05e7\u05d9 \u05d1\u05dc\u05d1\u05d3.\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d4\u05e8\u05d9\u05e5 \u05d0\u05ea \u05db\u05dc\u05d9 \u05d4\u05d1\u05d3\u05d9\u05e7\u05d4 \u05e9\u05dc \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e2\u05dc \u05d4\u05e6\u05d9\u05d5\u05d3 \u05e2\u05dc \u05de\u05e0\u05ea \u05dc\u05d5\u05d5\u05d3\u05d0 \u05db\u05d9 \u05d4\u05e6\u05d9\u05d5\u05d3 \u05dc\u05d0 \u05d4\u05d5\u05ea\u05e7\u05e3 \u05d8\u05e8\u05dd \u05e4\u05e8\u05e1\u05d5\u05dd \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea, \u05d5\u05dc\u05e4\u05e2\u05d5\u05dc \u05d1\u05d4\u05ea\u05d0\u05dd \u05dc\u05ea\u05d5\u05e6\u05d0\u05d5\u05ea \u05d4\u05d1\u05d3\u05d9\u05e7\u05d4.\n \n\n\u05de\u05e2\u05e8\u05da \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05dc\u05d0\u05d5\u05de\u05d9 \u05d9\u05de\u05e9\u05d9\u05da \u05dc\u05e2\u05e7\u05d5\u05d1 \u05d0\u05d7\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05d5\u05dc\u05e4\u05e8\u05e1\u05dd \u05e2\u05d3\u05db\u05d5\u05e0\u05d9\u05dd \u05dc\u05e4\u05d9 \u05d4\u05e6\u05d5\u05e8\u05da.", "creation_timestamp": "2021-04-21T08:34:01.000000Z"}, {"uuid": "03293f68-57a7-4537-9405-0fd12a78c81e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/TheMalware_Team/491", "content": "\u0627\u062e\u062a\u0631\u0627\u0642 \u062e\u0645\u0633 \u0648\u0643\u0627\u0644\u0627\u062a \u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0628\u0633\u0628\u0628 \u062b\u063a\u0631\u0629 \u0641\u064a Pulse Connect Secure\n\n\u0642\u0627\u0644\u062a \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u064a\u0648\u0645 \u0627\u0644\u062c\u0645\u0639\u0629 \u0625\u0646 \u0645\u0627 \u0644\u0627 \u064a\u0642\u0644 \u0639\u0646 \u062e\u0645\u0633 \u0648\u0643\u0627\u0644\u0627\u062a \u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u062a\u0639\u0631\u0636\u062a \u0644\u0647\u062c\u0645\u0627\u062a \u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u060c \u0628\u0633\u0628\u0628 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0645\u0624\u062e\u0631\u064b\u0627 \u0648\u0627\u0644\u062a\u064a \u062a\u0645\u0646\u062d \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u064a\u0646 \u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u062d\u0643\u0645 \u0641\u064a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0645\u0639\u0631\u0636\u0629 \u0644\u0644\u062e\u0637\u0631.\n\n\u062a\u0634\u0645\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0641\u064a Pulse Connect Secure \u060c \u0648\u0647\u064a \u0634\u0628\u0643\u0629 \u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629 \u062e\u0627\u0635\u0629 \u064a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0627\u0644\u0645\u0648\u0638\u0641\u0648\u0646 \u0644\u0644\u0627\u062a\u0635\u0627\u0644 \u0639\u0646 \u0628\u0639\u062f \u0628\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0648\u0643\u0627\u0644\u0627\u062a \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0643\u0628\u064a\u0631\u0629 \u060c \u0648\u0627\u062d\u062f\u0629 \u0645\u0646 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0643\u0627\u0646 \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u0648\u0646 \u064a\u0633\u062a\u063a\u0644\u0648\u0646\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u064a\u0639\u0631\u0641\u0647\u0627 \u0635\u0627\u0646\u0639 \u0627\u0644\u0645\u0646\u062a\u062c Ivanti \u060c \u0627\u0644\u0639\u064a\u0628 \u060c \u0627\u0644\u0630\u064a \u0643\u0634\u0641\u062a \u0639\u0646\u0647 \u0627\u0644\u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0633\u0628\u0648\u0639 \u0627\u0644\u0645\u0627\u0636\u064a \u060c \u064a\u062d\u0645\u0644 \u062f\u0631\u062c\u0629 \u062e\u0637\u0648\u0631\u0629 \u062a\u0628\u0644\u063a 10 \u0645\u0646 10 \u0648\u0647\u064a \u0623\u0639\u0644\u0649 \u062f\u0631\u062c\u0629 \u062e\u0637\u0648\u0631\u0629 \u0645\u0645\u0643\u0646\u0629.\n\n\u062a\u0633\u0645\u062d \u062b\u063a\u0631\u0629 zeroday \u0627\u0644\u062a\u064a \u062a\u062d\u0645\u0644 \u0627\u0644\u062a\u0631\u0642\u064a\u0645 CVE-2021-22893 \u0628\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629 \u0639\u0646 \u0628\u064f\u0639\u062f \u0639\u0644\u0649 \u0623\u062c\u0647\u0632\u0629 Pulse Secure \u060c \u0648\u0627\u0644\u062a\u062d\u0643\u0645 \u0641\u064a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0634\u0628\u0643\u0629.\n\n\u0642\u0627\u0644\u062a \u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a FireEye \u0641\u064a \u062a\u0642\u0631\u064a\u0631 \u0646\u064f\u0634\u0631 \u062d\u062f\u064a\u062b\u064b\u0627 \u0643\u0634\u0641\u062a \u0641\u064a\u0647 \u0623\u0646 \u0642\u0631\u0627\u0635\u0646\u0629 \u0645\u0631\u062a\u0628\u0637\u064a\u0646 \u0628\u0627\u0644\u0635\u064a\u0646 \u0623\u0645\u0636\u0648\u0627 \u0634\u0647\u0648\u0631\u064b\u0627 \u0641\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u062d\u0631\u062c\u0629 \u0644\u0644\u062a\u062c\u0633\u0633 \u0639\u0644\u0649 \u0645\u0642\u0627\u0648\u0644\u064a \u0627\u0644\u062f\u0641\u0627\u0639 \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0645\u0627\u0644\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629.\n\n\u0648\u0642\u0627\u0644\u062a \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0625\u0646 \u0645\u062c\u0645\u0648\u0639\u0629 \u062a\u062c\u0633\u0633 \u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u064a\u0637\u0644\u0642 \u0639\u0644\u064a\u0647\u0627 \u0625\u0633\u0645 \u0647\u0627\u0641\u0646\u064a\u0648\u0645 \"Hafnium\" \u062a\u0639\u0645\u0644 \u0641\u064a \u0627\u0644\u0635\u064a\u0646 \u0643\u0627\u0646\u062a \u0648\u0631\u0627\u0621 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u060c \u0648\u0641\u064a \u0627\u0644\u0623\u064a\u0627\u0645 \u0627\u0644\u062a\u064a \u062a\u0644\u062a \u0630\u0644\u0643 \u060c \u0628\u062f\u0623 \u0642\u0631\u0627\u0635\u0646\u0629 \u0641\u064a \u0625\u0635\u0627\u0628\u0629 \u0627\u0644\u062e\u0648\u0627\u062f\u0645 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u062e\u062a\u0631\u0627\u0642\u0647\u0627 \u0628\u0627\u0644\u0641\u0639\u0644 \u0644\u062a\u062b\u0628\u064a\u062a \u0633\u0644\u0627\u0644\u0629 \u062c\u062f\u064a\u062f\u0629 \u0645\u0646 \u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629.\n\n\u0643\u0645\u0627 \u062d\u062f\u062b \u0627\u0646\u062a\u0647\u0627\u0643\u0627\u0646 \u062e\u0637\u064a\u0631\u0627\u0646 \u0622\u062e\u0631\u0627\u0646 \u060c \u0623\u062d\u062f\u0647\u0645\u0627 \u0636\u062f \u0635\u0627\u0646\u0639 \u0623\u062f\u0627\u0629 \u0645\u0637\u0648\u0631 \u0628\u0631\u0627\u0645\u062c Codecov \u0648\u0627\u0644\u0622\u062e\u0631 \u0636\u062f Passwordstate \u0648\u0647\u0648 \u0645\u062f\u064a\u0631 \u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631 \u062a\u0633\u062a\u062e\u062f\u0645\u0647 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0643\u0628\u064a\u0631\u0629 \u0644\u062a\u062e\u0632\u064a\u0646 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0639\u062a\u0645\u0627\u062f \u062c\u062f\u0631\u0627\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0648\u0634\u0628\u0643\u0627\u062a VPN \u0648\u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0623\u062e\u0631\u0649 \u0627\u0644\u0645\u062a\u0635\u0644\u0629 \u0628\u0627\u0644\u0634\u0628\u0643\u0629.", "creation_timestamp": "2022-05-18T15:26:26.000000Z"}, {"uuid": "f4cd9b7c-f173-4c73-a89f-c48adfb65a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/229", "content": "CVE-2021-21972 VMware vSphere Client Unauthorized File Upload to Remote Code Execution (RCE)\nhttps://github.com/oxctdev/CVE-2021-21972\n\nProof-of-Concept #poc script to #exploit Pulse Secure CVE-2021-22893\nhttps://github.com/oxctdev/CVE-2021-22893", "creation_timestamp": "2021-10-04T20:50:05.000000Z"}, {"uuid": "d7b3703e-3f6a-4d57-98b1-839e1fa4f1a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/hacker_trick/186", "content": "Latest Vulnerabilities and Exploits\n\nCVE-2021-3449 OpenSSL denial-of-service exploit\nhttps://github.com/terorie/cve-2021-3449\n\nProxyToken\nhttps://github.com/bhdresh/CVE-2021-33766-ProxyToken\n\nCVES Xstream-1.4.17\nhttps://github.com/zwjjustdoit/Xstream-1.4.17\n\nCVE-2021-36934/HiveNightmare/SeriousSAM\nhttps://github.com/cube0x0/CVE-2021-36934\n\nHow to exploit a vulnerable windows driver Exploit for AsrDrv104 sys\nhttps://github.com/stong/CVE-2020-15368\n\nCVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel\nhttps://github.com/0vercl0k/CVE-2021-32537\n\nCVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch sys\nhttps://github.com/0vercl0k/CVE-2021-28476\n\nCVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit\nhttps://github.com/klezVirus/CVE-2021-40444\n\nExploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack\nhttps://github.com/lhashashinl/CVE-2021-37152\n\nProof on Concept Exploit for CVE-2021-38647 (OMIGOD)\nhttps://github.com/horizon3ai/CVE-2021-38647\n\nProof of Concept Exploit for vCenter CVE-2021-21972\nhttps://github.com/horizon3ai/CVE-2021-21972\n\nProof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893\nhttps://github.com/ZephrFish/CVE-2021-22893\n\nCVE-2021-33766 (ProxyToken)\nhttps://github.com/demossl/CVE-2021-33766-ProxyToken\n\nCVE-2021-2456\nhttps://github.com/peterjson31337/CVE-2021-2456\n\nCVE-2021-38647 POC for RCE\nhttps://github.com/midoxnet/CVE-2021-38647\n\nCVE-2021-26084 (PoC) | Confluence Server Webwork OGNL injection\nhttps://github.com/alt3kx/CVE-2021-26084_PoC\nhttps://github.com/r0ckysec/CVE-2021-26084_Confluence\nhttps://github.com/march0s1as/CVE-2021-26084\n\n\nCVE-2021-21551 Dell Driver EoP\nhttps://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551\n\nA basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)\nhttps://github.com/lntrx/CVE-2021-28663\n\nCVE-2021-40353 openSIS 8.0 SQL Injection\nhttps://github.com/5qu1n7/CVE-2021-40353\n\nCVE-2021-28476 Ubuntu 20.04\nhttps://github.com/sh4m2hwz/CVE-2021-28476-tools-env\n\nmy exp for chrome V8 CVE-2021-30551\nhttps://github.com/xmzyshypnc/CVE-2021-30551\n\nPOC of CVE-2021-2394\nhttps://github.com/lz2y/CVE-2021-2394\n\nWordPress Backup Guard Authenticated Remote Code Execution Exploit\nhttps://github.com/0dayNinja/CVE-2021-24155.rb\n\nExploit code for CVE-2021-33909,Just a dump of removed\nhttps://github.com/bbinfosec43/CVE-2021-33909", "creation_timestamp": "2021-09-18T23:06:09.000000Z"}, {"uuid": "e024e4f0-869a-43c2-ace4-9a2b1c7387d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/arpsyndicate/1014", "content": "#ExploitObserverAlert\n\nCVE-2021-22893\n\nDESCRIPTION: Exploit Observer has 21 entries related to CVE-2021-22893. Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse Connect Secure gateway. This vulnerability has been exploited in the wild.\n\nFIRST-EPSS: 0.967980000\nNVD-IS: 6.0\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T19:49:48.000000Z"}, {"uuid": "d2508e41-50b6-4d58-b7cc-01de335fbab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "Telegram/acUyixX9Lj_JIeCCEQ7YvMmbtZ4L7AlFDu5hQZOf1ebqqQ", "content": "", "creation_timestamp": "2021-10-04T01:39:26.000000Z"}, {"uuid": "a0e9ea44-ad82-46ab-aa73-477aa58f0cf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/TheMalware_Team/425", "content": "\u0627\u062e\u062a\u0631\u0627\u0642 \u062e\u0645\u0633 \u0648\u0643\u0627\u0644\u0627\u062a \u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u0628\u0633\u0628\u0628 \u062b\u063a\u0631\u0629 \u0641\u064a Pulse Connect Secure\n\n\u0642\u0627\u0644\u062a \u0648\u0643\u0627\u0644\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a \u0648\u0623\u0645\u0646 \u0627\u0644\u0628\u0646\u064a\u0629 \u0627\u0644\u062a\u062d\u062a\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u064a\u0648\u0645 \u0627\u0644\u062c\u0645\u0639\u0629 \u0625\u0646 \u0645\u0627 \u0644\u0627 \u064a\u0642\u0644 \u0639\u0646 \u062e\u0645\u0633 \u0648\u0643\u0627\u0644\u0627\u062a \u0641\u064a\u062f\u0631\u0627\u0644\u064a\u0629 \u0623\u0645\u0631\u064a\u0643\u064a\u0629 \u062a\u0639\u0631\u0636\u062a \u0644\u0647\u062c\u0645\u0627\u062a \u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629 \u060c \u0628\u0633\u0628\u0628 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u062b\u063a\u0631\u0627\u062a \u0623\u0645\u0646\u064a\u0629 \u062a\u0645 \u0627\u0643\u062a\u0634\u0627\u0641\u0647\u0627 \u0645\u0624\u062e\u0631\u064b\u0627 \u0648\u0627\u0644\u062a\u064a \u062a\u0645\u0646\u062d \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u064a\u0646 \u062d\u0631\u064a\u0629 \u0627\u0644\u062a\u062d\u0643\u0645 \u0641\u064a \u0627\u0644\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0645\u0639\u0631\u0636\u0629 \u0644\u0644\u062e\u0637\u0631.\n\n\u062a\u0634\u0645\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0641\u064a Pulse Connect Secure \u060c \u0648\u0647\u064a \u0634\u0628\u0643\u0629 \u0627\u0641\u062a\u0631\u0627\u0636\u064a\u0629 \u062e\u0627\u0635\u0629 \u064a\u0633\u062a\u062e\u062f\u0645\u0647\u0627 \u0627\u0644\u0645\u0648\u0638\u0641\u0648\u0646 \u0644\u0644\u0627\u062a\u0635\u0627\u0644 \u0639\u0646 \u0628\u0639\u062f \u0628\u0634\u0628\u0643\u0627\u062a \u0627\u0644\u0648\u0643\u0627\u0644\u0627\u062a \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0643\u0628\u064a\u0631\u0629 \u060c \u0648\u0627\u062d\u062f\u0629 \u0645\u0646 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0643\u0627\u0646 \u0627\u0644\u0645\u062a\u0633\u0644\u0644\u0648\u0646 \u064a\u0633\u062a\u063a\u0644\u0648\u0646\u0647\u0627 \u0642\u0628\u0644 \u0623\u0646 \u064a\u0639\u0631\u0641\u0647\u0627 \u0635\u0627\u0646\u0639 \u0627\u0644\u0645\u0646\u062a\u062c Ivanti \u060c \u0627\u0644\u0639\u064a\u0628 \u060c \u0627\u0644\u0630\u064a \u0643\u0634\u0641\u062a \u0639\u0646\u0647 \u0627\u0644\u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0633\u0628\u0648\u0639 \u0627\u0644\u0645\u0627\u0636\u064a \u060c \u064a\u062d\u0645\u0644 \u062f\u0631\u062c\u0629 \u062e\u0637\u0648\u0631\u0629 \u062a\u0628\u0644\u063a 10 \u0645\u0646 10 \u0648\u0647\u064a \u0623\u0639\u0644\u0649 \u062f\u0631\u062c\u0629 \u062e\u0637\u0648\u0631\u0629 \u0645\u0645\u0643\u0646\u0629.\n\n\u062a\u0633\u0645\u062d \u062b\u063a\u0631\u0629 zeroday \u0627\u0644\u062a\u064a \u062a\u062d\u0645\u0644 \u0627\u0644\u062a\u0631\u0642\u064a\u0645 CVE-2021-22893 \u0628\u062a\u0646\u0641\u064a\u0630 \u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0628\u0631\u0645\u062c\u064a\u0629 \u0636\u0627\u0631\u0629 \u0639\u0646 \u0628\u064f\u0639\u062f \u0639\u0644\u0649 \u0623\u062c\u0647\u0632\u0629 Pulse Secure \u060c \u0648\u0627\u0644\u062a\u062d\u0643\u0645 \u0641\u064a \u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0634\u0628\u0643\u0629.\n\n\u0642\u0627\u0644\u062a \u0634\u0631\u0643\u0629 \u0627\u0644\u0623\u0645\u0646 \u0627\u0644\u0633\u064a\u0628\u0631\u0627\u0646\u064a FireEye \u0641\u064a \u062a\u0642\u0631\u064a\u0631 \u0646\u064f\u0634\u0631 \u062d\u062f\u064a\u062b\u064b\u0627 \u0643\u0634\u0641\u062a \u0641\u064a\u0647 \u0623\u0646 \u0642\u0631\u0627\u0635\u0646\u0629 \u0645\u0631\u062a\u0628\u0637\u064a\u0646 \u0628\u0627\u0644\u0635\u064a\u0646 \u0623\u0645\u0636\u0648\u0627 \u0634\u0647\u0648\u0631\u064b\u0627 \u0641\u064a \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0646\u0642\u0627\u0637 \u0627\u0644\u0636\u0639\u0641 \u0627\u0644\u062d\u0631\u062c\u0629 \u0644\u0644\u062a\u062c\u0633\u0633 \u0639\u0644\u0649 \u0645\u0642\u0627\u0648\u0644\u064a \u0627\u0644\u062f\u0641\u0627\u0639 \u0648\u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0645\u0627\u0644\u064a\u0629 \u0627\u0644\u0623\u0645\u0631\u064a\u0643\u064a\u0629.\n\n\u0648\u0642\u0627\u0644\u062a \u0645\u0627\u064a\u0643\u0631\u0648\u0633\u0648\u0641\u062a \u0625\u0646 \u0645\u062c\u0645\u0648\u0639\u0629 \u062a\u062c\u0633\u0633 \u0625\u0644\u0643\u062a\u0631\u0648\u0646\u064a \u064a\u0637\u0644\u0642 \u0639\u0644\u064a\u0647\u0627 \u0625\u0633\u0645 \u0647\u0627\u0641\u0646\u064a\u0648\u0645 \"Hafnium\" \u062a\u0639\u0645\u0644 \u0641\u064a \u0627\u0644\u0635\u064a\u0646 \u0643\u0627\u0646\u062a \u0648\u0631\u0627\u0621 \u0627\u0644\u0647\u062c\u0645\u0627\u062a \u060c \u0648\u0641\u064a \u0627\u0644\u0623\u064a\u0627\u0645 \u0627\u0644\u062a\u064a \u062a\u0644\u062a \u0630\u0644\u0643 \u060c \u0628\u062f\u0623 \u0642\u0631\u0627\u0635\u0646\u0629 \u0641\u064a \u0625\u0635\u0627\u0628\u0629 \u0627\u0644\u062e\u0648\u0627\u062f\u0645 \u0627\u0644\u062a\u064a \u062a\u0645 \u0627\u062e\u062a\u0631\u0627\u0642\u0647\u0627 \u0628\u0627\u0644\u0641\u0639\u0644 \u0644\u062a\u062b\u0628\u064a\u062a \u0633\u0644\u0627\u0644\u0629 \u062c\u062f\u064a\u062f\u0629 \u0645\u0646 \u0628\u0631\u0627\u0645\u062c \u0627\u0644\u0641\u062f\u064a\u0629.\n\n\u0643\u0645\u0627 \u062d\u062f\u062b \u0627\u0646\u062a\u0647\u0627\u0643\u0627\u0646 \u062e\u0637\u064a\u0631\u0627\u0646 \u0622\u062e\u0631\u0627\u0646 \u060c \u0623\u062d\u062f\u0647\u0645\u0627 \u0636\u062f \u0635\u0627\u0646\u0639 \u0623\u062f\u0627\u0629 \u0645\u0637\u0648\u0631 \u0628\u0631\u0627\u0645\u062c Codecov \u0648\u0627\u0644\u0622\u062e\u0631 \u0636\u062f Passwordstate \u0648\u0647\u0648 \u0645\u062f\u064a\u0631 \u0643\u0644\u0645\u0627\u062a \u0645\u0631\u0648\u0631 \u062a\u0633\u062a\u062e\u062f\u0645\u0647 \u0627\u0644\u0645\u0624\u0633\u0633\u0627\u062a \u0627\u0644\u0643\u0628\u064a\u0631\u0629 \u0644\u062a\u062e\u0632\u064a\u0646 \u0628\u064a\u0627\u0646\u0627\u062a \u0627\u0639\u062a\u0645\u0627\u062f \u062c\u062f\u0631\u0627\u0646 \u0627\u0644\u062d\u0645\u0627\u064a\u0629 \u0648\u0634\u0628\u0643\u0627\u062a VPN \u0648\u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0623\u062e\u0631\u0649 \u0627\u0644\u0645\u062a\u0635\u0644\u0629 \u0628\u0627\u0644\u0634\u0628\u0643\u0629.", "creation_timestamp": "2021-05-02T01:02:41.000000Z"}, {"uuid": "fa2c37e2-5e32-4335-98c1-9a03a0e532ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/CyberSecurityIL_Chat/3300", "content": "\u05e9\u05dc\u05d5\u05dd \u05e8\u05d1,\n\n \n\n\u05e7\u05d9\u05d9\u05de\u05ea \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e7\u05e8\u05d9\u05d8\u05d9\u05ea \u05d1\u05e6\u05d9\u05d5\u05d3 VPN  \u05de\u05e1\u05d5\u05d2 Pulse Connect Secure (PCS).\n\n \n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05de\u05d6\u05d5\u05d4\u05d4 \u05db-CVE-2021-22893. \u05e6\u05d9\u05d5\u05df CVSS 10.0.\n\n \n\n\u05e7\u05d9\u05d9\u05de\u05d9\u05dd \u05d3\u05d9\u05d5\u05d5\u05d7\u05d9\u05dd \u05db\u05d9 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05de\u05e0\u05d5\u05e6\u05dc\u05ea \u05d1\u05e4\u05d5\u05e2\u05dc \u05e2\u05dc \u05d9\u05d3\u05d9 \u05e7\u05d1\u05d5\u05e6\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05d3\u05d9\u05e0\u05ea\u05d9\u05ea \u05dc\u05ea\u05e7\u05d9\u05e4\u05ea \u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05dd \u05d1\u05e2\u05d5\u05dc\u05dd.\n\n \n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e2\u05dc\u05d5\u05dc\u05d4 \u05dc\u05d0\u05e4\u05e9\u05e8 \u05dc\u05ea\u05d5\u05e7\u05e3 \u05de\u05e2\u05e7\u05e3 \u05e9\u05dc \u05de\u05e0\u05d2\u05e0\u05d5\u05df \u05d4\u05d4\u05d6\u05d3\u05d4\u05d5\u05ea \u05dc\u05e6\u05d9\u05d5\u05d3, \u05d2\u05dd \u05d0\u05dd \u05e0\u05e2\u05e9\u05d4 \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1-multifactor authentication.\n\n \n\n\u05d0\u05d9\u05df \u05e2\u05d3\u05d9\u05d9\u05df \u05e2\u05d3\u05db\u05d5\u05df \u05e2\u05d1\u05d5\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5, \u05d5\u05e2\u05dc \u05e4\u05d9 \u05d4\u05e4\u05e8\u05e1\u05d5\u05de\u05d9\u05dd \u05e2\u05d3\u05db\u05d5\u05df \u05e6\u05e4\u05d5\u05d9 \u05d1\u05ea\u05d7\u05d9\u05dc\u05ea \u05d7\u05d5\u05d3\u05e9 \u05de\u05d0\u05d9.\n\n \n\n\u05dc\u05e2\u05ea \u05e2\u05ea\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e1\u05d9\u05e4\u05e7\u05d4 \u05e7\u05d5\u05d1\u05e5 XML \u05d4\u05de\u05e0\u05d8\u05e8\u05dc \u05e9\u05d9\u05de\u05d5\u05e9 \u05d1\u05e9\u05ea\u05d9 \u05d9\u05db\u05d5\u05dc\u05d5\u05ea \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8 \u05d5\u05de\u05d0\u05e4\u05e9\u05e8 \u05e0\u05d8\u05e8\u05d5\u05dc \u05d5\u05e7\u05d8\u05d5\u05e8 \u05d4\u05ea\u05e7\u05d9\u05e4\u05d4.\n\n \n\n\u05d4\u05ea\u05db\u05d5\u05e0\u05d5\u05ea \u05e9\u05d9\u05e0\u05d5\u05d8\u05e8\u05dc\u05d5 \u05d4\u05df:\n\n \n\n\u00b7         Windows File Share Browser\n\n\u00b7         Pulse Secure Collaboration\n\n \n\n\u05d9\u05e9 \u05dc\u05e2\u05e7\u05d5\u05d1 \u05d0\u05d7\u05e8 \u05d4\u05d5\u05e8\u05d0\u05d5\u05ea \u05d4\u05d4\u05ea\u05e7\u05e0\u05d4 \u05d1\u05e7\u05d9\u05e9\u05d5\u05e8 \u05dc\u05d4\u05dc\u05df.\n\n \n\n\u05d1\u05e0\u05d5\u05e1\u05e3 \u05e1\u05d9\u05e4\u05e7\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05db\u05dc\u05d9 \u05dc\u05d1\u05d3\u05d9\u05e7\u05ea \u05d4-Integrity \u05e9\u05dc \u05d4\u05de\u05d5\u05e6\u05e8. \u05d4\u05db\u05dc\u05d9 \u05d0\u05de\u05d5\u05e8 \u05dc\u05d6\u05d4\u05d5\u05ea \u05e7\u05d1\u05e6\u05d9\u05dd \u05e9\u05e9\u05d5\u05e0\u05d5 \u05d0\u05d5 \u05e0\u05d5\u05e1\u05e4\u05d5 \u05dc\u05de\u05d5\u05e6\u05e8 \u05e2\u05dc \u05d9\u05d3\u05d9 \u05ea\u05d5\u05e7\u05e4\u05d9\u05dd.\n\n \n\n\u05e7\u05d5\u05d1\u05e5 \u05d4-XML \u05d5\u05db\u05dc\u05d9 \u05d4\u05d1\u05d3\u05d9\u05e7\u05d4 \u05e0\u05d9\u05ea\u05e0\u05d9\u05dd \u05dc\u05d4\u05d5\u05e8\u05d3\u05d4 \u05de\u05d4\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05d4\u05d1\u05d0\u05d9\u05dd:\n\n \n\nhttps://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44784/\n\nhttps://kb.pulsesecure.net/articles/Pulse_Secure_Article/KB44755\n\n \n\n \n\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05e7\u05e8\u05d5\u05d0 \u05d4\u05d9\u05d8\u05d1 \u05d0\u05ea \u05d4\u05ea\u05d9\u05e2\u05d5\u05d3 \u05d4\u05e0\u05dc\u05d5\u05d5\u05d4 \u05dc\u05db\u05dc\u05d9 \u05d5\u05dc-Workaround \u05e9\u05e4\u05e8\u05e1\u05de\u05d4 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05d8\u05e8\u05dd \u05d4\u05e4\u05e2\u05dc\u05ea\u05dd.\n\n \n\n\u05d4\u05d7\u05d1\u05e8\u05d4 \u05d2\u05dd \u05e6\u05d9\u05d9\u05e0\u05d4 \u05d0\u05ea \u05e8\u05e9\u05d9\u05de\u05ea \u05d4-URL \u05d4\u05e4\u05d2\u05d9\u05e2\u05d9\u05dd:\n\n \n\n^/+dana/+meeting\n^/+dana/+fb/+smb\n^/+dana-cached/+fb/+smb\n^/+dana-ws/+namedusers\n^/+dana-ws/+metric\n\n \n\n \n\n\u05d4\u05de\u05dc\u05e6\u05d5\u05ea:\n\n \n\n\u05d0\u05dd \u05d1\u05d0\u05e4\u05e9\u05e8\u05d5\u05ea\u05db\u05dd \u05dc\u05d4\u05e9\u05d1\u05d9\u05ea \u05d1\u05d0\u05d5\u05e4\u05df \u05d6\u05de\u05e0\u05d9 \u05d0\u05ea 2 \u05d4\u05ea\u05db\u05d5\u05e0\u05d5\u05ea \u05d4\u05e0\u05d6\u05db\u05e8\u05d5\u05ea \u2013 \u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d1\u05d7\u05d5\u05df \u05e4\u05ea\u05e8\u05d5\u05df \u05d6\u05d4 \u05d5\u05dc\u05d9\u05d9\u05e9\u05de\u05d5 \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9.\n\u05d0\u05dd \u05d1\u05d9\u05db\u05d5\u05dc\u05ea\u05db\u05dd \u05dc\u05d4\u05d2\u05d1\u05d9\u05dc \u05d4\u05d2\u05d9\u05e9\u05d4 \u05dc\u05e6\u05d9\u05d5\u05d3 \u05dc\u05db\u05ea\u05d5\u05d1\u05d5\u05ea \u05de\u05d5\u05db\u05e8\u05d5\u05ea \u05d1\u05dc\u05d1\u05d3 \u05e2\u05d3 \u05dc\u05e4\u05e8\u05e1\u05d5\u05dd \u05e2\u05d3\u05db\u05d5\u05df \u05d0\u05d1\u05d8\u05d7\u05d4 \u2013 \u05e0\u05d9\u05ea\u05df \u05dc\u05d1\u05d7\u05d5\u05df \u05e4\u05ea\u05e8\u05d5\u05df \u05d6\u05d4 \u05d5\u05dc\u05d9\u05d9\u05e9\u05de\u05d5 \u05d1\u05d4\u05e7\u05d3\u05dd \u05d4\u05d0\u05e4\u05e9\u05e8\u05d9. \u05d4\u05e1\u05d9\u05db\u05d5\u05df \u05d4\u05e9\u05d9\u05d5\u05e8\u05d9 \u05d1\u05de\u05e7\u05e8\u05d4 \u05d6\u05d4 \u05d4\u05d5\u05d0 \u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05d4\u05db\u05ea\u05d5\u05d1\u05d5\u05ea \u05d4\u05de\u05d5\u05e8\u05e9\u05d5\u05ea.\n\u05d4\u05d2\u05d1\u05dc\u05ea \u05d4\u05d2\u05d9\u05e9\u05d4 \u05dc\u05de\u05d3\u05d9\u05e0\u05d5\u05ea \u05de\u05e1\u05d5\u05d9\u05de\u05d5\u05ea \u05d4\u05d9\u05e0\u05d4 \u05e4\u05ea\u05e8\u05d5\u05df \u05d7\u05dc\u05e7\u05d9 \u05d1\u05dc\u05d1\u05d3.\n\u05de\u05d5\u05de\u05dc\u05e5 \u05dc\u05d4\u05e8\u05d9\u05e5 \u05d0\u05ea \u05db\u05dc\u05d9 \u05d4\u05d1\u05d3\u05d9\u05e7\u05d4 \u05e9\u05dc \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e2\u05dc \u05d4\u05e6\u05d9\u05d5\u05d3 \u05e2\u05dc \u05de\u05e0\u05ea \u05dc\u05d5\u05d5\u05d3\u05d0 \u05db\u05d9 \u05d4\u05e6\u05d9\u05d5\u05d3 \u05dc\u05d0 \u05d4\u05d5\u05ea\u05e7\u05e3 \u05d8\u05e8\u05dd \u05e4\u05e8\u05e1\u05d5\u05dd \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea, \u05d5\u05dc\u05e4\u05e2\u05d5\u05dc \u05d1\u05d4\u05ea\u05d0\u05dd \u05dc\u05ea\u05d5\u05e6\u05d0\u05d5\u05ea \u05d4\u05d1\u05d3\u05d9\u05e7\u05d4.\n \n\n\u05de\u05e2\u05e8\u05da \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05dc\u05d0\u05d5\u05de\u05d9 \u05d9\u05de\u05e9\u05d9\u05da \u05dc\u05e2\u05e7\u05d5\u05d1 \u05d0\u05d7\u05e8 \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05d6\u05d5 \u05d5\u05dc\u05e4\u05e8\u05e1\u05dd \u05e2\u05d3\u05db\u05d5\u05e0\u05d9\u05dd \u05dc\u05e4\u05d9 \u05d4\u05e6\u05d5\u05e8\u05da.", "creation_timestamp": "2021-04-21T10:12:35.000000Z"}, {"uuid": "b57b57dd-452b-4369-abbe-8bbb84f3f156", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://t.me/CyberSecurityIL/3297", "content": "\u05e7\u05d1\u05d5\u05e6\u05ea \u05ea\u05e7\u05d9\u05e4\u05d4 \u05de\u05e1\u05d9\u05df \u05d4\u05d7\u05dc\u05d5 \u05dc\u05e0\u05e6\u05dc \u05e4\u05d2\u05d9\u05e2\u05d5\u05ea ZeroDay \u05d1\u05de\u05d5\u05e6\u05e8 \u05d4-VPN \u05e9\u05dc \u05d7\u05d1\u05e8\u05ea Pulse Secure.\n\u05d1\u05e9\u05dc\u05d1 \u05d6\u05d4 \u05d0\u05d9\u05df \u05e2\u05d3\u05db\u05d5\u05df \u05e8\u05e9\u05de\u05d9 \u05dc\u05ea\u05d9\u05e7\u05d5\u05df \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea\n\n\u05d7\u05d1\u05e8\u05ea Pulse Secure \u05d4\u05d5\u05e6\u05d9\u05d0\u05d4 \u05d4\u05d5\u05d3\u05e2\u05d4 \u05d3\u05d7\u05d5\u05e4\u05d4 \u05dc\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05d1\u05d4\u05df \u05d4\u05d9\u05d0 \u05de\u05d1\u05e7\u05e9\u05ea \u05de\u05d4\u05dd \u05dc\u05d1\u05e6\u05e2 Workaround \u05d1\u05de\u05d5\u05e6\u05e8 \u05d4\u05d7\u05d1\u05e8\u05d4 \u05e2\u05dc \u05de\u05e0\u05ea \u05dc\u05e0\u05d8\u05e8\u05dc \u05d0\u05ea \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e9\u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 \u05d5\u05d6\u05d0\u05ea \u05db\u05e4\u05d9\u05ea\u05e8\u05d5\u05df \u05d6\u05de\u05e0\u05d9 \u05e2\u05d3 \u05dc\u05d4\u05d5\u05e6\u05d0\u05ea \u05e2\u05d3\u05db\u05d5\u05df \u05de\u05e2\u05e8\u05db\u05ea \u05e9\u05d9\u05ea\u05e7\u05df \u05d0\u05ea \u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea.\n\n\u05d4\u05e4\u05d2\u05d9\u05e2\u05d5\u05ea \u05e9\u05d4\u05ea\u05d2\u05dc\u05ea\u05d4 CVE-2021-22893 \u05e7\u05d9\u05d1\u05dc\u05d4 \u05d3\u05d9\u05e8\u05d5\u05d2 10 \u05d1\u05e8\u05de\u05ea \u05d4\u05e1\u05d9\u05db\u05d5\u05df \u05d5\u05d4\u05d9\u05d0 \u05de\u05d0\u05e4\u05e9\u05e8\u05ea \u05dc\u05ea\u05d5\u05e7\u05e4\u05d9\u05dd \u05dc\u05d4\u05e8\u05d9\u05e5 \u05e7\u05d5\u05d3 \u05de\u05e8\u05d7\u05d5\u05e7 \u05e2\u05dc \u05d4\u05e8\u05e9\u05ea \u05d4\u05d0\u05e8\u05d2\u05d5\u05e0\u05d9\u05ea.\n\nhttps://t.me/CyberSecurityIL/930\n\n\u05d4\u05d5\u05d3\u05e2\u05d4 \u05e8\u05e9\u05de\u05d9\u05ea \u05e9\u05dc \u05de\u05e2\u05e8\u05da \u05d4\u05e1\u05d9\u05d9\u05d1\u05e8 \u05d4\u05dc\u05d0\u05d5\u05de\u05d9 \u05e2\u05dd \u05de\u05d9\u05d3\u05e2 \u05e0\u05d5\u05e1\u05e3 \u05de\u05e6\"\u05d1 \u05d1\u05ea\u05d2\u05d5\u05d1\u05d5\u05ea", "creation_timestamp": "2021-04-21T10:41:24.000000Z"}, {"uuid": "aa78ae13-2d8a-4709-af9d-fa262e9d4e3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/true_secator/1642", "content": "\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b Pulse Secure \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0434\u0438\u043b\u0438 \u0434\u043e\u0432\u043e\u0434\u044b FireEye \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u0438 Pulse Secure VPN, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u043d\u0438 \u0437\u0430\u0434\u0435\u0442\u0435\u043a\u0442\u0438\u043b\u0438 \u0435\u0449\u0435 \u0430\u0432\u0433\u0443\u0441\u0442\u0435 2020, \u043a\u043e\u0433\u0434\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u043e\u0441\u044c \u0437\u0430\u043a\u0440\u0435\u043f\u0438\u0442\u044c\u0441\u044f \u0432 \u0441\u0435\u0442\u044f\u0445 \u043e\u0431\u043e\u0440\u043e\u043d\u043d\u044b\u0445 \u043f\u043e\u0434\u0440\u044f\u0434\u0447\u0438\u043a\u043e\u0432 \u0421\u0428\u0410 \u0438 \u0435\u0432\u0440\u043e\u043f\u0435\u0439\u0441\u043a\u0438\u0445 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439.\n\n\u0414\u043b\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u043d\u0430\u0434 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c\u0438 Pulse Secure \u0445\u0430\u043a\u0435\u0440\u044b \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0441 2019 \u0433\u043e\u0434\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 (CVE-2019-11510), (CVE-2020-8243), (CVE-2020-8260) \u0438 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0430\u043a\u0430\u043d\u0443\u043d\u0435 - CVE-2021-22893, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u0432\u043d\u0435\u0434\u0440\u044f\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0435 \u041f\u041e  (SLOWPULSE, RADIALPULSE, THINBLOOD, ATRIUM, PACEMAKER, SLIGHTPULSE \u0438 PULSECHECK), \u0431\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u043c\u0443 \u0438\u043c \u0443\u0434\u0430\u0432\u0430\u043b\u043e\u0441\u044c \u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0442\u044c \u0431\u044d\u043a\u0434\u043e\u0440\u044b. \u0410\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u043b\u0430 \u0444\u0438\u043a\u0441\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043e \u043c\u0430\u0440\u0442\u0430 2021 \u0433\u043e\u0434\u0430. \n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c FireEye, \u043a \u0430\u0442\u0430\u043a\u0430\u043c \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Pulse Secure \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u044b \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u0435\u0434\u043f\u043e\u043b\u043e\u0436\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u043c\u0435\u0436\u0434\u0443 \u0441\u043e\u0431\u043e\u0439 \u0433\u0440\u0443\u043f\u043f. \u0421 \u043e\u043a\u0442\u044f\u0431\u0440\u0435 2020 \u0433\u043e\u0434\u0430 \u0430\u0442\u0430\u043a\u0438 \u0438\u043c\u0435\u043b\u0438 \u0441\u0445\u043e\u0436\u0438\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0438 \u0437\u0430 \u0438\u0441\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u043c\u0435\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u043d\u0430\u0431\u043e\u0440\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c (HARDPULSE, QUIETPULSE \u0438 PULSEJUMP), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u043d\u0441\u0442\u0430\u043b\u043b\u0438\u0440\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430. \u0412 \u0446\u0435\u043b\u043e\u043c, \u043e\u0431\u0449\u0435\u0435 \u0447\u0438\u0441\u043b\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u043e\u0431\u0440\u0430\u0437\u0446\u043e\u0432 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043e\u0441\u0442\u0438\u0433\u043b\u043e 12.\n\n\u041f\u043e\u043b\u0443\u0447\u0435\u043d\u043d\u044b\u0435 \u0432 \u0445\u043e\u0434\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u043c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u0430\u043c FireEye \u0432\u0441\u043a\u0440\u044b\u0442\u044c \u043f\u0440\u0438\u0447\u0430\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u043a \u0430\u0442\u0430\u043a\u0430\u043c \u0410\u0420\u04225, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0443\u044e \u0432 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u0430\u0445 \u041a\u041d\u0420.\n\n\u0421\u043e\u0432\u043c\u0435\u0441\u0442\u043d\u043e \u0441 FireEye \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Ivanti (\u0432\u043b\u0430\u0434\u0435\u043b\u0435\u0446 Pulse Secure VPN) \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0438 \u0438 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043f\u0430\u043a\u0435\u0442 \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0439 \u0441\u043a\u0430\u043d\u0435\u0440 \u0434\u043b\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Pulse Security Integrity Checker Tool, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043d\u0435\u043f\u0440\u0430\u0432\u043e\u043c\u0435\u0440\u043d\u044b\u0435 \u0432\u043c\u0435\u0448\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430. \u041f\u043e\u043b\u043d\u044b\u0439 \u043f\u0430\u0442\u0447 \u0431\u0443\u0434\u0435\u0442 \u0434\u043e\u0441\u0442\u0443\u043f\u0435\u043d \u0432 \u043c\u0430\u0435 2021.", "creation_timestamp": "2021-04-21T16:48:21.000000Z"}, {"uuid": "3f0bc08a-40e4-4d1b-b620-b08baeeb006c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/3042", "content": "\u0410\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0435 \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431\u044b \u0442\u0440\u0438\u0430\u0434\u043e\u0439 \u0437\u0430\u044f\u0432\u0438\u043b\u0438 \u043e \u0432\u0430\u0440\u0432\u0430\u0440\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u044f\u0445 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u0410\u0420\u0422 \u0432 \u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u0442\u0435\u043b\u0435\u043a\u043e\u043c. \u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u0434 \u0430\u0432\u0442\u043e\u0440\u0441\u0442\u0432\u043e\u043c \u0410\u041d\u0411, CISA \u0438 \u0424\u0411\u0420 \u0431\u043e\u043b\u044c\u0448\u0435 \u043d\u0430\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442 \u043d\u0430\u0434\u0443\u043c\u0430\u043d\u043d\u044b\u0439 \u043f\u0440\u0435\u0434\u043b\u043e\u0433 \u0434\u043b\u044f \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u044b\u0445 \u043d\u0435\u043f\u0440\u0430\u0432\u043e\u043c\u0435\u0440\u043d\u044b\u0445 \u0441\u0430\u043d\u043a\u0446\u0438\u0439.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0430\u0432\u0442\u043e\u0440\u043e\u0432, \u043f\u0440\u043e\u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0410\u0420\u0422 \u043d\u0430\u0446\u0435\u043b\u0438\u043b\u0438\u0441\u044c \u043d\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u043b\u0443\u0433, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043e\u0431\u0449\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 , \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u0438 \u0431\u0443\u043a\u0432\u0430\u043b\u044c\u043d\u043e \u0432\u0441\u0435: \u043e\u0442 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 \u0434\u043e \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0439, \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0441\u0431\u043e\u0440\u0430 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0412\u0441\u0435 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043d\u0435\u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0435 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0445\u0430\u043a\u0435\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0434\u043b\u044f \u0430\u0442\u0430\u043a, \u0440\u0430\u0441\u043f\u043e\u043b\u0430\u0433\u0430\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0438 \u043f\u0440\u043e\u043a\u0441\u0438-\u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0438\u044f \u0432\u043d\u0443\u0442\u0440\u0438 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0410\u0420\u0422 \u0432\u044b\u0434\u0435\u043b\u044f\u0435\u0442 \u043a\u0440\u0443\u0433 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438 \u0432\u0430\u0436\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0443\u0447\u0435\u0442\u0430. \u041f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u043a\u0440\u0430\u0434\u0443\u0442 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0431\u0430\u0437\u0430\u043c \u0434\u0430\u043d\u043d\u044b\u0445 SQL \u0438 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c SQL-\u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u044f\u0442 \u0441\u0431\u0440\u043e\u0441 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u043e\u0432 \u0441 RADIUS.\n\n\u0412\u043e\u043e\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0441\u044c \u0443\u0436\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u043c\u0438 \u0437\u0430\u043f\u0438\u0441\u044f\u043c\u0438 \u0441\u043e \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 RADIUS \u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f\u043c\u0438 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043f\u0440\u043e\u0445\u043e\u0434\u044f\u0442 \u0443\u0441\u043f\u0435\u0448\u043d\u0443\u044e \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u0432 \u0441\u0435\u0442\u0438, \u043f\u0440\u0438\u0441\u0442\u0443\u043f\u0430\u044e\u0442 \u043a \u043d\u0430\u0441\u0442\u0440\u043e\u0439\u043a\u0435 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u0430 \u0434\u043b\u044f \u0441\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0442\u0440\u0430\u0444\u0438\u043a\u0430 \u043d\u0430 \u043f\u043e\u0434\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c\u043d\u0443\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0447\u0435\u0440\u0435\u0437 \u043d\u0430\u0441\u0442\u0440\u0430\u0438\u0432\u0430\u0435\u043c\u044b\u0439 \u0442\u0443\u043d\u043d\u0435\u043b\u044c, \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u044d\u0435\u0440\u043a\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0440\u0442\u043e\u0432.\n\n\u0417\u0430\u0432\u0435\u0440\u0448\u0438\u0432 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0447\u0430\u0441\u0442\u043e \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0438/\u0438\u043b\u0438 \u0443\u0434\u0430\u043b\u044f\u043b\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0438\u0442\u044c \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u0441\u0432\u043e\u0435\u0439 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e\u0431\u044b \u0435\u0449\u0435 \u0431\u043e\u043b\u044c\u0448\u0435 \u0441\u043a\u0440\u044b\u0442\u044c \u0441\u0432\u043e\u0435 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435 \u0438 \u0438\u0437\u0431\u0435\u0436\u0430\u0442\u044c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f.\n\n\u0412 \u0441\u0432\u043e\u0435\u0439 \u0440\u0430\u0431\u043e\u0442\u0435 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 \u0430\u043a\u0442\u043e\u0440\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043d\u0430\u0431\u043e\u0440 \u043e\u0431\u0449\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043d\u0430\u0447\u0438\u043d\u0430\u044f \u0441 2020 \u0433\u043e\u0434\u0430, \u0441\u0440\u0435\u0434\u0438 \u043a\u043e\u0442\u043e\u0440\u044b\u0445: Cisco (CVE-2018-0171, CVE-2019-15271, CVE-2019-1652), Citrix (CVE-2019-19781), D-Link (CVE-2019-16920), Fortinet (CVE-2018-13382), MikroTik (CVE-2018-14847), Netgear (CVE-2017-6862), Pulse (CVE-2019-11510, CVE-2021-22893), QNAP (CVE-2019-7192-7195), Zyxel (CVE-2020-29583) \u0438 \u0434\u0440. \n\n\u042d\u0442\u043e\u0442 \u043c\u0435\u0442\u043e\u0434 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u0447\u0435\u0442\u043d\u044b\u043c \u0437\u0430\u043f\u0438\u0441\u044f\u043c \u0436\u0435\u0440\u0442\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 PoC, \u0431\u0435\u0437 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0441\u0432\u043e\u0435\u0433\u043e \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u043e\u0442\u043b\u0438\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0438\u043b\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u0443\u044e\u0449\u0435\u0433\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 RouterSploit \u0438 RouterScan \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u044b\u0445 \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432, \u0447\u0442\u043e\u0431\u044b \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u0442\u044c \u043c\u0430\u0440\u043a\u0438, \u043c\u043e\u0434\u0435\u043b\u0438 \u0438 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438.\u00a0\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0441\u043f\u0435\u0446\u0441\u043b\u0443\u0436\u0431, \u0442\u0430\u043a\u0430\u044f \u0442\u0430\u043a\u0442\u0438\u043a\u0430 \u0440\u0430\u0431\u043e\u0442\u044b \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u0430 \u0410\u0420\u0422 \u0441\u043e\u0437\u0434\u0430\u0442\u044c \u043e\u0431\u0448\u0438\u0440\u043d\u044b\u0435 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u044b\u0435 \u0441\u0435\u0442\u0438 \u0434\u043b\u044f \u0441\u043e\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0431\u043e\u043b\u0435\u0435 \u043c\u043e\u0449\u043d\u044b\u0445 \u0430\u0442\u0430\u043a \u043d\u0430 \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u043a\u0440\u0443\u0433 \u0446\u0435\u043b\u0435\u0439 \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0438 \u0447\u0430\u0441\u0442\u043d\u043e\u0433\u043e \u0441\u0435\u043a\u0442\u043e\u0440\u043e\u0432 \u0421\u0428\u0410.\n\n\u0410\u0431\u0441\u0442\u0440\u0430\u0433\u0438\u0440\u0443\u044f\u0441\u044c \u043e\u0442 \u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0430\u043d\u0433\u0430\u0436\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0441\u0442\u0438 \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0445 \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u0439, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044e \u0431\u0443\u0434\u0443\u0442 \u0432\u043e\u0441\u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u044b \u0432\u043d\u0435 \u0437\u0430\u0432\u0438\u0441\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442 \u0444\u0430\u043a\u0442\u0443\u0440\u044b \u0441\u0430\u043c\u043e\u0433\u043e \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442\u0430. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u043e\u0437\u043d\u0430\u043a\u043e\u043c\u0438\u0442\u044c\u0441\u044f (\u0437\u0434\u0435\u0441\u044c).", "creation_timestamp": "2022-06-08T19:35:04.000000Z"}, {"uuid": "ae55d0e9-9e62-42b1-b8e9-1eed437126bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/true_secator/1675", "content": "Invanti, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a Pulse Secure VPN, \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0442\u0430\u043a\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0437\u0430\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-22893 (\u043e\u0446\u0435\u043d\u043a\u0430 \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438 \u043f\u043e CVSS - 10 \u0438\u0437 10). \n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044e, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0435\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e, \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 (RCE) - \u0441\u0442\u0440\u0430\u0448\u043d\u044b\u0439 \u0441\u043e\u043d \u043b\u044e\u0431\u043e\u0433\u043e \u0438\u043d\u0444\u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u0438\u043a\u0430.\n\n0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435, \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u043c\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 FireEye. \u0422\u043e\u0433\u0434\u0430 \u0431\u044b\u043b\u043e \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u043e, \u0447\u0442\u043e \u044d\u0442\u0430 \u0434\u044b\u0440\u043a\u0430, \u0432 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u0441 \u0440\u0430\u043d\u0435\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 CVE-2019-11510, CVE-2020-8243 \u0438 CVE-2020-8260, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0434\u0432\u0443\u043c\u044f \u0430\u043a\u0442\u043e\u0440\u0430\u043c\u0438 \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430  \u043e\u0431\u043e\u0440\u043e\u043d\u043d\u044b\u0435, \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0435 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u0421\u0428\u0410 \u0438 \u0415\u0432\u0440\u043e\u043f\u0435. \u041e\u0434\u0438\u043d \u0438\u0437 \u043d\u0438\u0445 \u0441 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u0434\u043e\u043b\u0435\u0439 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u0438 \u0431\u044b\u043b \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0440\u043e\u0432\u0430\u043d \u043a\u0430\u043a \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0430\u044f APT 5 aka Keyhole Panda, \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 VPN \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 Fortinet \u0438 Pulse Secure \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a.\n\n\u0415\u0441\u043b\u0438 \u0432\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0435 Pulse Secure VPN - \u0441\u0430\u043c\u043e\u0435 \u0432\u0440\u0435\u043c\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f.", "creation_timestamp": "2021-05-04T18:23:00.000000Z"}, {"uuid": "c5e08974-483d-40c3-ab3b-c1493912987d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/true_secator/1786", "content": "The New York Times \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u0442\u0430\u0442\u044c\u044e, \u0432 \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0441\u043e\u043e\u0431\u0449\u0438\u043b\u0438 \u043e \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0435\u0434\u0448\u0435\u0439 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 \u044d\u0442\u043e \u0433\u043e\u0434\u0430 \u043a\u0438\u0431\u0435\u0440\u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u0439 \u0430\u0442\u0430\u043a\u0435 \u043d\u0430 \u0440\u0435\u0441\u0443\u0440\u0441\u044b \u0413\u043e\u0440\u043e\u0434\u0441\u043a\u043e\u0433\u043e \u0442\u0440\u0430\u043d\u0441\u043f\u043e\u0440\u0442\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u041d\u044c\u044e-\u0419\u043e\u0440\u043a\u0430 (MTA) \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 APT.\n\n\u041f\u043e\u043f\u0430\u0432\u0448\u0438\u0439 \u0432 \u0440\u0443\u043a\u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u0438\u0441\u0442\u043e\u0432 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 MTA \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443\u0435\u0442, \u0447\u0442\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u043e\u0441\u0442\u0430\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u0441\u0435\u0442\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u0438\u0445 \u0434\u043d\u0435\u0439 \u0438 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 3 \u0438\u0437 18 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0445 IT-\u0441\u0438\u0441\u0442\u0435\u043c \u0423\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u0435\u0436\u0434\u0435 \u0447\u0435\u043c  \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u0431\u044b\u043b \u0432\u044b\u044f\u0432\u043b\u0435\u043d. \u041a\u0430\u043a\u0438\u0435-\u043b\u0438\u0431\u043e \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e \u0437\u0430\u044f\u0432\u043b\u0435\u043d\u0438\u044e \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u0435\u0439 MTA \u043d\u0435 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u043b\u0438.\n\n\u0412  \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 \u0430\u043a\u0442\u043e\u0440\u043e\u0432 \u043d\u0430\u0437\u0432\u0430\u043d\u044b \u0434\u0432\u0435 \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 APT, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2021-22893 \u0432 Pulse Secure VPN. \u0418\u043c\u0435\u043d\u043d\u043e \u043e\u0431 \u044d\u0442\u0438\u0445 \u0433\u0440\u0443\u043f\u043f\u0430\u0445 \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 FireEye. \u041e\u0434\u043d\u0430 \u0438\u0437 \u043d\u0438\u0445 \u0441 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u0434\u043e\u043b\u0435\u0439 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0430 \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0430 \u043a\u0430\u043a APT 5 aka Keyhole Panda, \u0440\u0430\u043d\u0435\u0435 \u0443\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0432\u0448\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0438 \u0432 VPN \u0441\u0435\u0440\u0432\u0438\u0441\u0430\u0445 Fortinet \u0438 Pulse Secure \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a.\n\n\u0421\u043c\u044b\u0441\u043b \u043d\u0430\u043f\u0430\u0434\u0435\u043d\u0438\u044f \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0445 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 \u043d\u0430 MTA \u043e\u0441\u0442\u0430\u0435\u0442\u0441\u044f \u043d\u0435\u043f\u043e\u043d\u044f\u0442\u043d\u044b\u043c. \u0412\u0440\u044f\u0434 \u043b\u0438 \u0442\u0440\u0430\u043d\u0441\u043f\u043e\u0440\u0442\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u043a\u0430\u043a\u0443\u044e-\u043b\u0438\u0431\u043e \u0441\u0438\u043b\u044c\u043d\u043e \u0441\u0435\u043a\u0440\u0435\u0442\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0449\u0443\u044e \u0438\u043d\u0442\u0435\u0440\u0435\u0441 \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0438 \u041a\u041d\u0420. \u0425\u043e\u0442\u044f \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0435 \u044d\u043a\u0441\u043f\u0435\u0440\u0434\u044b \u0441\u0440\u0430\u0437\u0443 \u0440\u043e\u0434\u0438\u043b\u0438 \u0432\u0435\u0440\u0441\u0438\u044e \u043e \"\u043a\u043e\u043d\u043a\u0443\u0440\u0435\u043d\u0442\u043d\u043e\u0439 \u0431\u043e\u0440\u044c\u0431\u0435 \u0437\u0430 \u043c\u0438\u0440\u043e\u0432\u043e\u0439 \u0440\u044b\u043d\u043e\u043a \u0436\u0435\u043b\u0435\u0437\u043d\u043e\u0434\u043e\u0440\u043e\u0436\u043d\u044b\u0445 \u0432\u0430\u0433\u043e\u043d\u043e\u0432\". \u0422\u0430\u043a\u043e\u0435 \u0441\u0435\u0431\u0435.\n\n\u0411\u043e\u043b\u0435\u0435 \u043f\u0440\u0430\u0432\u0434\u043e\u043f\u043e\u0434\u043e\u0431\u043d\u043e\u0435 \u043e\u0431\u044a\u044f\u0441\u043d\u0435\u043d\u0438\u0435 \u0433\u043b\u0430\u0441\u0438\u0442, \u0447\u0442\u043e \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u0435 APT \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u043b\u0438 \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0443\u044e \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u0443\u044e \u0441\u0435\u0442\u044c \u0447\u0435\u0440\u0435\u0437 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043e \u043a\u0443\u0447\u0438, \u043d\u043e, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432, \u0447\u0442\u043e \u0442\u0430\u043c \u043d\u0435\u0442\u0438 \u043d\u0438\u0447\u0435\u0433\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0433\u043e, \u043f\u0440\u043e\u0441\u0442\u043e \u043d\u0430 \u043d\u0435\u0435 \u0437\u0430\u0431\u0438\u043b\u0438. \n\n\u0412 \u043b\u044e\u0431\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435, \u0430\u043c\u0435\u0440\u0438\u043a\u0430\u043d\u0441\u043a\u0438\u0435 \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u0442\u0435\u043b\u0438 MTA \u043f\u0440\u0438\u0437\u043d\u0430\u044e\u0442, \u0447\u0442\u043e \u0445\u0430\u043a\u0435\u0440\u044b \u043d\u0435 \u0438\u043c\u0435\u043b\u0438 \u0446\u0435\u043b\u0438 \u0432\u044b\u0432\u0435\u0441\u0442\u0438 \u0438\u0437 \u0441\u0442\u0440\u043e\u044f \u0438\u0437\u043e\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0443\u044e \u0434\u0432\u0438\u0436\u0435\u043d\u0438\u0435\u043c \u0442\u0440\u0430\u043d\u0441\u043f\u043e\u0440\u0442\u0430 \u0432 \u041d\u044c\u044e-\u0419\u043e\u0440\u043a\u0435 \u0438 \u0435\u0433\u043e \u043e\u043a\u0440\u0435\u0441\u0442\u043d\u043e\u0441\u0442\u044f\u0445.", "creation_timestamp": "2021-06-04T15:43:00.000000Z"}, {"uuid": "416f9e6d-0bf0-4190-b925-8d79fa15e757", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/thehackernews/1158", "content": "\ud83d\udd25 WARNING !!!\n\nAPT hackers are exploiting a new UNPATCHED 0-DAY critical authentication bypass vulnerability (CVE-2021-22893) in Pulse Connect Secure Gateway to breach organizations worldwide.\nDetails \u2014 https://thehackernews.com/2021/04/warning-hackers-exploit-unpatched-pulse.html\nTemporary mitigations currently available.", "creation_timestamp": "2021-04-21T06:30:57.000000Z"}, {"uuid": "3f38f57b-f8b6-4048-83eb-34e68f2f1a50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/thehackernews/1190", "content": "A security patch has now been released for the critical vulnerability (CVE-2021-22893) affecting Pulse Secure VPN appliances, which had been made public after it was spotted being used in an active zero-day attack.\n\nDetails: https://thehackernews.com/2021/05/critical-patch-out-for-month-old-pulse.html", "creation_timestamp": "2021-05-04T10:07:59.000000Z"}, {"uuid": "f6aee032-0f63-43b0-97aa-270ecb3a133f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3279", "content": "#Analytics\nTop 10 Most Used Vulnerabilities of the Month (April 1-30)\n\nCVE-2020-13379 - Unauth Full-Read SSRF in Grafana\nhttps://t.me/cybersecuritytechnologies/1515\nCVE-2021-24086 - Win IPv4/6 Stack RCE/DoS Vulns\nhttps://unit42.paloaltonetworks.com/cve-2021-24074-patch-tuesday\nCVE-2021-22893 Pulse SecureVPN RCE\nhttps://t.me/cybersecuritytechnologies/3185\nCVE-2021-28310 - Win32k EoP Vulnerability\nhttps://t.me/cybersecuritytechnologies/3124\nCVE-2021-26411 - IE mshtml UAF\nhttps://t.me/cybersecuritytechnologies/2908\nCVE-2021-22204 - DjVu improper neutralization of user data\nhttps://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800\nCVE-2021-24027 - Remote exploitation of a man-in-the-disk vulnerability in WhatsApp\nhttps://t.me/cybersecuritytechnologies/3126\nCVE-2021-28316 - Windows WLAN AutoConfig Service Security Feature Bypass Vulnerability\nhttps://t.me/cybersecuritytechnologies/3156\nCVE-2021-28480/28482 - MS Exchange Server RCE\nhttps://www.tenable.com/blog/cve-2021-28480-cve-2021-28481-cve-2021-28482-cve-2021-28483-four-critical-microsoft-exchange", "creation_timestamp": "2024-04-30T17:11:44.000000Z"}, {"uuid": "7b684a24-8f56-45eb-b37c-b7feb9cebe41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "exploited", "source": "https://t.me/SecLabNews/10080", "content": "\u041a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0430\u0442\u0430\u043a\u0443\u044e\u0442 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u044b\u0435 \u0441\u0435\u0442\u0438 \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f \u0432 \u0448\u043b\u044e\u0437\u0430\u0445 Pulse Connect Secure (CVE-2021-22893), \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0435\u0449\u0435 \u043d\u0435 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435. \u041a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442\n \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 FireEye, \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0434\u0432\u0435 \u0445\u0430\u043a\u0435\u0440\u0441\u043a\u0438\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u043d\u0430 \u043e\u0431\u043e\u0440\u043e\u043d\u043d\u044b\u0435, \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u0421\u0428\u0410 \u0438 \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0442\u0440\u0430\u043d\u0430\u0445.\n\n \n\nhttps://www.securitylab.ru/news/519141.php", "creation_timestamp": "2021-04-21T10:35:03.000000Z"}, {"uuid": "fc67f180-8145-48c8-8c88-49d283f50312", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://t.me/Russian_OSINT/875", "content": "\u200b\u200b\ud83d\ude94 \u0424\u0411\u0420 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0438 \u0441\u043f\u0438\u0441\u043e\u043a 30 \u0441\u0430\u043c\u044b\u0445 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 2 \u0433\u043e\u0434\u0430\n\nCVE-2021-26855: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26857: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-26858: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-27065: It is a Microsoft Exchange Server Remote Code Execution\nCVE-2021-22893: It is an Improper Authentication vulnerability that is marked as critical\nCVE-2021-22894: It is a buffer overflow vulnerability that enables an attacker to execute arbitrary code\nCVE-2021-22899: It is a command injection vulnerability that enables an attacker to execute remote code\nCVE-2021-22900: It is an Improper Control of Generation of Code vulnerability\nCVE-2021-27101: It is an Improper Neutralization of Special Elements used in an SQL Command\nCVE-2021-27102: It is an Improper Neutralization of Special Elements used in an OS Command\nCVE-2021-27103: It is a Server-Side Request Forgery (SSRF) vulnerability\nCVE-2021-27104: It is an Improper Neutralization of Special Elements used in an OS Command vulnerability\nCVE-2021-21985: It is an Improper Input Validation vulnerability\nCVE-2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory (\u2018Path Traversal\u2019)\nCVE-2020-12812: It is an Improper Authentication vulnerability\nCVE-2019-5591: It is a Missing Authentication for Critical Function vulnerability\nCVE-2019-19781: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2019-11510: It is an Improper Limitation of a Pathname to a Restricted Directory\nCVE 2018-13379: It is an Improper Limitation of a Pathname to a Restricted Directory \nCVE 2020-5902: It is an Inclusion of Functionality from Untrusted Control Sphere and Improper Limitation of a Pathname to a Restricted Directory vulnerability \nCVE 2020-15505: It is an Insufficient Information vulnerability\nCVE-2017-11882: It is a Microsoft Office Memory Corruption vulnerability that enables an attacker to execute arbitrary code.\nCVE-2019-11580: It is an Insufficient Information vulnerability\nCVE-2018-7600: It is an Improper Input Validation vulnerability\nCVE 2019-18935: It is a Deserialization of Untrusted Data vulnerability\nCVE-2019-0604: It is a Microsoft SharePoint Remote Code Execution Vulnerability\nCVE-2020-0787: It is a Windows Background Intelligent Transfer Service Elevation of Privilege vulnerability\nCVE-2020-1472: It is a Netlogon Elevation of Privilege vulnerability \nCVE-2020-15505: It is an Insufficient Information vulnerability\nCVE-2020-0688: It is a Use of Hard-coded Credentials vulnerability", "creation_timestamp": "2021-07-29T17:59:02.000000Z"}, {"uuid": "9af9eaed-cf0d-4aa6-b37c-8b4333fea19f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/3185", "content": "#exploit\nCVE-2021-22893:\nPoC script to exploit Pulse Secure VPNs\nhttps://github.com/ZephrFish/CVE-2021-22893", "creation_timestamp": "2021-04-22T12:21:08.000000Z"}, {"uuid": "6c57d286-d519-468b-aec1-e97bd4430796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/3219", "content": "#Analytics\n10 most exploited vulnerabilities of the week (April 19-25)\nCVE-2021-3156 Heap-Based Buffer Overflow in Sudo\nhttps://t.me/cybersecuritytechnologies/2577\nCVE-2021-1732 Win kernel 0-day\nhttps://t.me/cybersecuritytechnologies/2679\nCVE-2021-22893 Pulse SecureVPN RCE\nhttps://t.me/cybersecuritytechnologies/3185\nCVE-2021-22204 Improper neutralization of user data in DjVu\nhttps://github.com/exiftool/exiftool/commit/cf0f4e7dcd024ca99615bfd1102a841a25dde031#diff-fa0d652d10dbcd246e6b1df16c1e992931d3bb717a7e36157596b76bdadb3800\nCVE-2021-26415 Win Installer EoP\nhttps://t.me/cybersecuritytechnologies/3186\nCVE-2021-3493 OverlayFS PE\nhttps://t.me/cybersecuritytechnologies/3164\nCVE-2021-26413 Win Installer Spoofing\nhttps://t.me/cybersecuritytechnologies/3176\nCVE-2016-7836 SKYSEA Client View Arbitrary Code Exec\nhttps://www.virusbulletin.com/virusbulletin/2020/05/vb2019-paper-apt-cases-exploiting-vulnerabilities-regionspecific-software\nCVE-2021-27905 Apache Solr SSRF\nhttps://t.me/cybersecuritytechnologies/3213", "creation_timestamp": "2021-04-26T11:02:21.000000Z"}, {"uuid": "527a9433-284e-48a6-b009-0d40ae49ccdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/cyber0iq/18", "content": "Latest Vulnerabilities and Exploits\n\nCVE-2021-3449 OpenSSL denial-of-service exploit\nhttps://github.com/terorie/cve-2021-3449\n\nProxyToken\nhttps://github.com/bhdresh/CVE-2021-33766-ProxyToken\n\nCVES Xstream-1.4.17\nhttps://github.com/zwjjustdoit/Xstream-1.4.17\n\nCVE-2021-36934/HiveNightmare/SeriousSAM\nhttps://github.com/cube0x0/CVE-2021-36934\n\nHow to exploit a vulnerable windows driver Exploit for AsrDrv104 sys\nhttps://github.com/stong/CVE-2020-15368\n\nCVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel\nhttps://github.com/0vercl0k/CVE-2021-32537\n\nCVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch sys\nhttps://github.com/0vercl0k/CVE-2021-28476\n\nCVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit\nhttps://github.com/klezVirus/CVE-2021-40444\n\nExploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack\nhttps://github.com/lhashashinl/CVE-2021-37152\n\nProof on Concept Exploit for CVE-2021-38647 (OMIGOD)\nhttps://github.com/horizon3ai/CVE-2021-38647\n\nProof of Concept Exploit for vCenter CVE-2021-21972\nhttps://github.com/horizon3ai/CVE-2021-21972\n\nProof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893\nhttps://github.com/ZephrFish/CVE-2021-22893\n\nCVE-2021-33766 (ProxyToken)\nhttps://github.com/demossl/CVE-2021-33766-ProxyToken\n\nCVE-2021-2456\nhttps://github.com/peterjson31337/CVE-2021-2456\n\nCVE-2021-38647 POC for RCE\nhttps://github.com/midoxnet/CVE-2021-38647\n\nCVE-2021-26084 (PoC) | Confluence Server Webwork OGNL injection\nhttps://github.com/alt3kx/CVE-2021-26084_PoC\nhttps://github.com/r0ckysec/CVE-2021-26084_Confluence\nhttps://github.com/march0s1as/CVE-2021-26084\n\n\nCVE-2021-21551 Dell Driver EoP\nhttps://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551\n\nA basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)\nhttps://github.com/lntrx/CVE-2021-28663\n\nCVE-2021-40353 openSIS 8.0 SQL Injection\nhttps://github.com/5qu1n7/CVE-2021-40353\n\nCVE-2021-28476 Ubuntu 20.04\nhttps://github.com/sh4m2hwz/CVE-2021-28476-tools-env\n\nmy exp for chrome V8 CVE-2021-30551\nhttps://github.com/xmzyshypnc/CVE-2021-30551\n\nPOC of CVE-2021-2394\nhttps://github.com/lz2y/CVE-2021-2394\n\nWordPress Backup Guard Authenticated Remote Code Execution Exploit\nhttps://github.com/0dayNinja/CVE-2021-24155.rb\n\nExploit code for CVE-2021-33909,Just a dump of removed\nhttps://github.com/bbinfosec43/CVE-2021-33909", "creation_timestamp": "2021-09-25T02:14:31.000000Z"}, {"uuid": "6c410cf4-773f-40ab-a71c-afb8e09dd9a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22893", "type": "published-proof-of-concept", "source": "https://t.me/cyber0iq/19", "content": "Latest Vulnerabilities and Exploits\n\nCVE-2021-3449 OpenSSL denial-of-service exploit\nhttps://github.com/terorie/cve-2021-3449\n\nProxyToken\nhttps://github.com/bhdresh/CVE-2021-33766-ProxyToken\n\nCVES Xstream-1.4.17\nhttps://github.com/zwjjustdoit/Xstream-1.4.17\n\nCVE-2021-36934/HiveNightmare/SeriousSAM\nhttps://github.com/cube0x0/CVE-2021-36934\n\nHow to exploit a vulnerable windows driver Exploit for AsrDrv104 sys\nhttps://github.com/stong/CVE-2020-15368\n\nCVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel\nhttps://github.com/0vercl0k/CVE-2021-32537\n\nCVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch sys\nhttps://github.com/0vercl0k/CVE-2021-28476\n\nCVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit\nhttps://github.com/klezVirus/CVE-2021-40444\n\nExploit Accsess network clients by sending packets in wirless TP-LINK and preparing for a mitm attack\nhttps://github.com/lhashashinl/CVE-2021-37152\n\nProof on Concept Exploit for CVE-2021-38647 (OMIGOD)\nhttps://github.com/horizon3ai/CVE-2021-38647\n\nProof of Concept Exploit for vCenter CVE-2021-21972\nhttps://github.com/horizon3ai/CVE-2021-21972\n\nProof-of-Concept (PoC) script to exploit Pulse Secure CVE-2021-22893\nhttps://github.com/ZephrFish/CVE-2021-22893\n\nCVE-2021-33766 (ProxyToken)\nhttps://github.com/demossl/CVE-2021-33766-ProxyToken\n\nCVE-2021-2456\nhttps://github.com/peterjson31337/CVE-2021-2456\n\nCVE-2021-38647 POC for RCE\nhttps://github.com/midoxnet/CVE-2021-38647\n\nCVE-2021-26084 (PoC) | Confluence Server Webwork OGNL injection\nhttps://github.com/alt3kx/CVE-2021-26084_PoC\nhttps://github.com/r0ckysec/CVE-2021-26084_Confluence\nhttps://github.com/march0s1as/CVE-2021-26084\n\n\nCVE-2021-21551 Dell Driver EoP\nhttps://github.com/ihack4falafel/Dell-Driver-EoP-CVE-2021-21551\n\nA basic PoC leak for CVE-2021-28663 (Internal of the Android kernel backdoor vulnerability)\nhttps://github.com/lntrx/CVE-2021-28663\n\nCVE-2021-40353 openSIS 8.0 SQL Injection\nhttps://github.com/5qu1n7/CVE-2021-40353\n\nCVE-2021-28476 Ubuntu 20.04\nhttps://github.com/sh4m2hwz/CVE-2021-28476-tools-env\n\nmy exp for chrome V8 CVE-2021-30551\nhttps://github.com/xmzyshypnc/CVE-2021-30551\n\nPOC of CVE-2021-2394\nhttps://github.com/lz2y/CVE-2021-2394\n\nWordPress Backup Guard Authenticated Remote Code Execution Exploit\nhttps://github.com/0dayNinja/CVE-2021-24155.rb\n\nExploit code for CVE-2021-33909,Just a dump of removed\nhttps://github.com/bbinfosec43/CVE-2021-33909", "creation_timestamp": "2021-09-25T02:15:23.000000Z"}]}