{"vulnerability": "CVE-2024-53704", "sightings": [{"uuid": "8ca56d4c-3959-4355-bab6-98b60bdca567", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://threatintel.cc/2025/01/08/sonicwall-warns-of-an-exploitable.html", "content": "", "creation_timestamp": "2025-01-08T23:58:09.000000Z"}, {"uuid": "3618bbe9-15cd-488a-af7b-9c0fccf04e36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113822502051441311", "content": "", "creation_timestamp": "2025-01-13T18:39:10.306627Z"}, {"uuid": "6e7d777e-271a-4969-aa41-19a2c3132fba", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/technijian.bsky.social/post/3lfccm2pkvc2k", "content": "", "creation_timestamp": "2025-01-09T08:55:35.643539Z"}, {"uuid": "3a9943ca-3efa-4172-a2e2-33ad67683379", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0004", "content": "", "creation_timestamp": "2025-01-08T08:57:24.000000Z"}, {"uuid": "9cb59593-361a-476c-9ff7-7a31218d22a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/securopean.bsky.social/post/3lfb226gxwc2h", "content": "", "creation_timestamp": "2025-01-08T20:49:44.952413Z"}, {"uuid": "46464e76-800e-451f-9afd-0addebb3d2cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lfdzeyrdfc2v", "content": "", "creation_timestamp": "2025-01-10T01:15:56.752487Z"}, {"uuid": "818891ac-fdb9-42f2-94cd-80a27d6b0a44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/113806179216289038", "content": "", "creation_timestamp": "2025-01-10T21:28:06.717730Z"}, {"uuid": "666c6407-b511-4824-82cb-18735bf26797", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-012/", "content": "", "creation_timestamp": "2025-01-09T05:00:00.000000Z"}, {"uuid": "78ea2f58-3b3c-474c-bf83-e053b7b539b6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lfc2ms7ptc2j", "content": "", "creation_timestamp": "2025-01-09T06:32:48.615860Z"}, {"uuid": "cb388d11-d4fb-470c-b3be-178b25863c0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/adulau.infosec.exchange.ap.brid.gy/post/3lf5oiexfugk2", "content": "", "creation_timestamp": "2025-01-07T12:45:24.485278Z"}, {"uuid": "2371706e-16f6-4f58-9bb8-6c7a928aa581", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797093432134293", "content": "", "creation_timestamp": "2025-01-09T06:57:25.181972Z"}, {"uuid": "fd75b995-423a-4e6e-8490-fcac47008327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lfcpymlyrf27", "content": "", "creation_timestamp": "2025-01-09T12:55:13.629799Z"}, {"uuid": "2a897230-1e18-4567-a757-ece5caf22e81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/it-connect.bsky.social/post/3lfc46icj5r2v", "content": "", "creation_timestamp": "2025-01-09T07:00:36.142826Z"}, {"uuid": "8cf52439-c1e4-41de-b889-6aa9d8028eb0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113797106857626931", "content": "", "creation_timestamp": "2025-01-09T07:00:49.951510Z"}, {"uuid": "e95268cb-720a-4440-8d4a-f055bd01b548", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lfar4oen3r2t", "content": "", "creation_timestamp": "2025-01-08T18:10:05.148342Z"}, {"uuid": "a52acd9e-7777-41f9-b42b-25b73b3edf18", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lfc522h6rw2l", "content": "", "creation_timestamp": "2025-01-09T07:16:01.155381Z"}, {"uuid": "fb807f27-5cb9-4049-b9b9-8551fadc4f04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lfc6m4jm4s2w", "content": "", "creation_timestamp": "2025-01-09T07:44:01.056637Z"}, {"uuid": "697d676d-88dc-4037-a419-e6d56388f372", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lfliclwxic2g", "content": "", "creation_timestamp": "2025-01-13T00:31:42.895292Z"}, {"uuid": "9a78e220-5d3a-43a3-8d53-b4227197a9eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/113799181971417372", "content": "", "creation_timestamp": "2025-01-09T15:48:34.177106Z"}, {"uuid": "7c747a3a-fe97-4dd4-89a3-a0c6c79824a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113788992074892039", "content": "", "creation_timestamp": "2025-01-07T20:37:08.840855Z"}, {"uuid": "d3a6f92f-e92e-4880-92a6-83023f101137", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lfhumredwy2u", "content": "", "creation_timestamp": "2025-01-11T14:01:24.487772Z"}, {"uuid": "cd07585c-d692-4e36-8b9a-5dfc60878d9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/br4inde4d.bsky.social/post/3lfxflscp6k2u", "content": "", "creation_timestamp": "2025-01-17T18:15:01.851723Z"}, {"uuid": "d05030b9-debf-46b5-8795-e03a544bae71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/christiaanbeek.bsky.social/post/3lguqbxll322q", "content": "", "creation_timestamp": "2025-01-29T10:13:37.365498Z"}, {"uuid": "71c249c6-5356-46ac-948c-c80889adda79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://bsky.app/profile/sambowne.infosec.exchange.ap.brid.gy/post/3lgef6ftn45s2", "content": "", "creation_timestamp": "2025-01-22T22:12:14.365349Z"}, {"uuid": "3b37b1be-abbc-4ea5-a024-ad018af65692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/dragonjar/statuses/113911335228727190", "content": "", "creation_timestamp": "2025-01-29T11:10:37.503997Z"}, {"uuid": "39e0aa57-51b2-4210-b053-bc4127f20b8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/xnyhps/statuses/113907592377342111", "content": "", "creation_timestamp": "2025-01-28T19:18:45.719050Z"}, {"uuid": "34045b94-7011-4d40-8da4-854d055547db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3lgfyw2dapp2x", "content": "", "creation_timestamp": "2025-01-23T13:38:02.754580Z"}, {"uuid": "9dd3f54a-4fe6-407f-9659-53e9d8e0e8d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3lgqvrgvcpz2x", "content": "", "creation_timestamp": "2025-01-27T21:41:04.109648Z"}, {"uuid": "d1a82fa1-e5b3-4b86-9aac-1fb86ffb295f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lgscaioi6k2n", "content": "", "creation_timestamp": "2025-01-28T10:56:54.012113Z"}, {"uuid": "561fcbd0-d88a-43c4-8a6c-66e32dd7fa1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://bsky.app/profile/Reverse-Engineering.activitypub.awakari.com.ap.brid.gy/post/3lgqcyp3yppq2", "content": "", "creation_timestamp": "2025-01-27T16:05:08.342503Z"}, {"uuid": "e58298b0-772f-4e9f-9dca-1b825be12223", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/schubringglobal.bsky.social/post/3lgtreb5x3p2f", "content": "", "creation_timestamp": "2025-01-29T01:00:06.389676Z"}, {"uuid": "1705e6c1-a85d-4894-8ca1-0a530f82d931", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/helpnetsecurity.com/post/3lgq7swnhdk2j", "content": "", "creation_timestamp": "2025-01-27T15:08:13.952206Z"}, {"uuid": "ec6c96e7-bf67-46bf-8ef3-85543e1b797d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/mrbyte.bsky.social/post/3lh2vif4lls2x", "content": "", "creation_timestamp": "2025-01-31T21:02:47.219618Z"}, {"uuid": "18058965-d817-4420-89f7-f8528c69038c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/catc0n/statuses/113906827046497525", "content": "", "creation_timestamp": "2025-01-28T16:04:07.123373Z"}, {"uuid": "f8c50482-0a81-4a9e-a445-9c73dc5ecd83", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3lgqg6odjt627", "content": "", "creation_timestamp": "2025-01-27T17:02:07.714813Z"}, {"uuid": "067434e2-d087-4e40-a5c1-27f97e4dd3ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/catc0n.bsky.social/post/3lgsuvlofmc2l", "content": "", "creation_timestamp": "2025-01-28T16:30:50.241792Z"}, {"uuid": "2722fbae-9c52-4f58-8b18-2b9c64b799f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/xnyhps/statuses/113896553636102157", "content": "", "creation_timestamp": "2025-01-26T20:31:29.428422Z"}, {"uuid": "d0036a5b-c791-4322-9a25-fe4841079d78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/br4inde4d.bsky.social/post/3lhty27ofqk2q", "content": "", "creation_timestamp": "2025-02-10T20:24:57.875720Z"}, {"uuid": "be5b6f93-de82-451c-bcaa-eac4ae9d868c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://threatintel.cc/2025/01/23/sonicwall-cve-ssl-vpn-session.html", "content": "", "creation_timestamp": "2025-01-23T13:22:14.000000Z"}, {"uuid": "95d98c66-bf04-40f5-9b41-39ac41f44941", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgz3bbaydk2u", "content": "", "creation_timestamp": "2025-01-31T03:40:46.964370Z"}, {"uuid": "9bedbdb2-f317-4f1e-9bc3-a6c96c93a510", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113872929744601721", "content": "", "creation_timestamp": "2025-01-22T16:23:35.829248Z"}, {"uuid": "b430cc66-5625-412e-affc-1baf4c01117e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lgdyhpcxek23", "content": "", "creation_timestamp": "2025-01-22T18:24:48.492765Z"}, {"uuid": "77736ba0-6f85-459f-a82f-c0b35d03e3ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-05)", "content": "", "creation_timestamp": "2025-03-05T00:00:00.000000Z"}, {"uuid": "959b38ac-d28a-4841-8ba2-cc5549c82d58", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lhwaru7due2d", "content": "", "creation_timestamp": "2025-02-11T18:06:38.661946Z"}, {"uuid": "d156909e-86b1-4836-924b-4744d1b4be30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/undercodenews.bsky.social/post/3lhwaynmyoa2l", "content": "", "creation_timestamp": "2025-02-11T18:10:26.792876Z"}, {"uuid": "20986741-f858-4c94-ade2-a20b380f59b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3lhy6gv57oc2n", "content": "", "creation_timestamp": "2025-02-12T12:30:02.693402Z"}, {"uuid": "cdbd5f71-2d37-43fd-916d-170214db78cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/youranonriots.bsky.social/post/3lhxbblxtzs2k", "content": "", "creation_timestamp": "2025-02-12T03:48:06.423597Z"}, {"uuid": "70b351a5-ae77-4aaa-b873-7cda130c4cd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lhwhqr57xs2b", "content": "", "creation_timestamp": "2025-02-11T20:11:22.222205Z"}, {"uuid": "1ff95363-08c6-4919-9a95-09469ba0b130", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/techtales.bsky.social/post/3lhylkgttco2k", "content": "", "creation_timestamp": "2025-02-12T16:24:41.207831Z"}, {"uuid": "00b9a98b-2e0c-4056-8985-6ca50e547029", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://threatintel.cc/2025/02/12/sonicwall-firewall-exploit-lets-hackers.html", "content": "", "creation_timestamp": "2025-02-12T12:09:55.000000Z"}, {"uuid": "11b3dc5c-8b7a-41b6-9266-f5bc2f3175a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3lhyr6eecke2l", "content": "", "creation_timestamp": "2025-02-12T18:05:18.086684Z"}, {"uuid": "d363b767-5526-437b-97fa-7775329278dc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "3e79fcb5-d162-432c-8fc7-26d17f13e653", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-53704.yaml", "content": "", "creation_timestamp": "2025-02-11T20:18:51.000000Z"}, {"uuid": "231e806c-8fa9-42e5-ad91-f1237add5748", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/114002767455751906", "content": "", "creation_timestamp": "2025-02-14T14:43:01.506614Z"}, {"uuid": "c823d9ce-8cac-4a73-be77-7f460124b5d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/campuscodi.risky.biz/post/3li5petukvs2c", "content": "", "creation_timestamp": "2025-02-14T17:16:27.113967Z"}, {"uuid": "7f119a3b-d7c3-411d-8f1d-5de334f3d211", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3li5td335in2p", "content": "", "creation_timestamp": "2025-02-14T18:27:01.842880Z"}, {"uuid": "94912032-eceb-40f3-b3b1-ecac3162c1bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://threatintel.cc/2025/02/14/sonicwall-firewall-vulnerability-exploited-after.html", "content": "", "creation_timestamp": "2025-02-14T13:42:53.000000Z"}, {"uuid": "fd1dc025-c825-4554-8153-9d45287de64c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3li63y6tdnh2a", "content": "", "creation_timestamp": "2025-02-14T21:02:02.769591Z"}, {"uuid": "8c70e62b-27e9-47a7-9953-2972651c4cb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/zeljkazorz/statuses/114001772161112726", "content": "", "creation_timestamp": "2025-02-14T10:29:54.587000Z"}, {"uuid": "be253c74-a9e2-449f-80d9-632f4aedcacc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/xnyhps/statuses/114004757282477424", "content": "", "creation_timestamp": "2025-02-14T23:09:04.193852Z"}, {"uuid": "eda1d2ec-5c62-4358-aad5-d9307f1336e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/radar.bsky.social/post/3li6ecavo5e2u", "content": "", "creation_timestamp": "2025-02-14T23:30:47.824852Z"}, {"uuid": "10d3ee45-9531-42a3-b924-7d3548a5e0f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/tmjintel.bsky.social/post/3li56wkaszp2f", "content": "", "creation_timestamp": "2025-02-14T12:22:06.955472Z"}, {"uuid": "9e59886b-e94e-4a30-9f3a-de00f42d9714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://go.theregister.com/feed/www.theregister.com/2025/02/14/sonicwall_firewalls_under_attack_patch/", "content": "", "creation_timestamp": "2025-02-14T22:26:59.000000Z"}, {"uuid": "c685f818-f009-4ea5-917b-fa7065ab59b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lijoihtges23", "content": "", "creation_timestamp": "2025-02-19T11:32:31.406178Z"}, {"uuid": "c556a52d-4784-45ea-ab89-53a66bf97ca0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-24)", "content": "", "creation_timestamp": "2025-02-24T00:00:00.000000Z"}, {"uuid": "19b7b905-da02-4a04-97a3-66d25d022058", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-13)", "content": "", "creation_timestamp": "2025-03-13T00:00:00.000000Z"}, {"uuid": "ee8c7d44-4772-4034-8e23-d7d45f9e808c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/jbhall56/statuses/114008401724475447", "content": "", "creation_timestamp": "2025-02-15T14:35:53.667582Z"}, {"uuid": "cd24a942-9d32-4397-a6b7-3227c55a6488", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/jbhall56.bsky.social/post/3li7wuvvgoc25", "content": "", "creation_timestamp": "2025-02-15T14:36:02.383032Z"}, {"uuid": "8afcb29a-cb8c-45e6-9bb8-fa48be387b0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3liami6pwcj2o", "content": "", "creation_timestamp": "2025-02-15T21:02:37.952875Z"}, {"uuid": "bcf27808-5951-4b7f-b199-c4a989f72d30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3liaot6rhms2j", "content": "", "creation_timestamp": "2025-02-15T21:44:37.119361Z"}, {"uuid": "26a1139a-f3d0-4da3-80f9-db51bb110106", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3lib76tu7ic2j", "content": "", "creation_timestamp": "2025-02-16T02:37:29.551520Z"}, {"uuid": "3237aca4-4604-4276-816c-0307370124f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3libzs35hpk2n", "content": "", "creation_timestamp": "2025-02-16T10:33:26.957446Z"}, {"uuid": "edb5664a-d5f1-4605-9c57-1bc57e4b3ff8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://mstdn.ca/users/rfwaveio/statuses/114014348582449224", "content": "", "creation_timestamp": "2025-02-16T15:48:18.466218Z"}, {"uuid": "341160b6-8080-4077-beee-c7b649361063", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://advisories.ncsc.nl/advisory?id=NCSC-2025-0004", "content": "", "creation_timestamp": "2025-02-18T07:09:28.000000Z"}, {"uuid": "56e69d1e-f4d2-4b4d-8b47-1b33342c5ca9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/townsgr.bsky.social/post/3lihyvxwyck2l", "content": "", "creation_timestamp": "2025-02-18T19:33:44.708161Z"}, {"uuid": "ac749a67-0270-4cb9-ae92-a84355cf6602", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/aakl.bsky.social/post/3lii3cgqqms2a", "content": "", "creation_timestamp": "2025-02-18T20:16:27.777206Z"}, {"uuid": "ab665aad-1014-4397-bf3a-2b29ae1215dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-18T21:10:02.000000Z"}, {"uuid": "24c3c4fa-edf7-445c-8bd1-3e783a083dec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/kitafox.bsky.social/post/3liihokw3rw27", "content": "", "creation_timestamp": "2025-02-18T23:57:59.808229Z"}, {"uuid": "126f1a59-d08f-475d-ae9a-6764344f4157", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/techtales.bsky.social/post/3liek2l733x2e", "content": "", "creation_timestamp": "2025-02-17T10:29:51.621246Z"}, {"uuid": "b339e653-ea10-440c-8475-b6b1005be95c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/securityrss.bsky.social/post/3liekb3jmcd25", "content": "", "creation_timestamp": "2025-02-17T10:33:30.276622Z"}, {"uuid": "1413ae9c-8fb2-4385-b75c-803f431f1ac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3liknlh2ves2y", "content": "", "creation_timestamp": "2025-02-19T20:48:57.289596Z"}, {"uuid": "82accdd3-1dcd-4f9a-a59b-41dad8149155", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/defendopsdiaries.bsky.social/post/3lig7nwh7gc2u", "content": "", "creation_timestamp": "2025-02-18T02:29:11.035419Z"}, {"uuid": "4d050b2e-a3e3-4672-8206-d6f60bccbc8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3ligbexp3zk2n", "content": "", "creation_timestamp": "2025-02-18T02:59:55.776792Z"}, {"uuid": "434a6e51-0e09-44cf-bb82-a470724407a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3ligebv4vxs2a", "content": "", "creation_timestamp": "2025-02-18T03:51:59.558801Z"}, {"uuid": "c057e0fc-1e64-4554-a0bc-98b432691002", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3liisp3i4z22i", "content": "", "creation_timestamp": "2025-02-19T03:15:09.587524Z"}, {"uuid": "56f5b0db-d8a7-470d-b992-96f5f85d6c54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/opsmatters.bsky.social/post/3liiv5fuhvs2j", "content": "", "creation_timestamp": "2025-02-19T03:58:56.663332Z"}, {"uuid": "2eb8b133-154f-41b0-ba7e-dc2b8ff968c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/hackingne.ws/post/3lij45repnm2g", "content": "", "creation_timestamp": "2025-02-19T06:04:24.824696Z"}, {"uuid": "ef90de21-846b-4d96-b00b-ddc4cd32a4bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3liknyna5bk2y", "content": "", "creation_timestamp": "2025-02-19T20:56:20.667941Z"}, {"uuid": "14c804b0-8dec-4af7-90ba-8e814a67f0b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3liktag5kdl2o", "content": "", "creation_timestamp": "2025-02-19T22:30:09.727369Z"}, {"uuid": "99fb2820-5c6f-41b2-993c-c849082d6474", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3ligs4j2r5s2h", "content": "", "creation_timestamp": "2025-02-18T07:59:27.731605Z"}, {"uuid": "9f839f6f-0954-4ef7-8884-69a7ef431f3d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:05.000000Z"}, {"uuid": "cf6dab62-de92-417c-9c6b-b532e1e73ea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-f6926507-d7321de3a3a4bcf9", "content": "", "creation_timestamp": "2025-02-22T08:30:53.809528Z"}, {"uuid": "6bb9d7ec-2299-47c6-b356-275183dd2c40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-25)", "content": "", "creation_timestamp": "2025-02-25T00:00:00.000000Z"}, {"uuid": "ef2533b0-14fe-40f3-b3e1-f5552238d12c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-02)", "content": "", "creation_timestamp": "2025-03-02T00:00:00.000000Z"}, {"uuid": "f737ed8d-ca3d-4eca-96b6-0a90a16f2d65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-23)", "content": "", "creation_timestamp": "2025-03-23T00:00:00.000000Z"}, {"uuid": "7c8d54ec-3084-4b67-bb35-1642845efba7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-31)", "content": "", "creation_timestamp": "2025-03-31T00:00:00.000000Z"}, {"uuid": "05c1b40e-4f72-45c5-97d3-5f8c1a536af1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-23)", "content": "", "creation_timestamp": "2025-04-23T00:00:00.000000Z"}, {"uuid": "a9da1b05-2fe6-4126-985a-b68d51058b51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lluyky5wmc25", "content": "", "creation_timestamp": "2025-04-03T03:47:52.202368Z"}, {"uuid": "38798408-8348-4a34-86c9-bf020b596ffc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-23)", "content": "", "creation_timestamp": "2025-05-23T00:00:00.000000Z"}, {"uuid": "c1afb916-9761-4ce7-a135-73db59456a70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-15)", "content": "", "creation_timestamp": "2025-05-15T00:00:00.000000Z"}, {"uuid": "5878b1e9-e86e-45d6-93d3-ab5755e9dc8e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-13)", "content": "", "creation_timestamp": "2025-06-13T00:00:00.000000Z"}, {"uuid": "20ef6428-7d0f-4a4d-8ab9-91bd42be296d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-26)", "content": "", "creation_timestamp": "2025-06-26T00:00:00.000000Z"}, {"uuid": "690b1554-cdc7-4251-a3e7-6a53cf60ba42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-05)", "content": "", "creation_timestamp": "2025-07-05T00:00:00.000000Z"}, {"uuid": "b3f1276c-bd29-4e3e-827f-28e6ba5f9591", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-12)", "content": "", "creation_timestamp": "2025-07-12T00:00:00.000000Z"}, {"uuid": "647f01e7-1beb-42a1-89a3-9be6e4658855", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-12)", "content": "", "creation_timestamp": "2025-05-12T00:00:00.000000Z"}, {"uuid": "75fe3884-94e6-4931-b7cd-16c6da1ac91a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-13)", "content": "", "creation_timestamp": "2025-07-13T00:00:00.000000Z"}, {"uuid": "826ab6c7-0434-45f7-8a9b-91272160f4ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-06-12)", "content": "", "creation_timestamp": "2025-06-12T00:00:00.000000Z"}, {"uuid": "3e0ac654-1108-4ac5-8e18-0085c282b486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-24)", "content": "", "creation_timestamp": "2025-05-24T00:00:00.000000Z"}, {"uuid": "bbba0a94-98b6-4e90-b39b-0c376ec7fdb3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-05)", "content": "", "creation_timestamp": "2025-05-05T00:00:00.000000Z"}, {"uuid": "e20766d1-90f2-46d7-bc8b-9efdf351830f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-06)", "content": "", "creation_timestamp": "2025-07-06T00:00:00.000000Z"}, {"uuid": "8587d96a-17e2-442b-896f-89bb0fa56e40", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-18)", "content": "", "creation_timestamp": "2025-10-18T00:00:00.000000Z"}, {"uuid": "9615db4f-6a77-4062-bd34-94fe466c4bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "dcb76907-10cb-46da-93cc-02d0f06f60dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "333817d2-1d75-4a82-ab48-74bf2f576f9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-12)", "content": "", "creation_timestamp": "2025-09-12T00:00:00.000000Z"}, {"uuid": "327387ca-2452-4874-b7e7-699aab0baa65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-21)", "content": "", "creation_timestamp": "2025-10-21T00:00:00.000000Z"}, {"uuid": "fac33162-6ebb-4577-bdc1-08c2ca9e8358", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-05)", "content": "", "creation_timestamp": "2025-09-05T00:00:00.000000Z"}, {"uuid": "ed366520-3016-494f-b747-d013e90ce4b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-27)", "content": "", "creation_timestamp": "2025-10-27T00:00:00.000000Z"}, {"uuid": "b82b93d1-b214-4711-98ae-1a5527f73ea2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-29)", "content": "", "creation_timestamp": "2025-10-29T00:00:00.000000Z"}, {"uuid": "18a90795-bed3-4fa1-b0d3-726eb303e5c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "b2466b5f-2433-45f6-90cf-898db64af7f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-21)", "content": "", "creation_timestamp": "2025-11-21T00:00:00.000000Z"}, {"uuid": "26a4d20e-1807-47c0-a49b-8ec0961f7da3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-09)", "content": "", "creation_timestamp": "2025-09-09T00:00:00.000000Z"}, {"uuid": "32847925-4608-4de9-b0d1-4bcb6ed10436", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-01)", "content": "", "creation_timestamp": "2025-08-01T00:00:00.000000Z"}, {"uuid": "0893737f-7455-4a59-97c4-807a6fb1f87b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "90f5d6f5-21d6-4770-acfe-5a5a90afbc80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-13)", "content": "", "creation_timestamp": "2025-10-13T00:00:00.000000Z"}, {"uuid": "6c9d19af-bb7c-4531-ac1b-8f956ce6249d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-06)", "content": "", "creation_timestamp": "2025-10-06T00:00:00.000000Z"}, {"uuid": "1d0005b3-bd05-4339-ba00-5b04ee9bdb70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-07-30)", "content": "", "creation_timestamp": "2025-07-30T00:00:00.000000Z"}, {"uuid": "66eba60f-3623-47c6-a263-07a8f68779b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-53704", "type": "seen", "source": "https://www.cert.at/de/warnungen/2025/1/schwewiegende-sicherheitslucken-in-sonicwall-ssl-vpn-aktiv-ausgenutzt", "content": "", "creation_timestamp": "2025-01-07T13:41:44.000000Z"}, {"uuid": "f064757a-b8cd-4dcd-bc7c-89e0295e47af", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-05)", "content": "", "creation_timestamp": "2025-08-05T00:00:00.000000Z"}, {"uuid": "cb60cbf1-b754-4f7e-9a98-6827838271ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "360a1b58-9342-4487-967c-670325eb35f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-31)", "content": "", "creation_timestamp": "2025-10-31T00:00:00.000000Z"}, {"uuid": "d92e50a6-d885-4175-a572-811a9c77cd1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "bbcdf69f-1910-460b-96f9-93281631db3a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "8b6f8a8b-3c23-4079-94ae-c1b6597552b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "a9c53eb4-238c-4028-b64e-13a63dac8af9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "eff7b2eb-07e2-402d-b5cc-c3d53de4e414", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "18f83254-b2ce-4268-9427-9f38e49c2c21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "4e215a79-aa37-421c-bbf4-bdc6e6e644ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-06)", "content": "", "creation_timestamp": "2025-09-06T00:00:00.000000Z"}, {"uuid": "4649ac58-3dae-474e-964b-f296b128306f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-19)", "content": "", "creation_timestamp": "2025-10-19T00:00:00.000000Z"}, {"uuid": "57cbc44e-ebfd-4a6a-9c9f-ed2599ee8a5a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-08)", "content": "", "creation_timestamp": "2025-10-08T00:00:00.000000Z"}, {"uuid": "c8e7db23-ce15-42c2-9f54-0fd6468bd405", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-08)", "content": "", "creation_timestamp": "2025-08-08T00:00:00.000000Z"}, {"uuid": "7cfc0dad-f500-4ef0-9152-8abe80957bb8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "6b54a5d9-228a-455b-ab2d-43901a2b2e39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-21)", "content": "", "creation_timestamp": "2025-09-21T00:00:00.000000Z"}, {"uuid": "b74b132b-5e9e-4412-949d-6fad35384ec1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-09)", "content": "", "creation_timestamp": "2025-08-09T00:00:00.000000Z"}, {"uuid": "a42e3752-90d8-4d29-90d4-f02888026d23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-12)", "content": "", "creation_timestamp": "2025-08-12T00:00:00.000000Z"}, {"uuid": "38d58265-078f-4a32-85ce-4b8e5da88f59", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "c6439556-1725-4ffb-a493-e0d03f086f2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-28)", "content": "", "creation_timestamp": "2025-09-28T00:00:00.000000Z"}, {"uuid": "fb09bff8-cfdd-4d81-9d29-f9305cc70454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "ed212f44-1142-43a7-a9cc-45516ddf4834", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "9988d2ed-072f-4dcf-88a0-3c537572da37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "3ffd94be-3086-4903-89a3-c98b77827ae1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-13)", "content": "", "creation_timestamp": "2025-08-13T00:00:00.000000Z"}, {"uuid": "b6843cc3-83f7-4334-b1ec-a8a08040757e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "edd2a1f4-c630-4b01-bbe0-20c4762955aa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-10)", "content": "", "creation_timestamp": "2025-11-10T00:00:00.000000Z"}, {"uuid": "4d4a46ef-41dd-44e8-96b1-f4b87bd333b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-14)", "content": "", "creation_timestamp": "2025-09-14T00:00:00.000000Z"}, {"uuid": "1911e0be-313f-41ae-a4f5-f30a0697e7c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "d002d694-8703-4f63-a3ea-924d2468e614", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "cd79f138-3e31-4481-823a-4fee1edfd4e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "289edaf4-6e74-4f37-9560-25f9f136987c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "d9b67eaf-0b46-46bc-a0d2-a74ee052df80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-26)", "content": "", "creation_timestamp": "2025-10-26T00:00:00.000000Z"}, {"uuid": "ac6ec923-3d9a-40f3-a52d-0dedc2788435", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-12)", "content": "", "creation_timestamp": "2025-11-12T00:00:00.000000Z"}, {"uuid": "0ae41c62-1d63-4aeb-bfb7-3de34405e77b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "e8d59f73-55cb-45ea-a8f7-97415000ee98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-20)", "content": "", "creation_timestamp": "2025-10-20T00:00:00.000000Z"}, {"uuid": "742209d2-5f11-4ca3-8b3f-439124e3e20e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-09)", "content": "", "creation_timestamp": "2025-10-09T00:00:00.000000Z"}, {"uuid": "b0a6751d-826d-4a9a-b345-68a5245e5705", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-13)", "content": "", "creation_timestamp": "2025-11-13T00:00:00.000000Z"}, {"uuid": "130cf1a2-5d70-4648-8c60-6fd61343fe64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-11)", "content": "", "creation_timestamp": "2025-10-11T00:00:00.000000Z"}, {"uuid": "9c7d87c3-61b1-46a5-bcc4-6d6545203cc9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-19)", "content": "", "creation_timestamp": "2025-11-19T00:00:00.000000Z"}, {"uuid": "ceeb98b8-02d7-4248-bddf-7fa3c162d24d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "c0039da7-fc42-4399-b9ce-a5e334e46a64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-14)", "content": "", "creation_timestamp": "2025-10-14T00:00:00.000000Z"}, {"uuid": "31724ffc-e5d2-4f2f-a7ba-8d679abd5d0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-28)", "content": "", "creation_timestamp": "2025-10-28T00:00:00.000000Z"}, {"uuid": "d88ae0fb-2ccd-4714-b2f3-f620b8013262", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-29)", "content": "", "creation_timestamp": "2025-09-29T00:00:00.000000Z"}, {"uuid": "c0dbd913-c105-489d-86f8-9539b9f8ed75", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-22)", "content": "", "creation_timestamp": "2025-09-22T00:00:00.000000Z"}, {"uuid": "58095bd2-ac69-4fee-8f16-695462f58c5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-30)", "content": "", "creation_timestamp": "2025-10-30T00:00:00.000000Z"}, {"uuid": "dc670b07-f4fe-432f-9804-4d36f8aeb988", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-02)", "content": "", "creation_timestamp": "2025-11-02T00:00:00.000000Z"}, {"uuid": "21e6d682-7452-4b42-8d9f-0b71122d4f13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-23)", "content": "", "creation_timestamp": "2025-08-23T00:00:00.000000Z"}, {"uuid": "f2054659-5f85-4b22-a0ee-205615955a49", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-24)", "content": "", "creation_timestamp": "2025-10-24T00:00:00.000000Z"}, {"uuid": "a0aaaf2b-cea9-4204-a174-4db815f5a05d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "0e488b7e-7b45-4d61-bda3-220d7c9f8a78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "c7a9bdbe-4704-4055-91d7-6377ba3f3b71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-07)", "content": "", "creation_timestamp": "2025-10-07T00:00:00.000000Z"}, {"uuid": "c4241e78-ca3f-43a7-93d0-1ebe62202233", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "d04188f4-194d-495a-be67-06eab94b9529", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "def12bc2-1445-4a8e-89a2-7647f4472596", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-24)", "content": "", "creation_timestamp": "2025-11-24T00:00:00.000000Z"}, {"uuid": "e534271c-c248-4cf4-ad6f-c5ee05d80e73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-18)", "content": "", "creation_timestamp": "2025-11-18T00:00:00.000000Z"}, {"uuid": "58ef53ee-8ae7-4765-bf42-8086c0179514", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "6c41cfe6-5cdf-4da6-9d1d-7419aba9536b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-24)", "content": "", "creation_timestamp": "2025-08-24T00:00:00.000000Z"}, {"uuid": "d3413e3d-a92f-4e21-b8d9-7bace8157962", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "7bd13f8e-510a-4327-a359-fed245f39650", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "2e0dd3e3-cba5-4c0c-b125-797d1d28b89c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-14)", "content": "", "creation_timestamp": "2025-11-14T00:00:00.000000Z"}, {"uuid": "05a1fd07-d9ce-4e7e-8b1d-1c042810031c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "MISP/71f05cce-2beb-4b80-8496-bbbabc032544", "content": "", "creation_timestamp": "2025-08-25T18:31:43.000000Z"}, {"uuid": "d535a262-7c62-4699-93ec-ce5e97da3031", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-11)", "content": "", "creation_timestamp": "2025-09-11T00:00:00.000000Z"}, {"uuid": "6dd6ab3e-5e96-416a-b4e9-d209847b7b27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "be6212e9-751a-4020-95fd-937fb9c32d8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-16)", "content": "", "creation_timestamp": "2025-12-16T00:00:00.000000Z"}, {"uuid": "b0a0aead-1f83-4a1e-8376-ba0d437b01ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-03)", "content": "", "creation_timestamp": "2025-09-03T00:00:00.000000Z"}, {"uuid": "569b2500-d59a-4718-863b-ede3283803f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-04)", "content": "", "creation_timestamp": "2025-11-04T00:00:00.000000Z"}, {"uuid": "c6746d93-4ead-4018-81ff-335b74131180", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-04)", "content": "", "creation_timestamp": "2025-09-04T00:00:00.000000Z"}, {"uuid": "8f6dcc99-72e5-41ac-9dc2-57129933d048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115747612928209009", "content": "", "creation_timestamp": "2025-12-19T18:20:10.808752Z"}, {"uuid": "1aff6976-52cd-461e-a837-766e0319ac86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "3ba74422-69a9-4aaa-a690-1db268f73611", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-02-24)", "content": "", "creation_timestamp": "2026-02-24T00:00:00.000000Z"}, {"uuid": "7ff2a049-9d6b-4885-8915-df50889b3374", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "c377a328-7fc5-4164-8e87-3e7767a78be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-11)", "content": "", "creation_timestamp": "2026-01-11T00:00:00.000000Z"}, {"uuid": "3fae2b70-25c2-4fe5-8f56-a233b6fb9883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-12-25)", "content": "", "creation_timestamp": "2025-12-25T00:00:00.000000Z"}, {"uuid": "7071a1cc-e9d5-4c7b-802a-7d4b1a114ede", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://vulnerability.circl.lu/comment/b2a6b85e-5b0d-4ac4-b7a4-9227e3ff28e0", "content": "", "creation_timestamp": "2025-02-17T08:57:05.680592Z"}, {"uuid": "7e11ee8d-6741-4cbd-a6e4-76cef6fdedfc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-12)", "content": "", "creation_timestamp": "2026-01-12T00:00:00.000000Z"}, {"uuid": "ad9c4d97-c9e2-47dc-b48e-467eb6e0dd1d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-22)", "content": "", "creation_timestamp": "2026-01-22T00:00:00.000000Z"}, {"uuid": "5288747f-b185-49ae-a68a-55fcc289552a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/602ffeaf-2425-48cc-967c-0efad9629dd0", "content": "", "creation_timestamp": "2025-01-07T12:38:58.150623Z"}, {"uuid": "a7c633d1-861d-4268-8a4f-26e033525775", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-15)", "content": "", "creation_timestamp": "2026-03-15T00:00:00.000000Z"}, {"uuid": "9d6e709e-8964-42cb-991d-9de713e26f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_1/2025", "content": "", "creation_timestamp": "2025-01-08T09:23:12.000000Z"}, {"uuid": "2135d76c-6121-4cd3-846b-5f9675b1696f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1456", "content": "", "creation_timestamp": "2025-01-09T04:00:00.000000Z"}, {"uuid": "566f45fc-5c09-49a4-90af-4f8dd80033a4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fd3c35bb-67ab-41ed-886a-27d46a940afd", "content": "", "creation_timestamp": "2026-02-02T12:26:13.433795Z"}, {"uuid": "feadaf6f-7138-43c7-887d-ee9bf14e867f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-01-24)", "content": "", "creation_timestamp": "2026-01-24T00:00:00.000000Z"}, {"uuid": "806dcfb5-3160-4c18-930f-0924382c7944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/cKure/14348", "content": "\u25a0\u25a0\u25a0\u25a0\u25a1 SonicWall CVE-2024-53704: SSL VPN Session Hijacking.\n\nhttps://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking", "creation_timestamp": "2025-02-21T18:30:58.000000Z"}, {"uuid": "589179fc-9c8b-4a53-bf55-733267f75ba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-04-24)", "content": "", "creation_timestamp": "2026-04-24T00:00:00.000000Z"}, {"uuid": "cdb3f617-d030-4598-8aee-4324452db616", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/903", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53704\n\ud83d\udd39 Description: An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.\n\ud83d\udccf Published: 2025-01-09T06:52:16.771Z\n\ud83d\udccf Modified: 2025-01-09T06:52:16.771Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003", "creation_timestamp": "2025-01-09T07:14:25.000000Z"}, {"uuid": "ddf925ec-7fb2-4b18-aacd-8e20cdc85fbd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/BleepingComputer/21529", "content": "\u200aSonicWall firewall exploit lets hackers hijack VPN sessions, patch now\n\nSecurity researchers at Bishop Fox have published complete exploitation details for the CVE-2024-53704 vulnerability that allows bypassing the authentication mechanism in certain versions of the SonicOS SSLVPN application. [...]\n\nhttps://www.bleepingcomputer.com/news/security/sonicwall-firewall-exploit-lets-hackers-hijack-vpn-sessions-patch-now/", "creation_timestamp": "2025-02-11T16:52:37.000000Z"}, {"uuid": "efb8c829-fc5e-424b-b40e-5b1001815a64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4777", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-53704\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication.\n\ud83d\udccf Published: 2025-01-09T06:52:16.771Z\n\ud83d\udccf Modified: 2025-02-19T04:55:10.591Z\n\ud83d\udd17 References:\n1. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0003", "creation_timestamp": "2025-02-19T08:39:35.000000Z"}, {"uuid": "0e2d3b99-40af-45d4-bf46-58abbf3433a9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "Telegram/P2ymq86f9WpKtSEzHRHeyGGMiVGy1auD6iLrIY_idC8AZqx0", "content": "", "creation_timestamp": "2025-02-18T23:42:23.000000Z"}, {"uuid": "fd8cdd10-d499-4966-be9d-5672ab15f47c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://t.me/cybersecplayground/18", "content": "CVE-2024-53704\n\nZero-day vulnerability in Sonicwall: An authentication bypass in SonicOS SSLVPN\n\n\ud83d\udcca 15.9K+ Services are found on hunter.how yearly.\n\n\ud83d\udd17 Hunter Link: hunter.how/list?searchVal\u2026\n\ud83d\udc47Query\n\nHUNTER :product.name=\"SonicOS\n\nFOFA : product=\"SonicOS\"\n\n\ud83d\udcf0 Refer:securityonline.info/sonicwall-issu\u2026\n\n\n#SONICWALL #hunterhow #infosec #infosecurity #OSINT #Vulnerability", "creation_timestamp": "2025-01-08T12:28:10.000000Z"}, {"uuid": "0c6e036f-27e7-4efb-ae97-48e23ac85f01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/10687", "content": "The Hidden Dangers of VPNs: Critical Vulnerabilities Exposed (Late 2024 \u2013 Early 2025)\n\nVirtual Private Networks (VPNs) have long been considered an essential tool for securing online activity. However, a closer examination reveals an unsettling reality: VPNs themselves are increasingly becoming high-value targets for attackers. Over the past several months, a wave of critical vulnerabilities has shaken trust in these technologies, impacting both consumers and enterprises alike.\n\nIn this report, we highlight the most significant VPN vulnerabilities discovered from late 2024 into early 2025 \u2014 and why blind reliance on VPNs may no longer be a safe bet.\n\n\n---\n\nCVE-2025-22457: Critical Buffer Overflow in Ivanti Connect Secure and Pulse Connect Secure\n\nIn April 2025, researchers uncovered CVE-2025-22457, a critical unauthenticated stack-based buffer overflow vulnerability affecting Ivanti Connect Secure (ICS) and Pulse Connect Secure VPN appliances. Impacted versions include ICS 22.7R2.5 and earlier, as well as Pulse Connect Secure 9.1x, which reached end-of-support in December 2024.\n\nInitially, Ivanti assessed the issue as non-exploitable due to character restrictions (periods and numbers only) within the overflow. However, a suspected Chinese advanced persistent threat (APT) group, dubbed UNC5221, demonstrated that \u2014 through intricate exploitation techniques \u2014 remote code execution was indeed achievable.\n\nExploitation Details:\n\nProof-of-concept (PoC) exploits are already available publicly, such as the sfewer-r7 implementation on GitHub. Attackers can leverage these to gain a reverse shell with limited user privileges (\"nr\"), circumventing initial vendor assumptions about exploitability.\n\nA netcat listener captures the shell.\n\nThe exploit brute-forces address space layout randomization (ASLR) protections by guessing base addresses for libdsplibs.so.\n\nSuccessful exploitation results in unauthorized access to the underlying system.\n\n\nExposure:\nAs of April 2025, Shodan scans indicated over 4,000 vulnerable instances exposed online.\n\n\n---\n\nCVE-2024-53704: Authentication Bypass in SonicWall SSL VPN\n\nAnother significant threat emerged with CVE-2024-53704, a critical authentication bypass vulnerability impacting SonicWall\u2019s SSL VPN solutions based on SonicOS versions 7.1.x (through 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035.\n\nDiscovered by Computest Security in November 2024 and patched in January 2025, this flaw allows attackers to hijack active VPN sessions by manipulating Base64-encoded session cookies \u2014 bypassing even multi-factor authentication (MFA) mechanisms.\n\nAttack Technique:\n\nBy inserting 32 null bytes encoded in Base64 into the swap cookie of a GET request, adversaries can effectively impersonate legitimate users without valid credentials.\n\nDespite available patches, thousands of systems remained unpatched into early 2025. According to Bishop Fox, more than 4,500 SonicWall VPN instances were still exposed as of February 2025.\n\n\n---\n\nCVE-2025-0282 and CVE-2025-0283: Stack-Based Buffer Overflows in Ivanti Products\n\nIn January 2025, Ivanti disclosed two additional vulnerabilities:\n\nCVE-2025-0282 (CVSS 9.0): Unauthenticated stack-based buffer overflow enabling remote code execution.\n\nCVE-2025-0283 (CVSS 7.0): Local privilege escalation via stack-based buffer overflow.\n\n\nAffected products included Ivanti Connect Secure, Policy Secure, and Neurons for Zero Trust Access (ZTA) gateways.\n\nExploitation Insights:\n\nPublic exploits, such as the one by sfewer-r7, target specific product versions with tailored ROP (Return-Oriented Programming) chains.\n\nSuccessful exploitation allows execution of operating system commands under non-root privileges, confirming breach activity.\n\n\nNotably, the exploit requires multiple attempts due to ASLR protections but ultimately grants unauthorized access if persistence is maintained.\n\n\n---\n\nCVE-2025-20212: Cisco Meraki AnyConnect VPN Denial-of-Service Vulnerability\n\nCisco disclosed CVE-2025-20212, a high-severity DoS vulnerability affecting AnyConnect VPN servers on Meraki MX and Z series devices.", "creation_timestamp": "2025-04-27T03:42:30.000000Z"}, {"uuid": "5e335a93-9018-408f-8b80-c0ce33e6dafe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://t.me/cvedetector/14795", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-53704 - Citrix SSLVPN Authentication Bypass Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-53704 \nPublished : Jan. 9, 2025, 7:15 a.m. | 40\u00a0minutes ago \nDescription : An Improper Authentication vulnerability in the SSLVPN authentication mechanism allows a remote attacker to bypass authentication. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"09 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-09T09:23:29.000000Z"}, {"uuid": "aa7a3f03-9514-45f5-9ac5-b479fa8d7167", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "https://t.me/kasperskyb2b/1580", "content": "\ud83e\ude79 Welcome back and Patch now!\n\n\u0425\u043e\u0442\u044f \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0442\u043e\u0436\u0435 \u0431\u0435\u0440\u0443\u0442 \u0432\u044b\u0445\u043e\u0434\u043d\u044b\u0435 \u043d\u0430 \u043f\u0435\u0440\u0438\u043e\u0434 \u041d\u043e\u0432\u043e\u0433\u043e \u0433\u043e\u0434\u0430 \u0438 \u0420\u043e\u0436\u0434\u0435\u0441\u0442\u0432\u0430, \u0434\u0440\u0443\u0433\u0438\u0435 \u0432 \u044d\u0442\u043e\u0442 \u043f\u0435\u0440\u0438\u043e\u0434 \u0430\u043a\u0442\u0438\u0432\u0438\u0437\u0438\u0440\u0443\u044e\u0442\u0441\u044f. \u0417\u0430 \u0432\u0440\u0435\u043c\u044f \u043a\u0430\u043d\u0438\u043a\u0443\u043b \u043d\u0430\u0431\u0440\u0430\u043b\u043e\u0441\u044c \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0442\u0440\u0435\u0431\u0443\u044e\u0449\u0438\u0445 \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u044f, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445.\n\nSonicWall \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u0444\u0438\u043a\u0441 SonicOS, \u0443\u0441\u0442\u0440\u0430\u043d\u044f\u044e\u0449\u0438\u0439 CVE-2024-53704 (CVSS 8.2), \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043e\u0431\u0445\u043e\u0434\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u044f\u0445 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f SSL VPN \u0438 SSH. \u041f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044c \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u0442 \u0434\u0435\u0444\u0435\u043a\u0442 \u00ab\u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d\u043d\u044b\u043c \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438\u00bb (susceptible to actual exploitation), \u0447\u0442\u043e \u043c\u043e\u0436\u043d\u043e \u0447\u0438\u0442\u0430\u0442\u044c \u0438 \u043a\u0430\u043a \u043f\u0440\u043e\u0441\u0442\u043e \u043e\u0446\u0435\u043d\u043a\u0443 exploitability, \u0438 \u043a\u0430\u043a \u0437\u0430\u0432\u0443\u0430\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u0435 \u043f\u0440\u0438\u0437\u043d\u0430\u043d\u0438\u0435, \u0447\u0442\u043e \u044d\u0442\u043e \u0437\u0438\u0440\u043e\u0434\u0435\u0439. \n\u041a\u0440\u043e\u043c\u0435 \u043f\u0430\u0442\u0447\u0430, \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u044b \u0442\u0438\u043f\u0438\u0447\u043d\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u043f\u043e \u0441\u043d\u0438\u0436\u0435\u043d\u0438\u044e \u0443\u0433\u0440\u043e\u0437\u044b, \u0442\u0430\u043a\u0438\u0435 \u043a\u0430\u043a \u043e\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044e \u043f\u043e SSH.\n\n\u041e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u0430\u044f \u0432 \u0441\u0435\u0440\u0435\u0434\u0438\u043d\u0435 \u0434\u0435\u043a\u0430\u0431\u0440\u044f CVE-2024-52875, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a RCE \u0432 \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u0435 GFI KerioControl, \u043d\u0430\u0447\u0430\u043b\u0430 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438. \u0412 \u0421\u0435\u0442\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b \u0431\u043e\u043b\u0435\u0435 23 \u0442\u044b\u0441\u044f\u0447 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u043e\u0432 KerioControl.\n\n\u0410 \u043c\u043d\u043e\u0433\u043e\u0441\u0442\u0440\u0430\u0434\u0430\u043b\u044c\u043d\u0430\u044f Ivanti \u0443\u0441\u043f\u0435\u043b\u0430 \u043e\u0442\u043c\u0435\u0442\u0438\u0442\u044c\u0441\u044f \u0432 2025 \u0433\u043e\u0434\u0443 \u0437\u0438\u0440\u043e\u0434\u0435\u0435\u043c. CVE-2025-0282 (CVSS 9.0) \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0434\u043e\u0441\u0442\u0438\u0447\u044c RCE \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 Connect Secure. \u0422\u043e\u0442 \u0436\u0435 \u0434\u0435\u0444\u0435\u043a\u0442 \u043f\u0440\u0438\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 Policy Secure \u0438 Neurons, \u043d\u043e \u0440\u0435\u0430\u043b\u044c\u043d\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u043d\u0430 \u043d\u0438\u0445 \u043d\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u0430.\n\n\u0422\u0430\u043a\u0436\u0435 7 \u044f\u043d\u0432\u0430\u0440\u044f CISA \u0434\u043e\u0431\u0430\u0432\u0438\u043b\u0430 \u0432 \u0441\u043f\u0438\u0441\u043e\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0441\u0442\u0430\u0440\u044b\u0439 \u0434\u0435\u0444\u0435\u043a\u0442 Oracle WebLogic (CVE-2020-2883) \u0438 \u043f\u0430\u0440\u0443 \u0431\u0430\u0433\u043e\u0432 \u0432 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435 \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043e\u0431\u0449\u0435\u043d\u0438\u044f MiCollab (CVE-2024-41713, -55550). \u041d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0441\u0432\u0435\u0436\u0435\u0439 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u043f\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e.\n\n\u041f\u043b\u043e\u0445\u0438\u0435 \u043d\u043e\u0432\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u0442\u0435\u0445, \u043a\u0442\u043e \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u043c\u0430\u0433\u0430\u0437\u0438\u043d\u044b \u043d\u0430 WordPress \u0438 WooCommerce. \u041f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0439 \u043f\u043b\u0430\u0433\u0438\u043d Fancy Product Designer, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0439 \u043b\u0435\u0433\u043a\u043e \u043f\u0435\u0440\u0435\u043a\u0440\u0430\u0448\u0438\u0432\u0430\u0442\u044c \u0444\u0443\u0442\u0431\u043e\u043b\u043a\u0438 \u0438\u043b\u0438 \u043c\u0435\u043d\u044f\u0442\u044c \u0442\u0435\u043a\u0441\u0442 \u043d\u0430 \u043a\u0440\u0443\u0436\u043a\u0430\u0445, \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 9 \u043c\u0435\u0441\u044f\u0446\u0435\u0432 \u0441\u043e\u0434\u0435\u0440\u0436\u0438\u0442 \u0434\u0432\u0435 \u043d\u0435\u0437\u0430\u043a\u0440\u044b\u0442\u044b\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 \u0441\u0432\u043e\u0439 \u043a\u043e\u0434 \u0438 \u0438\u0437\u0432\u043b\u0435\u043a\u0430\u0442\u044c \u0447\u0443\u0432\u0441\u0442\u0432\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u0430\u0442\u0435\u043b\u0435\u0439. \u0423\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u0438\u0433\u043d\u043e\u0440\u0438\u0440\u0443\u044e\u0442 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0438 \u0437\u0430 20 \u043d\u043e\u0432\u044b\u0445 \u0432\u0435\u0440\u0441\u0438\u0439 \u0442\u0430\u043a \u0438 \u043d\u0435 \u0432\u043d\u0435\u0441\u043b\u0438 \u043d\u0443\u0436\u043d\u044b\u0435 \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0432\u043b\u0430\u0434\u0435\u043b\u044c\u0446\u0430\u043c 20 \u0442\u044b\u0441\u044f\u0447 \u0441\u0430\u0439\u0442\u043e\u0432, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0449\u0438\u0445 \u043f\u043b\u0430\u0433\u0438\u043d, \u0441\u0442\u043e\u0438\u0442 \u043e\u0431\u0434\u0443\u043c\u0430\u0442\u044c \u0437\u0430\u043c\u0435\u043d\u0443 \u044d\u0442\u043e\u0433\u043e \u0438\u0437\u0434\u0435\u043b\u0438\u044f \u043d\u0430 \u043a\u0430\u043a\u043e\u0439-\u0442\u043e \u0434\u0440\u0443\u0433\u043e\u0439 \u00ab\u043a\u0430\u0441\u0442\u043e\u043c\u0438\u0437\u0430\u0442\u043e\u0440\u00bb.\n\n#\u043d\u043e\u0432\u043e\u0441\u0442\u0438 #\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 @\u041f2\u0422", "creation_timestamp": "2025-01-09T10:41:33.000000Z"}, {"uuid": "52853c54-b166-465d-bb42-f588f255f471", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6709", "content": "#exploit\n1. macOS PackageKit Exploits\nhttps://jhftss.github.io/Endless-Exploits\n\n2. CVE-2024-53704:\nSonicWall SSL VPN Session Hijacking\nhttps://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking\n\n3. CVE-2024-54527:\nMediaLibraryService Full TCC Bypass, Dive Deep into AMFI\nhttps://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass", "creation_timestamp": "2025-02-20T05:23:47.000000Z"}, {"uuid": "470ce51f-b875-4882-96ae-64c0a7d73f00", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2412", "content": "SonicWall firewall exploit lets hackers hijack VPN sessions, patch now\n\nSecurity researchers at Bishop Fox have published complete exploitation details for the CVE-2024-53704 vulnerability that allows bypassing the authentication mechanism in certain versions of the SonicOS SSLVPN application.\n\nBill Toulas | bleepingcomputer.com \u2022 Feb 11, 2025", "creation_timestamp": "2025-02-12T13:52:59.000000Z"}, {"uuid": "c56cc710-b8a1-4d41-af02-92cd3f907663", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2476", "content": "#exploit\n1. macOS PackageKit Exploits\nhttps://jhftss.github.io/Endless-Exploits\n\n2. CVE-2024-53704:\nSonicWall SSL VPN Session Hijacking\nhttps://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking\n\n3. CVE-2024-54527:\nMediaLibraryService Full TCC Bypass, Dive Deep into AMFI\nhttps://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass", "creation_timestamp": "2025-02-20T05:23:48.000000Z"}, {"uuid": "45bdde3d-e8ef-406d-b44f-713d2e1ca0c2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/2411", "content": "Exploit for SonicWall firewall auth bypass flaw public, patch now\n\nSecurity researchers at Bishop Fox have published complete exploitation details for the CVE-2024-53704 vulnerability that allows bypassing the authentication mechanism in certain versions of the SonicOS SSLVPN application.\n\nBill Toulas | bleepingcomputer.com \u2022 Feb 11, 2025", "creation_timestamp": "2025-02-12T13:52:59.000000Z"}, {"uuid": "5dda11f9-3fb5-4833-8140-c21e0aae1124", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "Telegram/eklxMrjGJAqgDzMP0f-VCuJu9mo5iFKjiBjBnr28Qav0eE0", "content": "", "creation_timestamp": "2025-02-12T04:00:07.000000Z"}, {"uuid": "cc3f4635-7c42-4f28-8447-0e1e1c0ad48c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "https://t.me/CyberBulletin/2331", "content": "\u26a1This security flaw (CVE-2024-53704), tagged by CISA as critical severity and found in the SSLVPN authentication mechanism, impacts SonicOS versions 7.1.x (up to 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035, used by multiple models of Gen 6 and Gen 7 firewalls and SOHO series devices.\n\n#CyberBulletin", "creation_timestamp": "2025-02-15T06:31:41.000000Z"}, {"uuid": "a5239f3c-dd38-4a1c-8891-fa4e6c110433", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/3124", "content": "The Hidden Dangers of VPNs: Critical Vulnerabilities Exposed (Late 2024 \u2013 Early 2025)\n\nVirtual Private Networks (VPNs) have long been considered an essential tool for securing online activity. However, a closer examination reveals an unsettling reality: VPNs themselves are increasingly becoming high-value targets for attackers. Over the past several months, a wave of critical vulnerabilities has shaken trust in these technologies, impacting both consumers and enterprises alike.\n\nIn this report, we highlight the most significant VPN vulnerabilities discovered from late 2024 into early 2025 \u2014 and why blind reliance on VPNs may no longer be a safe bet.\n\n\n---\n\nCVE-2025-22457: Critical Buffer Overflow in Ivanti Connect Secure and Pulse Connect Secure\n\nIn April 2025, researchers uncovered CVE-2025-22457, a critical unauthenticated stack-based buffer overflow vulnerability affecting Ivanti Connect Secure (ICS) and Pulse Connect Secure VPN appliances. Impacted versions include ICS 22.7R2.5 and earlier, as well as Pulse Connect Secure 9.1x, which reached end-of-support in December 2024.\n\nInitially, Ivanti assessed the issue as non-exploitable due to character restrictions (periods and numbers only) within the overflow. However, a suspected Chinese advanced persistent threat (APT) group, dubbed UNC5221, demonstrated that \u2014 through intricate exploitation techniques \u2014 remote code execution was indeed achievable.\n\nExploitation Details:\n\nProof-of-concept (PoC) exploits are already available publicly, such as the sfewer-r7 implementation on GitHub. Attackers can leverage these to gain a reverse shell with limited user privileges (\"nr\"), circumventing initial vendor assumptions about exploitability.\n\nA netcat listener captures the shell.\n\nThe exploit brute-forces address space layout randomization (ASLR) protections by guessing base addresses for libdsplibs.so.\n\nSuccessful exploitation results in unauthorized access to the underlying system.\n\n\nExposure:\nAs of April 2025, Shodan scans indicated over 4,000 vulnerable instances exposed online.\n\n\n---\n\nCVE-2024-53704: Authentication Bypass in SonicWall SSL VPN\n\nAnother significant threat emerged with CVE-2024-53704, a critical authentication bypass vulnerability impacting SonicWall\u2019s SSL VPN solutions based on SonicOS versions 7.1.x (through 7.1.1-7058), 7.1.2-7019, and 8.0.0-8035.\n\nDiscovered by Computest Security in November 2024 and patched in January 2025, this flaw allows attackers to hijack active VPN sessions by manipulating Base64-encoded session cookies \u2014 bypassing even multi-factor authentication (MFA) mechanisms.\n\nAttack Technique:\n\nBy inserting 32 null bytes encoded in Base64 into the swap cookie of a GET request, adversaries can effectively impersonate legitimate users without valid credentials.\n\nDespite available patches, thousands of systems remained unpatched into early 2025. According to Bishop Fox, more than 4,500 SonicWall VPN instances were still exposed as of February 2025.\n\n\n---\n\nCVE-2025-0282 and CVE-2025-0283: Stack-Based Buffer Overflows in Ivanti Products\n\nIn January 2025, Ivanti disclosed two additional vulnerabilities:\n\nCVE-2025-0282 (CVSS 9.0): Unauthenticated stack-based buffer overflow enabling remote code execution.\n\nCVE-2025-0283 (CVSS 7.0): Local privilege escalation via stack-based buffer overflow.\n\n\nAffected products included Ivanti Connect Secure, Policy Secure, and Neurons for Zero Trust Access (ZTA) gateways.\n\nExploitation Insights:\n\nPublic exploits, such as the one by sfewer-r7, target specific product versions with tailored ROP (Return-Oriented Programming) chains.\n\nSuccessful exploitation allows execution of operating system commands under non-root privileges, confirming breach activity.\n\n\nNotably, the exploit requires multiple attempts due to ASLR protections but ultimately grants unauthorized access if persistence is maintained.\n\n\n---\n\nCVE-2025-20212: Cisco Meraki AnyConnect VPN Denial-of-Service Vulnerability\n\nCisco disclosed CVE-2025-20212, a high-severity DoS vulnerability affecting AnyConnect VPN servers on Meraki MX and Z series devices.", "creation_timestamp": "2025-04-27T05:42:31.000000Z"}, {"uuid": "6d3f9de1-6586-499f-9d56-61d3a0297699", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "https://t.me/CyberBulletin/2499", "content": "\u26a1SonicWall Firewalls Under Attack: CVE-2024-53704 Exploited in the Wild, PoC Released.\n\n#CyberBulletin", "creation_timestamp": "2025-03-07T02:39:04.000000Z"}, {"uuid": "6472d433-0f89-4414-b171-7a4981ff7feb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6629", "content": "SonicWall firewall exploit lets hackers hijack VPN sessions, patch now\n\nSecurity researchers at Bishop Fox have published complete exploitation details for the CVE-2024-53704 vulnerability that allows bypassing the authentication mechanism in certain versions of the SonicOS SSLVPN application.\n\nBill Toulas | bleepingcomputer.com \u2022 Feb 11, 2025", "creation_timestamp": "2025-02-12T13:52:58.000000Z"}, {"uuid": "4083ae91-69f6-4eef-81d9-a7d332a897d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/6628", "content": "Exploit for SonicWall firewall auth bypass flaw public, patch now\n\nSecurity researchers at Bishop Fox have published complete exploitation details for the CVE-2024-53704 vulnerability that allows bypassing the authentication mechanism in certain versions of the SonicOS SSLVPN application.\n\nBill Toulas | bleepingcomputer.com \u2022 Feb 11, 2025", "creation_timestamp": "2025-02-12T13:52:58.000000Z"}, {"uuid": "e17e6e1b-a7fe-4ee7-b5a4-a81b6191badc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "Telegram/c1Lut5KesANENCLFgMiHE86oq-uIYI0qqyK9FFQMzQtuMdSn", "content": "", "creation_timestamp": "2025-02-19T03:09:26.000000Z"}, {"uuid": "e3f1d6db-fc2a-4635-826e-ab7e5e84f940", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "Telegram/hksShGzt80xw31TBHQM0NVY1k15D7CYI1aK6NPQGkDleslo", "content": "", "creation_timestamp": "2025-02-12T04:00:11.000000Z"}, {"uuid": "e9f4dd3a-640c-49bc-9193-dbba5a037e06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "seen", "source": "Telegram/5mxzI48SRYQ2ultz4BQ0fCjoNNNlr74aSuV93pSIBrqNP6Y", "content": "", "creation_timestamp": "2025-01-11T08:12:54.000000Z"}, {"uuid": "287a36e5-1cc8-493f-b03f-81d30390de27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11825", "content": "#exploit\n1. macOS PackageKit Exploits\nhttps://jhftss.github.io/Endless-Exploits\n\n2. CVE-2024-53704:\nSonicWall SSL VPN Session Hijacking\nhttps://bishopfox.com/blog/sonicwall-cve-2024-53704-ssl-vpn-session-hijacking\n\n3. CVE-2024-54527:\nMediaLibraryService Full TCC Bypass, Dive Deep into AMFI\nhttps://jhftss.github.io/CVE-2024-54527-MediaLibraryService-Full-TCC-Bypass", "creation_timestamp": "2025-02-18T03:05:25.000000Z"}, {"uuid": "bf91dd5d-7baf-4195-9c08-8dc3681c85f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-53704", "type": "exploited", "source": "https://t.me/thehackernews/6364", "content": "\ud83d\udea8 Two critical vulnerabilities in Palo Alto Networks PAN-OS and SonicWall SonicOS SSLVPN are actively exploited, now added to CISA's KEV catalog.\n\nCVE-2025-0108 allows unauthenticated attackers to bypass PAN-OS security, while CVE-2024-53704 compromises SSLVPN authentication.\n\nExploitation is escalating, with attack traffic spiking 10x in a week. Act now!\n\nRead More: https://thehackernews.com/2025/02/cisa-adds-palo-alto-networks-and.html", "creation_timestamp": "2025-02-19T06:12:11.000000Z"}]}