{"vulnerability": "CVE-2024-49113", "sightings": [{"uuid": "1d114a4f-e314-4991-bff3-d191462ad05d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://www.thezdi.com/blog/2024/12/10/the-december-2024-security-update-review", "content": "", "creation_timestamp": "2024-12-10T17:33:56.000000Z"}, {"uuid": "f244a7e7-a15a-4722-9e40-76062b755a6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113630508313516130", "content": "", "creation_timestamp": "2024-12-10T20:52:38.588529Z"}, {"uuid": "b9f046e3-ca76-4132-94ee-023afecd5548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lfblb3exm42c", "content": "", "creation_timestamp": "2025-01-09T01:57:49.203943Z"}, {"uuid": "6ee60a71-5fa3-4f17-a9cb-0ffa37b2f87a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lflk3e5kfs2g", "content": "", "creation_timestamp": "2025-01-13T01:03:28.778378Z"}, {"uuid": "64f727b4-caed-44e1-b1e4-030654bd2729", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lfbml2udni24", "content": "", "creation_timestamp": "2025-01-09T02:21:17.927807Z"}, {"uuid": "1dc8c42f-1307-411a-8a7d-a74308685231", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lfd453take2s", "content": "", "creation_timestamp": "2025-01-09T16:32:28.783114Z"}, {"uuid": "c52cc42b-1845-44bd-9664-d19919aa56d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/some-news.bsky.social/post/3lflxvaui4i2d", "content": "", "creation_timestamp": "2025-01-13T05:10:29.045824Z"}, {"uuid": "fadf3680-8238-4f5e-8e99-a84d1a374f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://threatintel.cc/2025/01/10/green-bay-packers-online-pro.html", "content": "", "creation_timestamp": "2025-01-10T13:25:21.000000Z"}, {"uuid": "5b3ecbc5-a8d9-4905-88f2-8a1c59128e94", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lfot5wn5oc2n", "content": "", "creation_timestamp": "2025-01-14T08:23:50.697608Z"}, {"uuid": "0668e010-f321-480d-841c-1bc1b549c114", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/bluecyber.bsky.social/post/3lfi5fbnnbk26", "content": "", "creation_timestamp": "2025-01-11T16:38:18.028764Z"}, {"uuid": "1e2e5713-7580-48af-a426-9ef7a17920a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/patrickcmiller.bsky.social/post/3lfm4yy4snq2e", "content": "", "creation_timestamp": "2025-01-13T06:42:02.223576Z"}, {"uuid": "ea52aa71-17db-460d-a33d-d742622336d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lfdzjnu2kb2w", "content": "", "creation_timestamp": "2025-01-10T01:18:28.882977Z"}, {"uuid": "a108e783-0e68-4ae0-9631-b9d74af1652b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/r-purpleteamsec.bsky.social/post/3lfie64x6pu2n", "content": "", "creation_timestamp": "2025-01-11T18:39:31.899489Z"}, {"uuid": "abce23e7-cb77-45bb-9c27-a9cc6436e9f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/cyberhexagone.fr/post/3lfssuplalk2d", "content": "", "creation_timestamp": "2025-01-15T22:29:21.114847Z"}, {"uuid": "0bc6f367-7c7d-4e0b-aa18-0d0e87e03d13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/bertjancyber.bsky.social/post/3lf3ytczzoc2z", "content": "", "creation_timestamp": "2025-01-06T20:44:43.532184Z"}, {"uuid": "b7b7409c-fd54-4df0-831c-bc357d259fcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/geekfeed.bsky.social/post/3lfjo7mutu424", "content": "", "creation_timestamp": "2025-01-12T07:12:00.330555Z"}, {"uuid": "ea00c681-570e-4446-bdac-8c452600d745", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3lfoaggxsun25", "content": "", "creation_timestamp": "2025-01-14T02:48:35.226199Z"}, {"uuid": "b6835c54-b8a1-4803-a827-07ad4d6fe5ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/pvynckier.bsky.social/post/3lfhhsv3afk25", "content": "", "creation_timestamp": "2025-01-11T10:12:12.465279Z"}, {"uuid": "2d86a49f-34f7-481c-9c2a-0b2d183e28ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/b00010111.bsky.social/post/3lf6gr7x4r72f", "content": "", "creation_timestamp": "2025-01-07T19:59:23.421998Z"}, {"uuid": "46946006-308d-4813-b452-903f963d5270", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lfc2rvqsss27", "content": "", "creation_timestamp": "2025-01-09T06:35:44.723597Z"}, {"uuid": "467579b9-c2ee-4c2d-a466-9fe4f9b08237", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lfsgyx6zjk2m", "content": "", "creation_timestamp": "2025-01-15T18:56:57.208047Z"}, {"uuid": "69e2827c-2926-4af1-9018-cfc954e81cf6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lfhkyapdye2s", "content": "", "creation_timestamp": "2025-01-11T11:08:51.260836Z"}, {"uuid": "870ea39d-fda9-4673-a173-f708ccdf7396", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfmsl6m5rk24", "content": "", "creation_timestamp": "2025-01-13T13:08:10.358150Z"}, {"uuid": "b60d016e-7bb4-4b35-8ef0-0a11f3708696", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/cti-news.bsky.social/post/3lfc2zcknde2b", "content": "", "creation_timestamp": "2025-01-09T06:39:48.271802Z"}, {"uuid": "0fdd52ac-4022-4a43-9ed5-0bf82c7fafd1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-1ce10b77-6eb97309939566ed", "content": "", "creation_timestamp": "2025-01-13T13:59:22.558526Z"}, {"uuid": "d04f35c6-5bed-4879-bc2c-2c445a32a38f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://infosec.exchange/users/0patch/statuses/113826896984768625", "content": "", "creation_timestamp": "2025-01-14T13:16:52.404013Z"}, {"uuid": "1b86332b-f9aa-494c-babb-08256376ddb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfc3puelss2j", "content": "", "creation_timestamp": "2025-01-09T06:52:25.230988Z"}, {"uuid": "5dbb772c-36c1-4982-81ca-7594f1dfe39a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/wiretor.bsky.social/post/3lfklwcucxc2n", "content": "", "creation_timestamp": "2025-01-12T16:03:48.048724Z"}, {"uuid": "4dfd66b3-a757-4001-b674-52cff932acef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lftq7b5nh22y", "content": "", "creation_timestamp": "2025-01-16T07:14:21.369968Z"}, {"uuid": "1667d43c-eb49-4912-a549-f7ccbc569e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://threatintel.cc/2025/01/13/infostealer-masquerades-as-poc-code.html", "content": "", "creation_timestamp": "2025-01-13T17:34:01.000000Z"}, {"uuid": "4c9d2206-678e-415e-9b9f-3b0a15b76075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfpfwpbc5u2x", "content": "", "creation_timestamp": "2025-01-14T13:59:49.126703Z"}, {"uuid": "4b9b8de8-2222-4812-af10-d65bcfa45d65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/caproni.fr/post/3lfcvcnolo52u", "content": "", "creation_timestamp": "2025-01-09T14:30:19.616053Z"}, {"uuid": "4650a49b-6824-4279-8346-93bc4e87023b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113798930548659828", "content": "", "creation_timestamp": "2025-01-09T14:44:37.485099Z"}, {"uuid": "6c405451-6176-4e10-a62c-1c6f8f573fa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3leswytauyk2j", "content": "", "creation_timestamp": "2025-01-03T06:18:00.931102Z"}, {"uuid": "14769582-71a8-43c1-8ff3-25f7c0b1cd0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-967d2c26-4ee6731e8fa630b7", "content": "", "creation_timestamp": "2025-01-03T07:28:16.901667Z"}, {"uuid": "a4bec062-37ec-4744-bb85-2a5146f22973", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3leta3gaow22q", "content": "", "creation_timestamp": "2025-01-03T09:00:35.847583Z"}, {"uuid": "fa601bd8-6f12-4fd3-88eb-edfbccac3877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3leta7eblts2l", "content": "", "creation_timestamp": "2025-01-03T09:02:43.685164Z"}, {"uuid": "9bf77e59-018f-4761-9ce8-cc8782f343f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/3kkenekkepen.bsky.social/post/3letdsqtt2k2o", "content": "", "creation_timestamp": "2025-01-03T10:07:19.873549Z"}, {"uuid": "7b322443-749d-40aa-9d44-28355d3c0d46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3letfrg5b4n2t", "content": "", "creation_timestamp": "2025-01-03T10:42:19.516438Z"}, {"uuid": "c938e34d-9b03-40e5-a4c1-abf4519bc6df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html", "content": "", "creation_timestamp": "2025-01-03T07:16:00.000000Z"}, {"uuid": "8e8f9ab0-94d4-4ec8-b57a-e7188ef1a5a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3letkkziyup2n", "content": "", "creation_timestamp": "2025-01-03T12:08:13.373223Z"}, {"uuid": "e6064f02-c2fe-4d61-a4ce-aee8d5bfe8f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/neroqc.bsky.social/post/3letqslm54s2u", "content": "", "creation_timestamp": "2025-01-03T13:59:51.682702Z"}, {"uuid": "f4056f5a-c27d-4d78-bbaa-1b27318bdbc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3letvo2yg5p24", "content": "", "creation_timestamp": "2025-01-03T15:26:45.900880Z"}, {"uuid": "160e96ee-afa9-4dc4-867c-dec586fb2423", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-49113", "type": "seen", "source": "https://mastodon.social/users/verbrecher/statuses/113766453177064719", "content": "", "creation_timestamp": "2025-01-03T21:05:12.425711Z"}, {"uuid": "84293edd-80b0-4945-8033-abd860b53593", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lewese3j7w2j", "content": "", "creation_timestamp": "2025-01-04T15:02:56.316571Z"}, {"uuid": "5dfec359-2e19-48d0-af76-11aa8a6687b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-49113", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ley5rrn64s2r", "content": "", "creation_timestamp": "2025-01-05T08:02:56.718837Z"}, {"uuid": "277ab205-c68a-4af6-a992-154885522ca8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-49113", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/113774737553826951", "content": "", "creation_timestamp": "2025-01-05T08:12:01.869262Z"}, {"uuid": "45529fbd-f89c-4054-97e6-7f9e090265e5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-49113", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/113775209399756842", "content": "", "creation_timestamp": "2025-01-05T10:12:01.738228Z"}, {"uuid": "7e631434-6770-4eca-9af8-be44117a4d0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113776614539165743", "content": "", "creation_timestamp": "2025-01-05T16:09:25.003457Z"}, {"uuid": "f157498b-4f58-44af-8689-9b1cfeb2b52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2024-0470", "content": "", "creation_timestamp": "2025-01-06T06:30:29.000000Z"}, {"uuid": "c153ac23-9d53-4be7-8119-6688a338abff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/kaldata.bsky.social/post/3lf33b35bnu2l", "content": "", "creation_timestamp": "2025-01-06T11:55:31.379435Z"}, {"uuid": "bb9c1d87-df43-4e90-b4bc-f83aa02e204d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/giterlizzi.dev/post/3lf3bpdoqh22i", "content": "", "creation_timestamp": "2025-01-06T13:50:54.836705Z"}, {"uuid": "5c4dd6ce-1d96-4504-a33a-d5860623476e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lflbeyaae22p", "content": "", "creation_timestamp": "2025-01-12T22:27:40.448743Z"}, {"uuid": "4f865a1b-dec7-486d-9f45-61533bdd73cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfcx6xa52j27", "content": "", "creation_timestamp": "2025-01-09T15:04:03.312911Z"}, {"uuid": "11489145-c545-4977-85b0-5942f4a13c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://mastodon.social/users/verbrecher/statuses/113806560520611727", "content": "", "creation_timestamp": "2025-01-10T23:05:01.692195Z"}, {"uuid": "1075c36b-4563-420b-9142-6bb628ba6a35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://mastodon.social/users/verbrecher/statuses/113806570068418012", "content": "", "creation_timestamp": "2025-01-10T23:07:29.011637Z"}, {"uuid": "a35adccf-4702-46c0-99e4-37466d3237f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfca3g5emk24", "content": "", "creation_timestamp": "2025-01-09T08:10:28.639882Z"}, {"uuid": "73f8a0e9-2526-4929-ac06-3d55d2df6e4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://infosec.exchange/users/patrickcmiller/statuses/113807531761421685", "content": "", "creation_timestamp": "2025-01-11T03:12:01.726526Z"}, {"uuid": "78878dac-bee5-4e20-8daf-91678ae0b19b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/r-blueteamsec.bsky.social/post/3lfwpiwobjh2m", "content": "", "creation_timestamp": "2025-01-17T11:39:42.106334Z"}, {"uuid": "d0d3dfbd-1ee6-423b-8dc9-c7cdb7714057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/socprime.com/post/3lfx5gl64td2o", "content": "", "creation_timestamp": "2025-01-17T15:48:55.203597Z"}, {"uuid": "7717aab7-dada-4d6b-a4e3-69bcc2d332c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/socprime.com/post/3lfx5uo73xc2q", "content": "", "creation_timestamp": "2025-01-17T15:56:52.421435Z"}, {"uuid": "221dfa33-e8ab-4373-a0cb-b04f7de4af37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/decrypt.lol/post/3lgxs66lja52l", "content": "", "creation_timestamp": "2025-01-30T15:25:15.892263Z"}, {"uuid": "6844f0af-8fcc-483e-b51b-7571345719c3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lswtwyklns2p", "content": "", "creation_timestamp": "2025-07-01T23:26:41.911142Z"}, {"uuid": "19372c67-80dd-4367-b45c-5bafbf2e2f7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "MISP/bd312f64-bd8b-48d9-b2f2-3c7ee31a5c9f", "content": "", "creation_timestamp": "2025-01-28T09:17:53.000000Z"}, {"uuid": "ef2535b6-196a-4a26-ba97-cdc3eb5a34d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/pentest-tools.bsky.social/post/3lgss5eha622u", "content": "", "creation_timestamp": "2025-01-28T15:41:32.410272Z"}, {"uuid": "b7b72878-3c4f-4f53-9f88-eec0735a717f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/pentest-tools.bsky.social/post/3lgss5ehhy22u", "content": "", "creation_timestamp": "2025-01-28T15:41:32.926052Z"}, {"uuid": "951c1888-50a7-463f-9151-f831e5f79207", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/kriptabiz.bsky.social/post/3lkrdcpxduo2u", "content": "", "creation_timestamp": "2025-03-19T23:24:08.320391Z"}, {"uuid": "4c476f4f-a9c6-4198-99e4-ad3619694059", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://bsky.app/profile/schnoog.eu/post/3lk5ucfvw4s27", "content": "", "creation_timestamp": "2025-03-12T05:34:57.319445Z"}, {"uuid": "27f68362-cd96-4cce-9a2f-d033ef375029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/21334", "content": "\u200aFake LDAPNightmware exploit on GitHub spreads infostealer malware\n\nA deceptive proof-of-concept (PoC) exploit for CVE-2024-49113 (aka \"LDAPNightmare\") on GitHub infects users with infostealer malware that exfiltrates sensitive data to an external FTP server. [...]\n\nhttps://www.bleepingcomputer.com/news/security/fake-ldapnightmware-exploit-on-github-spreads-infostealer-malware/", "creation_timestamp": "2025-01-11T19:13:38.000000Z"}, {"uuid": "1e5b8066-b4f1-4685-b9fc-e5838cecc678", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-495cbc43-6597c8b3203e4b61", "content": "", "creation_timestamp": "2025-08-11T08:26:12.958671Z"}, {"uuid": "21cc03ac-1561-4ea5-a36d-7229a6cd85ba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/9aa579cb-be14-4a74-9427-91defcc2ccd5", "content": "", "creation_timestamp": "2025-01-02T22:00:01.220523Z"}, {"uuid": "dad349b2-3145-4557-af90-cbedbddb8732", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/elblogden4p5t3r/358", "content": "\ud83d\udcc3 \"Exploit DoS para LDAPNightmare (CVE-2024-49112)\" https://www.hackplayers.com/2025/01/exploit-dos-para-ldapnightmare-cve-2024.html\n\n\ud83d\udee0 LDAP Nightmare https://github.com/SafeBreach-Labs/CVE-2024-49113", "creation_timestamp": "2025-02-10T12:55:16.000000Z"}, {"uuid": "980c75ee-36a1-4c3e-9996-20391dc13213", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/792", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49113\n\ud83d\udd39 Description: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability\n\ud83d\udccf Published: 2024-12-10T17:49:45.354Z\n\ud83d\udccf Modified: 2025-01-08T18:54:27.805Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113", "creation_timestamp": "2025-01-08T19:15:51.000000Z"}, {"uuid": "fe9565f7-1b22-40f1-889b-a142fe31d8be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/codeby_sec/8692", "content": "\u0421\u0442\u0438\u043b\u0435\u0440 \u043c\u0430\u0441\u043a\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043f\u043e\u0434 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u0434\u043b\u044f LDAPNightmare (CVE-2024-49113). \n\n\u2757\ufe0f \u0412 \u0440\u0430\u043c\u043a\u0430\u0445 \"Patch Tuesday\" \u043e\u0442 Microsoft \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 \u0431\u044b\u043b\u0438 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u044b \u0434\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 LDAP. \u041e\u0431\u0435 \u0431\u044b\u043b\u0438 \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u044b \u043e\u0447\u0435\u043d\u044c \u0441\u0435\u0440\u044c\u0451\u0437\u043d\u044b\u043c\u0438 \u0438\u0437-\u0437\u0430 \u0448\u0438\u0440\u043e\u043a\u043e\u0433\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f LDAP \u0432 \u0441\u0440\u0435\u0434\u0430\u0445 Windows:\n\u23fa\ufe0fCVE-2024-49112: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043a\u043e\u0434\u0430 (RCE), \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b LDAP.\n\u23fa\ufe0fCVE-2024-49113: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0442\u0438\u043f\u0430 \u00ab\u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438\u00bb (DoS), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0441\u0431\u043e\u044f \u0441\u043b\u0443\u0436\u0431\u044b LDAP.\n\n\ud83d\udcb1 \u0417\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0441\u043e\u0437\u0434\u0430\u043b\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439, \u0434\u0435\u043c\u043e\u043d\u0441\u0442\u0440\u0438\u0440\u0443\u044e\u0449\u0438\u0439 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u043e \u043a\u043e\u043d\u0446\u0435\u043f\u0446\u0438\u0438 CVE-2024-49113. \u0412\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043e\u043d \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043e\u0442\u0432\u0435\u0442\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043e\u0442 \u0438\u0441\u0445\u043e\u0434\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f, \u043d\u043e \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b Python \u0431\u044b\u043b\u0438 \u0437\u0430\u043c\u0435\u043d\u0435\u043d\u044b \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u043c \u0444\u0430\u0439\u043b\u043e\u043c poc.exe, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0431\u044b\u043b \u0443\u043f\u0430\u043a\u043e\u0432\u0430\u043d \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e UPX. \u0425\u043e\u0442\u044f \u043d\u0430 \u043f\u0435\u0440\u0432\u044b\u0439 \u0432\u0437\u0433\u043b\u044f\u0434 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 \u0432\u044b\u0433\u043b\u044f\u0434\u0438\u0442 \u043d\u043e\u0440\u043c\u0430\u043b\u044c\u043d\u043e, \u043d\u0430\u043b\u0438\u0447\u0438\u0435 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u043e\u0433\u043e \u0444\u0430\u0439\u043b\u0430 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u043f\u043e\u0434\u043e\u0437\u0440\u0435\u043d\u0438\u044f \u0438\u0437-\u0437\u0430 \u0435\u0433\u043e \u043d\u0435\u043e\u0436\u0438\u0434\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u0432 \u043f\u0440\u043e\u0435\u043a\u0442\u0435 \u043d\u0430 Python.\n\n\u270f\ufe0f \u041a\u043e\u0433\u0434\u0430 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u0435\u0442 \u0444\u0430\u0439\u043b, \u0432 \u043f\u0430\u043f\u043a\u0443 %Temp% \u043f\u043e\u043c\u0435\u0449\u0430\u0435\u0442\u0441\u044f \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439 PowerShell. \u042d\u0442\u043e \u0441\u043e\u0437\u0434\u0430\u0451\u0442 \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u0437\u0430\u0434\u0430\u043d\u0438\u0435, \u043a\u043e\u0442\u043e\u0440\u043e\u0435, \u0432 \u0441\u0432\u043e\u044e \u043e\u0447\u0435\u0440\u0435\u0434\u044c, \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u043a\u0440\u0438\u043f\u0442 \u0441 Pastebin. \u0414\u0430\u043b\u0435\u0435 \u043e\u043d \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0439 IP-\u0430\u0434\u0440\u0435\u0441 \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0430 \u0436\u0435\u0440\u0442\u0432\u044b \u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0435\u0433\u043e \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e FTP. \u0417\u0430\u0442\u0435\u043c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442\u0441\u044f \u0438 \u0441\u0436\u0438\u043c\u0430\u0435\u0442\u0441\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e ZIP, \u043f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442\u0441\u044f \u043d\u0430 \u0432\u043d\u0435\u0448\u043d\u0438\u0439 FTP-\u0441\u0435\u0440\u0432\u0435\u0440 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u0436\u0435\u0441\u0442\u043a\u043e \u0437\u0430\u0434\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\ud83d\udee1 \u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u043f\u043e\u043f\u0430\u0434\u0430\u043d\u0438\u044f \u0432 \u0442\u0430\u043a\u0438\u0435 \u0441\u0438\u0442\u0443\u0430\u0446\u0438\u0438 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0431\u044b\u0442\u044c \u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u044b\u043c \u0441 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f\u043c\u0438 \u0443 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043c\u0430\u043b\u043e stars, forks, contributors. \u0422\u0430\u043a \u0436\u0435 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u043e\u0441\u043c\u0430\u0442\u0440\u0438\u0432\u0430\u0442\u044c \u0438\u0441\u0442\u043e\u0440\u0438\u044e \u043a\u043e\u043c\u043c\u0438\u0442\u043e\u0432 \u0438 \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u0432 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438 \u043d\u0430 \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438.", "creation_timestamp": "2025-01-29T07:06:29.000000Z"}, {"uuid": "128355b7-fb93-4ca2-a486-6b2d7f30b0df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/256", "content": "CVE-2024-49113: LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 #PoC #LdapNightmare #CVE202449113 #SafeBreachLabs #WindowsServerVulnerability https://github.com/SafeBreach-Labs/CVE-2024-49113", "creation_timestamp": "2025-02-03T19:31:44.000000Z"}, {"uuid": "2e29d550-1f16-4fc3-a5eb-9ef4487ed302", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/hackingbra/228", "content": "PoC:\nhttps://github.com/SafeBreach-Labs/CVE-2024-49113 \n\nBlog: https://www.safebreach.com/blog/ldapnightmare-safebreach-labs-publishes-first-proof-of-concept-exploit-for-CVE-2024-49113/", "creation_timestamp": "2025-01-03T13:37:07.000000Z"}, {"uuid": "407cbc93-5de6-478c-a1b4-37b3f1f57401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9696", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aLdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113\nURL\uff1ahttps://github.com/SafeBreach-Labs/CVE-2024-49113\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2025-01-02T16:04:05.000000Z"}, {"uuid": "ed8138e6-c1bc-47bd-b9e0-605ba47237f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/13003", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-49113\n\ud83d\udd25 CVSS Score: 7.5 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)\n\ud83d\udd39 Description: Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability\n\ud83d\udccf Published: 2024-12-10T17:49:45.354Z\n\ud83d\udccf Modified: 2025-04-23T03:56:02.133Z\n\ud83d\udd17 References:\n1. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49113", "creation_timestamp": "2025-04-23T04:03:54.000000Z"}, {"uuid": "9e6e7808-281f-4197-be36-132d1a17be6f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "Telegram/6dN-xPk5ChsV-Ud1UMbF9kuccvIlVY21KcYcIldvuep9gA", "content": "", "creation_timestamp": "2025-01-03T10:46:05.000000Z"}, {"uuid": "1ba73c1b-f496-4c94-a86a-9395ad412d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/ddos_guard/603", "content": "\u200b\u0412 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430 Microsoft \u0443\u0441\u0442\u0440\u0430\u043d\u0438\u043b\u0430 \u0434\u0432\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 LDAP \u0434\u043b\u044f Windows, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0431\u044b\u043b\u0438 \u043e\u0446\u0435\u043d\u0435\u043d\u044b \u043a\u0430\u043a \u043a\u0440\u0430\u0439\u043d\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u0435.\n\n\u041f\u0435\u0440\u0432\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, CVE-2024-49112 (CVSS: 9.8), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u043b\u0430 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434. \u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, CVE-2024-49113 (CVSS: 7.5), \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u043e\u0442\u043a\u0430\u0437\u0443 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438.\n\n\u0421\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0430 GitHub \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c LDAPNightmare \u0434\u043b\u044f CVE-2024-49113. \u041e\u043d \u0431\u044b\u043b \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043d \u0434\u043b\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043b\u0438  \u0430\u0440\u0445\u0438\u0432 \u0441 \u043d\u0430\u043c\u0435\u0440\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0432\u0435\u0441\u0442\u0438 \u0430\u043d\u0430\u043b\u0438\u0437.\n\n\u0412 \u0444\u0438\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f Python-\u0444\u0430\u0439\u043b\u044b \u0431\u044b\u043b\u0438 \u0437\u0430\u043c\u0435\u043d\u0435\u043d\u044b \u043d\u0430 \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u0439 \u0444\u0430\u0439\u043b poc.exe. \u041f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043e\u043d \u0441\u043e\u0437\u0434\u0430\u0435\u0442 PowerShell-\u0441\u043a\u0440\u0438\u043f\u0442 \u0432 \u043f\u0430\u043f\u043a\u0435 %Temp%, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u0441 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043d\u0430 \u0432\u043d\u0435\u0448\u043d\u0438\u0439 FTP-\u0441\u0435\u0440\u0432\u0435\u0440.\n\n\u041f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0435\u043c\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u043e \u043a\u043e\u043c\u043f\u044c\u044e\u0442\u0435\u0440\u0435, \u0441\u043f\u0438\u0441\u043e\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u044b\u0445 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432, \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u043c\u043e\u0435 \u043f\u0430\u043f\u043e\u043a \u0438 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u043f\u0430\u0440\u0430\u043c\u0435\u0442\u0440\u044b.\n\n\u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439 \u0443\u0434\u0430\u043b\u0438\u043b\u0438, \u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0418\u0411 \u043d\u0430\u043f\u043e\u043c\u043d\u0438\u043b\u0438 \u043e \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u0441\u043e\u0431\u043b\u044e\u0434\u0430\u0442\u044c \u043e\u0441\u0442\u043e\u0440\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0442\u043e\u043b\u044c\u043a\u043e \u043e\u0442 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0418\u0411-\u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0438 \u0430\u043a\u043a\u0430\u0443\u043d\u0442\u043e\u0432 \u0441 \u0445\u043e\u0440\u043e\u0448\u0435\u0439 \u0440\u0435\u043f\u0443\u0442\u0430\u0446\u0438\u0435\u0439.", "creation_timestamp": "2025-01-16T09:16:16.000000Z"}, {"uuid": "434ea38a-0385-47bb-bce6-3fb1b212a50d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/CyberBulletin/2032", "content": "\u26a1\ufe0fHackers are impersonating cybersecurity giant CrowdStrike, tricking victims into downloading a cryptominer disguised as a recruitment tool.\n\nIn a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113).\n\n#CyberBulletin", "creation_timestamp": "2025-01-10T16:21:17.000000Z"}, {"uuid": "8eacb846-f4d5-4e94-a7b6-464a274813fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/true_secator/6614", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Trend Micro \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0436\u0434\u0430\u044e\u0442 \u043e \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438 \u0438\u043d\u0444\u043e\u043a\u0440\u0430\u0434\u0430, \u0437\u0430\u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0433\u043e \u043f\u043e\u0434 \u043a\u043e\u0434 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u043d\u0430 \u043d\u0435\u0434\u0430\u0432\u043d\u044e\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 Windows Lightweight Directory Access Protocol (LDAP).\n\nCVE-2024-49113 (CVSS 7,5), \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044e DoS, \u0431\u044b\u043b\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0430 10 \u0434\u0435\u043a\u0430\u0431\u0440\u044f \u0432 \u0441\u043e\u0441\u0442\u0430\u0432\u0435 \u0431\u043e\u043b\u0435\u0435 \u0447\u0435\u043c 70 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0440\u0443\u0433\u0443\u044e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0443\u044e \u043e\u0448\u0438\u0431\u043a\u0443 LDAP (CVE-2024-49112), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a RCE.\n\n\u041c\u0435\u043d\u0435\u0435 \u0447\u0435\u043c \u0447\u0435\u0440\u0435\u0437 \u043c\u0435\u0441\u044f\u0446 \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0439 \u0434\u043b\u044f \u0434\u0432\u0443\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 SafeBreach \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0430 PoC, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 CVE-2024-49113, \u043f\u043e\u043b\u0430\u0433\u0430\u044f, \u0447\u0442\u043e \u0435\u0435 \u0441\u043b\u0435\u0434\u0443\u0435\u0442 \u0441\u0447\u0438\u0442\u0430\u0442\u044c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435 \u0432\u0430\u0436\u043d\u043e\u0439, \u043d\u0435\u0436\u0435\u043b\u0438 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c.\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c SafeBreach, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u043c\u0435\u043d\u0443\u0435\u0442 CVE-2024-49113 \u043a\u0430\u043a LDAPNightmare, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0434\u043b\u044f \u0432\u044b\u0437\u043e\u0432\u0430 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u044f \u0441\u0431\u043e\u044f \u043b\u044e\u0431\u043e\u0433\u043e \u043d\u0435\u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u0435\u0440\u0432\u0435\u0440\u0430 Windows, \u0434\u0430\u0436\u0435 \u0435\u0441\u043b\u0438 \u043e\u043d \u043d\u0435 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u043e\u043c \u0434\u043e\u043c\u0435\u043d\u0430, \u043f\u0440\u0438 \u043d\u0430\u043b\u0438\u0447\u0438\u0438 DNS-\u0441\u0435\u0440\u0432\u0435\u0440\u0430, \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u043e\u0433\u043e \u0447\u0435\u0440\u0435\u0437 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442.\n\n\u0410 \u0432 Trend Micro \u0432\u0437\u0433\u043b\u044f\u043d\u0443\u043b\u0438 \u043d\u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e LDAPNightmare \u0441 \u0434\u0440\u0443\u0433\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u044b, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432 \u0444\u0435\u0439\u043a\u043e\u0432\u044b\u0439 PoC, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043d\u0430\u0446\u0435\u043b\u0435\u043d \u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0441 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u043c \u041f\u041e \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043d\u0430 \u0431\u043e\u0440\u0442\u0443.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0442\u0430\u043a\u0442\u0438\u043a\u0430 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043d\u0438\u044f PoC-\u043f\u0440\u0438\u043c\u0430\u043d\u043e\u043a \u0434\u043b\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0438 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0433\u043e \u041f\u041e \u0434\u0430\u043b\u0435\u043a\u043e \u043d\u0435 \u043d\u043e\u0432\u0430, \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u043c\u0430\u044f \u0430\u0442\u0430\u043a\u0430 \u0432\u0441\u0435 \u0436\u0435 \u0432\u044b\u0437\u044b\u0432\u0430\u0435\u0442 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u0435 \u043e\u043f\u0430\u0441\u0435\u043d\u0438\u044f \u0432 \u0432\u0438\u0434\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432 \u043c\u043e\u043c\u0435\u043d\u0442\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442 \u043e\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u0431\u043e\u043b\u044c\u0448\u043e\u0435 \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u0436\u0435\u0440\u0442\u0432.\n\nPoC \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439, \u043e\u0442\u0432\u0435\u0442\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u043e\u0442 \u043e\u0440\u0438\u0433\u0438\u043d\u0430\u043b\u0430, \u0438 \u0437\u0430\u043c\u0435\u043d\u044f\u0435\u0442 \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b Python \u0438\u0441\u043f\u043e\u043b\u043d\u044f\u0435\u043c\u044b\u043c \u0444\u0430\u0439\u043b\u043e\u043c, \u0443\u043f\u0430\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e UPX.\n\n\u041f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 PoC \u043f\u043e\u043c\u0435\u0449\u0430\u0435\u0442 \u0441\u043a\u0440\u0438\u043f\u0442 PowerShell \u0432\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u0443\u044e \u043f\u0430\u043f\u043a\u0443 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. \u0421\u043a\u0440\u0438\u043f\u0442 \u0441\u043e\u0437\u0434\u0430\u0435\u0442 \u0437\u0430\u043f\u043b\u0430\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0437\u0430\u0434\u0430\u0447\u0443, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442 \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u043a\u0440\u0438\u043f\u0442, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0434\u0440\u0443\u0433\u043e\u0433\u043e \u0441\u043a\u0440\u0438\u043f\u0442\u0430 \u0438\u0437 Pastebin.\n\n\u0412\u0442\u043e\u0440\u043e\u0439 \u0441\u043a\u0440\u0438\u043f\u0442 \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e, \u0442\u0430\u043a\u0443\u044e \u043a\u0430\u043a \u0441\u043f\u0438\u0441\u043e\u043a \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0432, \u0441\u043f\u0438\u0441\u043e\u043a \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u043e\u0432, IP-\u0430\u0434\u0440\u0435\u0441\u0430, \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0430\u0434\u0430\u043f\u0442\u0435\u0440\u0430\u0445 \u0441\u0435\u0442\u0438 \u0438 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439, \u0441\u0436\u0438\u043c\u0430\u0435\u0442 \u0435\u0435 \u0432 ZIP-\u0430\u0440\u0445\u0438\u0432 \u0438 \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u043d\u0430 \u0432\u043d\u0435\u0448\u043d\u0438\u0439 FTP-\u0441\u0435\u0440\u0432\u0435\u0440, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u0436\u0435\u0441\u0442\u043a\u043e \u0437\u0430\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u0443\u0447\u0435\u0442\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435.\n\n\u041f\u0435\u0440\u0435\u0447\u0435\u043d\u044c IoC - \u0437\u0434\u0435\u0441\u044c.", "creation_timestamp": "2025-01-13T19:14:21.000000Z"}, {"uuid": "5347ceb6-61a6-43a5-bd15-4a186cb73005", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1465", "content": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113.\n\nhttps://github.com/SafeBreach-Labs/CVE-2024-49113\n\n#CyberDilara", "creation_timestamp": "2025-01-19T10:29:44.000000Z"}, {"uuid": "04f04665-9110-4fcb-ae59-b77719682f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4084", "content": "#Github #Tools \n\nCreate agents that monitor and act on your behalf. Your agents are standing by!\n\nhttps://github.com/huginn/huginn\n\nStalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.\n\nhttps://github.com/ThoughtfulDev/EagleEye\n\nCVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit\n\nhttps://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit\n\nA high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.\n\nhttps://github.com/vxfemboy/ghostport\n\nLdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113\n\nhttps://github.com/SafeBreach-Labs/CVE-2024-49113\n\n#HackersFactory", "creation_timestamp": "2025-01-14T12:32:42.000000Z"}, {"uuid": "f18c8c1f-b4b3-4fc9-8b9a-981f3ec3972a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "Telegram/jlozJxBZ6c2zPMb8t9ZTUmCjCeY81oRo5qY8Duk3lR3oDeM", "content": "", "creation_timestamp": "2025-02-16T04:00:07.000000Z"}, {"uuid": "3b259f2b-75cf-42d7-90ea-ec77085d0624", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7911", "content": "#Github #Tools \n\nCreate agents that monitor and act on your behalf. Your agents are standing by!\n\nhttps://github.com/huginn/huginn\n\nStalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.\n\nhttps://github.com/ThoughtfulDev/EagleEye\n\nCVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit\n\nhttps://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit\n\nA high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.\n\nhttps://github.com/vxfemboy/ghostport\n\nLdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113\n\nhttps://github.com/SafeBreach-Labs/CVE-2024-49113\n\n#HackersFactory", "creation_timestamp": "2025-01-14T12:33:29.000000Z"}, {"uuid": "51b943e5-e569-4871-bff2-b2f2d8128b65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/ctinow/229044", "content": "Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit\nhttps://ift.tt/QpZPku0", "creation_timestamp": "2025-01-09T08:19:32.000000Z"}, {"uuid": "14017377-af7f-40dc-894f-b82079b0ba9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/ctinow/228802", "content": "LDAPNightmare, a PoC exploit targets Windows LDAP flaw CVE-2024-49113\nhttps://ift.tt/HLqgCjr", "creation_timestamp": "2025-01-03T11:34:36.000000Z"}, {"uuid": "58cab9b6-64b7-4545-8716-1c38351fc3da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/ctinow/229042", "content": "Information Stealer Masquerades as LDAPNightmare (CVE-2024-49113) PoC Exploit\nhttps://ift.tt/QpZPku0", "creation_timestamp": "2025-01-09T07:29:42.000000Z"}, {"uuid": "69bffaa5-d3d4-4b0a-8755-80ca2acf7330", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/ctinow/228842", "content": "What We Know About CVE-2024-49112 and CVE-2024-49113\nhttps://ift.tt/qE3rBmt", "creation_timestamp": "2025-01-04T08:59:34.000000Z"}, {"uuid": "5f7dbc85-e6c3-494f-9101-f0922c3b5904", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "seen", "source": "https://t.me/ctinow/228841", "content": "What We Know About CVE-2024-49112 and CVE-2024-49113\nhttps://ift.tt/qE3rBmt", "creation_timestamp": "2025-01-04T08:44:14.000000Z"}, {"uuid": "28ce2464-fe21-4c2c-8d1d-b6912c5f80e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/xakep_ru/16939", "content": "\u041d\u0430 GitHub \u043d\u0430\u0448\u043b\u0438 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b LDAPNightmware\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u043d\u0430 GitHub \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0441\u0432\u0435\u0436\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-49113 (\u043e\u043d\u0430 \u0436\u0435 LDAPNightmare). \u042d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0437\u0430\u0440\u0430\u0436\u0430\u043b \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440\u043e\u043c, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u043e\u0440\u0443\u0435\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u0442 \u0438\u0445 \u043d\u0430 \u0441\u0442\u043e\u0440\u043e\u043d\u043d\u0438\u0439 FTP-\u0441\u0435\u0440\u0432\u0435\u0440.\n\nhttps://xakep.ru/2025/01/13/fake-ldapnightmware-poc/", "creation_timestamp": "2025-01-13T11:43:23.000000Z"}, {"uuid": "9ddff144-e4cf-42e0-a543-5e443db851cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/6144", "content": "\u26a0\ufe0f Hackers are impersonating cybersecurity giant CrowdStrike, tricking victims into downloading a cryptominer disguised as a recruitment tool. \n \n\ud83d\uded1 In a separate campaign, cybercriminals are targeting researchers with a fake PoC for the LDAPNightmare vulnerability (CVE-2024-49113). \n \n\ud83d\udd17 Stay informed and learn more: https://thehackernews.com/2025/01/crowdstrike-warns-of-phishing-scam.html", "creation_timestamp": "2025-01-10T10:14:12.000000Z"}, {"uuid": "dc1a566c-b9d2-4730-8316-d70e0df587a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/6110", "content": "\ud83d\udea8 Critical Flaws in LDAP Exploited! \n \nA new proof-of-concept exploit, LDAPNightmare, crashes unpatched Windows Servers with one crafted request. \n \nEven worse? RCE attacks are possible with minor tweaks. \n \n\u00bb CVE-2024-49113 causes DoS attacks. \n\u00bb CVE-2024-49112 allows remote code execution. \n \nWhat can you do? \n\u2705 Patch ASAP with Microsoft\u2019s December 2024 updates. \n\u2705 Monitor RPC calls and suspicious LDAP activity. \n \n\ud83d\udc49 Read more: https://thehackernews.com/2025/01/ldapnightmare-poc-exploit-crashes-lsass.html", "creation_timestamp": "2025-01-03T09:21:11.000000Z"}, {"uuid": "03e1934f-5354-4078-a870-04982183e0dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "exploited", "source": "https://t.me/SecLabNews/16082", "content": "\u0414\u0432\u043e\u0439\u043d\u0430\u044f \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0431\u0430\u0433\u0438 LDAP \u0438 \u0444\u0430\u043b\u044c\u0448\u0438\u0432\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\n\n\ud83d\udd25 Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0434\u0432\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0435 LDAP \u0434\u043b\u044f Windows \u0432 \u0434\u0435\u043a\u0430\u0431\u0440\u0435 2024 \u0433\u043e\u0434\u0430. \u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u0430\u044f \u0438\u0437 \u043d\u0438\u0445 (CVE-2024-49112) \u0438\u043c\u0435\u0435\u0442 \u043e\u0446\u0435\u043d\u043a\u0443 CVSS 9.8 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u043a\u043e\u0434\u0430.\n\n\ud83c\udfa3 \u0412 \u0441\u0435\u0442\u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442 LDAPNightmare, \u044f\u043a\u043e\u0431\u044b \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-49113. \u041d\u0430 \u0441\u0430\u043c\u043e\u043c \u0434\u0435\u043b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430 \u043e\u043a\u0430\u0437\u0430\u043b\u0430\u0441\u044c \u0437\u0430\u043c\u0430\u0441\u043a\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0438\u043d\u0444\u043e\u0441\u0442\u0438\u043b\u0435\u0440\u043e\u043c, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u043c \u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438.\n\n\ud83d\udd0d \u0412\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u044b\u0439 \u043a\u043e\u0434 \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u043f\u043e\u0434\u0434\u0435\u043b\u044c\u043d\u044b\u0439 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0439, \u044f\u0432\u043b\u044f\u044e\u0449\u0438\u0439\u0441\u044f \u0444\u043e\u0440\u043a\u043e\u043c \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0435\u043a\u0442\u0430. \u041f\u0440\u0438 \u0437\u0430\u043f\u0443\u0441\u043a\u0435 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441 \u0441\u043e\u0431\u0438\u0440\u0430\u0435\u0442 \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u0443\u044e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0438\u0445 \u043d\u0430 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u0439 FTP-\u0441\u0435\u0440\u0432\u0435\u0440.\n\n#cybersecurity #WindowsSecurity #LDAP #infosec\n\n@SecLabNews", "creation_timestamp": "2025-01-10T17:40:03.000000Z"}, {"uuid": "d11bcfb6-e4cc-4bb0-947a-90e4b9f03cf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/ckeArsenal/303", "content": "https://github.com/SafeBreach-Labs/CVE-2024-49113\n\nLdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113\n#github #exploit", "creation_timestamp": "2025-01-04T03:13:05.000000Z"}]}