{"vulnerability": "CVE-2023-2448", "sightings": [{"uuid": "fe30730e-f67a-446b-bcd4-87f573da9b8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-08-16T18:10:02.000000Z"}, {"uuid": "684a3584-dae8-4df5-b460-7b979c83e058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971868", "content": "", "creation_timestamp": "2024-12-24T20:35:01.612271Z"}, {"uuid": "ec3e5de4-e566-4b8b-b51d-7508c04b9834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-23)", "content": "", "creation_timestamp": "2024-12-23T00:00:00.000000Z"}, {"uuid": "d89a0e93-ad8f-4dd4-9bed-6e4421a7a5c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-20)", "content": "", "creation_timestamp": "2025-01-20T00:00:00.000000Z"}, {"uuid": "213e094f-7fbf-4a7c-9f3d-68a71a488b6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-01)", "content": "", "creation_timestamp": "2025-01-01T00:00:00.000000Z"}, {"uuid": "daf7ecb0-56cb-4cfd-84e9-e540ffd4baf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-30)", "content": "", "creation_timestamp": "2024-12-30T00:00:00.000000Z"}, {"uuid": "dd6d71de-405e-45ec-81cd-77ad82e7e6a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-02)", "content": "", "creation_timestamp": "2025-01-02T00:00:00.000000Z"}, {"uuid": "888d049b-b534-40c8-a475-0bcef6b1a98c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-06)", "content": "", "creation_timestamp": "2025-01-06T00:00:00.000000Z"}, {"uuid": "422fabdc-0246-4a84-949c-881732e31e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-01-13)", "content": "", "creation_timestamp": "2025-01-13T00:00:00.000000Z"}, {"uuid": "9e4b7e78-1b1b-4f7e-bcd8-faab1a4f4f6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-02)", "content": "", "creation_timestamp": "2025-02-02T00:00:00.000000Z"}, {"uuid": "b0185c76-70a7-46e6-90c4-ed4c5a3cd6be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-24)", "content": "", "creation_timestamp": "2024-10-24T00:00:00.000000Z"}, {"uuid": "daadbcd5-675e-4d21-808a-0cc211f20df5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-10-28)", "content": "", "creation_timestamp": "2024-10-28T00:00:00.000000Z"}, {"uuid": "5bf00bea-6397-45b6-a6df-020587ece526", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-07)", "content": "", "creation_timestamp": "2024-11-07T00:00:00.000000Z"}, {"uuid": "28f4ddac-45ef-42c4-8132-91a589fab401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-04)", "content": "", "creation_timestamp": "2024-11-04T00:00:00.000000Z"}, {"uuid": "a9e4a83e-2c5b-4731-b393-dbfcfaaad3d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-11)", "content": "", "creation_timestamp": "2024-11-11T00:00:00.000000Z"}, {"uuid": "7bb7d988-ad1c-4e4a-9e23-62e1cfa1bcf0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-25)", "content": "", "creation_timestamp": "2024-11-25T00:00:00.000000Z"}, {"uuid": "79a1d079-5b6f-4ff0-b81b-d7faa07626a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-05)", "content": "", "creation_timestamp": "2025-02-05T00:00:00.000000Z"}, {"uuid": "6982c329-0a41-40fc-a165-5bfb8544eb7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-11-18)", "content": "", "creation_timestamp": "2024-11-18T00:00:00.000000Z"}, {"uuid": "94b27022-a893-442b-a7d9-d0edcddad22b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-04)", "content": "", "creation_timestamp": "2024-12-04T00:00:00.000000Z"}, {"uuid": "081cb0f9-8f21-4edc-b32a-1da439c453a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-02)", "content": "", "creation_timestamp": "2024-12-02T00:00:00.000000Z"}, {"uuid": "48b107bc-f0a6-4408-a615-6bb59731d545", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-09)", "content": "", "creation_timestamp": "2024-12-09T00:00:00.000000Z"}, {"uuid": "21f40332-74ad-4c4b-ac55-11e82654fa3e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-16)", "content": "", "creation_timestamp": "2024-12-16T00:00:00.000000Z"}, {"uuid": "f3ce094e-6bef-4e64-a032-b60c7b2de509", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-03)", "content": "", "creation_timestamp": "2025-02-03T00:00:00.000000Z"}, {"uuid": "7b07d413-4ded-4b4f-aa8e-8a16c6c343f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "70735b39-bdbf-4f1e-8e5b-6232c7956366", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-03)", "content": "", "creation_timestamp": "2025-03-03T00:00:00.000000Z"}, {"uuid": "aae4b875-29af-4fb5-b45b-e3a5c0ed486d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "c502a677-322a-4e9c-bc6a-ddb0594be669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "cde42479-628d-4c59-94f3-8b4ddcc1f865", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "c4d6b473-cf52-41fa-8fbe-ea9a941920be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-10)", "content": "", "creation_timestamp": "2025-03-10T00:00:00.000000Z"}, {"uuid": "9ce74ec7-4d5f-45c3-83f9-a7619ffeaeaf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-24)", "content": "", "creation_timestamp": "2025-03-24T00:00:00.000000Z"}, {"uuid": "d981bfc7-9977-408a-97c2-467e70ddbcce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "b42609cf-b554-48dc-935a-11185113ca3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-11)", "content": "", "creation_timestamp": "2025-03-11T00:00:00.000000Z"}, {"uuid": "e1ae758b-7188-415f-8fa6-9ab322084e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:45.000000Z"}, {"uuid": "ce172325-b432-4970-8bff-7f30c1f64e1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-17)", "content": "", "creation_timestamp": "2025-03-17T00:00:00.000000Z"}, {"uuid": "b81e84ed-40cb-4063-aa56-9f24cc077fed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-15)", "content": "", "creation_timestamp": "2025-03-15T00:00:00.000000Z"}, {"uuid": "b0ae2916-3ed1-4e30-8537-92ed11679a9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-11)", "content": "", "creation_timestamp": "2025-07-11T00:00:00.000000Z"}, {"uuid": "18c21e46-c07f-43e3-aef3-30fa39899f02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-14)", "content": "", "creation_timestamp": "2025-07-14T00:00:00.000000Z"}, {"uuid": "17161079-cea7-4b2d-84b0-a2f800114788", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-07)", "content": "", "creation_timestamp": "2025-04-07T00:00:00.000000Z"}, {"uuid": "df302f87-dc7b-4c65-a74c-092a72cbf17e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-24)", "content": "", "creation_timestamp": "2025-06-24T00:00:00.000000Z"}, {"uuid": "7e4c07d1-2e35-417a-a9f6-43e82610d7d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-14)", "content": "", "creation_timestamp": "2025-04-14T00:00:00.000000Z"}, {"uuid": "216ece3e-6172-450e-943c-336bb3708bae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-16)", "content": "", "creation_timestamp": "2025-06-16T00:00:00.000000Z"}, {"uuid": "c4fc1eb7-5f76-4ad3-8fd8-f9739333e6dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-22)", "content": "", "creation_timestamp": "2025-04-22T00:00:00.000000Z"}, {"uuid": "2c899ab9-1288-452c-bc23-12e6affaa03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-10)", "content": "", "creation_timestamp": "2025-07-10T00:00:00.000000Z"}, {"uuid": "18e44001-3f8f-4506-99b7-48314ac84c3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-19)", "content": "", "creation_timestamp": "2025-05-19T00:00:00.000000Z"}, {"uuid": "5194c303-bdea-44b8-bf9a-8562e2f81ce0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-30)", "content": "", "creation_timestamp": "2025-06-30T00:00:00.000000Z"}, {"uuid": "5cfa1f5c-b190-4c13-ba8f-46e19fc21d94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-28)", "content": "", "creation_timestamp": "2025-04-28T00:00:00.000000Z"}, {"uuid": "96ecce96-bb4e-4992-b04c-f3b10236af6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-02)", "content": "", "creation_timestamp": "2025-06-02T00:00:00.000000Z"}, {"uuid": "fc103864-bb50-48b9-8abb-ba3a85dfccb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-29)", "content": "", "creation_timestamp": "2025-04-29T00:00:00.000000Z"}, {"uuid": "a58e4af5-ac39-4395-b7ed-8a8fcd1cd964", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-23)", "content": "", "creation_timestamp": "2025-06-23T00:00:00.000000Z"}, {"uuid": "c931a858-5dda-4f24-b057-25d363a1ebab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-05)", "content": "", "creation_timestamp": "2025-05-05T00:00:00.000000Z"}, {"uuid": "f0ea008c-35ea-4d00-9033-f812b177c8c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "35f3e039-571d-4769-847d-1023235f4120", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-27)", "content": "", "creation_timestamp": "2025-05-27T00:00:00.000000Z"}, {"uuid": "95746248-ef2b-43f8-88c3-8e48d7470cd7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-12)", "content": "", "creation_timestamp": "2025-05-12T00:00:00.000000Z"}, {"uuid": "1303dbd5-1949-4d02-be42-e30fae8cf1ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-09)", "content": "", "creation_timestamp": "2025-06-09T00:00:00.000000Z"}, {"uuid": "4b606704-9e63-4e4a-9112-191945e712dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "60af4225-eb13-4c6a-9f7b-dfcfe6120497", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-21)", "content": "", "creation_timestamp": "2025-07-21T00:00:00.000000Z"}, {"uuid": "87361b2a-1f9e-4721-aad4-4eec2326ca8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-27)", "content": "", "creation_timestamp": "2025-10-27T00:00:00.000000Z"}, {"uuid": "62d55a81-965d-4d75-b70a-935632334b2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "c69ee15f-ffc5-4278-be01-52babee7d4aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-13)", "content": "", "creation_timestamp": "2025-10-13T00:00:00.000000Z"}, {"uuid": "56b8d28d-82a7-4659-a6f0-ba9d5c6b4011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-28)", "content": "", "creation_timestamp": "2025-07-28T00:00:00.000000Z"}, {"uuid": "f723ce18-5b17-43e3-88f5-3ef04f7b98be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-06)", "content": "", "creation_timestamp": "2025-10-06T00:00:00.000000Z"}, {"uuid": "533e12e9-367d-410d-80e1-a57b091e9ba4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-04)", "content": "", "creation_timestamp": "2025-08-04T00:00:00.000000Z"}, {"uuid": "0169b076-40f7-4446-9981-7f1169488fc4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-05)", "content": "", "creation_timestamp": "2025-08-05T00:00:00.000000Z"}, {"uuid": "0db8208a-959f-458a-81eb-68da4afdec4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "fce1de54-86f1-4ba2-94bb-ab682011cdcd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-01)", "content": "", "creation_timestamp": "2025-12-01T00:00:00.000000Z"}, {"uuid": "5ae47afc-78d2-4f15-9eee-fac8d1377c96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "e723ac00-e9d6-459a-be41-1618fb1eb23d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-10)", "content": "", "creation_timestamp": "2025-11-10T00:00:00.000000Z"}, {"uuid": "bcd405e7-acc0-4bd0-93c6-e6e5e1819645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-20)", "content": "", "creation_timestamp": "2025-10-20T00:00:00.000000Z"}, {"uuid": "749f28a6-4dc3-4c29-8de4-b8054154f058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-18)", "content": "", "creation_timestamp": "2025-08-18T00:00:00.000000Z"}, {"uuid": "3bd20706-91bf-45ed-a701-fbf254643853", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}, {"uuid": "5262c91f-03e7-4ae6-8307-aa48c8ee118d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "1938a927-11e3-4025-b27d-806bf7ca612c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "6c2b2639-5f18-4f15-bc7c-98df30c3e673", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "eecf15ab-f7d9-445f-ae0f-7445a6f28753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-27)", "content": "", "creation_timestamp": "2025-11-27T00:00:00.000000Z"}, {"uuid": "e4d78a54-94c0-4076-90c0-26806641f645", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "fed0e11d-c4de-4c5e-a698-53f959e073ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "ab16a20b-2db3-4717-aa9c-9a49d500009f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-25)", "content": "", "creation_timestamp": "2025-08-25T00:00:00.000000Z"}, {"uuid": "312d0309-995a-4196-aecd-ce5130c68c66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:01.000000Z"}, {"uuid": "4a98f19c-baf4-43f7-bfca-12e770a880a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-01)", "content": "", "creation_timestamp": "2025-09-01T00:00:00.000000Z"}, {"uuid": "db04af83-fb22-4fb4-abe3-3bd9feecb048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-12)", "content": "", "creation_timestamp": "2026-02-12T00:00:00.000000Z"}, {"uuid": "b315b259-3df9-4d23-81cf-909eeb97a87a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-25)", "content": "", "creation_timestamp": "2026-02-25T00:00:00.000000Z"}, {"uuid": "9e972e27-c74e-47bb-b97b-f3716c0ad1c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-04)", "content": "", "creation_timestamp": "2026-03-04T00:00:00.000000Z"}, {"uuid": "a93b93e1-a1fb-4c67-93db-0d5fa99b752d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-08)", "content": "", "creation_timestamp": "2025-12-08T00:00:00.000000Z"}, {"uuid": "49582e16-368f-4ace-b068-74debacf2b05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "a0a9b2c4-be75-43e4-ab1d-566c0899b208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "d07397be-ac34-4b1b-aea9-73fede58d82b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-13)", "content": "", "creation_timestamp": "2025-12-13T00:00:00.000000Z"}, {"uuid": "989a58dc-1ea2-4788-b0ae-7412d3cdd533", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-15)", "content": "", "creation_timestamp": "2025-12-15T00:00:00.000000Z"}, {"uuid": "a108b0fe-6431-4331-b48a-0906b6d9b761", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-05)", "content": "", "creation_timestamp": "2026-02-05T00:00:00.000000Z"}, {"uuid": "e9b06956-5f1a-4a41-8366-9e5e16457ee9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "8e4efbac-786e-4e2e-bb39-709189dab16e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "6f91f097-1f9e-4666-b608-98c4c720a1fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-18)", "content": "", "creation_timestamp": "2026-02-18T00:00:00.000000Z"}, {"uuid": "95d7b01b-e84e-4281-b6fc-73945f496b1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-04)", "content": "", "creation_timestamp": "2026-02-04T00:00:00.000000Z"}, {"uuid": "473369b9-9973-47a2-97a1-5838aa9f3bdb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-11)", "content": "", "creation_timestamp": "2026-02-11T00:00:00.000000Z"}, {"uuid": "bb7bebea-b340-4a01-b1dc-e66052409c6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-26)", "content": "", "creation_timestamp": "2026-02-26T00:00:00.000000Z"}, {"uuid": "5491a337-a0db-4234-9605-a42b23a549f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-27)", "content": "", "creation_timestamp": "2025-12-27T00:00:00.000000Z"}, {"uuid": "96eb8264-7355-4874-a33c-5c3f6e285e7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-28)", "content": "", "creation_timestamp": "2026-01-28T00:00:00.000000Z"}, {"uuid": "8714f35a-9c54-474b-85cc-ac1d8ded1967", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-05)", "content": "", "creation_timestamp": "2026-03-05T00:00:00.000000Z"}, {"uuid": "5bcf9d31-3727-4ee5-aa31-6463ad83bf4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-03)", "content": "", "creation_timestamp": "2026-01-03T00:00:00.000000Z"}, {"uuid": "cefb0197-704b-4569-a6f2-f147eead2a58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-19)", "content": "", "creation_timestamp": "2026-02-19T00:00:00.000000Z"}, {"uuid": "0500ecf8-3e88-4203-a26b-66dee2b75240", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-04)", "content": "", "creation_timestamp": "2026-01-04T00:00:00.000000Z"}, {"uuid": "1844b74a-77b2-4eec-a1de-1f4fb3a39584", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-07)", "content": "", "creation_timestamp": "2026-01-07T00:00:00.000000Z"}, {"uuid": "5bfce944-c6e7-4a8d-913c-4535493f88a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-08)", "content": "", "creation_timestamp": "2026-01-08T00:00:00.000000Z"}, {"uuid": "81873bea-989a-41bb-9f86-44d9a06a31c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-25)", "content": "", "creation_timestamp": "2026-03-25T00:00:00.000000Z"}, {"uuid": "0e980108-ae0a-4fed-a4ea-114b3ed5e143", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-19)", "content": "", "creation_timestamp": "2026-03-19T00:00:00.000000Z"}, {"uuid": "f074d930-eca6-47d9-a389-6627b20db77b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-10)", "content": "", "creation_timestamp": "2026-01-10T00:00:00.000000Z"}, {"uuid": "c92c9e56-dc9d-46f0-b199-62ce5cc6bca3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-26)", "content": "", "creation_timestamp": "2026-03-26T00:00:00.000000Z"}, {"uuid": "efd11156-5a47-4600-8b03-26985588180c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-13)", "content": "", "creation_timestamp": "2026-01-13T00:00:00.000000Z"}, {"uuid": "f09532b0-937b-4082-8d0b-8bf214c39d1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-14)", "content": "", "creation_timestamp": "2026-01-14T00:00:00.000000Z"}, {"uuid": "24051835-2d07-4656-8cc3-bdcb321addc3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-15)", "content": "", "creation_timestamp": "2026-01-15T00:00:00.000000Z"}, {"uuid": "b5df797d-87e8-41fb-801e-c7c537c51316", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-27)", "content": "", "creation_timestamp": "2026-03-27T00:00:00.000000Z"}, {"uuid": "ab1b6f20-8ec6-4d76-8d3e-d8eb99d4a456", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-21)", "content": "", "creation_timestamp": "2026-01-21T00:00:00.000000Z"}, {"uuid": "9988b91c-b6d4-4ab1-9eba-21efda859d3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "ce7be608-7e25-4eab-9dc4-a99f40597b98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-22)", "content": "", "creation_timestamp": "2026-01-22T00:00:00.000000Z"}, {"uuid": "b587eac2-1823-4e04-84ac-2b0fe0457dcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/d8e54719-9148-4307-85c1-d6a9c928e79c", "content": "", "creation_timestamp": "2026-02-02T12:26:53.729788Z"}, {"uuid": "7ea8cdfa-b6b5-414b-95d3-451928173d02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-01)", "content": "", "creation_timestamp": "2026-04-01T00:00:00.000000Z"}, {"uuid": "ccd9a009-9ebb-43dc-a450-9af7ee04423a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-02)", "content": "", "creation_timestamp": "2026-04-02T00:00:00.000000Z"}, {"uuid": "4eb871a2-ff8f-4b72-ab11-21afe159fd83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-08)", "content": "", "creation_timestamp": "2026-04-08T00:00:00.000000Z"}, {"uuid": "ba45bf56-0b5f-4caf-a90b-371964037ac2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-09)", "content": "", "creation_timestamp": "2026-04-09T00:00:00.000000Z"}, {"uuid": "bfbc5cda-ccfc-4ecb-98ea-74a25e4a582e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24482", "type": "seen", "source": "https://t.me/kasperskyb2b/464", "content": "\u0414\u0430\u0439\u0434\u0436\u0435\u0441\u0442 \u043d\u043e\u0432\u043e\u0441\u0442\u0435\u0439 \u043f\u0430\u0442\u0447\u0435\u0439  \ud83e\ude79\ud83e\ude79\ud83e\ude79\u0437\u0430 \u044d\u0442\u0443 \u043d\u0435\u0434\u0435\u043b\u044e:\n\n\u0422\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e, \u00ab\u043d\u0430 \u0445\u0432\u043e\u0441\u0442\u00bb Microsoft \u0441 \u0435\u0451 \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u0435\u0439 Patch Tuesday \u00ab\u0443\u043f\u0430\u043b\u0438\u00bb \u043c\u043d\u043e\u0433\u0438\u0435 \u043a\u0440\u0443\u043f\u043d\u044b\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0418\u0411 \u043c\u043e\u0436\u043d\u043e \u043f\u043e\u0441\u0432\u044f\u0442\u0438\u0442\u044c \u043f\u0430\u0442\u0447\u0430\u043c \u043f\u043e\u0447\u0442\u0438 \u0446\u0435\u043b\u0438\u043a\u043e\u043c:\n\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows, Office \u0438 \u043f\u0440\u043e\u0447\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Microsoft \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0442 \u043f\u043e\u0447\u0442\u0438 80 \u0437\u0430\u043f\u043b\u0430\u0442\u043e\u043a, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0444\u0438\u043a\u0441\u044b \u0434\u043b\u044f  3 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0438 9 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\nAdobe \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 9 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043e\u0441\u043e\u0431\u043e\u0433\u043e \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f \u0441\u0442\u043e\u0438\u0442  \u043f\u0430\u0447\u043a\u0430 RCE \u0432 Photoshop (CVE-2023-21574 .. 21578)\n\nApple \u0441\u0440\u043e\u0447\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 iOS \u0438 macOS  \n\nCisco \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u0441\u0440\u043e\u0447\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043a \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u043c\u0443 opensource \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u043c\u0443 \u043c\u043e\u0434\u0443\u043b\u044e  ClamAV, \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430  \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043f\u0430\u0440\u0441\u0435\u0440\u0435 HFS+ (CVE-2023-20032, CVSS 9.8).\n\nIntel \u0438\u0437\u043e \u0432\u0441\u0435\u0445 \u0441\u0438\u043b \u0440\u0430\u0437\u0432\u043b\u0435\u043a\u0430\u043b\u0430 \u0430\u0434\u043c\u0438\u043d\u043e\u0432, \u043f\u043e\u0442\u043e\u043c\u0443 \u0447\u0442\u043e \u0434\u043b\u044f \u043d\u0430\u0447\u0430\u043b\u0430 \u043d\u0430\u0434\u043e \u043f\u0440\u043e\u0441\u0442\u043e \u043f\u0440\u043e\u0447\u0438\u0442\u0430\u0442\u044c 31 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044c \u0438 \u0432\u043d\u0438\u043a\u043d\u0443\u0442\u044c \u0432 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0434\u0435\u0444\u0435\u043a\u0442\u044b, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0435 \u0432 \u043a\u0430\u0436\u0434\u043e\u043c. \u041d\u0430 \u0434\u043e\u043b\u044e Software Guard Extensions (SGX) \u043f\u0440\u0438\u0445\u043e\u0434\u0438\u0442\u0441\u044f 5 CVE.\n\u0410 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0441\u0430\u043c\u044b\u0445 \u043d\u0435\u043f\u0440\u0438\u044f\u0442\u043d\u044b\u0445 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f CVE-2021-39296  \u0441 CVSS 10.0 \u0432 \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0435 IPMI lan+. \u0421\u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u043c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f IMPI \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0430\u0442 \u0435\u043c\u0443 \u0434\u043e\u0441\u0442\u0443\u043f \u043a BMC \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u0431\u0435\u0437 \u0432\u0441\u044f\u043a\u043e\u0439 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438.\n \u041a\u0430\u043a \u043e\u0431\u044b\u0447\u043d\u043e \u0443 Intel, \u043a\u0440\u043e\u043c\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u0440\u0430\u0439\u0432\u0435\u0440\u043e\u0432 \u0438 \u0441\u043e\u0444\u0442\u0430, \u043d\u0443\u0436\u043d\u044b \u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043c\u0438\u043a\u0440\u043e\u043a\u043e\u0434\u0430 \u0447\u0438\u043f\u043e\u0432. \n\nSchneider \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u00ab\u0432\u0441\u0435\u0433\u043e\u00bb 10 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439, \u043e\u0442\u043d\u043e\u0441\u044f\u0449\u0438\u0445\u0441\u044f \u043a \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u043c EcoStruxture, StruxtureWave, Merten KNX \u0438 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u043c \u0434\u0440\u0443\u0433\u0438\u043c.  \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 StruxtureWave Data Center Expert (CVE-2023-25547..25555, CVSS \u043e\u0442 5.6 \u0434\u043e 8.8) \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438 \u0438 \u0432\u0430\u043b\u0438\u0434\u0430\u0446\u0438\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u0438\u0441\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043d\u0435\u0448\u0442\u0430\u0442\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f. \n\nSiemens \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 22 \u043c\u0430\u0441\u0441\u0438\u0432\u043d\u044b\u0445 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u044f \u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0431\u043e\u043b\u0435\u0435 80 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445  \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445.\n\u041e\u0442\u043c\u0435\u0442\u0438\u043c  \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0432\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u0441\u043e\u0444\u0442\u0435 COMOS, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438/\u0438\u043b\u0438 \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438  (CVE-2023-24482, CVSS 10.0).\n\u0421\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0445 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043c\u0435\u0440 \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043b\u043e\u0445\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u0437\u0430\u043a\u0440\u044b\u0442\u043e\u0433\u043e (\u043f\u0440\u0438\u0432\u0430\u0442\u043d\u043e\u0433\u043e) \u043a\u043b\u044e\u0447\u0430 \u0432 SINUMERIK ONE an\u0438  SINUMERIK MC  (CVSS 9.3).\n\u0426\u0435\u043b\u044b\u0439 \u0431\u0443\u043a\u0435\u0442 \u0444\u0438\u043a\u0441\u043e\u0432 \u0432 Brownfield Connectivity \u043e\u0431\u0443\u0441\u043b\u043e\u0432\u043b\u0435\u043d \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f\u043c\u0438 \u0432 \u043d\u0430\u0445\u043e\u0434\u044f\u0449\u0435\u0439\u0441\u044f \u00ab\u043f\u043e\u0434 \u043a\u0430\u043f\u043e\u0442\u043e\u043c\u00bb \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0435  OpenSSL", "creation_timestamp": "2023-02-19T09:01:50.000000Z"}, {"uuid": "5aa5af9c-cd84-4a1f-bb28-f43c67cad958", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-15)", "content": "", "creation_timestamp": "2026-04-15T00:00:00.000000Z"}, {"uuid": "e86ae87a-ab4f-41ef-beca-b8e9c4a59d72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-16)", "content": "", "creation_timestamp": "2026-04-16T00:00:00.000000Z"}, {"uuid": "0fcb9854-daf4-4834-b74a-bd2cc3a3ed57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-22)", "content": "", "creation_timestamp": "2026-04-22T00:00:00.000000Z"}, {"uuid": "9ebe8461-a0e8-4e88-88b9-950542eb1c51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-23)", "content": "", "creation_timestamp": "2026-04-23T00:00:00.000000Z"}, {"uuid": "9d603f76-2b80-41d7-a1f6-f7f0f6db3d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "seen", "source": "https://t.me/GithubRedTeam/4699", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDetect CVE-2023-24488 Exploitation Attempts\nURL\uff1ahttps://github.com/NSTCyber/CVE-2023-24488-SIEM-Sigma-Rule\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-06T16:54:49.000000Z"}, {"uuid": "b19f486b-6154-45c1-b35e-d2f647fd5e19", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4660", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-24488 PoC\nURL\uff1ahttps://github.com/SirBugs/CVE-2023-24488-PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-01T19:39:26.000000Z"}, {"uuid": "3936538d-fbf5-4241-8e5f-3c8bc32b01ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4685", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPOC for CVE-2023-24488\nURL\uff1ahttps://github.com/securitycipher/CVE-2023-24488\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-04T18:07:42.000000Z"}, {"uuid": "00671f85-2188-41f6-bfe0-b467f4e27a8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4676", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-24488.rb The provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.\nURL\uff1ahttps://github.com/Abo5/CVE-2023-24488\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-04T00:35:34.000000Z"}, {"uuid": "5a1a69c7-7e3a-42f0-a3d5-2492515ea60a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4698", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDetect CVE-2023-24488 Exploitation Attempts\nURL\uff1ahttps://github.com/NSTCyber/CVE-2023-24488\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-06T16:36:19.000000Z"}, {"uuid": "de07156b-174b-4d7a-8cd0-441ccc816434", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4697", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aDetect CVE-2023-24488 Exploitation Attempts\nURL\uff1ahttps://github.com/atnstassure/CVE-2023-24488\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-06T15:30:01.000000Z"}, {"uuid": "ec169c67-a354-42c5-9cbd-01821003be3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4693", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-24488 By codeb0ss\nURL\uff1ahttps://github.com/codeb0ss/cve-2023-24488\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-06T03:12:55.000000Z"}, {"uuid": "00834cd5-8d12-4a72-883b-b4765f9d35d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/4804", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aCVE-2023-24489 PoC &amp; Exploiter\nURL\uff1ahttps://github.com/codeb0ss/CVE-2023-24489-PoC\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-07-26T03:28:07.000000Z"}, {"uuid": "c7d59aa7-39c7-4a87-8818-0d96b6a07f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/5003", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2023\n\u63cf\u8ff0\uff1aPOC for CVE-2023-24489 with bash. \nURL\uff1ahttps://github.com/whalebone7/CVE-2023-24489-poc\n\n\u6807\u7b7e\uff1a#CVE-2023", "creation_timestamp": "2023-08-27T11:57:38.000000Z"}, {"uuid": "6ed5f06a-95d8-4f63-bc4a-bb6cc2ee7173", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "https://t.me/YAH_Channel/683", "content": "#infodigest\n\n\u0421\u043e\u0431\u0440\u0430\u043b\u0438 \u0434\u043b\u044f \u0432\u0430\u0441 \u0441\u0430\u043c\u044b\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0438\u0437 \u0440\u0430\u0437\u043d\u044b\u0445 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0439.\n\n\ud83e\udeb2 Bugs &amp; Exploits\n1. WordPress \u00abWooCommerce Payments\u00bb plugin CVE-2023-28121\n2. Why ORMs and Prepared Statements Can't (Always) Win\n3. Exploiting XSS in hidden inputs and meta tags\n4. Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)\n5. Exploiting Incorrectly Configured Load Balancer with XSS to Steal Cookies\n6. Chaining our way to Pre-Auth RCE in Metabase (CVE-2023-38646)\n7. Reversing Citrix Gateway for XSS\n8. Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway (Part 1)\n9. Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway (Part 2)\n10. HTML Over the Wire\n\n\ud83d\udee0 Tools\n11. CVSS Advisor (Escalation Techniques)\n12. shortscan\n\n\ud83d\udcd1 Burp extensions &amp; tricks\n13. Improve your API Security Testing with Burp BCheck Scripts\n14. The top 10 community-created BChecks\n\n\ud83d\udcb0 Bug Bounty reports\n15. Bug Writeup: Stored XSS to Account Takeover (ATO) via GraphQL API\n16. Breaking TikTok: Our Journey to Finding an Account Takeover Vulnerability", "creation_timestamp": "2023-08-01T05:27:29.000000Z"}, {"uuid": "04f38544-f65c-4e8e-82ee-ed5aa1e94aab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24482", "type": "seen", "source": "https://t.me/ics_cert/708", "content": "\u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0645\u06a9\u0627\u0646\u06cc\u0633\u0645 \u0628\u0631\u0631\u0633\u06cc \u06a9\u0634 \u0646\u0631\u0645\u200c\u0627\u0641\u0632\u0627\u0631 \u0628\u0631\u0627\u06cc \u0637\u0631\u0627\u062d\u06cc\u060c \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0648 \u0646\u06af\u0647\u062f\u0627\u0631\u06cc \u06a9\u0627\u0631\u062e\u0627\u0646\u0647\u200c\u0647\u0627\u06cc \u0641\u0631\u0622\u06cc\u0646\u062f COMOS \u0628\u0647 \u0639\u0645\u0644\u06a9\u0631\u062f \u0641\u0631\u0627\u062a\u0631 \u0627\u0632 \u0645\u0631\u0632\u0647\u0627\u06cc \u0628\u0627\u0641\u0631 \u062f\u0631 \u062d\u0627\u0641\u0638\u0647 \u0645\u0631\u0628\u0648\u0637 \u0645\u06cc\u200c\u0634\u0648\u062f. \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u0628\u0647 \u0645\u0647\u0627\u062c\u0645 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0627\u062c\u0627\u0632\u0647 \u062f\u0647\u062f \u062a\u0627 \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u062f\n\nBDU: 00756-2023\nCVE-2023-24482\n\n\u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627 \u0631\u0627 \u0627\u0632 \u0645\u0646\u0627\u0628\u0639 \u0642\u0627\u0628\u0644 \u0627\u0639\u062a\u0645\u0627\u062f \u0646\u0635\u0628 \u06a9\u0646\u06cc\u062f.\n\u0628\u0627 \u062a\u0648\u062c\u0647 \u0628\u0647 \u0634\u0631\u0627\u06cc\u0637 \u0641\u0639\u0644\u06cc \u0648 \u062a\u062d\u0631\u06cc\u0645 \u0647\u0627\u06cc \u0627\u0639\u0645\u0627\u0644 \u0634\u062f\u0647\u060c \u0646\u0635\u0628 \u0628\u0647 \u0631\u0648\u0632 \u0631\u0633\u0627\u0646\u06cc \u0647\u0627\u06cc \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u062a\u0646\u0647\u0627 \u067e\u0633 \u0627\u0632 \u0627\u0631\u0632\u06cc\u0627\u0628\u06cc \u062a\u0645\u0627\u0645 \u062e\u0637\u0631\u0627\u062a \u0645\u0631\u062a\u0628\u0637 \u062a\u0648\u0635\u06cc\u0647 \u0645\u06cc \u0634\u0648\u062f.\n\n\u0627\u0642\u062f\u0627\u0645\u0627\u062a \u062c\u0628\u0631\u0627\u0646\u06cc:\n- \u0641\u0639\u0627\u0644 \u06a9\u0631\u062f\u0646 \u0628\u0627\u0632\u0646\u0648\u06cc\u0633\u06cc \u06a9\u0646\u062a\u0631\u0644 \u0633\u0627\u062e\u062a\u0627\u0631 \u06cc\u0627\u0641\u062a\u0647 (SEHOP) \u062f\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0648\u06cc\u0646\u062f\u0648\u0632\u06cc \u06a9\u0647 Comos \u0631\u0648\u06cc \u0622\u0646 \u0646\u0635\u0628 \u0634\u062f\u0647 \u0627\u0633\u062a \u062a\u0627 \u0627\u0632 \u0627\u0645\u06a9\u0627\u0646 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u062c\u0644\u0648\u06af\u06cc\u0631\u06cc \u0634\u0648\u062f.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0641\u0627\u06cc\u0631\u0648\u0627\u0644\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u06cc\u0633\u062a\u0645 \u0647\u0627\u06cc \u062a\u0634\u062e\u06cc\u0635 \u0646\u0641\u0648\u0630 \u0648 \u067e\u06cc\u0634\u06af\u06cc\u0631\u06cc\u061b\n- \u062a\u0642\u0633\u06cc\u0645 \u0628\u0646\u062f\u06cc \u0634\u0628\u06a9\u0647 \u0628\u0631\u0627\u06cc \u0645\u062d\u062f\u0648\u062f \u06a9\u0631\u062f\u0646 \u062f\u0633\u062a\u0631\u0633\u06cc \u0628\u0647 \u0628\u062e\u0634 \u0635\u0646\u0639\u062a\u06cc.\n- \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0627\u0628\u0632\u0627\u0631 \u0634\u062e\u0635 \u062b\u0627\u0644\u062b \u0628\u0631\u0627\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc \u06a9\u0627\u0631\u0628\u0631 (VPN \u0648 \u063a\u06cc\u0631\u0647) \u0628\u0647 \u0645\u062d\u0635\u0648\u0644 \u0646\u0631\u0645 \u0627\u0641\u0632\u0627\u0631\u06cc \u0627\u0632 \u0634\u0628\u06a9\u0647 \u0647\u0627\u06cc \u0639\u0645\u0648\u0645\u06cc (\u0627\u06cc\u0646\u062a\u0631\u0646\u062a).\n\n\u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u062a\u0648\u0635\u06cc\u0647 \u0647\u0627\u06cc \u0633\u0627\u0632\u0646\u062f\u0647:\nhttps://cert-portal.siemens.com/productcert/html/ssa-693110.html\n\n\ud83d\udc6e\u200d\u2640\ufe0f\ud83d\udc6e\u200d\u2640\ufe0f \u0628\u0627\u0632\u0646\u0634\u0631 \u0645\u0637\u0627\u0644\u0628 \u0627\u06cc\u0646 \u06a9\u0627\u0646\u0627\u0644 \u0635\u0631\u0641\u0627 \u0628\u0627 \u0630\u06a9\u0631 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u06a9\u0627\u0645\u0644 \u06a9\u0627\u0646\u0627\u0644 \u0645\u062c\u0627\u0632 \u0645\u06cc\u0628\u0627\u0634\u062f.\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\n\u0627\u062f\u0645\u06cc\u0646:\nhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u062a\u0648\u06cc\u06cc\u062a\u0631:\nhttps://twitter.com/icscerti", "creation_timestamp": "2023-02-17T21:18:44.000000Z"}, {"uuid": "d106ab68-e2e2-4c83-b393-23fb93b1767f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/BleepingComputer/17825", "content": "\u200aCISA warns of critical Citrix ShareFile flaw exploited in the wild\n\nCISA is warning that a critical Citrix ShareFile secure file transfer vulnerability tracked as CVE-2023-24489 is being targeted by unknown actors\u00a0and has added the flaw to its catalog of known security flaws exploited in the wild. [...]\n\nhttps://www.bleepingcomputer.com/news/security/cisa-warns-of-critical-citrix-sharefile-flaw-exploited-in-the-wild/", "creation_timestamp": "2023-08-17T01:05:45.000000Z"}, {"uuid": "cc4e82c8-62b8-4a90-8de0-4e69f38429f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/BleepingComputer/17823", "content": "Latest news and stories from BleepingComputer.com\nCISA warns of critical Citrix ShareFile flaw exploited in the wild\n\nCISA is warning that a critical Citrix ShareFile secure file transfer vulnerability tracked as CVE-2023-24489 is being targeted by unknown actors\u00a0and has added the flaw to its catalog of known security flaws exploited in the wild. [...]", "creation_timestamp": "2023-08-16T22:07:36.000000Z"}, {"uuid": "584fc28a-6d8a-4350-a78f-53a7d079f6a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/180", "content": "Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)\n\n\ud83d\udc64 by Dylan Pindur\n\nShareFile is cloud-based file sharing and collaboration application. The software providing this feature is a .NET web application running under IIS called \"Storage Zones Controller\" (also sometimes called Storage Center) and this is what Assetnote team decided to target.\nThrough their research they were able to achieve unauthenticated arbitrary file upload and full remote code execution by exploiting a seemingly innocuous cryptographic bug. Citrix has released a security update and assigned this issue CVE-2023-24489.\n\n\ud83d\udcdd Contents:\n\u25cf Introduction\n\u25cf Where to Start?\n\u25cf Authenticated, but Not Really\n\u25cf A Simple Path Traversal\n\u25cf Encryption != Authentication\n\u25cf Block Ciphers and Padding\n\u25cf Cipher Block Chaining\n\u25cf Enough Cryptography, Show Me the Exploit\n\u25cf What Have We Learned?\n\u25cf Conclusions\n\nhttps://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/", "creation_timestamp": "2023-07-11T04:59:28.000000Z"}, {"uuid": "74b68ba3-3f65-4305-8b41-e2c73860ac44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/poxek/3043", "content": "#infodigest\n\n\u0421\u043e\u0431\u0440\u0430\u043b\u0438 \u0434\u043b\u044f \u0432\u0430\u0441 \u0441\u0430\u043c\u044b\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0435 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0438\u0437 \u0440\u0430\u0437\u043d\u044b\u0445 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0439.\n\n\ud83e\udeb2 Bugs &amp; Exploits\n1. WordPress \u00abWooCommerce Payments\u00bb plugin CVE-2023-28121\n2. Why ORMs and Prepared Statements Can't (Always) Win\n3. Exploiting XSS in hidden inputs and meta tags\n4. Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)\n5. Exploiting Incorrectly Configured Load Balancer with XSS to Steal Cookies\n6. Chaining our way to Pre-Auth RCE in Metabase (CVE-2023-38646)\n7. Reversing Citrix Gateway for XSS\n8. Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway (Part 1)\n9. Analysis of CVE-2023-3519 in Citrix ADC and NetScaler Gateway (Part 2)\n10. HTML Over the Wire\n\n\ud83d\udee0 Tools\n11. CVSS Advisor (Escalation Techniques)\n12. shortscan\n\n\ud83d\udcd1 Burp extensions &amp; tricks\n13. Improve your API Security Testing with Burp BCheck Scripts\n14. The top 10 community-created BChecks\n\n\ud83d\udcb0 Bug Bounty reports\n15. Bug Writeup: Stored XSS to Account Takeover (ATO) via GraphQL API\n16. Breaking TikTok: Our Journey to Finding an Account Takeover Vulnerability", "creation_timestamp": "2023-08-02T15:22:57.000000Z"}, {"uuid": "5d672718-f886-43fc-a591-061fdb92daa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "https://t.me/ctinow/127202", "content": "https://ift.tt/JGb3X7C\nExperts warn attackers started exploiting Citrix ShareFile RCE flaw CVE-2023-24489", "creation_timestamp": "2023-07-31T10:18:01.000000Z"}, {"uuid": "56002f2a-d501-4f0a-80c1-379322bf4ad8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/ctinow/131149", "content": "https://ift.tt/Vh2JgbS\nCitrix ShareFile vulnerability actively exploited (CVE-2023-24489)", "creation_timestamp": "2023-08-17T13:52:00.000000Z"}, {"uuid": "a9d27785-cc76-4a60-bfd1-4266e4f2553b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "https://t.me/arpsyndicate/964", "content": "#ExploitObserverAlert\n\nCVE-2023-24489\n\nDESCRIPTION: Exploit Observer has 12 entries related to CVE-2023-24489. A vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.\n\nFIRST-EPSS: 0.969450000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T15:19:08.000000Z"}, {"uuid": "062c3513-30a4-4e94-b06d-a80735359e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "seen", "source": "https://t.me/arpsyndicate/368", "content": "#ExploitObserverAlert\n\nCVE-2023-24488\n\nDESCRIPTION: Exploit Observer has 79 entries related to CVE-2023-24488. Cross site scripting vulnerability\u00a0in Citrix ADC and Citrix Gateway?\u00a0in allows and attacker to perform cross site scripting\n\nFIRST-EPSS: 0.014460000\nNVD-IS: 2.7\nNVD-ES: 2.8", "creation_timestamp": "2023-11-22T23:19:36.000000Z"}, {"uuid": "82ec2601-cc59-4ef0-b52b-5a0cd99e6ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "Telegram/R5cdbEp-3EXwChueiJ8dOMcJ7sUs6Xxmfje-7Je5P_jeQQ", "content": "", "creation_timestamp": "2023-08-17T07:12:49.000000Z"}, {"uuid": "4e8ea4e5-dc10-43ad-8ec2-31b6cda832c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/KomunitiSiber/665", "content": "CISA Adds Citrix ShareFile Flaw to KEV Catalog Due to In-the-Wild Attacks\nhttps://thehackernews.com/2023/08/cisa-adds-citrix-sharefile-flaw-to-kev.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active in-the-wild exploitation.\nTracked as\u00a0CVE-2023-24489\u00a0(CVSS score: 9.8), the shortcoming has been described as an improper access control bug that, if successfully exploited", "creation_timestamp": "2023-08-17T07:47:21.000000Z"}, {"uuid": "c3105477-0d19-47e0-ad89-e62545eb05d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/v3n0mhack/267", "content": "CVE-2023-24489 - Authenticated: ShareFile RCE\nLink : https://github.com/codeb0ss/CVE-2023-24489-PoC", "creation_timestamp": "2023-08-03T00:43:50.000000Z"}, {"uuid": "9743da0b-0ed6-4d4e-9064-1dd57a213ef6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "Telegram/PfBDhyUlchQfTUwkRCz2h7RqM5ds-n-bVldH34W40cGx_g", "content": "", "creation_timestamp": "2023-07-01T17:36:04.000000Z"}, {"uuid": "74ecbd97-bc36-423b-9666-b39e4350e652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3117", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bCVE-2023-24488\n\nThe provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.\n\nhttps://github.com/Abo5/CVE-2023-24488\n\n#cve #cybersecurity #infosec\n\nrusty-radamsa\n\nRusty Radamsa is a general purpose fuzzer. It modifies given sample data in ways, which might expose errors in programs intended to process the data.\n\nhttps://github.com/microsoft/rusty-radamsa\n\n#cybersecurity #infosec\n\n\u200b\u200bInvoke-Pre2kSpray\n\nModified DomainPasswordSpray version to enumerate machine accounts and perform a pre2k password spray.\n\nhttps://github.com/eversinc33/Invoke-Pre2kSpray\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2022-43684\n\nServicenow insecure access control leading to administrator account takeover.\n\nhttps://github.com/lolminerxmrig/CVE-2022-43684\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34839\n\nCross Site Request Forgery vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via the a Custom CSRF exploit to create new user function in that application.\n\nhttps://github.com/sahiloj/CVE-2023-34839\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bBackdoor-exploit-python\n\nBackdoor exploit program which helps an user to get information from any user when deployed to the target machine.\n\nhttps://github.com/vaibhavbais007/Backdoor-exploit-python-program\n\n#infosec #pentesting #redteam\n\n\u200b\u200bbouheki\n\nKRSI (eBPF+LSM) based Linux security auditing tool. Security events can be audited and blocked based on the container of the process, and restrictions can be applied to container environments.\n\nhttps://github.com/mrtc0/bouheki\n\n#cybersecurity #infosec\n\n\u200b\u200bgoogleSearcher\n\nA custom Google search (to bypass some limitations on Google with regards to timeouts, vpns etc).\n\nhttps://github.com/AssassinUKG/googleSearcher\n\n#infosec #pentesting #bugbounty\n\nFind GraphQL API vulnerabilities, with Burp Suite Professional\n\nhttps://portswigger.net/blog/find-graphql-api-vulnerabilities-with-burp-suite-professional\n\nGraphQL Portswigger Challenges Writeups\n\nhttps://axon-xerox.medium.com/graphql-portswigger-challenges-writeups-4ed15c832483\n\nBest free AI Image Editing Tools\n\nLEDITS https://huggingface.co/spaces/editing-images/ledits\nUNCROP https://clipdrop.co/uncrop\nMicrosoft Designer https://designer.microsoft.com/\nStable Diffusion Inpainting https://huggingface.co/spaces/runwayml/stable-diffusion-inpainting\nAdobe Firefly AI https://firefly.adobe.com/generate/inpaint\nDragGAN  https://huggingface.co/spaces/radames/DragGan\n\n#infosec #cybersecurity \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-07T10:44:24.000000Z"}, {"uuid": "42cb37fa-e236-444a-baf5-677556c527f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3105", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bTakeMyRDP\n\nA keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe).\n\nhttps://github.com/TheD1rkMtr/TakeMyRDP\n\n#infosec #pentesting #redteam\n\n\u200b\u200bpowershell-backdoor-generator\n\nReverse backdoor written in PowerShell and obfuscated with Python. It generates payloads for popular hacking devices like Flipper Zero and Hak5 USB Rubber Ducky, and changes its signature after every build for evasion.\n\nhttps://github.com/freeide/powershell-backdoor-generator\n\n#infosec #pentesting #redteam\n\n\u200b\u200bBashfuscator\n\nA fully configurable and extendable #Bash #obfuscation framework. This tool is intended to help both red team and blue team.\n\nhttps://github.com/Bashfuscator/Bashfuscator\n\n\u200b\u200bh1stats - h1 Program Stats Scraper\n\nThis python3 script will call out to HackerOne's graphql API and scrape all currently active programs for information and stats on every h1 program. All programs and their stats get tabulated into a generated CSV file. From here you can compare and contrast all program stats to pick high fidelity targets. Furthermore, you can supply your h1 session cookie to the script to also compile in all private programs to the CSV.\n\nhttps://github.com/defparam/h1stats\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bdotdotfarm\n\nUtility for detection &amp; exploitation of Path Traversal vulnerabilities in various network services.\n\nhttps://github.com/treddis/dotdotfarm\n\n#cybersecurity #infosec\n\n\u200b\u200bpreboot\n\nExperiment with d_olex's firmware and conducting \"preboot\" attack\n\nhttps://github.com/realoriginal/preboot\n\n#cybersecurity #infosec\n\n\u200b\u200bWireless Pentesting CheatSheet\n\nThis repository contain a CheatSheet for OSWP &amp; WiFi Cracking.\n\nhttps://github.com/V0lk3n/WirelessPentesting-CheatSheet\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bCVE-2023-24488\n\nReversing Citrix Gateway for #XSS\n\nhttps://github.com/k00kx/CVE-2023-24488\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCryptoTester\n\nA utility for playing with cryptography, geared towards #ransomware analysis.\n\nhttps://github.com/Demonslay335/CryptoTester\n\n#cybersecurity #infosec\n\n\u200b\u200bRecycledInjector\n \nFully Undetected same-process native/.NET assembly shellcode injector based on RecycledGate by thefLink, which is also based on HellsGate + HalosGate + TartarusGate to ensure undetectable native syscalls even if one technique fails.\n\nhttps://github.com/florylsk/RecycledInjector\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-03T15:17:50.000000Z"}, {"uuid": "09be7bac-4832-43d9-aa81-e3a919496fde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3104", "content": "Hackers Factory\n\nFind authentication (authn) and authorization (authz) security bugs in web application routes.\n\nhttps://github.com/mschwager/route-detect\n\nNetSkope Client Service Local Privilege Escalation\n\nhttps://hdwsec.fr/blog/20230622-netskope/\n\nTesting GraphQL APIs \n\nhttps://portswigger.net/web-security/graphql\n\nGmail client-side encryption: A deep dive\n\nhttp://security.googleblog.com/2023/06/gmail-client-side-encryption-deep-dive.html\n\nHacking Auto-GPT and escaping its docker container\n\nhttps://positive.security/blog/auto-gpt-rce\n\nReversing Citrix Gateway for XSS\n\nhttps://blog.assetnote.io/2023/06/29/binary-reversing-citrix-xss/\n\nAdvisory: Citrix Gateway Open Redirect and XSS (CVE-2023-24488)\n\nhttps://blog.assetnote.io/2023/06/29/citrix-xss-advisory/\n\n#infosec #cybersecurity \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-02T08:27:32.000000Z"}, {"uuid": "d6fc3836-1f54-49b2-ac98-2043935f15e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1618", "content": "CVE-2023-24489\nCitrix ShareFile RCE\ud83d\udd25\nPOC exploit + \u0440\u0430\u0437\u0431\u043e\u0440\n\n#citrix", "creation_timestamp": "2023-07-11T13:03:14.000000Z"}, {"uuid": "009cba38-5a96-4359-8b63-c4fe3450df0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/955", "content": "CVE-2023-24498 - Remote Code Execution [RCE]\n\nhttps://github.com/codeb0ss/CVE-2023-24489-PoC", "creation_timestamp": "2023-07-26T06:00:48.000000Z"}, {"uuid": "6648e2bd-66f4-4f2b-8817-9aae4a8e1133", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/858", "content": "{python} CVE-2023-24488,                                                                  Citrix Gateway and Citrix ADC - Cross-Site Scripting\n\nYou can get 1k$ - 2k$ bounty , by report them in hackerone.\n\nEnjoy;", "creation_timestamp": "2023-07-06T05:16:58.000000Z"}, {"uuid": "ef295581-f09e-4466-8cd7-31d4caf3e3e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/codeb0ss/956", "content": "", "creation_timestamp": "2023-07-26T06:00:30.000000Z"}, {"uuid": "1a687f36-d4d3-4031-aed1-fdd388e81cef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/MrVGunz/836", "content": "CVE-2023-24489 : Citrix ShareFile Storage Zones Controller &lt;=\u00a0 5.11.24 (Citrix Content Collaboration) - Remote Code Execution\nPOC : https://github.com/adhikara13/CVE-2023-24489-ShareFile\nBlog : https://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/", "creation_timestamp": "2023-08-18T18:30:30.000000Z"}, {"uuid": "4447ad00-763a-458a-8f13-05a0306a4516", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3972", "content": "\ud83d\udcccXplain AG | Xplain.ch Data Leak : https://system32.ink/xplain-ag-xplain.ch-data-leak/\n\n\ud83d\udcdfCVE-2023-24489 Exploiter [ShareFile RCE]  : https://system32.ink/cve-2023-24489-exploiter-sharefile-rce/\n\n\ud83e\ude85RealChar. \u2013 Your Realtime AI Character : https://system32.ink/realchar.-your-realtime-ai-character/\n\n@Crackcodes | System32.ink | Crackcodes.in", "creation_timestamp": "2023-07-31T13:28:44.000000Z"}, {"uuid": "842c66ca-5152-4697-b26e-8b6662d48832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3863", "content": "CVE-2023-24489\nCitrix ShareFile RCE\ud83d\udd25\nPOC exploit + parsing\n\n#citrix", "creation_timestamp": "2023-07-11T13:17:20.000000Z"}, {"uuid": "c08e068e-6e98-44ef-a129-29856761cefd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/3783", "content": "\ud83d\udd31CVE-2023-24488 POC : https://www.system32.ink/2023/07/cve-2023-24488-poc.html\n\n\ud83d\udd31CVE-2023-28252 POC : https://www.system32.ink/2023/07/cve-2023-28252-poc.html\n\n\ud83d\udd31Sniffle - Sniffer for Bluetooth 5 and 4.x (LE) : https://www.system32.ink/2023/07/sniffle-sniffer-for-bluetooth-5-and-4x.html\n\n\ud83d\udd31ChromeOS pluginvm arbitrary chmod 777 : https://www.system32.ink/2023/07/chromeos-pluginvm-arbitrary-chmod-777.html\n\n\ud83d\udd31Akira Ransomware Decryptor Software : https://www.system32.ink/2023/07/akira-ransomware-decryptor-software.html\n\n\ud83d\udd31CVE-2023-27997 FortiGate SSL VPN Detector : https://www.system32.ink/2023/07/cve-2023-27997-fortigate-ssl-vpn.html\n\n\ud83d\udd31TomcatBackdoorPoC : https://www.system32.ink/2023/07/tomcatbackdoorpoc.html", "creation_timestamp": "2023-07-10T00:50:12.000000Z"}, {"uuid": "b98f23ef-5a3d-475e-86f6-2a09f0c7b704", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24481", "type": "seen", "source": "https://t.me/ctinow/201173", "content": "https://ift.tt/I47Fyes\nCVE-2023-24481 | Intel Thunderbolt DCH Drivers on Windows access control (intel-sa-00851)", "creation_timestamp": "2024-03-06T10:11:31.000000Z"}, {"uuid": "c784d5da-86bd-40e2-9d9f-4b65a6263d6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24480", "type": "seen", "source": "https://t.me/cibsecurity/66644", "content": "\u203c CVE-2023-24480 \u203c\n\nController DoS due to stack overflow when decoding a message from the server\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-13T14:52:13.000000Z"}, {"uuid": "b2efb2b7-9282-4fbc-8d9e-866e28891bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24487", "type": "seen", "source": "https://t.me/cibsecurity/66305", "content": "\u203c CVE-2023-24487 \u203c\n\nArbitrary file read\u00c2\u00a0in Citrix ADC and Citrix Gateway?\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T00:24:03.000000Z"}, {"uuid": "2657d982-7a1a-4381-b358-490c285aad86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24486", "type": "seen", "source": "https://t.me/cibsecurity/66304", "content": "\u203c CVE-2023-24486 \u203c\n\nA vulnerability has been identified in Citrix Workspace app for Linux that, if exploited, may result in a malicious local user being able to gain access to the Citrix Virtual Apps and Desktops session of another user who is using the same computer from which the ICA session is launched.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T00:24:02.000000Z"}, {"uuid": "0be44a4c-83cd-4b81-b5ec-ec3c584c155a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "https://t.me/cibsecurity/66316", "content": "\u203c CVE-2023-24489 \u203c\n\nA vulnerability has been discovered in the customer-managed ShareFile storage zones controller which, if exploited, could allow an unauthenticated attacker to remotely compromise the customer-managed ShareFile storage zones controller.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T02:24:02.000000Z"}, {"uuid": "1752b29d-ffbe-4e20-8d06-feb27f896fa6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "seen", "source": "https://t.me/cibsecurity/66311", "content": "\u203c CVE-2023-24488 \u203c\n\nCross site scripting vulnerability\u00c2\u00a0in Citrix ADC and Citrix Gateway?\u00c2\u00a0in allows and attacker to perform cross site scripting\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-07-11T00:24:12.000000Z"}, {"uuid": "0102b039-0a13-4b04-8e2b-1cd2caa3ec1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24484", "type": "seen", "source": "https://t.me/cibsecurity/58340", "content": "\u203c CVE-2023-24484 \u203c\n\nA malicious user can cause log files to be written to a directory that they do not have permission to write to.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T20:12:34.000000Z"}, {"uuid": "a0020f7d-098b-4e06-8e13-1b72c8a3e8a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24485", "type": "seen", "source": "https://t.me/cibsecurity/58336", "content": "\u203c CVE-2023-24485 \u203c\n\nVulnerabilities have been identified that, collectively, allow a standard Windows user to perform operations as SYSTEM on the computer running Citrix Workspace app.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T20:12:27.000000Z"}, {"uuid": "129a3917-8a81-4dd3-9350-d66db42de3f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24483", "type": "seen", "source": "https://t.me/cibsecurity/58337", "content": "\u203c CVE-2023-24483 \u203c\n\nA vulnerability has been identified that, if exploited, could result in a local user elevating their privilege level to NT AUTHORITY\\SYSTEM on a Citrix Virtual Apps and Desktops Windows VDA.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-02-16T20:12:28.000000Z"}, {"uuid": "10da80d5-d66f-42b1-9a79-dd373ad55644", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-29)", "content": "", "creation_timestamp": "2026-04-29T00:00:00.000000Z"}, {"uuid": "adac5677-3033-4953-81ab-5cb488383836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/788", "content": "https://github.com/codeb0ss/CVE-2023-24489-PoC\n#github", "creation_timestamp": "2023-07-30T08:40:37.000000Z"}, {"uuid": "ea589ece-819e-48dd-94e8-078f5446be61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-30)", "content": "", "creation_timestamp": "2026-04-30T00:00:00.000000Z"}, {"uuid": "f3415c22-5eff-41d0-8851-fc7a37eef89f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-02)", "content": "", "creation_timestamp": "2026-05-02T00:00:00.000000Z"}, {"uuid": "b6684948-326c-48ab-87e1-7c56cc9bdeb6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/information_security_channel/50467", "content": "Exploitation of Citrix ShareFile Vulnerability Spikes as CISA Issues Warning\u00a0\nhttps://www.securityweek.com/exploitation-of-citrix-sharefile-vulnerability-spikes-as-cisa-issues-warning/\n\nExploitation of a Citrix ShareFile vulnerability tracked as CVE-2023-24489 has spiked as CISA added it to its \u2018must patch\u2019 catalog.\nThe post Exploitation of Citrix ShareFile Vulnerability Spikes as CISA Issues Warning\u00a0 (https://www.securityweek.com/exploitation-of-citrix-sharefile-vulnerability-spikes-as-cisa-issues-warning/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-08-17T11:55:59.000000Z"}, {"uuid": "0f0bce45-fabf-4da8-9e17-bf1b9ea2c2bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/information_security_channel/50356", "content": "Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins\nhttps://www.securityweek.com/exploitation-of-recent-citrix-sharefile-rce-vulnerability-begins/\n\nThe first attempts to exploit CVE-2023-24489, a recent critical Citrix ShareFile remote code execution vulnerability, have been observed.\nThe post Exploitation of Recent Citrix ShareFile RCE Vulnerability Begins (https://www.securityweek.com/exploitation-of-recent-citrix-sharefile-rce-vulnerability-begins/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2023-07-28T16:51:40.000000Z"}, {"uuid": "392c69a1-97bd-41d7-bc9f-99491da51060", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "exploited", "source": "https://t.me/thehackernews/3755", "content": "\ud83d\udd75\ufe0f\u200d\u2642\ufe0f Citrix ShareFile under attack! Learn about ongoing exploitation of CVE-2023-24489 and how to defend your systems. \n \nRead now: https://thehackernews.com/2023/08/cisa-adds-citrix-sharefile-flaw-to-kev.html", "creation_timestamp": "2023-08-17T14:18:36.000000Z"}, {"uuid": "602e3648-5991-442f-8859-9f7ff2c131bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7507", "content": "Advisory: ShareFile Pre-Auth RCE (CVE-2023-24489)\n\nhttps://blog.assetnote.io/2023/07/04/citrix-sharefile-rce-advisory/", "creation_timestamp": "2023-07-11T12:27:02.000000Z"}, {"uuid": "69447044-7220-4e4a-9a7a-e43cc78368e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/7515", "content": "Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)\n\nhttps://blog.assetnote.io/2023/07/04/citrix-sharefile-rce/", "creation_timestamp": "2023-07-12T12:27:02.000000Z"}, {"uuid": "eca2cbbf-4834-45cc-98e0-45ea404604a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2448", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/9447", "content": "#exploit\n1. CVE-2023-2437, CVE-2023-2446,\nCVE-2023-2448, CVE-2023-2449, CVE-2023-6009:\nWordPress UserPro 5.1.x - Password Reset / Authentication Bypass / Escalation\nhttps://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html\n\n2. CVE-2023-4211:\nUaF in ARM Mali GPU Driver\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-4211.html", "creation_timestamp": "2023-11-23T10:58:01.000000Z"}, {"uuid": "355dd154-4460-4499-af25-f83369afc9fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8596", "content": "#Reversing\n1. Rust Binary Analysis: Feature by Feature\nhttps://research.checkpoint.com/2023/rust-binary-analysis-feature-by-feature\n2. Reversing Citrix Gateway for XSS (CVE-2023-24488)\nhttps://github.com/k00kx/CVE-2023-24488", "creation_timestamp": "2023-07-02T20:02:42.000000Z"}, {"uuid": "dda07ed2-ea3d-4fe1-9053-b1172fe69590", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8616", "content": "#tools\n#Blue_Team_Techniques\n1. Ruby script to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway/ADC\nhttps://github.com/Abo5/CVE-2023-24488\n2. KRSI (eBPF+LSM) based Linux security auditing tool\nhttps://github.com/mrtc0/bouheki\n3. WordPress Sites Vulnerability Checker for CVE-2020-35489\nhttps://github.com/reneoliveirajr/wp_CVE-2020-35489_checker", "creation_timestamp": "2023-07-05T15:02:28.000000Z"}, {"uuid": "8417e9e2-3706-4a7a-8216-c9f8b08b1cf4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24489", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/8751", "content": "#exploit\n1. CVE-2022-44666:\nA sample of PoC scripts that run Calc.exe with full source code\nhttps://github.com/arntsonl/calc_security_poc\n]-&gt; https://github.com/j00sean/CVE-2022-44666/tree/main/bypass/jar-poc\n\n2. CVE-2023-24489:\nA Critical Citrix ShareFile RCE Vulnerability\nhttps://blog.assetnote.io/2023/07/04/citrix-sharefile-rce", "creation_timestamp": "2023-07-28T22:07:01.000000Z"}, {"uuid": "052dd63d-e883-4fda-86c9-0c6862f9eb49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2448", "type": "seen", "source": "https://t.me/Rootsec_2/2051", "content": "#exploit\n1. CVE-2023-2437, CVE-2023-2446,\nCVE-2023-2448, CVE-2023-2449, CVE-2023-6009:\nWordPress UserPro 5.1.x - Password Reset / Authentication Bypass / Escalation\nhttps://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html\n\n2. CVE-2023-4211:\nUaF in ARM Mali GPU Driver\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-4211.html", "creation_timestamp": "2024-08-16T08:51:14.000000Z"}, {"uuid": "59d48b6d-bd32-4eef-8575-ba794edbcf96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-2448", "type": "seen", "source": "https://t.me/Rootsec_2/1998", "content": "#exploit\n1. CVE-2023-2437, CVE-2023-2446,\nCVE-2023-2448, CVE-2023-2449, CVE-2023-6009:\nWordPress UserPro 5.1.x - Password Reset / Authentication Bypass / Escalation\nhttps://packetstormsecurity.com/files/175871/WordPress-UserPro-5.1.x-Password-Reset-Authentication-Bypass-Escalation.html\n\n2. CVE-2023-4211:\nUaF in ARM Mali GPU Driver\nhttps://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2023/CVE-2023-4211.html", "creation_timestamp": "2024-08-16T08:51:05.000000Z"}, {"uuid": "1902a82f-a1f8-4a9f-8730-0fb0dbceeeb9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-24488", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-05-06)", "content": "", "creation_timestamp": "2026-05-06T00:00:00.000000Z"}]}