{"vulnerability": "CVE-2023-4879", "sightings": [{"uuid": "87f4d33f-5077-4627-95fe-854cdeafbe2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2023-48795", "content": "", "creation_timestamp": "2024-10-14T19:50:00.000000Z"}, {"uuid": "ebb47a23-a5be-4ae4-be72-eada89875efe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-08", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "0ea5ca10-ec21-4e29-9a81-be4f6e11c088", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3ldrinmbghv2n", "content": "", "creation_timestamp": "2024-12-20T23:03:20.989824Z"}, {"uuid": "48145ea4-abe9-4b25-b995-008ad86451c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lg4pubicon2n", "content": "", "creation_timestamp": "2025-01-19T21:02:04.479145Z"}, {"uuid": "7bfe1055-1f79-49b8-89ca-b57af591b0cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lhjybyoxq32r", "content": "", "creation_timestamp": "2025-02-06T21:02:39.876997Z"}, {"uuid": "58b0d58e-7dd1-4af4-84ba-6532b92df27b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48790", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lk4nsro2eb24", "content": "", "creation_timestamp": "2025-03-11T18:06:10.999100Z"}, {"uuid": "7228eb35-0862-429d-8162-a2e95fab4e2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "d0571cb0-1a62-42c6-b571-78ed52b0c006", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/yescurvyswab/ab2b67bdc7c520d9abc595d36ac438f8", "content": "", "creation_timestamp": "2025-07-13T05:36:28.000000Z"}, {"uuid": "90f5e581-0917-4aa4-b0bb-e40599977bef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/parsifail/f0396b2b7d02b4675619e90543b8aa4b", "content": "", "creation_timestamp": "2025-05-03T17:39:28.000000Z"}, {"uuid": "91da8ed7-5966-44d3-b8b4-8fb01fc7207b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-105-08", "content": "", "creation_timestamp": "2025-04-15T10:00:00.000000Z"}, {"uuid": "51c9c25e-3a29-4293-9d85-117d527c914a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-05", "content": "", "creation_timestamp": "2025-06-12T10:00:00.000000Z"}, {"uuid": "5af6c723-377f-4ca2-806b-650176eab81e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114863085610968286", "content": "", "creation_timestamp": "2025-07-16T13:13:15.433523Z"}, {"uuid": "179470bc-09ef-4a9e-9662-4a33b1ccb6c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3ltzz66pfnp2h", "content": "", "creation_timestamp": "2025-07-15T23:03:20.853504Z"}, {"uuid": "4a29ad04-a05f-4b83-a4b8-dd99bbdab983", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48796", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3m6oo6f2zvs2g", "content": "", "creation_timestamp": "2025-11-28T10:24:27.017316Z"}, {"uuid": "a3b3495c-99de-4af7-a926-96da96042375", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/esmaeelE/88caa9febeb9d42044e03684d2ebb366", "content": "", "creation_timestamp": "2025-05-26T08:55:41.000000Z"}, {"uuid": "4204d158-4b01-4c3f-bd0f-5757375424c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/Muhammed762729/335ce665aefa951f8b537df6d7b648ce", "content": "", "creation_timestamp": "2025-06-07T09:06:10.000000Z"}, {"uuid": "12ce9d41-2c31-4869-b7a5-d10965e02a54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/tommytri/c0666a0cf87ae4047d7f628e1a62bdd4", "content": "", "creation_timestamp": "2025-06-26T15:00:32.000000Z"}, {"uuid": "09c269fb-06b1-45bd-9452-0515ec0f5543", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/CosasDePuma/5693efe311bb5aecbec5ca60f4a18abd", "content": "", "creation_timestamp": "2025-10-10T11:38:46.000000Z"}, {"uuid": "ec1311ce-a08c-448a-b569-2a28fdc48221", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3loncs4zqta2h", "content": "", "creation_timestamp": "2025-05-08T06:44:59.349309Z"}, {"uuid": "034702ee-e25a-48d5-a8d1-4688da5ffbf7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/keegars/14170d61b201dc6f56f3f6a77c1d108e", "content": "", "creation_timestamp": "2025-05-12T10:37:34.000000Z"}, {"uuid": "85a98643-059f-4842-bae6-0386730b7966", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/sebrandon1/758455dc1ea03ac2d7e445037c445895", "content": "", "creation_timestamp": "2026-02-04T22:01:28.000000Z"}, {"uuid": "52257283-673e-41e6-9bb2-c1ae9dc9075e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48796", "type": "seen", "source": "https://seclists.org/oss-sec/2025/q4/215", "content": "", "creation_timestamp": "2025-11-28T07:40:54.000000Z"}, {"uuid": "2e44f6d5-9334-4c8b-b33f-f319ea53421f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48790", "type": "seen", "source": "https://t.me/cvedetector/20105", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2023-48790 - Fortinet FortiNDR CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2023-48790 \nPublished : March 11, 2025, 3:15 p.m. | 1\u00a0hour ago \nDescription : A cross site request forgery vulnerability [CWE-352] in Fortinet FortiNDR version 7.4.0, 7.2.0 through 7.2.1 and 7.1.0 through 7.1.1 and before 7.0.5 may allow a remote unauthenticated attacker to execute unauthorized actions via crafted HTTP GET requests. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-11T17:37:54.000000Z"}, {"uuid": "8ce705b8-88a3-4f2d-b5ad-f06617a73d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/joshua-gallagher/7857a23ba6cbeed21c5f8cfdae97cba6", "content": "", "creation_timestamp": "2026-01-07T00:49:28.000000Z"}, {"uuid": "cac8cc81-c658-4bc9-a95d-73f852e93164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/DOIQtoRPo9QZsuX5THXjgS647nyT83qV2A8rDRo8PS4OVRs", "content": "", "creation_timestamp": "2025-12-31T05:18:58.000000Z"}, {"uuid": "4cd1e26e-d451-4768-9991-011c77cacc41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48796", "type": "seen", "source": "Telegram/fTOBMv7D5zpTBBaUHbFjz2pzY1URcQ1ftQz_63c9sVqpNbo", "content": "", "creation_timestamp": "2026-04-09T15:17:27.000000Z"}, {"uuid": "2ad8bba9-e300-42c7-80e1-10cb400732c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/156335", "content": "https://ift.tt/20FoZgx\nSSH vulnerability exploitable in Terrapin attacks (CVE-2023-48795)", "creation_timestamp": "2023-12-19T11:52:45.000000Z"}, {"uuid": "5117dab2-3818-4ac2-97c4-28f269b0d66d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/itsec_news/3878", "content": "\u200b\u26a1\ufe0f\u0410\u0442\u0430\u043a\u0430 \u043d\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b SSH: Terrapin \u043f\u043e\u043d\u0438\u0436\u0430\u0435\u0442 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 OpenSSH\n\n\ud83d\udcac \u0413\u0440\u0443\u043f\u043f\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u0437 \u0420\u0443\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0432 \u0411\u043e\u0445\u0443\u043c\u0435 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u0432\u0435\u043a\u0442\u043e\u0440 \u0430\u0442\u0430\u043a\u0438 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c \u00abTerrapin\u00bb, \u0432 \u043e\u0441\u043d\u043e\u0432\u0435 \u043a\u043e\u0442\u043e\u0440\u043e\u0433\u043e \u043b\u0435\u0436\u0438\u0442 \u043c\u0430\u043d\u0438\u043f\u0443\u043b\u044f\u0446\u0438\u044f \u043f\u043e\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c\u044e \u043d\u043e\u043c\u0435\u0440\u043e\u0432 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f (\u0445\u0435\u043d\u0434\u0448\u0435\u0439\u043a\u0435).\n\n\u0410\u0442\u0430\u043a\u0430 Terrapin \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u044c \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c SSH-\u043a\u0430\u043d\u0430\u043b\u043e\u0432 \u043f\u0440\u0438 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0440\u0435\u0436\u0438\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u044d\u0442\u043e\u0442 \u043c\u0435\u0442\u043e\u0434, \u0445\u0430\u043a\u0435\u0440\u044b \u043c\u043e\u0433\u0443\u0442 \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0438\u043b\u0438 \u0438\u0437\u043c\u0435\u043d\u044f\u0442\u044c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 \u043a\u0430\u043d\u0430\u043b\u0435, \u0447\u0442\u043e \u0432\u043b\u0435\u0447\u0435\u0442 \u0437\u0430 \u0441\u043e\u0431\u043e\u0439 \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u0435 \u0443\u0440\u043e\u0432\u043d\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u043e\u0432 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0433\u043e \u043a\u043b\u044e\u0447\u0430, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0432 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0430\u0442\u0430\u043a, \u0431\u0430\u0437\u0438\u0440\u0443\u044e\u0449\u0438\u0445\u0441\u044f \u043d\u0430 \u0430\u043d\u0430\u043b\u0438\u0437\u0435 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430\u0436\u0430\u0442\u0438\u044f \u043a\u043b\u0430\u0432\u0438\u0448, \u0447\u0442\u043e \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u0434\u043b\u044f OpenSSH 9.5.\n\n\u0421\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u043e\u0442\u043c\u0435\u0442\u0438\u043b\u0438, \u0447\u0442\u043e \u0430\u0442\u0430\u043a\u0430 Terrapin \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 SSH \u0432\u043c\u0435\u0441\u0442\u0435 \u0441 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430\u043c\u0438 \u0438 \u0440\u0435\u0436\u0438\u043c\u0430\u043c\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438 \u0432 OpenSSH \u0431\u043e\u043b\u0435\u0435 \u0434\u0435\u0441\u044f\u0442\u0438 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434\n\n\u0423\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043d\u043e\u0432\u044b\u043c \u0432\u0435\u043a\u0442\u043e\u0440\u043e\u043c \u0430\u0442\u0430\u043a\u0438, \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b CVE-2023-48795, CVE-2023-46445 \u0438 CVE-2023-46446.\n\n\u0414\u043b\u044f \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a\u0438 Terrapin \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e, \u0447\u0442\u043e\u0431\u044b \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0438\u0441\u044c \u0432 \u043f\u043e\u0437\u0438\u0446\u0438\u0438 \u00ab\u0447\u0435\u043b\u043e\u0432\u0435\u043a \u043f\u043e\u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435\u00bb (MiTM), \u0430 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043e \u043b\u0438\u0431\u043e ChaCha20-Poly1305, \u043b\u0438\u0431\u043e CBC \u0441 Encrypt-then-MAC.\n\n\u041c\u043d\u043e\u0433\u0438\u0435 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0438 \u0443\u0436\u0435 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u0438\u043c\u0430\u044e\u0442 \u043c\u0435\u0440\u044b \u0434\u043b\u044f \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044f \u0440\u0438\u0441\u043a\u043e\u0432, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0435\u0439 Terrapin. \u041f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0441\u0442\u0440\u043e\u0433\u043e\u0433\u043e \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0430\u0435\u0442 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0434\u043d\u0438\u043c \u0438\u0437 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0431\u043e\u0440\u044c\u0431\u044b \u0441 \u044d\u0442\u043e\u0439 \u0443\u0433\u0440\u043e\u0437\u043e\u0439. \u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u0438\u0432\u0430\u044e\u0442, \u0447\u0442\u043e \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0438\u0436\u0435\u043d\u0438\u044f \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u043c\u0435\u0440\u044b \u0434\u043e\u043b\u0436\u043d\u044b \u0431\u044b\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u044b \u043a\u0430\u043a \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u043a\u043b\u0438\u0435\u043d\u0442\u0430, \u0442\u0430\u043a \u0438 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0447\u0442\u043e \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u043a\u0430\u043d\u0435\u0440 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Terrapin, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 \u043d\u0430 GitHub, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u044c, \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u043b\u0438 SSH-\u043a\u043b\u0438\u0435\u043d\u0442 \u0438\u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440 \u0434\u0430\u043d\u043d\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438. \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0435 \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0430\u0442\u0430\u043a\u0438 \u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u043e\u0442 \u043d\u0435\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u0432 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 , \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u043c \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u0430\u043c\u0438 \u0420\u0443\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2023-12-20T14:29:56.000000Z"}, {"uuid": "6c34e5c5-5380-496c-afe2-6b090c2edfec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/qXF8Cjz6knmlpu3SrYMoQxCiBvWret7nWYdUS1mAXBP11v98Zw", "content": "", "creation_timestamp": "2025-08-17T02:42:33.000000Z"}, {"uuid": "a678fb42-caac-4f78-88f3-808e55337498", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/kasperskyb2b/1090", "content": "\u23e9 Welcome back! \u0412\u043e\u0442 \u0447\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\u0433\u043e \u0441\u043b\u0443\u0447\u0438\u043b\u043e\u0441\u044c \u0432 \u043c\u0438\u0440\u0435 \u0418\u0411 \u0437\u0430 \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043d\u0438\u043a\u0443\u043b\n\n\u0421\u043d\u0430\u0447\u0430\u043b\u0430 \u0442\u0435\u043b\u0435\u0433\u0440\u0430\u0444\u043d\u043e \u043e \u0432\u0430\u0436\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445:\nIvanti EPM (9.6), OpenOffice (4 \u0448\u0442), QNAP (\u043f\u0430\u0447\u043a\u0430)\n\n\ud83d\udc22 \u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Sea Turtle/Silicon/Cosmic Wolf \u043e\u0442\u043c\u0435\u0447\u0435\u043d\u0430 \u0432 \u043d\u043e\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0430 \u0438\u043d\u0442\u0435\u0440\u043d\u0435\u0442-\u043f\u0440\u043e\u0432\u0430\u0439\u0434\u0435\u0440\u043e\u0432 \u0432 \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u0430\u0445.  \u0410\u0432\u0442\u043e\u0440\u044b \u043e\u0442\u0447\u0451\u0442\u0430 \u0441\u0447\u0438\u0442\u0430\u044e\u0442, \u0447\u0442\u043e APT \u0442\u0443\u0440\u0435\u0446\u043a\u0430\u044f, \u0446\u0435\u043b\u044c\u044e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0448\u043f\u0438\u043e\u043d\u0430\u0436, \u043f\u0440\u0435\u0438\u043c\u0443\u0449\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0432 \u0415\u0432\u0440\u043e\u043f\u0435 \u0438 \u043d\u0430 \u0411\u043b\u0438\u0436\u043d\u0435\u043c \u0412\u043e\u0441\u0442\u043e\u043a\u0435.  \u041e\u0441\u043d\u043e\u0432\u043d\u044b\u043c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u043c \u043d\u0430 \u0437\u0430\u0432\u0435\u0440\u0448\u0430\u044e\u0449\u0438\u0445 \u044d\u0442\u0430\u043f\u0430\u0445 \u0430\u0442\u0430\u043a\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0440\u0435\u0432\u0435\u0440\u0441-\u0448\u0435\u043b\u043b SnappyTCP. \u041a\u0441\u0442\u0430\u0442\u0438, \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439 \u043f\u0440\u0438\u043c\u0435\u0440 \u043e\u0445\u043e\u0442\u044b \u043d\u0430 \u044d\u0442\u0443 \u0443\u0433\u0440\u043e\u0437\u0443 \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442\u0441\u044f \u0432 \u0434\u0440\u0443\u0433\u043e\u043c \u043f\u043e\u0441\u0442\u0435, \u043d\u0430\u0433\u043b\u044f\u0434\u043d\u043e \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0449\u0435\u043c, \u043a\u0430\u043a \u0432\u044b\u0434\u0435\u043b\u044f\u0442\u044c \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435 \u0438\u043d\u0434\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u044f\u0442\u044c \u0438\u0445 \u0441\u043f\u0438\u0441\u043e\u043a, \u0447\u0442\u043e\u0431\u044b \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u044c \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445. \u041f\u0440\u0435\u0434\u043c\u0435\u0442\u043e\u043c \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0432 \u043e\u0441\u043d\u043e\u0432\u043d\u043e\u043c DNS-\u0437\u0430\u043f\u0438\u0441\u0438 \u0438 \u0441\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b.\n\n\u274c \u0420\u0430\u043d\u0441\u043e\u043c\u0432\u0430\u0440\u0449\u0438\u043a\u0438 \u0432\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u044e\u0442\u0441\u044f \u043a \u0436\u0435\u0440\u0442\u0432\u0430\u043c. \u0416\u0435\u0440\u0442\u0432\u044b, \u0440\u0430\u043d\u0435\u0435 \u0437\u0430\u043f\u043b\u0430\u0442\u0438\u0432\u0448\u0438\u0435 \u0432\u044b\u043a\u0443\u043f \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044f\u043c Akira \u0438 Royal, \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u0437\u0430\u0432\u0443\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0434\u0435\u043d\u0435\u0436\u043d\u044b\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f \u0437\u0430 \u00ab\u0432\u0437\u043b\u043e\u043c \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0440\u0430\u043d\u0441\u043e\u043c\u0432\u0430\u0440\u0449\u0438\u043a\u043e\u0432 \u0438 \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043e\u0442\u0442\u0443\u0434\u0430 \u0432\u0430\u0448\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445\u00bb. \u0410\u0432\u0442\u043e\u0440\u044b \u044d\u0442\u043e\u0433\u043e \u0441\u043c\u0435\u043b\u043e\u0433\u043e \u043f\u0440\u0435\u0434\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u00ab\u0418\u0411-\u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438\u00bb, \u0438\u0445 \u0441\u0432\u044f\u0437\u044c \u0441 \u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438 ransomware \u043d\u0435 \u044f\u0441\u043d\u0430. \u042f\u0441\u043d\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0434\u043d\u043e \u2014 \u0442\u0435, \u043a\u0442\u043e \u0437\u0430\u043f\u043b\u0430\u0442\u0438\u043b\u0438 \u0432\u044b\u043a\u0443\u043f, \u043d\u0438\u043a\u043e\u0433\u0434\u0430 \u043d\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0443\u0432\u0435\u0440\u0435\u043d\u044b, \u0447\u0442\u043e \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u0430\u044f \u0443 \u043d\u0438\u0445 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0434\u0430\u043b\u0435\u043d\u0430 \u0438 \u043d\u0435 \u0431\u0443\u0434\u0435\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u043a\u0435\u043c-\u0442\u043e \u0432 \u0431\u0443\u0434\u0443\u0449\u0435\u043c. \n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u0430\u0442\u0430\u043a APT Patchwork/APT-Q-36 \u043d\u0430 \u044d\u043d\u0435\u0440\u0433\u0435\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0441\u0435\u043a\u0442\u043e\u0440 \u041a\u0438\u0442\u0430\u044f (\u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b, \u0433\u0443\u0433\u043b-\u0442\u0440\u0430\u043d\u0441\u043b\u0435\u0439\u0442). \u041d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0435 \u043f\u0440\u043e\u043d\u0438\u043a\u043d\u043e\u0432\u0435\u043d\u0438\u0435 \u0447\u0435\u0440\u0435\u0437 \u0444\u0438\u0448\u0438\u043d\u0433, \u0444\u0438\u043d\u0430\u043b\u044c\u043d\u043e\u0435 \u0412\u041f\u041e \u2014 NorthStarC2.\n\n\ud83d\udc40 \u0418\u043d\u0442\u0435\u0440\u0435c\u043d\u0430\u044f 20-\u043c\u0438\u043d\u0443\u0442\u043d\u0430\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0441 LABSCON23, \u043f\u043e\u0441\u0432\u044f\u0449\u0451\u043d\u043d\u0430\u044f \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u043e-\u0448\u043f\u0438\u043e\u043d\u0441\u043a\u043e\u043c\u0443 \u043a\u043e\u043d\u0433\u043b\u043e\u043c\u0435\u0440\u0430\u0442\u0443 Intellexa \u0438 \u0438\u0445 \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u043e\u043c\u0443 \u0412\u041f\u041e ALIEN/PREDATOR. \u0411\u043e\u043b\u044c\u0448\u0430\u044f \u0447\u0430\u0441\u0442\u044c \u0434\u043e\u043a\u043b\u0430\u0434\u0430 \u043f\u043e\u0441\u0432\u044f\u0449\u0435\u043d\u0430 \u0438\u0441\u0442\u043e\u0440\u0438\u0447\u0435\u0441\u043a\u043e\u043c\u0443 \u0438 \u0431\u0438\u0437\u043d\u0435\u0441-\u0430\u0441\u043f\u0435\u043a\u0442\u0430\u043c \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 Intellexa, \u044d\u043a\u043e\u043d\u043e\u043c\u0438\u043a\u0435 \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0438 \u0442\u0430\u043a \u0434\u0430\u043b\u0435\u0435, \u043d\u043e \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043d\u0430\u0431\u043b\u044e\u0434\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u043d\u0438\u043a\u043e\u0432 \u0442\u043e\u0436\u0435 \u0435\u0441\u0442\u044c.\n\n\ud83e\udd28 \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0430\u0442\u0430\u043a\u0438, \u0437\u0430\u0440\u0430\u0436\u0430\u044e\u0449\u0435\u0439 \u0436\u0435\u0440\u0442\u0432  \u043e\u043f\u0435\u043d\u0441\u043e\u0440\u0441\u043d\u044b\u043c \u0442\u0440\u043e\u044f\u043d\u0446\u0435\u043c AsyncRAT. \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u043e\u0431\u043b\u0430\u0434\u0430\u044e\u0442 \u0431\u043e\u043b\u044c\u0448\u043e\u0439 \u043d\u0430\u0441\u0442\u043e\u0439\u0447\u0438\u0432\u043e\u0441\u0442\u044c\u044e \u0438 \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0438\u0437\u0438\u0440\u0443\u044e\u0442 \u0441\u043a\u0440\u044b\u0442\u043d\u043e\u0441\u0442\u044c: \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u043f\u044b\u0442\u0430\u044e\u0442\u0441\u044f \u0437\u0430\u0440\u0430\u0436\u0430\u0442\u044c \u043e\u0434\u043d\u0438\u0445 \u0438 \u0442\u0435\u0445 \u0436\u0435, \u0447\u0435\u043c-\u0442\u043e \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0445 \u0438\u043c \u0436\u0435\u0440\u0442\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043c\u043d\u043e\u0433\u043e\u044d\u0442\u0430\u043f\u043d\u0443\u044e \u0446\u0435\u043f\u043e\u0447\u043a\u0443 \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0438 \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u044e\u0442 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0443\u0441\u0438\u043b\u0438\u044f, \u0447\u0442\u043e\u0431\u044b \u043e\u0442\u0444\u0438\u043b\u044c\u0442\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u0435\u0441\u043e\u0447\u043d\u0438\u0446\u044b \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u043e\u043f\u044b\u0442\u043a\u0438 \u0430\u043d\u0430\u043b\u0438\u0437\u0430. \u0412\u041f\u041e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 DGA, \u0430 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0435\u0436\u0435\u043d\u0435\u0434\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u043a\u0443\u043f\u0430\u044e\u0442 \u043d\u043e\u0432\u044b\u0435 \u0434\u043e\u043c\u0435\u043d\u044b. \u041f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442\u0441\u044f \u0430\u0442\u0430\u043a\u0430 \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 11 \u043c\u0435\u0441\u044f\u0446\u0435\u0432. \n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u043d\u043e\u0432\u043e\u0433\u043e \u0442\u0440\u043e\u044f\u043d\u0446\u0430 SilverRAT, \u043d\u0430\u0431\u0438\u0440\u0430\u044e\u0449\u0435\u0433\u043e \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u043e\u0441\u0442\u044c \u0443 \u043a\u0438\u0431\u0435\u0440\u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u0430 \u0441 \u043d\u043e\u044f\u0431\u0440\u044f. \u041a\u0440\u043e\u043c\u0435 \u0442\u0438\u043f\u043e\u0432\u044b\u0445 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0432\u0440\u043e\u0434\u0435 \u043a\u0440\u0430\u0436\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 RDP, \u043f\u0440\u0438\u043c\u0435\u0447\u0430\u0442\u0435\u043b\u044c\u043d\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c SilverRAT \u0443\u0434\u0430\u043b\u044f\u0442\u044c \u0442\u043e\u0447\u043a\u0438 \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Windows \u043f\u043e \u043a\u043e\u043c\u0430\u043d\u0434\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430.\n\n\ud83d\ude0e \u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0430\u043d\u0442\u0438\u043e\u0442\u043b\u0430\u0434\u043e\u0447\u043d\u044b\u0445 \u0442\u0440\u044e\u043a\u043e\u0432 \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0445 \u0441\u0431\u043e\u0440\u043a\u0430\u0445 GuLoader \u0438 RedLine Stealer.\n\n\u041d\u0435 APT, \u043d\u043e \u0442\u043e\u0436\u0435 \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u043e\n\n\ud83d\udef0 NASA \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u0440\u0443\u043a\u043e\u0432\u043e\u0434\u0441\u0442\u0432\u043e \u043f\u043e \u043a\u043e\u0441\u043c\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0418\u0411. \u041f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 \u043e\u0445\u0432\u0430\u0442\u044b\u0432\u0430\u0435\u0442 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438 \u0438 \u043b\u0443\u0447\u0448\u0438\u0435 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0438 \u043a\u0430\u043a \u0434\u043b\u044f \u0441\u0438\u0441\u0442\u0435\u043c \u043d\u0430\u0437\u0435\u043c\u043d\u043e\u0433\u043e \u0441\u0435\u0433\u043c\u0435\u043d\u0442\u0430, \u0442\u0430\u043a \u0438 \u0434\u043b\u044f \u043a\u043e\u0441\u043c\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f \u043e\u0431\u043e\u0441\u0442\u0440\u0438\u0432\u0448\u0438\u0439\u0441\u044f \u0432 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u0438\u043d\u0442\u0435\u0440\u0435\u0441 \u043a \u0432\u0437\u043b\u043e\u043c\u0443 \u0441\u043f\u0443\u0442\u043d\u0438\u043a\u043e\u0432, \u0434\u043e\u043a\u0443\u043c\u0435\u043d\u0442 \u0440\u0435\u0430\u043b\u044c\u043d\u043e \u0437\u043b\u043e\u0431\u043e\u0434\u043d\u0435\u0432\u043d\u044b\u0439.\n\n\u0427\u0443\u0442\u044c \u043b\u0438 \u043d\u0435 \u043f\u043e\u043b\u043e\u0432\u0438\u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 \u0441 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u043c \u0438\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442\u0430 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u043c SSH \u0443\u044f\u0437\u0432\u0438\u043c\u044b \u043a \u0430\u0442\u0430\u043a\u0435 Terrapin (CVE-2023-48795). \n\n\ud83d\udc4e \u041e\u0447\u0435\u0440\u0435\u0434\u043d\u0430\u044f \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u0430\u044f \u044d\u043f\u0438\u0434\u0435\u043c\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0432 PyPi, \u043d\u0430 \u0441\u0435\u0439 \u0440\u0430\u0437 116 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0431\u044b\u043b\u0438 \u0437\u0430\u0440\u0430\u0436\u0435\u043d\u044b \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u043b\u0438 \u0436\u0435\u0440\u0442\u0432\u0430\u043c \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440 W4SP, \u043e\u043f\u0438\u0441\u0430\u043d\u043d\u044b\u0439 \u043d\u0430\u043c\u0438 \u0440\u0430\u043d\u0435\u0435. \u041e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0446\u0435\u043b\u044c\u044e \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445, \u043f\u043e\u0445\u043e\u0436\u0435, \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u0440\u0430\u0436\u0430 \u043a\u0440\u0438\u043f\u0442\u043e\u0432\u0430\u043b\u044e\u0442\u044b.\n\u0411\u043e\u043d\u0443\u0441-\u0442\u0440\u0435\u043a: 3 \u043f\u0430\u043a\u0435\u0442\u0430 \u0438\u0437 \u0434\u0440\u0443\u0433\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 \u0438 \u0435\u0449\u0451 24 \u043f\u0430\u043a\u0435\u0442\u0430 npm.\n\n\ud83c\udf10 \u0412 \u0440\u043e\u0436\u0434\u0435\u0441\u0442\u0432\u0435\u043d\u0441\u043a\u043e-\u043d\u043e\u0432\u043e\u0433\u043e\u0434\u043d\u0438\u0439 \u043f\u0435\u0440\u0438\u043e\u0434 \u0443\u0441\u043f\u0435\u043b\u0438 \u043a\u0430\u043f\u0438\u0442\u0430\u043b\u044c\u043d\u043e \u0438 \u043d\u0430\u0434\u043e\u043b\u0433\u043e \u043f\u0440\u0438\u043b\u0435\u0447\u044c \u0434\u0432\u0430 \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u0442\u0435\u043b\u0435\u043a\u043e\u043c-\u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430 \u2014 \u041a\u0438\u0435\u0432\u0441\u0442\u0430\u0440 \u0438 Orange Spain. \u0418 \u0435\u0441\u043b\u0438 \u0432 \u043f\u0435\u0440\u0432\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0440\u0435\u0447\u044c \u0438\u0434\u0451\u0442 \u043e \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u043e\u0439 \u0438 \u0442\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u0434\u0433\u043e\u0442\u043e\u0432\u043b\u0435\u043d\u043d\u043e\u0439 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a\u0435, \u0442\u043e Orange, \u043f\u043e\u0445\u043e\u0436\u0435, \u0441\u0442\u0430\u043b\u0438 \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0439 \u0431\u0435\u0441\u043f\u0435\u0447\u043d\u043e\u0441\u0442\u0438 \u0438 \u043e\u0447\u0435\u043d\u044c \u0437\u043b\u043e\u0439 \u0448\u0443\u0442\u043a\u0438 \u2014 \u043a\u0442\u043e-\u0442\u043e \u0441\u043c\u043e\u0433 \u0437\u0430\u0439\u0442\u0438 \u0432 \u0438\u0445 \u043f\u0430\u043d\u0435\u043b\u044c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0432 RIPE \u0438 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e \u043f\u043e\u043c\u0435\u043d\u044f\u0442\u044c BGP-\u043c\u0430\u0440\u0448\u0440\u0443\u0442\u044b. \u041f\u043e \u0441\u043b\u0443\u0445\u0430\u043c, \u0432 \u043f\u0430\u043d\u0435\u043b\u0438 \u043d\u0435 \u0431\u044b\u043b\u043e 2FA \ud83e\udd37\u200d\u2642\ufe0f.\n\n\ud83d\udc6e\u200d\u2642\ufe0f\u0427\u0435\u0442\u044b\u0440\u0451\u0445 \u0440\u0430\u043d\u0441\u043e\u043c\u0432\u0430\u0440\u0449\u0438\u043a\u043e\u0432 \u0430\u0440\u0435\u0441\u0442\u043e\u0432\u0430\u043b\u0438 \u0432 \u041a\u0438\u0442\u0430\u0435. \u0421\u043b\u0443\u0447\u0430\u0439 \u0432 \u0446\u0435\u043b\u043e\u043c \u043e\u0440\u0434\u0438\u043d\u0430\u0440\u043d\u044b\u0439, \u043d\u043e \u0435\u0441\u0442\u044c \u0438\u043d\u0442\u0435\u0440\u0435\u0441\u043d\u044b\u0439 \u043d\u044e\u0430\u043d\u0441 \u2014 \u043e\u043d\u0438 \u043e\u043f\u0442\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0441\u0432\u043e\u0438 \u0438\u0437\u0434\u0435\u043b\u0438\u044f \u043f\u0440\u0438 \u043f\u043e\u043c\u043e\u0449\u0438 ChatGPT. \u041f\u043e \u0441\u043a\u0440\u043e\u043c\u043d\u043e\u043c\u0443 \u043c\u043d\u0435\u043d\u0438\u044e \u0440\u0435\u0434\u0430\u043a\u0446\u0438\u0438 \u044d\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0431\u044b\u043b\u0438, \u043a\u0445\u043c, \u043d\u0430\u0447\u0438\u043d\u0430\u044e\u0449\u0438\u0435.\n\n\u041f\u043e\u0443\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0447\u0442\u0435\u043d\u0438\u0435 \u043f\u0440\u043e \u0434\u044b\u0440\u0443 \u0432 Bitwarden, \u0437\u0430\u043a\u0440\u044b\u0442\u0443\u044e \u0432 \u0430\u043f\u0440\u0435\u043b\u0435 2023 \u0433\u043e\u0434\u0430. \u041c\u043e\u0436\u043d\u043e \u0431\u044b\u043b\u043e \u0443\u0442\u0430\u0449\u0438\u0442\u044c \u0432\u0441\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0411\u0415\u0417 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438. \ud83e\udd2f\n\n#\u0434\u0430\u0439\u0434\u0436\u0435\u0441\u0442 #APT @\u041f2\u0422", "creation_timestamp": "2024-01-09T07:27:24.000000Z"}, {"uuid": "34613b3f-cb58-4000-ac3e-ad63d40f764f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/156067", "content": "https://ift.tt/c5UDFoQ\nCVE-2023-48795 | OpenSSH up to 9.5 Binary Packet Protocol Terrapin inadequate encryption", "creation_timestamp": "2023-12-18T19:47:03.000000Z"}, {"uuid": "3b2b1b29-0e67-428c-8921-06c75b4630e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48796", "type": "seen", "source": "https://t.me/ctinow/155412", "content": "https://ift.tt/FUAsx9L\nCVE-2023-48796 | Apache DolphinScheduler 3.0.0/3.0.1 information disclosure", "creation_timestamp": "2023-12-16T14:48:00.000000Z"}, {"uuid": "b03d7a4d-90b6-44b1-8f8c-32b1cf2c7681", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10590", "content": "8.1     https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992        *EXPLOIT*              |       11F020AC-F907-5606-8805-0516E06160EE   8.1     https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE        *EXPLOIT*              |       108E1D25-1F7E-534C-97CD-3F6045E32B98   8.1     https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 232641 rttvar: 232641  to: 300000                                                        Nmap scan report for static.254.140.201.138.clients.your-server.de (138.201.140.254)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "ab6f5f90-b31a-463f-8b57-e18ad151ea9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/cvedetector/2863", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-41909 - Apache MINA SSHD Terrapin Attack\", \n  \"Content\": \"CVE ID : CVE-2024-41909 \nPublished : Aug. 12, 2024, 4:15 p.m. | 44\u00a0minutes ago \nDescription : Like many other SSH implementations, Apache MINA SSHD suffered from the issue that is more widely known as CVE-2023-48795. An attacker that can intercept traffic between client and server could drop certain packets from the stream, potentially causing client and server to consequently end up with a connection for which   \nsome security features have been downgraded or disabled, aka a Terrapin   \nattack  \n  \nThe mitigations to prevent this type of attack were implemented in Apache MINA SSHD 2.12.0, both client and server side. Users are recommended to upgrade to at least this version. Note that both the client and the server implementation must have mitigations applied against this issue, otherwise the connection may still be affected. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-12T19:17:38.000000Z"}, {"uuid": "e93ec700-430b-4cb4-8fb8-77344566548a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2968", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "b56527f3-60bd-42ab-8fa6-ea4be8a56f87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/MalaysiaHacktivistz/10580", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "0e4cba5b-d8c2-43af-87b8-173f93e3015f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10585", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "20f89835-8570-4792-84ae-8a9fb862bba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10581", "content": "https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 214350 rttvar: 214350  to: 300000                                                        Nmap scan report for static.246.140.201.138.clients.your-server.de (138.201.140.246)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 224679 rttvar: 224679  to: 300000                                                        Nmap scan report for static.247.140.201.138.clients.your-server.de (138.201.140.247)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.2p1 Debian 2+deb12u3 (protocol 2.0)    | vulners:                             |   cpe:/a:openbsd:openssh:9.2p1:      |       2C119FFA-ECE0-5E14-A4A4-354A2C38071A   10.0    https://vulners.com/githubexploit/2C119FFA-ECE0-5E14-A4A4-354A2C38071A        *EXPLOIT*              |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       CVE-2023-28531  9.8     https://vulners.com/cve/CVE-2023-28531        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "8a4a8e35-0cd5-4ac1-8226-dd33474ccd83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10579", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "231f3f2c-2cac-427b-9d64-bece2fcd5e6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10586", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "c059e477-e9b8-4b5a-8d8f-b14b85a06c09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10574", "content": "https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       EDB-ID:40858    6.4     https://vulners.com/exploitdb/EDB-ID:40858   *EXPLOIT*                               |       EDB-ID:40119    6.4     https://vulners.com/exploitdb/EDB-ID:40119   *EXPLOIT*                               |       EDB-ID:39569    6.4     https://vulners.com/exploitdb/EDB-ID:39569   *EXPLOIT*                               |       CVE-2016-3115   6.4     https://vulners.com/cve/CVE-2016-3115         |       PACKETSTORM:181223      5.9   https://vulners.com/packetstorm/PACKETSTORM:181223      *EXPLOIT*              |       MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       5.9     https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       *EXPLOIT*      |       EDB-ID:40136    5.9     https://vulners.com/exploitdb/EDB-ID:40136   *EXPLOIT*                               |       EDB-ID:40113    5.9     https://vulners.com/exploitdb/EDB-ID:40113   *EXPLOIT*                               |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       CVE-2019-6111   5.9     https://vulners.com/cve/CVE-2019-6111         |       CVE-2016-6210   5.9     https://vulners.com/cve/CVE-2016-6210         |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       EXPLOITPACK:98FE96309F9524B8C84C508837551A19   5.8     https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19  *EXPLOIT*      |       EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97   5.8     https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97  *EXPLOIT*      |       1337DAY-ID-32328        5.8   https://vulners.com/zdt/1337DAY-ID-32328*EXPLOIT*                              |       1337DAY-ID-32009        5.8   https://vulners.com/zdt/1337DAY-ID-32009*EXPLOIT*                              |       SSV:91041       5.5     https://vulners.com/seebug/SSV:91041   *EXPLOIT*                                     |       PACKETSTORM:140019      5.5   https://vulners.com/packetstorm/PACKETSTORM:140019      *EXPLOIT*              |       PACKETSTORM:136251      5.5   https://vulners.com/packetstorm/PACKETSTORM:136251      *EXPLOIT*              |       PACKETSTORM:136234      5.5   https://vulners.com/packetstorm/PACKETSTORM:136234      *EXPLOIT*              |       EXPLOITPACK:F92411A645D85F05BDBD274FD222226F   5.5     https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F  *EXPLOIT*      |       EXPLOITPACK:9F2E746846C3C623A27A441281EAD138   5.5     https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138  *EXPLOIT*      |       EXPLOITPACK:1902C998CBF9154396911926B4C3B330   5.5     https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330  *EXPLOIT*      |       CVE-2016-10011  5.5     https://vulners.com/cve/CVE-2016-10011        |       1337DAY-ID-25388        5.5   https://vulners.com/zdt/1337DAY-ID-25388*EXPLOIT*                              |       EDB-ID:45939    5.3     https://vulners.com/exploitdb/EDB-ID:45939   *EXPLOIT*                               |       EDB-ID:45233    5.3     https://vulners.com/exploitdb/EDB-ID:45233   *EXPLOIT*                               |       CVE-2018-20685  5.3     https://vulners.com/cve/CVE-2018-20685        |       CVE-2018-15919  5.3     https://vulners.com/cve/CVE-2018-15919        |       CVE-2018-15473  5.3     https://vulners.com/cve/CVE-2018-15473        |       CVE-2017-15906  5.3     https://vulners.com/cve/CVE-2017-15906        |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "96e2b99d-be5d-4784-b365-00be2bcd184b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/10572", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "ac2deebc-df1d-4b66-9e3c-2aa02f8746ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2977", "content": "8.1     https://vulners.com/githubexploit/123C2683-74BE-5320-AA3A-C376C8E3A992        *EXPLOIT*              |       11F020AC-F907-5606-8805-0516E06160EE   8.1     https://vulners.com/githubexploit/11F020AC-F907-5606-8805-0516E06160EE        *EXPLOIT*              |       108E1D25-1F7E-534C-97CD-3F6045E32B98   8.1     https://vulners.com/githubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 232641 rttvar: 232641  to: 300000                                                        Nmap scan report for static.254.140.201.138.clients.your-server.de (138.201.140.254)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "0f339903-a261-47b1-a672-f7a637bee20f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2972", "content": "7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 228328 rttvar: 228328  to: 300000                                                        Nmap scan report for static.248.140.201.138.clients.your-server.de (138.201.140.248)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 9.9 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:9.9:        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2025-26466  5.9     https://vulners.com/cve/CVE-2025-26466        |_      CE606E2D-D0A5-5DE8-8A61-E7AB65789A99   5.9     https://vulners.com/githubexploit/CE606E2D-D0A5-5DE8-8A61-E7AB65789A99        *EXPLOIT*              Final times for host: srtt: 214222 rttvar: 214222  to: 300000                                                        Nmap scan report for static.249.140.201.138.clients.your-server.de (138.201.140.249)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.250.140.201.138.clients.your-server.de (138.201.140.250)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.251.140.201.138.clients.your-server.de (138.201.140.251)                                 Host is up, received user-set.", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "ccf318f0-728c-4054-ad1f-109b033c2377", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2973", "content": "Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.252.140.201.138.clients.your-server.de (138.201.140.252)                                 Host is up, received user-set (0.23s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.0 (protocol 2.0)                       | vulners:                             |   cpe:/a:openbsd:openssh:8.0:        |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       CVE-2019-16905  7.8     https://vulners.com/cve/CVE-2019-16905        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Final times for host: srtt: 227656 rttvar: 227656  to: 300000                                                        Nmap scan report for static.253.140.201.138.clients.your-server.de (138.201.140.253)                                 Host is up, received user-set", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "28d6843b-3838-42ec-aa74-30a5a4b98d11", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2967", "content": "CVE-2021-28041  7.1     https://vulners.com/cve/CVE-2021-28041        |       CVE-2021-41617  7.0     https://vulners.com/cve/CVE-2021-41617        |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3   6.8     https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2016-20012  5.3     https://vulners.com/cve/CVE-2016-20012        |       CVE-2021-36368  3.7     https://vulners.com/cve/CVE-2021-36368        |_      PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 216453 rttvar: 216453  to: 300000                                                        Nmap scan report for solidboukas.mynewserver.com (138.201.140.244)            Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 166s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 219505 rttvar: 219505  to: 300000                                                        Nmap scan report for static.245.140.201.138.clients.your-server.de (138.201.140.245)                                 Host is up, received user-set (0.21s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.12 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "adf362cd-7550-4f1b-a3eb-b63c4333d241", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2966", "content": "*EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel                       Final times for host: srtt: 229364 rttvar: 229364  to: 300000                                                        Nmap scan report for static.243.140.201.138.clients.your-server.de (138.201.140.243)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)                            | vulners:                             |   cpe:/a:openbsd:openssh:8.2p1:      |       CVE-2023-38408  9.8     https://vulners.com/cve/CVE-2023-38408        |       B8190CDB-3EB9-5631-9828-8064A1575B23   9.8     https://vulners.com/githubexploit/B8190CDB-3EB9-5631-9828-8064A1575B23        *EXPLOIT*              |       8FC9C5AB-3968-5F3C-825E-E8DB5379A623   9.8     https://vulners.com/githubexploit/8FC9C5AB-3968-5F3C-825E-E8DB5379A623        *EXPLOIT*              |       8AD01159-548E-546E-AA87-2DE89F3927EC   9.8     https://vulners.com/githubexploit/8AD01159-548E-546E-AA87-2DE89F3927EC        *EXPLOIT*              |       5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A   9.8     https://vulners.com/githubexploit/5E6968B4-DBD6-57FA-BF6E-D9B2219DB27A        *EXPLOIT*              |       0221525F-07F5-5790-912D-F4B9E2D1B587   9.8     https://vulners.com/githubexploit/0221525F-07F5-5790-912D-F4B9E2D1B587        *EXPLOIT*              |       CVE-2020-15778  7.8     https://vulners.com/cve/CVE-2020-15778        |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       CVE-2020-12062  7.5     https://vulners.com/cve/CVE-2020-12062        |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |", "creation_timestamp": "2025-04-01T08:49:51.000000Z"}, {"uuid": "1dc65483-af4a-4339-b7d3-64e14726fe6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2961", "content": "https://vulners.com/githubexploit/C94132FD-1FA5-5342-B6EE-0DAF45EEFFE3        *EXPLOIT*              |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       10213DBE-F683-58BB-B6D3-353173626207   6.8     https://vulners.com/githubexploit/10213DBE-F683-58BB-B6D3-353173626207        *EXPLOIT*              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       EDB-ID:40858    6.4     https://vulners.com/exploitdb/EDB-ID:40858   *EXPLOIT*                               |       EDB-ID:40119    6.4     https://vulners.com/exploitdb/EDB-ID:40119   *EXPLOIT*                               |       EDB-ID:39569    6.4     https://vulners.com/exploitdb/EDB-ID:39569   *EXPLOIT*                               |       CVE-2016-3115   6.4     https://vulners.com/cve/CVE-2016-3115         |       PACKETSTORM:181223      5.9   https://vulners.com/packetstorm/PACKETSTORM:181223      *EXPLOIT*              |       MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       5.9     https://vulners.com/metasploit/MSF:AUXILIARY-SCANNER-SSH-SSH_ENUMUSERS-       *EXPLOIT*      |       EDB-ID:40136    5.9     https://vulners.com/exploitdb/EDB-ID:40136   *EXPLOIT*                               |       EDB-ID:40113    5.9     https://vulners.com/exploitdb/EDB-ID:40113   *EXPLOIT*                               |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       CVE-2020-14145  5.9     https://vulners.com/cve/CVE-2020-14145        |       CVE-2019-6111   5.9     https://vulners.com/cve/CVE-2019-6111         |       CVE-2016-6210   5.9     https://vulners.com/cve/CVE-2016-6210         |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       EXPLOITPACK:98FE96309F9524B8C84C508837551A19   5.8     https://vulners.com/exploitpack/EXPLOITPACK:98FE96309F9524B8C84C508837551A19  *EXPLOIT*      |       EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97   5.8     https://vulners.com/exploitpack/EXPLOITPACK:5330EA02EBDE345BFC9D6DDDD97F9E97  *EXPLOIT*      |       1337DAY-ID-32328        5.8   https://vulners.com/zdt/1337DAY-ID-32328*EXPLOIT*                              |       1337DAY-ID-32009        5.8   https://vulners.com/zdt/1337DAY-ID-32009*EXPLOIT*                              |       SSV:91041       5.5     https://vulners.com/seebug/SSV:91041   *EXPLOIT*                                     |       PACKETSTORM:140019      5.5   https://vulners.com/packetstorm/PACKETSTORM:140019      *EXPLOIT*              |       PACKETSTORM:136251      5.5   https://vulners.com/packetstorm/PACKETSTORM:136251      *EXPLOIT*              |       PACKETSTORM:136234      5.5   https://vulners.com/packetstorm/PACKETSTORM:136234      *EXPLOIT*              |       EXPLOITPACK:F92411A645D85F05BDBD274FD222226F   5.5     https://vulners.com/exploitpack/EXPLOITPACK:F92411A645D85F05BDBD274FD222226F  *EXPLOIT*      |       EXPLOITPACK:9F2E746846C3C623A27A441281EAD138   5.5     https://vulners.com/exploitpack/EXPLOITPACK:9F2E746846C3C623A27A441281EAD138  *EXPLOIT*      |       EXPLOITPACK:1902C998CBF9154396911926B4C3B330   5.5     https://vulners.com/exploitpack/EXPLOITPACK:1902C998CBF9154396911926B4C3B330  *EXPLOIT*      |       CVE-2016-10011  5.5     https://vulners.com/cve/CVE-2016-10011        |       1337DAY-ID-25388        5.5   https://vulners.com/zdt/1337DAY-ID-25388*EXPLOIT*                              |       EDB-ID:45939    5.3     https://vulners.com/exploitdb/EDB-ID:45939   *EXPLOIT*                               |       EDB-ID:45233    5.3     https://vulners.com/exploitdb/EDB-ID:45233   *EXPLOIT*                               |       CVE-2018-20685  5.3     https://vulners.com/cve/CVE-2018-20685        |       CVE-2018-15919  5.3     https://vulners.com/cve/CVE-2018-15919        |       CVE-2018-15473  5.3     https://vulners.com/cve/CVE-2018-15473        |       CVE-2017-15906  5.3     https://vulners.com/cve/CVE-2017-15906        |", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "979213f2-f477-4e02-b732-9fa36ff97d47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/MalaysiaHacktivistz/2959", "content": "hubexploit/108E1D25-1F7E-534C-97CD-3F6045E32B98        *EXPLOIT*              |       0FC4BE81-312B-51F4-9D9B-66D8B5C093CD   8.1     https://vulners.com/githubexploit/0FC4BE81-312B-51F4-9D9B-66D8B5C093CD        *EXPLOIT*              |       0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180   8.1     https://vulners.com/githubexploit/0F9B3655-C7D4-55A9-8EB5-2EAD9CEAB180        *EXPLOIT*              |       0E9294FD-6B44-503A-84C2-C6E76E53B0B7   8.1     https://vulners.com/githubexploit/0E9294FD-6B44-503A-84C2-C6E76E53B0B7        *EXPLOIT*              |       0A8CA57C-ED38-5301-A03A-C841BD3082EC   8.1     https://vulners.com/githubexploit/0A8CA57C-ED38-5301-A03A-C841BD3082EC        *EXPLOIT*              |       SSV:92579       7.5     https://vulners.com/seebug/SSV:92579   *EXPLOIT*                                     |       PACKETSTORM:173661      7.5   https://vulners.com/packetstorm/PACKETSTORM:173661      *EXPLOIT*              |       F0979183-AE88-53B4-86CF-3AF0523F3807   7.5     https://vulners.com/githubexploit/F0979183-AE88-53B4-86CF-3AF0523F3807        *EXPLOIT*              |       1337DAY-ID-26576        7.5   https://vulners.com/zdt/1337DAY-ID-26576*EXPLOIT*                              |       PACKETSTORM:189283      6.8   https://vulners.com/packetstorm/PACKETSTORM:189283      *EXPLOIT*              |       F79E574D-30C8-5C52-A801-66FFA0610BAA   6.8     https://vulners.com/githubexploit/F79E574D-30C8-5C52-A801-66FFA0610BAA        *EXPLOIT*              |       CVE-2025-26465  6.8     https://vulners.com/cve/CVE-2025-26465        |       1337DAY-ID-39918        6.8   https://vulners.com/zdt/1337DAY-ID-39918*EXPLOIT*                              |       CVE-2023-51385  6.5     https://vulners.com/cve/CVE-2023-51385        |       CVE-2023-48795  5.9     https://vulners.com/cve/CVE-2023-48795        |       54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C   5.9     https://vulners.com/githubexploit/54E1BB01-2C69-5AFD-A23D-9783C9D9FC4C        *EXPLOIT*              |       CVE-2023-51384  5.5     https://vulners.com/cve/CVE-2023-51384        |       PACKETSTORM:140261      0.0   https://vulners.com/packetstorm/PACKETSTORM:140261      *EXPLOIT*              |       5C971D4B-2DD3-5894-9EC2-DAB952B4740D   0.0     https://vulners.com/githubexploit/5C971D4B-2DD3-5894-9EC2-DAB952B4740D        *EXPLOIT*              |_      39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118   0.0     https://vulners.com/githubexploit/39E70D1A-F5D8-59D5-A0CF-E73D9BAA3118        *EXPLOIT*              Final times for host: srtt: 228805 rttvar: 228805  to: 300000                                                        Nmap scan report for static.238.140.201.138.clients.your-server.de (138.201.140.238)                                 Host is up, received user-set.         Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE    SERVICE REASON      VERSION                                   22/tcp filtered ssh     no-response                                           Nmap scan report for static.239.140.201.138.clients.your-server.de (138.201.140.239)                                 Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 165s                                                                          PORT   STATE  SERVICE REASON       VERSION                                    22/tcp closed ssh     conn-refused     Final times for host: srtt: 216092 rttvar: 216092  to: 300000                                                        Nmap scan report for fahrschulcloud.de (138.201.140.240)                      Host is up, received user-set (0.22s latency).                                Scanned at 2025-04-01 14:37:41 +08 for 186s                                                                          PORT   STATE SERVICE REASON  VERSION   22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.10 (Ubuntu Linux; protocol 2.0)                           | vulners:                             |   cpe:/a:openbsd:openssh:7.2p2:", "creation_timestamp": "2025-04-01T08:49:50.000000Z"}, {"uuid": "bd4e0f63-be08-4a68-94da-cdf9ca7c66cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/3YF2aJFDAU2pSWhX6P1NE7GgtKuQTKofLV4QDhfjuo9ELSKQcQ", "content": "", "creation_timestamp": "2024-07-08T12:15:24.000000Z"}, {"uuid": "080dfb65-fadd-4d39-85a9-39ef7ba4f25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/u5l-ZaeBoa4rQ-jCnAd-RyTkmBiEwVQkA95tqksDWv2Ihl4", "content": "", "creation_timestamp": "2024-08-26T12:45:39.000000Z"}, {"uuid": "77d0e143-b2db-42ac-abb1-b34d4e73fea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/g4YVNsl8VVhm8hCc75QWhNv5PFRAQjIgSB1n0jxM2tiTPh-tRQ", "content": "", "creation_timestamp": "2025-02-01T09:42:01.000000Z"}, {"uuid": "5220a4ed-468c-4ca7-b97c-3a7c058026d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48791", "type": "seen", "source": "https://t.me/arpsyndicate/2363", "content": "#ExploitObserverAlert\n\nCVE-2023-48791\n\nDESCRIPTION: Exploit Observer has 1 entries related to CVE-2023-48791. An improper neutralization of special elements used in a command ('Command Injection') vulnerability [CWE-77] in FortiPortal version 7.2.0, version 7.0.6 and below may allow a remote authenticated attacker with at least R/W permission to execute unauthorized commands via specifically crafted arguments in the Schedule System Backup page field.\n\nFIRST-EPSS: 0.001100000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2024-01-03T21:18:59.000000Z"}, {"uuid": "62e05acd-75c9-4582-aae7-7faf20bda99a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/integral_security/718", "content": "\u26a1\ufe0f\u0414\u0430\u0439\u0434\u0436\u0435\u0441\u0442 18\u201422 \u0434\u0435\u043a\u0430\u0431\u0440\u044f\n\n\u0412 \u041c\u0438\u043d\u0446\u0438\u0444\u0440\u044b \u043d\u0430\u0437\u0432\u0430\u043b\u0438 \u0441\u0440\u043e\u043a\u0438 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f 5G \u0441\u0435\u0442\u0435\u0439\n\u0410\u043a\u0442\u0438\u0432\u043d\u043e\u0435 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0435\u0439 5G \u043d\u0430 \u043e\u0442\u0435\u0447\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0431\u0430\u0437\u043e\u0432\u044b\u0445 \u0441\u0442\u0430\u043d\u0446\u0438\u044f\u0445 \u043d\u0430\u0447\u043d\u0435\u0442\u0441\u044f \u0441 2026 \u0433\u043e\u0434\u0430 \u0432 \u043a\u0440\u0443\u043f\u043d\u044b\u0445 \u0433\u043e\u0440\u043e\u0434\u0430\u0445, \u0442\u0430\u043a\u0436\u0435 \u043f\u043b\u0430\u043d\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0434\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u0431\u0430\u0437\u043e\u0432\u044b\u0445 \u0441\u0442\u0430\u043d\u0446\u0438\u0439 \u0432 \u0434\u0440\u0443\u0436\u0435\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0445 \u0441\u0442\u0440\u0430\u043d\u0430\u0445. \n\n\u0412 \u041c\u0412\u0414 \u0437\u0430\u044f\u0432\u0438\u043b\u0438 \u043e \u0440\u043e\u0441\u0442\u0435 \u0447\u0438\u0441\u043b\u0430 \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438\n\u0427\u0438\u0441\u043b\u043e \u043a\u0438\u0431\u0435\u0440\u0430\u0442\u0430\u043a \u0438 \u0434\u0438\u0441\u0442\u0430\u043d\u0446\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u0445\u0438\u0449\u0435\u043d\u0438\u044f \u0434\u0435\u043d\u0435\u0433 \u0443 \u0433\u0440\u0430\u0436\u0434\u0430\u043d \u0440\u0430\u0441\u0442\u0435\u0442, \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043a\u0440\u0438\u043c\u0438\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0445\u0435\u043c\u044b \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e \u043c\u0435\u043d\u044f\u044e\u0442\u0441\u044f.\n\n\u0421\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442 \u041c\u0438\u043d\u0446\u0438\u0444\u0440\u044b \u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u043e\u0442 \u0443\u0442\u0435\u0447\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445\nC\u0435\u0440\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u044b \u0441\u043e\u0437\u0434\u0430\u044e\u0442 \u0437\u0430\u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u0449\u0438\u0449\u0430\u0442\u044c \u043b\u0438\u0447\u043d\u044b\u0435 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u043e\u0432\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e\u0442 \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \n\n40% \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0443\u0432\u0435\u043b\u0438\u0447\u0438\u043b\u0438 \u0431\u044e\u0434\u0436\u0435\u0442\u044b \u043d\u0430 \u0418\u0411 \u0432 2023 \u0433\u043e\u0434\u0443\n\u041e\u0441\u043d\u043e\u0432\u043d\u0430\u044f \u0447\u0430\u0441\u0442\u044c \u0431\u044e\u0434\u0436\u0435\u0442\u0430 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043d\u0430 \u043f\u0440\u043e\u0434\u043b\u0435\u043d\u0438\u0435 \u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u0435 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0432 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0418\u0411.\n\n\u0418\u043d\u0442\u0435\u0440\u043f\u043e\u043b \u0430\u0440\u0435\u0441\u0442\u043e\u0432\u0430\u043b \u043e\u043a\u043e\u043b\u043e 3500 \u0443\u0447\u0430\u0441\u0442\u043d\u0438\u043a\u043e\u0432 \u0438 \u043a\u043e\u043d\u0444\u0438\u0441\u043a\u043e\u0432\u0430\u043b $300 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0442\u0440\u0430\u043d\u0441\u043d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0439 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u043f\u043e \u0431\u043e\u0440\u044c\u0431\u0435 \u0441 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0441\u0442\u044c\u044e\n\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u044f HAECHI IV \u0434\u043b\u0438\u043b\u0430\u0441\u044c 6 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0438 \u0431\u044b\u043b\u0430 \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 \u043d\u0430 \u0431\u043e\u0440\u044c\u0431\u0443 \u0441 \u0441\u0435\u043c\u044c\u044e \u0432\u0438\u0434\u0430\u043c\u0438 \u043a\u0438\u0431\u0435\u0440\u043c\u043e\u0448\u0435\u043d\u043d\u0438\u0447\u0435\u0441\u0442\u0432\u0430.\n\nOpenAI \u043f\u0440\u0438\u043d\u044f\u043b\u0430 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 ChatGPT, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441 \u0443\u0442\u0435\u0447\u043a\u043e\u0439 \u0434\u0430\u043d\u043d\u044b\u0445\n\u0425\u0430\u043a\u0435\u0440\u044b \u043c\u043e\u0433\u043b\u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0440\u0435\u043d\u0434\u0435\u0440\u0438\u043d\u0433 \u0438\u0437\u043e\u0431\u0440\u0430\u0436\u0435\u043d\u0438\u0439 \u043f\u0440\u0438 \u0430\u0442\u0430\u043a\u0430\u0445 \u0442\u0438\u043f\u0430 prompt injection.\n\n\u0422\u0435\u043b\u0435\u0444\u043e\u043d\u043d\u044b\u0435 \u043c\u043e\u0448\u0435\u043d\u043d\u0438\u043a\u0438 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0432\u044b\u043c\u0430\u043d\u0438\u0432\u0430\u044e\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u0434 \u043f\u0440\u0435\u0434\u043b\u043e\u0433\u043e\u043c \u043f\u0440\u043e\u0434\u043b\u0435\u043d\u0438\u044f \u043d\u043e\u043c\u0435\u0440\u0430\n\u0426\u0435\u043b\u044c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u2014 \u0432\u044b\u043c\u0430\u043d\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0434\u043b\u044f \u0432\u0445\u043e\u0434\u0430 \u0432 \u043b\u0438\u0447\u043d\u044b\u0439 \u043a\u0430\u0431\u0438\u043d\u0435\u0442 \u0441\u043e\u0442\u043e\u0432\u043e\u0433\u043e \u043e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u0430.\n\n\u0424\u0411\u0420 \u0437\u0430\u0445\u0432\u0430\u0442\u0438\u043b\u043e \u0441\u0430\u0439\u0442 ALPHV/BlackCat\n\u0424\u0411\u0420 \u0432\u0437\u043b\u043e\u043c\u0430\u043b\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u044b \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438 ALPHV/BlackCat \u0438 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b\u043e \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043f\u043e\u043c\u043e\u0433\u0430\u0435\u0442 \u043f\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u0432\u0448\u0438\u043c \u0432\u043e\u0441\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0444\u0430\u0439\u043b\u044b.\n\n\u041f\u043e\u0445\u0438\u0449\u0435\u043d\u044b \u0431\u0430\u043d\u043a\u043e\u0432\u0441\u043a\u0438\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 50 000 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0432\u0435\u0431-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0439\n\u041d\u043e\u0432\u0430\u044f \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0432\u0435\u0431-\u0438\u043d\u044a\u0435\u043a\u0446\u0438\u0438 JavaScript \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0431\u0430\u043d\u043a\u043e\u0432\u0441\u043a\u0438\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 40 \u0431\u0430\u043d\u043a\u043e\u0432 \u0432 \u0421\u0435\u0432\u0435\u0440\u043d\u043e\u0439 \u0438 \u042e\u0436\u043d\u043e\u0439 \u0410\u043c\u0435\u0440\u0438\u043a\u0435, \u0415\u0432\u0440\u043e\u043f\u0435 \u0438 \u042f\u043f\u043e\u043d\u0438\u0438.\n\n\u0410\u0442\u0430\u043a\u0430 Terrapin \u0441\u043d\u0438\u0436\u0430\u0435\u0442 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 SSH\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c (CVE-2023-48795) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043d\u0438\u0437\u0438\u0442\u044c \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f \u043f\u0443\u0442\u0435\u043c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043e \u0441\u043e\u0433\u043b\u0430\u0441\u043e\u0432\u0430\u043d\u0438\u0438 \u0440\u0430\u0441\u0448\u0438\u0440\u0435\u043d\u0438\u044f.", "creation_timestamp": "2023-12-22T09:43:04.000000Z"}, {"uuid": "7347090e-d740-4518-8a30-791cca23ea2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/l8X44cMUixgER7r7iiMI4ADWQwLUqwiAQrCqwuO6O3sHcQ", "content": "", "creation_timestamp": "2024-01-01T11:30:25.000000Z"}, {"uuid": "db70f0d3-672c-4677-87cb-38329f5c34a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/KomunitiSiber/1284", "content": "New Terrapin Flaw Could Let Attackers Downgrade SSH Protocol Security\nhttps://thehackernews.com/2024/01/new-terrapin-flaw-could-let-attackers.html\n\nSecurity researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network protocol that could allow an attacker to downgrade the connection's security by breaking the integrity of the secure channel.\nCalled\u00a0Terrapin\u00a0(CVE-2023-48795, CVSS score: 5.9), the exploit has been described as the \"first ever practically exploitable prefix", "creation_timestamp": "2024-01-01T10:42:33.000000Z"}, {"uuid": "0ffe6c69-e594-4cc7-a732-39f409aacb02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/w0w9iKcyXi70OnNrtP96yLy6sw-7f3qLcDmBnN0l3DtxqHg", "content": "", "creation_timestamp": "2024-07-01T14:33:02.000000Z"}, {"uuid": "fe1847a1-5ae4-4152-a186-15b69d7184bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/4508", "content": "https://redhat-satellite.si.uvsq.fr/users/login\n\nhttps://193.51.33.54/users/login\n\nCVE-2008-3844, CVE-2020-14145, CVE-2023-48795, CVE-2007-2768, CVE-2021-36368, CVE-2021-41617, CVE-2019-16905, CVE-2023-51385, CVE-2016-20012, CVE-2023-51767, CVE-2020-15778, CVE-2023-38408", "creation_timestamp": "2024-08-25T08:59:44.000000Z"}, {"uuid": "fab71cd3-b968-4c4a-b9c7-87a136d907a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/xGsLy8z3fANiCroIRCfALnNfiha1hqkEaeyvq7MCrScixms", "content": "", "creation_timestamp": "2024-07-01T14:34:42.000000Z"}, {"uuid": "b61111fb-60ec-4fa1-bb1a-0cfa2022c34b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "Telegram/2G0LL9YDDO0dQKSo5p4zQWAL-pbipATIxiBPSKqKsYKP6RG0", "content": "", "creation_timestamp": "2024-07-01T14:30:24.000000Z"}, {"uuid": "b762e184-32b3-469e-94fd-375f447ee061", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48792", "type": "seen", "source": "https://t.me/ctinow/177888", "content": "https://ift.tt/kVFBetn\nCVE-2023-48792", "creation_timestamp": "2024-02-02T03:21:46.000000Z"}, {"uuid": "69afa977-a32e-4f28-b066-b24c65ec0c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "Telegram/WlMaMFraTxN-dgNMoPKfUYgcV5oiIKVHA71R9POf825BNYw", "content": "", "creation_timestamp": "2023-12-25T09:33:38.000000Z"}, {"uuid": "80105852-e961-4dda-b99c-bb177bce755b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/5221", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 \u0420\u0443\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u043d\u0438\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442\u0430 \u0432 \u0411\u043e\u0445\u0443\u043c\u0435 \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b\u0438 \u043d\u043e\u0432\u0443\u044e \u0430\u0442\u0430\u043a\u0443 \u0441 \u0443\u0441\u0435\u0447\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0435\u0444\u0438\u043a\u0441\u0430 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c Terrapin, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0430\u0435\u0442 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439  OpenSSH \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u0440\u0435\u0436\u0438\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f.\n\nTerrapin \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u043b\u0430\u0431\u044b\u0435 \u043c\u0435\u0441\u0442\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u0442\u0440\u0430\u043d\u0441\u043f\u043e\u0440\u0442\u043d\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f SSH \u0432 \u0441\u043e\u0447\u0435\u0442\u0430\u043d\u0438\u0438 \u0441 \u043d\u043e\u0432\u044b\u043c\u0438 \u043a\u0440\u0438\u043f\u0442\u043e\u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u0430\u043c\u0438 \u0438 \u0440\u0435\u0436\u0438\u043c\u0430\u043c\u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u043c\u0438 OpenSSH \u0431\u043e\u043b\u0435\u0435 10 \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u043d\u0430 \u043a\u0430\u043d\u0430\u043b\u0435, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u043f\u0435\u0440\u0435\u0445\u043e\u0434\u0443 \u043d\u0430 \u043c\u0435\u043d\u0435\u0435 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0430\u043b\u0433\u043e\u0440\u0438\u0442\u043c\u044b \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u0438 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044e\u00a0\u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0430\u0442\u0430\u043a \u043f\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u043d\u0430\u0436\u0430\u0442\u0438\u044f \u043a\u043b\u0430\u0432\u0438\u0448 \u0432 OpenSSH 9.5.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a CVE-2023-48795, CVE-2023-46445 \u0438 CVE-2023-46446.\n\n\u0414\u043b\u044f \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u044c\u0441\u044f \u0432 \u043f\u043e\u0437\u0438\u0446\u0438\u0438 MiTM \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0443\u0440\u043e\u0432\u043d\u0435, \u0447\u0442\u043e\u0431\u044b \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0438 \u043f\u043e\u0432\u043b\u0438\u044f\u0442\u044c \u043d\u0430 \u043e\u0431\u043c\u0435\u043d \u0440\u0443\u043a\u043e\u043f\u043e\u0436\u0430\u0442\u0438\u044f\u043c\u0438, \u0430 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0434\u043e\u043b\u0436\u043d\u043e \u0431\u044b\u0442\u044c \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043e \u043b\u0438\u0431\u043e ChaCha20-Poly1305, \u043b\u0438\u0431\u043e CBC \u0441 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c, \u0437\u0430\u0442\u0435\u043c MAC.\n\n\u0414\u0430\u043d\u043d\u044b\u0435 \u0432 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u0445, \u043a\u043e\u0442\u043e\u0440\u044b\u043c\u0438 \u043e\u0431\u043c\u0435\u043d\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0440\u0443\u043a\u043e\u043f\u043e\u0436\u0430\u0442\u0438\u044f, \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u044f\u044e\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u0430\u0442\u0430\u043a\u0438.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u043e\u0441\u043e\u0431\u044b\u0435 \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u044f \u043a Terrapin, \u0448\u0438\u0440\u043e\u043a\u043e\u0435 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u0443\u043f\u043e\u043c\u044f\u043d\u0443\u0442\u044b\u0445 \u0440\u0435\u0436\u0438\u043c\u043e\u0432 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f (\u0441\u043a\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 77%) \u0434\u0435\u043b\u0430\u0435\u0442 \u0430\u0442\u0430\u043a\u0443 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0438\u043c\u043e\u0439 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0438.\n\n\u041c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432\u00a0\u043f\u043e\u0441\u0442\u0435\u043f\u0435\u043d\u043d\u043e \u0441\u043c\u044f\u0433\u0447\u0430\u044e\u0442\u00a0\u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443. \u041e\u0434\u043d\u0438\u043c \u0438\u0437 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0441\u0442\u0430\u043b\u0430 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f \u0441\u0442\u0440\u043e\u0433\u043e\u0433\u043e \u043e\u0431\u043c\u0435\u043d\u0430 \u043a\u043b\u044e\u0447\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0434\u0435\u043b\u0430\u0435\u0442 \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0440\u0443\u043a\u043e\u043f\u043e\u0436\u0430\u0442\u0438\u044f.\n\n\u041e\u0434\u043d\u0430\u043a\u043e \u043f\u043e\u0442\u0440\u0435\u0431\u0443\u0435\u0442\u0441\u044f \u0432\u0440\u0435\u043c\u044f, \u0447\u0442\u043e\u0431\u044b \u044d\u0442\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0431\u044b\u043b\u0430 \u0440\u0435\u0448\u0435\u043d\u0430 \u043f\u043e\u0432\u0441\u0435\u043c\u0435\u0441\u0442\u043d\u043e. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e \u0441\u0442\u0440\u043e\u0433\u0438\u0435 \u043c\u0435\u0440\u044b \u043f\u0440\u043e\u0442\u0438\u0432\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u043e\u0431\u043c\u0435\u043d\u0443 \u043a\u043b\u044e\u0447\u0430\u043c\u0438 \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b \u0442\u043e\u043b\u044c\u043a\u043e \u0442\u043e\u0433\u0434\u0430, \u043a\u043e\u0433\u0434\u0430 \u043e\u043d\u0438 \u0440\u0435\u0430\u043b\u0438\u0437\u043e\u0432\u0430\u043d\u044b \u043a\u0430\u043a \u043d\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u0435, \u0442\u0430\u043a \u0438 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435.\n\n\u041a\u043e\u043c\u0430\u043d\u0434\u0430 \u0443\u0447\u0435\u043d\u044b\u0445 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u0441\u043a\u0430\u043d\u0435\u0440 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Terrapin \u043d\u0430 GitHub, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u044b \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c, \u0447\u0442\u043e\u0431\u044b \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0438\u0442\u044c, \u0443\u044f\u0437\u0432\u0438\u043c \u043b\u0438 SSH-\u043a\u043b\u0438\u0435\u043d\u0442 \u0438\u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440 \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438.\u00a0\n\nTerrapin - \u044d\u0442\u043e \u043d\u0435 \u043f\u0440\u043e\u0441\u0442\u0430\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u0430\u044f \u043e\u0448\u0438\u0431\u043a\u0430, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043e\u0434\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 \u0438\u043b\u0438 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430. \u041d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u044b, \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u044b, \u0447\u0442\u043e\u0431\u044b \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u043e\u0442 \u0430\u0442\u0430\u043a \u0441 \u0443\u0441\u0435\u0447\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0435\u0444\u0438\u043a\u0441\u0430.\n\n\u041d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0441\u0430\u043c\u044b\u043c \u0431\u043e\u043b\u044c\u0448\u0438\u043c \u0444\u0430\u043a\u0442\u043e\u0440\u043e\u043c \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a\u0438 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0442\u0440\u0435\u0431\u043e\u0432\u0430\u043d\u0438\u0435 MiTM, \u043a\u043e\u0442\u043e\u0440\u043e\u0435 \u0434\u0435\u043b\u0430\u0435\u0442 Terrapin \u043c\u0435\u043d\u0435\u0435 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0439 \u0443\u0433\u0440\u043e\u0437\u043e\u0439. \u041f\u043e \u044d\u0442\u043e\u0439 \u043f\u0440\u0438\u0447\u0438\u043d\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 CVE-2023-48795 \u0432\u043e \u043c\u043d\u043e\u0433\u0438\u0445 \u0441\u043b\u0443\u0447\u0430\u044f\u0445 \u043c\u043e\u0436\u0435\u0442 \u043d\u0435 \u0431\u044b\u0442\u044c \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u043e\u043c.\n\n\u0411\u043e\u043b\u0435\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0430\u0442\u0430\u043a\u0435 Terrapin \u043c\u043e\u0436\u043d\u043e \u043d\u0430\u0439\u0442\u0438 \u0432\u00a0\u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435.", "creation_timestamp": "2023-12-19T20:07:30.000000Z"}, {"uuid": "c3eb4d7e-a3ac-48cb-8aa0-62605502eee2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48793", "type": "seen", "source": "https://t.me/ctinow/192607", "content": "https://ift.tt/2W7zePB\nCVE-2023-48793 | Zoho ManageEngine ADAudit Plus up to 7250 Aggregate Report sql injection", "creation_timestamp": "2024-02-24T14:47:07.000000Z"}, {"uuid": "6b6c0789-3ce0-44d8-a11a-6ad36eb48b73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48792", "type": "seen", "source": "https://t.me/ctinow/192604", "content": "https://ift.tt/8XM5Ls2\nCVE-2023-48792 | Zoho ManageEngine ADAudit Plus up to 7250 sql injection", "creation_timestamp": "2024-02-24T14:47:03.000000Z"}, {"uuid": "2d29c08a-042e-4a59-91fc-3c6e75059ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48790", "type": "seen", "source": "https://t.me/true_secator/6837", "content": "Fortinet \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u0435\u0442 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432 \u043e\u0431 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0438 18 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043b\u0438\u044f\u044e\u0449\u0438\u0445 \u043d\u0430 FortiOS, FortiProxy, FortiPAM, FortiSRA, FortiAnalyzer, FortiManager, FortiAnalyzer-BigData, FortiSandbox, FortiNDR, FortiWeb, FortiSIEM \u0438 FortiADC.\n\n\u041a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u043e\u0442\u043d\u043e\u0441\u0438\u0442\u0441\u044f CVE-2023-48790 - \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c XSS \u0432 FortiNDR, \u043a\u043e\u0442\u043e\u0440\u0443\u044e \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434.\n\n\u0412 FortiOS, FortiProxy, FortiPAM, FortiSRA \u0438 FortiWeb \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 CVE-2024-45325, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0438\u043b\u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 \u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432.\n\n\u0422\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u043f\u043e\u0434\u0440\u043e\u0431\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043e\u0448\u0438\u0431\u043a\u0438, \u043f\u043e-\u0432\u0438\u0434\u0438\u043c\u043e\u043c\u0443, \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b.\n\n\u0414\u0440\u0443\u0433\u0430\u044f CVE-2023-40723 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u0432\u043b\u0438\u044f\u0435\u0442 \u043d\u0430 FortiSIEM \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0432\u0442\u043e\u0440\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0441\u0447\u0438\u0442\u044b\u0432\u0430\u0442\u044c \u043f\u0430\u0440\u043e\u043b\u044c \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 API-\u0437\u0430\u043f\u0440\u043e\u0441\u043e\u0432.\u00a0\n\n\u0412 FortiSandbox Fortinet\u00a0\u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-45328 (\u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439), CVE-2024-52961 (\u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434) \u0438 CVE-2024-54027 (\u0447\u0442\u0435\u043d\u0438\u0435 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445), \u0432\u0441\u0435 \u043e\u043d\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0438 \u043e\u0446\u0435\u043d\u043a\u0443 \u0432\u044b\u0441\u043e\u043a\u0438\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438.\n\n\u0412 FortiIsolator \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 CVE-2024-55590, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 \u0447\u0442\u0435\u043d\u0438\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434, \u0430 \u0432 FortiADC \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2023-37933, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 XSS-\u0430\u0442\u0430\u043a\u0438.\u00a0\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 Fortinet \u0432 \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445, \u043c\u043e\u0433\u0443\u0442 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430, \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434, \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0439 \u0437\u0430\u043f\u0438\u0441\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u043e\u0431\u0445\u043e\u0434\u0430 \u0437\u0430\u0449\u0438\u0442\u044b \u0432\u0435\u0431-\u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u043e\u0432.\n\n\u0422\u0430\u043a\u0436\u0435 \u0431\u044b\u043b\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u0434\u043e\u043f\u0443\u0441\u043a\u0430\u044e\u0449\u0430\u044f \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438.\n\nFortinet \u0437\u0430\u044f\u0432\u0438\u043b\u0430, \u0447\u0442\u043e \u043c\u043d\u043e\u0433\u0438\u0435 \u0438\u0437 \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0432\u043d\u0443\u0442\u0440\u0438 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u044f \u043f\u0440\u0438 \u044d\u0442\u043e\u043c \u043e \u0444\u0430\u043a\u0442\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u043a\u0430\u043a\u043e\u0439-\u043b\u0438\u0431\u043e \u0438\u0437 \u043d\u0438\u0445.\n\n\u041d\u043e, \u043a\u0430\u043a \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u0440\u0430\u043a\u0442\u0438\u043a\u0430, \u044d\u0442\u043e \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u043a\u0430.", "creation_timestamp": "2025-03-13T16:20:05.000000Z"}, {"uuid": "e760e1f4-f8a0-403f-af31-14fdb99fa7f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48793", "type": "seen", "source": "https://t.me/ctinow/177889", "content": "https://ift.tt/z6Ag3qd\nCVE-2023-48793", "creation_timestamp": "2024-02-02T03:21:47.000000Z"}, {"uuid": "4bc8af0f-50b6-43e5-93dd-ce7958a45bab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/175668", "content": "https://ift.tt/ascHhY9\nDSA-2024-021: iDRAC 8 and iDRAC 9 Security Update for CVE-2023-48795", "creation_timestamp": "2024-01-30T03:46:44.000000Z"}, {"uuid": "e49b7e71-d533-4d3a-945e-19b3d4c4dec5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4879", "type": "seen", "source": "https://t.me/cibsecurity/70183", "content": "\u203c CVE-2023-4879 \u203c\n\nCross-site Scripting (XSS) - Stored in GitHub repository instantsoft/icms2 prior to 2.16.1.-git.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2023-09-10T22:21:29.000000Z"}, {"uuid": "0e1a1aa6-8443-432a-9493-7a4d2f606dc2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/162810", "content": "https://ift.tt/EitNMu3\nCVE-2023-48795", "creation_timestamp": "2024-01-04T07:51:55.000000Z"}, {"uuid": "e1d35ec4-824a-4580-a68d-866d34a86609", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/160196", "content": "https://ift.tt/ELDnlSp\nCVE-2023-48795 Exploit", "creation_timestamp": "2023-12-28T21:16:39.000000Z"}, {"uuid": "e53b34d1-453e-40ef-a2a5-7f917243a421", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48799", "type": "seen", "source": "https://t.me/ctinow/158745", "content": "https://ift.tt/BY2V54p\nCVE-2023-48799 | Totolink X6000R 9.4.0cu.852_B20230719 Privilege Escalation", "creation_timestamp": "2023-12-23T09:41:48.000000Z"}, {"uuid": "d1bbb1df-5bfd-4b82-a47d-87aabb8fc942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/158153", "content": "https://ift.tt/iBeQ1AV\nSSH Attack Surface (CVE-2023-48795): Find and Patch Before the Grinch Arrives With CyberSecurity Asset Management", "creation_timestamp": "2023-12-22T03:26:53.000000Z"}, {"uuid": "9acafdef-5246-45c3-88fd-6384796686d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/ctinow/163624", "content": "https://ift.tt/pblfI0A\nCVE-2023-48795 SSH Protocol Vulnerability in NetApp Products", "creation_timestamp": "2024-01-05T18:31:35.000000Z"}, {"uuid": "f65d3d23-b6d4-48f8-b85f-81158d24cbce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://gist.github.com/nguyenvietphat-0302/105c79ab797c054b1bc4ec1b9beb4aaf", "content": "", "creation_timestamp": "2026-04-30T03:00:55.000000Z"}, {"uuid": "a610a948-414b-40b4-a4db-59b299aed5b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48795", "type": "seen", "source": "https://t.me/thehackernews/4345", "content": "\ud83d\udd12 Alert: Researchers have discovered a new SSH protocol vulnerability, \"Terrapin\" (CVE-2023-48795), enabling attackers to downgrade SSH connection security. \n \nLearn more: https://thehackernews.com/2024/01/new-terrapin-flaw-could-let-attackers.html \n \nUpdate and patch your SSH servers ASAP.", "creation_timestamp": "2024-01-01T11:15:04.000000Z"}]}