{"vulnerability": "cve-2014-0780", "sightings": [{"uuid": "2c051972-d536-47f2-9bb0-973b34ba5fb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-0780", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "72a4155f-37b0-4d97-9a79-2b561466be55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-0780", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971522", "content": "", "creation_timestamp": "2024-12-24T20:30:36.092812Z"}, {"uuid": "245b436a-5316-4417-945a-9f9ad91c1ba8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-0780", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:05.000000Z"}, {"uuid": "fc1d3e79-c043-4b21-8788-a1a79f1ec845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2014-0780", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/828c3107-eb16-4d9e-aa3e-ac6097b4e156", "content": "", "creation_timestamp": "2026-02-02T12:27:50.660606Z"}, {"uuid": "0e58a5ba-a3a9-4cd0-819b-dad3dddad4db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-0780", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4135", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2014-0780\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2014-04-25T05:12:07.787\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02\n2. http://www.securityfocus.com/bid/67056\n3. https://www.exploit-db.com/exploits/42699/\n4. http://ics-cert.us-cert.gov/advisories/ICSA-14-107-02\n5. http://www.securityfocus.com/bid/67056\n6. https://www.exploit-db.com/exploits/42699/", "creation_timestamp": "2025-02-12T21:08:00.000000Z"}, {"uuid": "56b27e53-4910-4858-874f-213d42b14a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2014-0780", "type": "seen", "source": "https://t.me/arpsyndicate/1367", "content": "#ExploitObserverAlert\n\nCVE-2014-0780\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2014-0780. Directory traversal vulnerability in NTWebServer in InduSoft Web Studio 7.1 before SP2 Patch 4 allows remote attackers to read administrative passwords in APP files, and consequently execute arbitrary code, via unspecified web requests.\n\nFIRST-EPSS: 0.961970000\nNVD-IS: 6.4\nNVD-ES: 10.0", "creation_timestamp": "2023-12-05T02:24:23.000000Z"}]}