{"vulnerability": "CVE-2024-1064", "sightings": [{"uuid": "5446bb65-c91e-4185-ab08-4042e0d9a0e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10647", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113433559689383878", "content": "", "creation_timestamp": "2024-11-06T02:06:00.560926Z"}, {"uuid": "107b7a6c-4ff1-4f53-9492-984e4414291d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10645", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113491723471559655", "content": "", "creation_timestamp": "2024-11-16T08:37:49.402129Z"}, {"uuid": "4c75fe38-93c4-4925-ba47-b196dfb59373", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981105493870458", "content": "", "creation_timestamp": "2025-02-10T18:54:08.831384Z"}, {"uuid": "45003b23-5fee-433e-8940-a006e58bc106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113981122716007211", "content": "", "creation_timestamp": "2025-02-10T18:58:29.257525Z"}, {"uuid": "99ae03e9-030f-4761-a601-7e4c1f08be78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhtu6oz2js2h", "content": "", "creation_timestamp": "2025-02-10T19:15:51.419787Z"}, {"uuid": "2e4056d8-d06b-4051-9638-ce51b6980875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhu5wi6wax22", "content": "", "creation_timestamp": "2025-02-10T22:10:17.357679Z"}, {"uuid": "51360d90-580c-44b1-bf82-84459d7ae8fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113985946473235472", "content": "", "creation_timestamp": "2025-02-11T15:25:13.822467Z"}, {"uuid": "c3f43b95-c3fd-40ce-bf66-cc6f70ef6237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhw2m62pc62a", "content": "", "creation_timestamp": "2025-02-11T16:16:05.133497Z"}, {"uuid": "42765eee-a5bb-4453-815f-38904e9eab29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113986273904768180", "content": "", "creation_timestamp": "2025-02-11T16:48:30.935665Z"}, {"uuid": "2a3c7f4e-ffab-432c-baa8-f81ec060b367", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhw5dy5qtn2u", "content": "", "creation_timestamp": "2025-02-11T17:05:12.625403Z"}, {"uuid": "9011824e-4225-47fd-828d-843cf0f8f890", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://social.circl.lu/users/cedric/statuses/113986844143593949", "content": "", "creation_timestamp": "2025-02-11T19:13:31.478810Z"}, {"uuid": "71c61cb6-206f-4b84-a5ef-8b9941b3e875", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lhypiivg5y2l", "content": "", "creation_timestamp": "2025-02-12T17:35:11.055831Z"}, {"uuid": "a957dbdc-b308-4332-9f63-687ad633134a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113994065845326371", "content": "", "creation_timestamp": "2025-02-13T01:50:10.491693Z"}, {"uuid": "70824d39-abf5-485f-ae3b-a34d69ef1ffb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-6c3cfb92-62b4327e96b9e56e", "content": "", "creation_timestamp": "2025-02-13T07:09:22.439956Z"}, {"uuid": "373b2c22-4801-4d68-ade1-4b6ac2839506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/85f9fd3a-b2ef-443b-b091-2cad7418236f", "content": "", "creation_timestamp": "2025-02-11T19:05:13.397489Z"}, {"uuid": "a2dcbe4c-0edb-435e-bd53-2df87eb8b135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1480", "content": "", "creation_timestamp": "2025-02-12T04:00:00.000000Z"}, {"uuid": "6e10242c-7db0-4231-aec1-bb1e7bcf8993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_6/2025", "content": "", "creation_timestamp": "2025-02-12T08:55:10.000000Z"}, {"uuid": "d4ee3cc4-6ec5-43e1-8e29-ed24afae0232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "https://t.me/cvedetector/17594", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10649 - Wandb OpenUI Unauthenticated File Upload/Download Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10649 \nPublished : Feb. 10, 2025, 7:15 p.m. | 27\u00a0minutes ago \nDescription : wandb/openui latest commit c945bb859979659add5f490a874140ad17c56a5d contains a vulnerability where unauthenticated endpoints allow file uploads and downloads from an AWS S3 bucket. This can lead to multiple security issues including denial of service, stored XSS, and information disclosure. The affected endpoints are '/v1/share/{id:str}' for uploading and '/v1/share/{id:str}' for downloading JSON files. The lack of authentication allows any user to upload and overwrite files, potentially causing the S3 bucket to run out of space, injecting malicious scripts, and accessing sensitive information. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"10 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-10T21:16:42.000000Z"}, {"uuid": "4aa44715-c017-40e8-9c4b-984f7f491ffd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10646", "type": "seen", "source": "https://t.me/cvedetector/12934", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10646 - Fluent Forms Stored Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10646 \nPublished : Dec. 14, 2024, 6:15 a.m. | 16\u00a0minutes ago \nDescription : The Contact Form Plugin by Fluent Forms for Quiz, Survey, and Drag &amp; Drop WP Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the form's subject parameter in all versions up to, and including, 5.2.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. \nSeverity: 7.2 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-14T07:40:09.000000Z"}, {"uuid": "0c0ca2ab-6f03-4c2c-b4bd-dc3dac987e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10640", "type": "seen", "source": "https://t.me/cvedetector/10348", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10640 - \"WooCommerce FOX - Currency Switcher Professional WordPress Shortcode Execution Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10640 \nPublished : Nov. 9, 2024, 12:15 p.m. | 42\u00a0minutes ago \nDescription : The The FOX \u2013 Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.4.2.2. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes. \nSeverity: 7.3 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-09T14:08:54.000000Z"}, {"uuid": "a07f549a-f6b6-4aad-98d6-38c27411c876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10645", "type": "seen", "source": "https://t.me/cvedetector/11228", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10645 - Blogger 301 Redirect SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10645 \nPublished : Nov. 16, 2024, 9:15 a.m. | 36\u00a0minutes ago \nDescription : The Blogger 301 Redirect plugin for WordPress is vulnerable to blind time-based SQL Injection via the \u2018br\u2019 parameter in all versions up to, and including, 2.5.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"16 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-16T11:03:17.000000Z"}, {"uuid": "c73f816b-effe-4442-a1e5-ff115854dd0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10647", "type": "seen", "source": "https://t.me/cvedetector/9968", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10647 - WordPress WS Form LITE Reflected Cross-Site Scripting Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10647 \nPublished : Nov. 6, 2024, 2:15 a.m. | 37\u00a0minutes ago \nDescription : The WS Form LITE \u2013 Drag &amp; Drop Contact Form Builder for WordPress plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 1.9.244. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. \nSeverity: 6.1 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"06 Nov 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-11-06T04:07:23.000000Z"}, {"uuid": "1f843fa0-17e3-4be0-8686-f2ddc15a7e6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10649", "type": "seen", "source": "Telegram/d1TleL3lvHbFMsSb6G3D9RkO1vcFN4nI7F4aUWi_-BpRNQwX", "content": "", "creation_timestamp": "2025-02-14T10:01:38.000000Z"}, {"uuid": "5270ee8a-e8c8-48c9-b56b-10531d29638a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://t.me/true_secator/6726", "content": "\u041f\u0440\u043e\u0441\u043b\u0430\u0432\u043b\u0435\u043d\u043d\u0430\u044f \u00ab\u043e\u0441\u043e\u0431\u043e\u0439 \u0442\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0435\u0439\u00bb \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0438 \u041f\u041e Ivanti \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0435 \u043c\u043d\u043e\u0433\u043e\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Connect Secure (ICS), Policy Secure (IPS) \u0438 Cloud Services Application (CSA), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0434\u043b\u044f RCE.\n\n\u0412\u0441\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 \u0441 CVSS: 9,1 \u0438 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u043a\u0430\u043a:\n\n- CVE-2024-38657: \u0432\u043d\u0435\u0448\u043d\u0438\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0438\u043c\u0435\u043d\u0438 \u0444\u0430\u0439\u043b\u0430 \u0432 Ivanti Connect Secure \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 22.7R2.4 \u0438 Ivanti Policy Secure \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 22.7R1.3 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0437\u0430\u043f\u0438\u0441\u044b\u0432\u0430\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b.\n\n- CVE-2025-22467: \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u0442\u0435\u043a\u0435 \u0432 Ivanti Connect Secure \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 22.7R2.6 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434.\n\n- CVE-2024-10644: \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430 \u0432 Ivanti Connect Secure \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 22.7R2.4 \u0438 Ivanti Policy Secure \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 22.7R1.3 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c RCE.\n\n- CVE-2024-47908: \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u0435 \u043a\u043e\u043c\u0430\u043d\u0434 \u041e\u0421 \u0432 \u0432\u0435\u0431-\u043a\u043e\u043d\u0441\u043e\u043b\u044c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 Ivanti CSA \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 5.0.5 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u043c\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430.\n\n\u041d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0431\u044b\u043b\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0445 \u0432\u0435\u0440\u0441\u0438\u044f\u0445: Ivanti Connect Secure 22.7R2.6, Ivanti Policy Secure 22.7R1.3 \u0438 Ivanti CSA 5.0.5.\n\n\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0442\u0440\u0430\u0434\u0438\u0446\u0438\u043e\u043d\u043d\u043e \u0437\u0430\u044f\u0432\u043b\u044f\u0435\u0442, \u0447\u0442\u043e \u043d\u0435 \u0437\u043d\u0430\u0435\u0442 \u043e \u043a\u0430\u043a\u0438\u0445-\u043b\u0438\u0431\u043e \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f\u0445 \u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\n\n\u041d\u043e \u043f\u0440\u0438\u0437\u043d\u0430\u0435\u0442, \u0447\u0442\u043e \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0435\u0435 \u043f\u0435\u0440\u0438\u0444\u0435\u0440\u0438\u0439\u043d\u044b\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u043f\u043e\u0434\u0432\u0435\u0440\u0433\u0430\u043b\u0438\u0441\u044c \u0430\u0442\u0430\u043a\u0430\u043c \u0441\u043e \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u043f\u0440\u043e\u0434\u0432\u0438\u043d\u0443\u0442\u044b\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0437\u0430\u0432\u0435\u0440\u044f\u0435\u0442, \u0447\u0442\u043e \u043f\u0440\u0438\u043b\u0430\u0433\u0430\u0435\u0442 \u0432\u0441\u0435 \u0443\u0441\u0438\u043b\u0438\u044f \u043f\u043e \u0443\u043b\u0443\u0447\u0448\u0435\u043d\u0438\u044e \u0441\u0432\u043e\u0435\u0433\u043e \u041f\u041e \u0438 \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u043d\u0446\u0438\u043f\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\u0412 \u043e\u0431\u0449\u0435\u043c, 50 \u043e\u0442\u0442\u0435\u043d\u043a\u043e\u0432 Ivanti. \u0418 \u0432\u0441\u0435 \u043a\u043e\u0440\u0438\u0447\u043d\u0435\u0432\u044b\u0435.", "creation_timestamp": "2025-02-12T16:00:07.000000Z"}, {"uuid": "3a2854fb-99e5-49d4-adeb-a5b9ae5d2e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1064", "type": "seen", "source": "https://t.me/ctinow/183408", "content": "https://ift.tt/kJ2Vihg\nCVE-2024-1064 Exploit", "creation_timestamp": "2024-02-12T21:16:45.000000Z"}, {"uuid": "cf6fb541-7154-4d65-9829-03273ed99f3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1064", "type": "seen", "source": "https://t.me/ctinow/178470", "content": "https://ift.tt/kMdOR7o\nCVE-2024-1064", "creation_timestamp": "2024-02-03T10:21:52.000000Z"}, {"uuid": "7c0a29b7-3163-4e5f-a967-a6ef375973af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10644", "type": "seen", "source": "https://t.me/thehackernews/6324", "content": "\ud83d\udea8 Critical security flaws discovered in Ivanti products could allow attackers to execute arbitrary code remotely.\n\nThe vulnerabilities (CVE-2024-38657, CVE-2025-22467, CVE-2024-10644, and CVE-2024-47908) impact Ivanti Connect Secure, Policy Secure, and Cloud Services Application.\n\nRead the full details: https://thehackernews.com/2025/02/ivanti-patches-critical-flaws-in.html", "creation_timestamp": "2025-02-12T07:09:15.000000Z"}]}