{"vulnerability": "CVE-2024-28987", "sightings": [{"uuid": "ed7fb590-3ebd-4d33-85c2-72ecb4d959b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "8ef3179e-6ae2-42ba-9d27-75d713d75f20", "vulnerability": "CVE-2024-28987", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:31:03.796404Z"}, {"uuid": "4f8768ff-9e63-4f3b-9b1a-a4d0abbce2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "8ef3179e-6ae2-42ba-9d27-75d713d75f20", "vulnerability": "CVE-2024-28987", "type": "confirmed", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:31:04.918128Z"}, {"uuid": "f2877382-6a2a-401c-973c-48baa4c44c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "8ef3179e-6ae2-42ba-9d27-75d713d75f20", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": null, "content": "", "creation_timestamp": "2024-10-18T12:31:06.414769Z"}, {"uuid": "3327ceda-d516-4b81-8b18-eb8d7fec2f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-28987", "type": "patched", "source": null, "content": "", "creation_timestamp": "2024-10-19T11:12:29.411464Z"}, {"uuid": "d087b42a-5409-42ad-bfe8-9cd7efa77fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-10-15T21:10:02.000000Z"}, {"uuid": "15d6e4c4-05a3-4551-bbc5-9a960b73c5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-28987", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113788880410319227", "content": "", "creation_timestamp": "2025-01-07T20:08:44.376901Z"}, {"uuid": "dc76dfe1-164e-4ade-b269-628650c395c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3lf6hbzeybd27", "content": "", "creation_timestamp": "2025-01-07T20:08:49.725260Z"}, {"uuid": "cbf04acd-8dd6-4d1d-a193-e930734fbba3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-28987", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113789007928798122", "content": "", "creation_timestamp": "2025-01-07T20:41:10.105518Z"}, {"uuid": "230723a5-214e-4304-99e2-01fe31a53cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3lf6j3zch5t27", "content": "", "creation_timestamp": "2025-01-07T20:41:15.338353Z"}, {"uuid": "c990dada-a8e0-4d91-9674-24f14d0caf88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-28987", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113789012155295772", "content": "", "creation_timestamp": "2025-01-07T20:42:14.560507Z"}, {"uuid": "bf9fe343-21dc-495d-ba5c-3a43bc1505f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3lf6j5zepkl27", "content": "", "creation_timestamp": "2025-01-07T20:42:22.510854Z"}, {"uuid": "e9490268-e6d1-412d-99a2-dbf0fae6325d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "91ef3283-a35d-4b68-b2bb-1aab44fe5929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}, {"uuid": "0544bd8f-6f38-476a-b9bc-3e5d39ea45bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:01.000000Z"}, {"uuid": "2b0c0da6-feed-41d8-a009-51d23a4fe856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/solarwinds_webhelpdesk_backdoor.rb", "content": "", "creation_timestamp": "2024-10-31T16:42:23.000000Z"}, {"uuid": "71af53f0-0b80-4df5-908e-8e3d9a74f46d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv6ndze6qu23", "content": "", "creation_timestamp": "2025-07-30T12:40:22.096244Z"}, {"uuid": "16509289-9bd6-4ba2-a5e5-c4973c45419e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "f6253472-fb3b-48cf-8dfc-dcd67bdfeef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/14736", "content": "\u200aCritical SolarWinds Flaw Exposes 827 Instances: PoC Exploit Unveiled for CVE-2024-28987\n\nhttps://securityonline.info/critical-solarwinds-flaw-exposes-827-instances-poc-exploit-unveiled-for-cve-2024-28987/", "creation_timestamp": "2024-09-30T18:09:40.000000Z"}, {"uuid": "2417b736-d895-4b4b-a877-b4c89510ebab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://vulnerability.circl.lu/comment/20187f45-138c-48ba-b11f-52dc3ddfd69e", "content": "", "creation_timestamp": "2024-10-18T22:23:39.387177Z"}, {"uuid": "3e8691b2-5ff3-405e-a9f7-a31b8f90c6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://vulnerability.circl.lu/comment/f9ef410e-5884-4a57-a0d5-a3a16d9ff8fa", "content": "", "creation_timestamp": "2024-10-18T22:25:32.495082Z"}, {"uuid": "89ae4117-1bd1-4d0c-8aeb-023abfa4ddd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "1c1557a9-849b-4e3b-aefb-b3d133e35182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8d4b0c92-f560-441c-8fd5-f910d1539b64", "content": "", "creation_timestamp": "2026-02-02T12:26:25.966515Z"}, {"uuid": "90a7c510-d403-40a7-aef9-86849d6625b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/35936", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T20:40:06.000000Z"}, {"uuid": "cab67611-8c32-4347-8578-7dbbcc294ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8455", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\nURL\uff1ahttps://github.com/fa-rrel/CVE-2024-28987-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-05T09:09:47.000000Z"}, {"uuid": "1074f072-3538-43e8-9a5c-947490f00768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/14290", "content": "\u200aCVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive\n\nhttps://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/", "creation_timestamp": "2024-09-26T11:07:50.000000Z"}, {"uuid": "2890e5c8-1d0f-488e-860e-b1ccc543352a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8650", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-28987 Scanner &amp; Exploiter - SolarWinds Web Help Desk\nURL\uff1ahttps://github.com/PlayerFridei/CVE-2024-28987\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-30T16:37:25.000000Z"}, {"uuid": "607abf0f-44d4-4a85-b06a-ce82684a8057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/itsec_news/4630", "content": "\u200b\u26a1\ufe0fCVE-2024-28987: \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u0432 SolarWinds WHD \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0440\u043e\u0447\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439\n\n\ud83d\udcac\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0451\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Web Help Desk (WHD). \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-28987 \u0438 \u043e\u0446\u0435\u043d\u0451\u043d\u043d\u0430\u044f \u0432 9,1 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0435 CVSS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Horizon3 \u0417\u0430\u043a \u0425\u044d\u043d\u043b\u0438 \u0431\u044b\u043b \u043f\u0440\u0438\u0437\u043d\u0430\u043d \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e \u0434\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0430\u043b\u0438\u0447\u0438\u0435\u043c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0436\u0451\u0441\u0442\u043a\u043e \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 12.8.3 Hotfix 2. \u041e\u0434\u043d\u0430\u043a\u043e, \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u0438 Web Help Desk 12.8.3.1813 \u0438\u043b\u0438 12.8.3 HF1.\n\n\u042d\u0442\u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0440\u0443\u0433\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u043e\u043c \u0436\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 ( CVE-2024-28986, \u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9.8).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0421\u0428\u0410 (CISA), \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u0445\u043e\u0442\u044f \u0434\u0435\u0442\u0430\u043b\u0438 \u0435\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e CVE-2024-28987 \u043e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u043c \u043c\u0435\u0441\u044f\u0446\u0435. \u041a\u0440\u0430\u0439\u043d\u0435 \u0432\u0430\u0436\u043d\u043e \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e\u0431\u044b \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0440\u0438\u0441\u043a\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-08-23T14:53:04.000000Z"}, {"uuid": "8da28555-6bf2-468b-b462-d350bf1cfea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/35519", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:30:08.000000Z"}, {"uuid": "bd1c4ec2-6efe-45c1-9c55-d89f7df4dd88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18440", "content": "https://github.com/fa-rrel/CVE-2024-28987-POC\n\nWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\n#github #exploit", "creation_timestamp": "2024-09-05T18:36:59.000000Z"}, {"uuid": "0c7d5a00-ad0c-4a45-883f-f7a2794803ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/Celestial_Pulse24/7758", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-06T18:20:42.000000Z"}, {"uuid": "3676a1d3-b622-450d-b701-5a3cfb9f6b63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/pLNkfqG8edUJ5abgUQNUKdxcVYfg-V1lxeR0R01pgTi5TQ", "content": "", "creation_timestamp": "2024-09-06T05:11:52.000000Z"}, {"uuid": "969783ff-6a3d-443e-8338-ada625d4c5d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/986", "content": "\u26a1\ufe0fCritical SolarWinds Flaw Exposes 827 Instances: PoC Exploit Unveiled for CVE-2024-28987.\n\n#CyberBulletin", "creation_timestamp": "2024-09-30T09:53:18.000000Z"}, {"uuid": "a63badbc-7c3c-4d83-a399-b116e2c4301f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1912", "content": "https://github.com/fa-rrel/CVE-2024-28987-POC\n\nWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\n#github #exploit", "creation_timestamp": "2024-09-05T11:48:17.000000Z"}, {"uuid": "ed6289bb-9c62-4154-8b4f-77e6052ed9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/cvedetector/3846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28987 - SolarWinds Web Help Desk Hardcoded Credential Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-28987 \nPublished : Aug. 21, 2024, 10:15 p.m. | 33\u00a0minutes ago \nDescription : The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T00:57:11.000000Z"}, {"uuid": "ff64c81a-7b1d-4ec9-bda8-f9dffacb7fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/10126", "content": "\ud83d\udea8CVE-2024-28987 Scanner &amp; Exploiter - SolarWinds Web Help Desk\n\nhttps://darkwebinformer.com/cve-2024-28987-scanner-exploiter-solarwinds-web-help-desk/?v=1", "creation_timestamp": "2025-01-07T21:42:01.000000Z"}, {"uuid": "5b92096c-87ab-4459-beda-0f470cc3cfb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "Telegram/oWM9fnezygmM0nBmDkYfvHo-s6r1nbk8dRSo1QSJPgPFnA", "content": "", "creation_timestamp": "2024-10-16T11:03:56.000000Z"}, {"uuid": "2c57e1b6-1dfa-4da0-b7d6-078509f90f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/99569", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T20:40:06.000000Z"}, {"uuid": "07305fc8-8dcd-465a-a1d8-790dc9393861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/99147", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:30:08.000000Z"}, {"uuid": "d6b19b18-1068-4787-b17d-93c87068762d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/HackingInsights/10924", "content": "\u200aSolarWinds Web Help Desk Hit by Critical Vulnerability (CVE-2024-28987)\n\nhttps://securityonline.info/solarwinds-web-help-desk-hit-by-critical-vulnerability-cve-2024-28987/", "creation_timestamp": "2024-08-22T12:21:40.000000Z"}, {"uuid": "69a74d74-55b4-418b-90b8-254901460820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/2969", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:29:15.000000Z"}, {"uuid": "42463c87-8df9-41c8-8a14-5cb3bbde9ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/23679", "content": "The Hacker News\nCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain", "creation_timestamp": "2024-10-16T11:03:56.000000Z"}, {"uuid": "838355c3-0d91-4f07-b01b-9d98bb31b21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/_f36eT9DDEkaZ8wfQGX3qCIkbSeLLRKrbtS_sNHN1aWzv9I", "content": "", "creation_timestamp": "2024-09-05T17:30:06.000000Z"}, {"uuid": "6148cbbe-d73e-4e46-aa55-bf2611c42b5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/N4vlq_UQn_WycLzT3DCRhD-EMUoWfT9WjMekDM1sG6oTp-5B", "content": "", "creation_timestamp": "2024-12-21T00:18:44.000000Z"}, {"uuid": "fe47c69c-4cc9-472c-9388-15646dc9fcf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/4TmRFK6d-0sBJMy5iC4u4LhacgPfrCXLnsJ7MWuL_wwwaKc", "content": "", "creation_timestamp": "2024-09-05T20:40:07.000000Z"}, {"uuid": "b13ad952-d964-4514-85d2-9fa484398933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "Telegram/cB5PXRJnltoIwSbVE1M1r6ouPORfG9ZbQci01_SlNoDOH70", "content": "", "creation_timestamp": "2024-09-05T17:30:06.000000Z"}, {"uuid": "138f309c-3d33-4316-9b8b-2335e3cec59c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/qyurz87mRVH7kvWTvRwWJRaZUZrXdLPGt4Uig9Hk07tWtBM", "content": "", "creation_timestamp": "2024-09-05T20:40:07.000000Z"}, {"uuid": "7ca7c958-0321-4e53-a1b5-46b126306b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "Telegram/4mlYzYWtNqMujb2J7zLhGZE1VQC4bytYTFTXTkH2HhyjdQ", "content": "", "creation_timestamp": "2024-10-16T11:01:42.000000Z"}, {"uuid": "ade712f1-3fcd-4288-83b1-e8f3b5f7e255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/FIj90rbbw6DtYiRmutpPiZsfH3945UKxSF3eexJUzzPGSfGh", "content": "", "creation_timestamp": "2024-12-21T00:18:41.000000Z"}, {"uuid": "da518aba-6a54-4d8f-a1f4-421b8fd6fb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/AnonymousEgypt/24470", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T20:40:02.000000Z"}, {"uuid": "bf1502ce-283d-4361-bec5-00727572b282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5138", "content": "The Hacker News\nCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain", "creation_timestamp": "2024-10-16T11:03:56.000000Z"}, {"uuid": "480858e7-d096-4440-898f-b48812a221b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/971", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\n#CyberDilara", "creation_timestamp": "2024-09-25T14:21:30.000000Z"}, {"uuid": "47895ddc-d8ca-4689-b8ab-6c207cdbb4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/AnonymousEgypt/24053", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:30:04.000000Z"}, {"uuid": "228e9b30-5e07-4df1-be1d-bd84ab39349f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23905", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\n#CyberDilara", "creation_timestamp": "2024-09-25T16:09:44.000000Z"}, {"uuid": "b010ea85-d78b-4d55-9adf-981bee209279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/KomunitiSiber/2723", "content": "CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability\nhttps://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain", "creation_timestamp": "2024-10-16T11:52:05.000000Z"}, {"uuid": "3a944f9e-d4ac-4f65-bb78-8e2817ee9959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/67tsegYcQIUV7lyfyUyokIQvG0vHB8OXAelx-BGM_6cMQP8", "content": "", "creation_timestamp": "2025-04-22T05:00:08.000000Z"}, {"uuid": "2f5561f3-b2dd-4c71-afa4-319360d19929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/25875", "content": "\u26a1\ufe0fCritical SolarWinds Flaw Exposes 827 Instances: PoC Exploit Unveiled for CVE-2024-28987.\n\n#CyberBulletin", "creation_timestamp": "2024-09-30T11:01:23.000000Z"}, {"uuid": "5ca630ed-62d7-40cd-8c05-785609978fdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/thehackernews/5461", "content": "SolarWinds has released a critical patch for its Web Help Desk (WHD) software to fix a flaw (CVE-2024-28987) that could allow unauthorized remote access. \n \nIf you're using versions before 12.8.3 Hotfix 2, it's crucial to update immediately to avoid potential breaches. \n \nLearn more: https://thehackernews.com/2024/08/hardcoded-credential-vulnerability.html", "creation_timestamp": "2024-08-22T18:38:57.000000Z"}, {"uuid": "f177ba3b-50ed-40cd-80aa-4feca827a026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/thehackernews/5736", "content": "\ud83d\udca5 A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets. \n \nLearn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html", "creation_timestamp": "2024-10-16T07:03:21.000000Z"}, {"uuid": "ca0514e4-d98e-4d56-ace2-77d7cea26512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9157", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\nhttps://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/", "creation_timestamp": "2024-09-25T13:54:41.000000Z"}, {"uuid": "fc0b3ee3-5eca-4cba-bcb2-21a89e281638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3120", "content": "https://github.com/fa-rrel/CVE-2024-28987-POC\n\nWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\n#github #exploit", "creation_timestamp": "2024-09-05T11:38:23.000000Z"}, {"uuid": "1ea16dae-af1b-45a5-abb8-f3d30c60c87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/InfoSecInsider/366", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\n#CyberDilara", "creation_timestamp": "2024-09-25T16:09:48.000000Z"}]}