{"vulnerability": "cve-2017-13872", "sightings": [{"uuid": "921e6050-f0bc-4034-ab74-272914366105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "exploited", "source": "https://www.exploit-db.com/exploits/43248", "content": "", "creation_timestamp": "2017-11-28T00:00:00.000000Z"}, {"uuid": "c7cf1538-6381-413c-8d65-80b3db64f7e6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "exploited", "source": "https://www.exploit-db.com/exploits/43201", "content": "", "creation_timestamp": "2017-11-30T00:00:00.000000Z"}, {"uuid": "94503bd0-51be-4094-a527-188e35ed609f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "e2fde72c-59ca-4410-8517-7e9415c043f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:54.000000Z"}, {"uuid": "c137f01e-1e0a-46c6-9184-5d4444a0c57c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/vnc/ard_root_pw.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "1792f16a-a1e3-40f7-b6ac-c59ff20d068b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "exploited", "source": "https://t.me/information_security_channel/25462", "content": "RootOS \u2013 macOS Root Helper\nhttps://kalilinuxtutorials.com/rootos-macos-root-helper/\n\nrootOS tries to use various CVEs to gain sudo or root access. All exploits have an end goal of adding ALL ALL=(ALL) NOPASSWD: ALL\u00a0to\u00a0/etc/sudoers\u00a0allowing any user to run\u00a0sudo\u00a0commands. Also Read \u2013 Goca : Scanner Used To Find Metadata &amp; Hidden Information Exploits CVE-2008-2830 CVE-2015-3760 CVE-2015-5889 CVE-2017-13872 AppleScript Dynamic Phishing Sudo Piggyback Run python root.py Dynamic [\u2026]\nThe post RootOS \u2013 macOS Root Helper (https://kalilinuxtutorials.com/rootos-macos-root-helper/) appeared first on Kali Linux Tutorials (https://kalilinuxtutorials.com/).", "creation_timestamp": "2019-03-13T07:34:18.000000Z"}, {"uuid": "99d7ff49-4540-4c0e-a0ff-31290b6107db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-13872", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/osx/local/root_no_password.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}]}