{"vulnerability": "CVE-2024-28986", "sightings": [{"uuid": "f1440858-5005-4a22-9247-7fe2e5fbdf50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-08-15T18:10:02.000000Z"}, {"uuid": "1d00f0c9-e5e9-4d0d-8a7c-224f308d9b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:57.000000Z"}, {"uuid": "074348fa-fb02-4968-a0d9-77df5a9ae861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://gist.github.com/Darkcrai86/90a29de635a75c3cd24c3ba2b1c551b7", "content": "", "creation_timestamp": "2025-09-30T15:07:22.000000Z"}, {"uuid": "257098a0-9555-4773-9e97-ace110007b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://cert.europa.eu/publications/security-advisories/2025-034/", "content": "", "creation_timestamp": "2025-09-24T13:35:06.000000Z"}, {"uuid": "23612896-b4b9-4fe4-bb26-f6d21876f62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lzj3po2e222l", "content": "", "creation_timestamp": "2025-09-23T14:04:49.283973Z"}, {"uuid": "4f0e0be8-3584-41d9-9545-cf2af2577a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/infosecindustry.bsky.social/post/3lzjerbr2ua2a", "content": "", "creation_timestamp": "2025-09-23T16:46:47.271907Z"}, {"uuid": "549b38fd-a6c0-434f-b64c-ffd94db9b29b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://gist.github.com/Darkcrai86/db3c374d3d3b7ce872319cce351bc7a7", "content": "", "creation_timestamp": "2025-09-23T16:59:31.000000Z"}, {"uuid": "94e6fb94-4642-4d6b-ad89-d779a63974b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115255134365690405", "content": "", "creation_timestamp": "2025-09-23T18:56:24.262229Z"}, {"uuid": "93110d9e-d9bf-491f-9648-f97f33e3a93b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzjiejwmp342", "content": "", "creation_timestamp": "2025-09-23T17:51:28.297201Z"}, {"uuid": "79e6f922-d074-43f9-9a50-0e844a92b2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-df887e70-aaa85e643f2fa245", "content": "", "creation_timestamp": "2026-03-13T15:12:35.527481Z"}, {"uuid": "a4c81253-eb2e-4f6d-96e1-9afbd06b6929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/termsofsurrender.bsky.social/post/3meoqxa3x4u2h", "content": "", "creation_timestamp": "2026-02-12T19:45:27.275664Z"}, {"uuid": "81429e99-5bf6-402f-af9c-c506f89f88ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mbcraildrn2g", "content": "", "creation_timestamp": "2025-12-31T21:03:10.802412Z"}, {"uuid": "e85853f2-7e0d-4724-a1a0-e0974f527888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/termsofsurrender.bsky.social/post/3mfskdm6qkf2p", "content": "", "creation_timestamp": "2026-02-27T01:22:47.754691Z"}, {"uuid": "8d2e0f0f-4099-45c2-8a9b-bd2c0e35b965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-28986", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8c25169b-2933-442f-9966-61d3feb84bff", "content": "", "creation_timestamp": "2026-02-02T12:26:31.460022Z"}, {"uuid": "610b20dd-36f5-48df-907e-74aa3abcc8a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "exploited", "source": "https://t.me/itsec_news/4630", "content": "\u200b\u26a1\ufe0fCVE-2024-28987: \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u0432 SolarWinds WHD \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0440\u043e\u0447\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439\n\n\ud83d\udcac\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0451\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Web Help Desk (WHD). \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-28987 \u0438 \u043e\u0446\u0435\u043d\u0451\u043d\u043d\u0430\u044f \u0432 9,1 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0435 CVSS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Horizon3 \u0417\u0430\u043a \u0425\u044d\u043d\u043b\u0438 \u0431\u044b\u043b \u043f\u0440\u0438\u0437\u043d\u0430\u043d \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e \u0434\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0430\u043b\u0438\u0447\u0438\u0435\u043c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0436\u0451\u0441\u0442\u043a\u043e \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 12.8.3 Hotfix 2. \u041e\u0434\u043d\u0430\u043a\u043e, \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u0438 Web Help Desk 12.8.3.1813 \u0438\u043b\u0438 12.8.3 HF1.\n\n\u042d\u0442\u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0440\u0443\u0433\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u043e\u043c \u0436\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 ( CVE-2024-28986, \u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9.8).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0421\u0428\u0410 (CISA), \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u0445\u043e\u0442\u044f \u0434\u0435\u0442\u0430\u043b\u0438 \u0435\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e CVE-2024-28987 \u043e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u043c \u043c\u0435\u0441\u044f\u0446\u0435. \u041a\u0440\u0430\u0439\u043d\u0435 \u0432\u0430\u0436\u043d\u043e \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e\u0431\u044b \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0440\u0438\u0441\u043a\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-08-23T14:53:04.000000Z"}, {"uuid": "60437cbe-699b-42ee-8dae-5f2bfb64db29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/10422", "content": "\u200aCVE-2024-28986: Critical RCE Vulnerability Impacting SolarWinds Web Help Desk\n\nhttps://malware.news/t/cve-2024-28986-critical-rce-vulnerability-impacting-solarwinds-web-help-desk/85377", "creation_timestamp": "2024-08-18T17:36:05.000000Z"}, {"uuid": "a46fdd9a-ec03-4627-885d-728f22fadd88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/information_security_channel/54193", "content": "SolarWinds Makes Third Attempt at Patching Exploited Vulnerability\nhttps://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/\n\nCVE-2025-26399 is a patch bypass of CVE-2024-28988, which is a patch bypass of the exploited CVE-2024-28986.\nThe post SolarWinds Makes Third Attempt at Patching Exploited Vulnerability (https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-09-23T17:35:41.000000Z"}, {"uuid": "ca10aa70-985e-4fb0-bf7a-39ac976912c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "Telegram/xXQF8FomX3CCIIL669vYPLe7wLqoolLX8vueau3hKomdbA", "content": "", "creation_timestamp": "2024-08-15T18:21:12.000000Z"}, {"uuid": "3967c371-30ae-41c4-8c49-6fdcb983896e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/HackingInsights/9834", "content": "\u200aCVE-2024-28986 (CVSS 9.8): SolarWinds Web Help Desk Users Must Patch Now!\n\nhttps://securityonline.info/cve-2024-28986-cvss-9-8-solarwinds-web-help-desk-users-must-patch-now/", "creation_timestamp": "2024-08-14T09:24:18.000000Z"}, {"uuid": "3c2c6d23-c345-4b93-9003-5a95265eeb3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "Telegram/8kmXPoK5fS_Y6NLNeYh_7fYapXPuZ9whEdBMRszaHJ77mg", "content": "", "creation_timestamp": "2024-08-15T17:16:41.000000Z"}, {"uuid": "e2390ac5-1dce-4f54-b386-5b8c2f13b670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/cvedetector/3087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28986 - SolarWinds Web Help Desk Java Deserialization Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-28986 \nPublished : Aug. 13, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : SolarWinds Web Help Desk was susceptible to a Java Deserialization  Remote Code Execution that would allow access to run commands on the host machine. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T02:19:45.000000Z"}, {"uuid": "13244680-919d-444d-a26b-5161b4a41fca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "published-proof-of-concept", "source": "Telegram/cNxbFZZdo4lIvFx4xvc0hLK4F8fRxTqcrmeBNIRfXm1RHD0", "content": "", "creation_timestamp": "2024-08-14T19:46:35.000000Z"}, {"uuid": "042c330d-8cd9-4a12-b965-d3e3f098b515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3546", "content": "The Hacker News\nSolarWinds Releases Patch for Critical Flaw in Web Help Desk Software\n\nSolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited to execute arbitrary code on susceptible instances.\nThe flaw, tracked as CVE-2024-28986 (CVSS score: 9.8), has been described as a deserialization bug.\n\"SolarWinds Web Help Desk was found to be susceptible to a Java deserialization remote code execution vulnerability", "creation_timestamp": "2024-08-15T17:16:42.000000Z"}]}