{"vulnerability": "cve-2017-7269", "sightings": [{"uuid": "6c44fa28-5c05-4a3d-b2b7-676728f512b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/5a54c404-ccfc-4fae-8f64-416c950d210f", "content": "", "creation_timestamp": "2018-01-10T12:58:13.000000Z"}, {"uuid": "5d0ff2de-3df2-4904-b8c5-a5e117d629b4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/f5030aca-7d5a-43a4-ae03-8f4ac8e85422", "content": "", "creation_timestamp": "2021-11-08T08:58:18.000000Z"}, {"uuid": "fccc5cc7-589a-4360-92c9-91303220c3c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2021-11-20T09:53:52.000000Z"}, {"uuid": "0a8c1d0e-e3ef-46aa-888c-ba26efc1ceb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/c94d3aa4-1871-479e-b6fc-a1fcfcb67b07", "content": "", "creation_timestamp": "2020-10-09T16:02:30.000000Z"}, {"uuid": "25e5c756-ec29-42ec-8568-3123815841b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/21b8cf94-f9f1-467a-9b17-5328dd7dcdf3", "content": "", "creation_timestamp": "2020-10-09T16:35:58.000000Z"}, {"uuid": "0fe6f49e-2d56-4974-8d34-70116725cfc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://www.exploit-db.com/exploits/41992", "content": "", "creation_timestamp": "2017-05-11T00:00:00.000000Z"}, {"uuid": "33e0131d-3823-43f5-9288-cac0d0f3a24f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971026", "content": "", "creation_timestamp": "2024-12-24T20:23:13.796184Z"}, {"uuid": "8b345dd4-49c2-4412-b5d2-2ed04e179d21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "6aec9879-19e8-45a2-a654-eaf29afe318b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:09:59.000000Z"}, {"uuid": "f8470edd-e2ea-4f2c-8753-f95b516cfc9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "published-proof-of-concept", "source": "https://t.me/arm1tage/129", "content": "HackTheBox:\n\n\u2014Easy Machines\u2014\n\nDriver - WinRM (evil-winrm), printnightmare CVE-2021-1675 (https://habr.com/ru/sandbox/156538/)\nhttps://0xdf.gitlab.io/2022/02/26/htb-driver.html\n\nSecret - JWT, Git source (tig), crush-dumps\nhttps://0xdf.gitlab.io/2022/03/26/htb-secret.html\n\nBackDoor - Wordpress eBook Dir Trav (https://www.exploit-db.com/exploits/39575), gdb exploit (https://www.exploit-db.com/exploits/50539, https://www.rapid7.com/db/modules/exploit/multi/gdb/gdb_server_exec/) \nhttps://0xdf.gitlab.io/2022/04/23/htb-backdoor.html\n\nPrevise - Backup, Site Reverse Shell, low-encrypted passwords\nhttps://0xdf.gitlab.io/2022/01/08/htb-previse.html\n\nBountyHunter - XXE, (root) NOPASSWD python code\nhttps://0xdf.gitlab.io/2021/11/20/htb-bountyhunter.html\n\nHorizontal - Strapi CMS 3.0.0 CVE-2019-18818/CVE-2019-19609 (https://www.exploit-db.com/exploits/50239, https://github.com/diego-tella/CVE-2019-19609-EXPLOIT), Laravel v8 (https://www.exploit-db.com/exploits/49424)\nhttps://0xdf.gitlab.io/2022/02/05/htb-horizontall.html\n\nOptimum - Windows 2012 (https://www.rapid7.com/db/modules/exploit/windows/http/rejetto_hfs_exec/, https://www.rapid7.com/db/modules/exploit/windows/local/ms16_032_secondary_logon_handle_privesc/)\nhttps://0xdf.gitlab.io/2021/03/17/htb-optimum.html\n\nLame - FTP Anonymous, SAMBA exploit (https://github.com/amriunix/CVE-2007-2447)\nhttps://0xdf.gitlab.io/2020/04/07/htb-lame.html\n\nJerry - Tomcat Default Cred, shell via .WAR\nhttps://0xdf.gitlab.io/2018/11/17/htb-jerry.html\n\nBlue - Win7 eternalblue (https://www.rapid7.com/db/modules/exploit/windows/smb/ms17_010_eternalblue/)\nhttps://0xdf.gitlab.io/2021/05/11/htb-blue.html\n\nDevel - Microsoft IIS httpd 7.5 reverse shell via .ASPX, MS11-046 or ms10_015_kitrap0d (https://github.com/abatchy17/WindowsExploits/tree/master/MS11-046)\nhttps://0xdf.gitlab.io/2019/03/05/htb-devel.html\n\nNetmon - PRTG Network Monitor 18.1.37.13946, Backup credentials, CVE-2018-9276 (https://github.com/A1vinSmith/CVE-2018-9276) / (https://www.exploit-db.com/exploits/46527) + evil-winrm\nhttps://0xdf.gitlab.io/2019/06/29/htb-netmon.html\n\nExplore (Android) - 59777 port CVE-2019-6447 (https://www.exploit-db.com/exploits/50070), SSH Creds on Photo, adb shell\nhttps://0xdf.gitlab.io/2021/10/30/htb-explore.html\n\nAntique - Telnet password via snmpget (https://www.irongeek.com/i.php?page=security/networkprinterhacking#JetDirect%20password%20notes), CUPS 1.6.1 (https://github.com/jpillora/chisel) \nhttps://0xdf.gitlab.io/2022/05/03/htb-antique.html\n\nReturn - evil-winrm, Server Operators in net user svc-printer /domain, sc.exe\nhttps://0xdf.gitlab.io/2022/05/05/htb-return.html\n\nGrandpa - CVE-2017-7269 (https://www.rapid7.com/db/modules/exploit/windows/iis/iis_webdav_scstoragepathfromurl/), SEImpersonalPrivilege Churrasco (https://github.com/Re4son/Churrasco/)\nhttps://0xdf.gitlab.io/2020/05/28/htb-grandpa.html\n\nBeep - ShellShock or Elastix 2.2.0 - 'graph.php' Local File Inclusion, (root) NOPASSWD nmap\nhttps://0xdf.gitlab.io/2021/02/23/htb-beep.html\n\nPandora - snmpwalk creds, CVE-2021-32099, Site Reverse Shell\nhttps://0xdf.gitlab.io/2022/05/21/htb-pandora.html\n\nPaper - WPS 5.2.3 - Cve-2019-17671 (https://www.exploit-db.com/exploits/47690, https://0day.work/proof-of-concept-for-wordpress-5-2-3-viewing-unauthenticated-posts/), Chat Bot Dir Trav, CVE-2021-3560 (https://github.com/Almorabea/Polkit-exploit/blob/main/CVE-2021-3560.py)\nhttps://0xjin.medium.com/paper-hackthebox-write-up-2abca22d3b54\n\n\n#hackthebox #ctf", "creation_timestamp": "2022-06-18T10:22:36.000000Z"}, {"uuid": "361b9030-1aa6-4e19-92f8-d82423da0155", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/iis/iis_webdav_scstoragepathfromurl.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "49ad88e0-07b2-47ea-a88c-d58666e4f61b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "https://t.me/webamoozir/1990", "content": "https://goo.gl/RqpBFh\n\u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc\u200c (\u06f2\u06f5 \u062e\u0631\u062f\u0627\u062f \u06f9\u06f6)\n\n\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0645\u0631\u0628\u0648\u0637 \u0628\u0647 \u0627\u06a9\u0633\u067e\u0644\u0648\u06cc\u062a \u0647\u0627\u06cc \u0628\u0627\u0642\u06cc\u0645\u0627\u0646\u062f\u0647 \u0627\u0632 \u0628\u0633\u062a\u0647 Shadowbrokers \u06a9\u0647 \u0631\u0641\u0639 \u0646\u0634\u062f\u0647 \u0628\u0648\u062f\u0646\u062f  \u0631\u0627 \u0628\u0631\u0627\u06cc \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0647\u0627\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632 XP \u0648 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0633\u0631\u0648\u0631 \u06f2\u06f0\u06f0\u06f3 \u0627\u0631\u0627\u0626\u0647 \u06a9\u0631\u062f: (\u0627\u06a9\u0646\u0648\u0646 \u0631\u0627\u0647\u06a9\u0627\u0631 \u062a\u0648\u0635\u06cc\u0647 \u0634\u062f\u0647 \u0628\u0631\u0627\u06cc \u0631\u0641\u0639 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0627\u06af\u0631 \u0627\u0645\u06a9\u0627\u0646 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0646\u0633\u062e\u0647 \u0647\u0627\u06cc \u062c\u062f\u06cc\u062f\u062a\u0631 \u0633\u06cc\u0633\u062a\u0645 \u0639\u0627\u0645\u0644 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0631\u0627 \u0646\u062f\u0627\u0631\u06cc\u062f\u060c \u0627\u0639\u0645\u0627\u0644 \u0628\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0631\u0633\u0645\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0627\u0633\u062a)\n\nhttps://support.microsoft.com/en-us/help/4025687/microsoft-security-advisory-4025685-guidance-for-older-platforms\n\nCVE-2017-0176: EsteemAudit\nCVE-2017-7269: ExplodingCan\nCVE-2017-8487: EnglishmanDentist\n\n@telescam", "creation_timestamp": "2017-06-15T09:40:24.000000Z"}, {"uuid": "f47518f0-e73b-45b9-a5b5-7fc7abe62db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "published-proof-of-concept", "source": "Telegram/ssqYqqdccEip6ZeushdrbISheIp6PDi_KXhzzvikRF8zVys", "content": "", "creation_timestamp": "2025-09-30T15:00:06.000000Z"}, {"uuid": "c1f28428-1109-43f2-9de0-8fe6c74641f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:09:39.000000Z"}, {"uuid": "752e971a-95b3-4097-b7a1-d3a7302d4cb7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/330bd34a-1803-4214-aa6e-62e104d828e5", "content": "", "creation_timestamp": "2026-02-02T12:28:50.880783Z"}, {"uuid": "ffcc8940-1ad4-4ced-8cc7-da74f986b047", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://t.me/webamoozir/1520", "content": "\u0627\u062b\u0631\u06af\u0630\u0627\u0631\u06cc \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632-\u0635\u0641\u0631\u0645 IIS \u0646\u0633\u062e\u0647\u200c \u06f6.\u06f0 \u0628\u0631 \u0645\u06cc\u0644\u06cc\u0648\u0646\u200c\u0647\u0627 \u0648\u0628\u06af\u0627\u0647\n@webamoozir\n\u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646 \u062d\u0648\u0632\u06c0 \u0627\u0645\u0646\u06cc\u062a \u0647\u0634\u062f\u0627\u0631 \u062f\u0627\u062f\u0647\u0627\u0646\u062f \u06a9\u0647 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0633\u0631\u0631\u06cc\u0632 \u0628\u0627\u0641\u0631 \u062f\u0631 \u062e\u062f\u0645\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u0627\u06cc\u0646\u062a\u0631\u0646\u062a (IIS) \u0646\u0633\u062e\u0647 \u06f6.\u06f0 \u0628\u0631 \u0628\u06cc\u0634 \u0627\u0632 \u06f8 \u0645\u06cc\u0644\u06cc\u0648\u0646 \u0648\u0628\u06af\u0627\u0647 \u062f\u0631 \u062f\u0646\u06cc\u0627\u06cc \u0648\u0627\u0642\u0639\u06cc \u062a\u0623\u062b\u06cc\u0631 \u0646\u0647\u0627\u062f\u0647 \u0627\u0633\u062a \u0648 \u0631\u062e\u0646\u0647\u06af\u0631\u0627\u0646 \u062a\u0627 \u062c\u0648\u0644\u0627\u06cc \u0633\u0627\u0644 \u06f2\u06f0\u06f1\u06f6 \u0645\u06cc\u0644\u0627\u062f\u06cc \u0627\u0632 \u0622\u0646 \u0628\u0647\u0631\u0647\u062c\u0648\u06cc\u06cc \u0645\u06cc\u06a9\u0631\u062f\u0647\u0627\u0646\u062f\u061b \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc\u0627\u06cc \u06a9\u0647 \u062f\u0631 \u062a\u0627\u0628\u0639 ScStoragePathFromUrl \u062e\u062f\u0645\u062a WebDAV \u0648\u06cc\u0646\u062f\u0648\u0632 \u0633\u0631\u0648\u0631 \u06f2\u06f0\u06f0\u06f3 \u0628\u0627 \u0634\u0646\u0627\u0633\u06c0 CVE-2017-7269 \u062c\u0627 \u062e\u0648\u0634 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u0648 \u0628\u0647 \u062f\u0644\u06cc\u0644 \u0627\u0639\u062a\u0628\u0627\u0631\u0633\u0646\u062c\u06cc \u0646\u0627\u0645\u0646\u0627\u0633\u0628 \u062f\u0631 \u0633\u0631\u0622\u06cc\u0646\u062f IF \u0648 \u062f\u0631 \u062f\u0631\u062e\u0648\u0627\u0633\u062a PROPFIND \u067e\u062f\u06cc\u062f\u0627\u0631 \u0645\u06cc\u0634\u0648\u062f \u0648 \u0645\u0647\u0627\u062c\u0645 \u0645\u06cc\u062a\u0648\u0627\u0646\u062f \u0628\u0627 \u0628\u0647\u0631\u0647\u062c\u0648\u06cc\u06cc \u0627\u0632 \u0622\u0646\u060c \u0634\u0631\u0627\u06cc\u0637 \u0631\u062f \u062e\u062f\u0645\u062a \u0631\u0627 \u067e\u062f\u06cc\u062f \u0622\u0648\u0631\u062f \u06cc\u0627 \u0628\u0647 \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f \u062f\u0644\u062e\u0648\u0627\u0647 \u062e\u0648\u062f\u0634 \u0628\u067e\u0631\u062f\u0627\u0632\u062f. \u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646 - \u0647\u0645\u06cc\u0646 \u0647\u0641\u062a\u0647 \u0648 \u0631\u0648\u06cc \u06af\u06cc\u062a \u0647\u0627\u0628 - \u06a9\u062f \u0627\u062b\u0628\u0627\u062a \u0645\u0641\u0647\u0648\u0645\u06cc\u0627\u06cc \u0631\u0627 \u0628\u0631\u0627\u06cc\u0634 \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0646\u062f \u0648 \u0631\u0648\u0634\u0646 \u0634\u062f \u06a9\u0647 \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0627\u0632 \u0686\u0646\u06cc\u0646 \u0627\u0634\u06a9\u0627\u0644\u06cc \u0622\u06af\u0627\u0647 \u0628\u0648\u062f\u0647 \u0627\u0633\u062a. \u0627\u0641\u0632\u0648\u0646\u0647 WebDAV \u062f\u0631 \u067e\u0631\u0648\u062a\u06a9\u0644 HTTP \u0628\u0647 \u06a9\u0627\u0631\u062e\u0648\u0627\u0647 (Client) \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u062f\u0647\u062f \u062a\u0627 \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 \u0645\u062d\u062a\u0648\u0627\u06cc \u062f\u0644\u062e\u0648\u0627\u0647\u0634 \u0631\u0627 \u0628\u0646\u0648\u06cc\u0633\u062f \u0648 \u0627\u0632 \u062a\u0648\u0627\u0628\u0639 \u062a\u0627\u0632\u0647\u0627\u06cc \u062f\u0631 HTTP\u060c \u0645\u0627\u0646\u0646\u062f: COPY \u060c LOCK\u060c MKCOL\u060c PROPFIND \u0648 UNLOCK \u067e\u0634\u062a\u06cc\u0628\u0627\u0646\u06cc \u0645\u06cc\u06a9\u0646\u062f. \u0628\u0647\u0631\u0647\u062c\u0648\u06cc\u06cc \u0627\u0632 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u06cc\u0627\u062f\u0634\u062f\u0647 \u0647\u0645\u0631\u0627\u0647\u0633\u062a \u0628\u0627 \u0628\u0647\u06a9\u0627\u0631\u06af\u06cc\u0631\u06cc \u062a\u0627\u0628\u0639 PROPFIND \u0648 \u0633\u0631\u0622\u06cc\u0646\u062f IF. \u0628\u0647 \u06af\u0641\u062a\u0647 \u067e\u0698\u0648\u0647\u0634\u06af\u0631\u0627\u0646\u060c \u0686\u0646\u0627\u0646\u0686\u0647 \u0633\u0631\u0622\u06cc\u0646\u062f IF \u0628\u06cc\u0634 \u0627\u0632 \u0627\u0646\u062f\u0627\u0632\u0647 \u0628\u0632\u0631\u06af \u0628\u0627\u0634\u062f\u060c \u0645\u06cc\u062a\u0648\u0627\u0646 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u067e\u0630\u06cc\u0631\u06cc \u0628\u0647\u0631\u0647\u062c\u0648\u06cc\u06cc \u06a9\u0631\u062f \u0648 \u06af\u0627\u0647\u06cc \u0634\u0631\u0627\u06cc\u0637 \u0631\u062f \u062e\u062f\u0645\u062a \u0646\u06cc\u0632 \u067e\u06cc\u0634 \u0645\u06cc\u0622\u06cc\u062f.\n\n\u0645\u0646\u0628\u0639: http://www.securityweek.com/.", "creation_timestamp": "2017-04-04T19:10:43.000000Z"}, {"uuid": "eff8c729-03f5-49a9-af88-4247c3e963d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "published-proof-of-concept", "source": "https://t.me/canyoupwnme/1015", "content": "CVE-2017-7269\nBuffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with \"If: &lt;http://\" in a PROPFIND request\nhttps://github.com/edwardz246003/IIS_exploit", "creation_timestamp": "2017-03-28T02:03:53.000000Z"}, {"uuid": "4d87d7f6-7d73-41a1-8595-dbeff9221687", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://t.me/information_security_channel/9396", "content": "Hackers Exploiting Microsoft IIS Flaw (CVE-2017-7269) to Hijack Servers and Mine Monero - Makes $63,000 In 3 Months\u2026 https://t.co/J3B3olYb5f", "creation_timestamp": "2017-09-28T18:36:22.000000Z"}, {"uuid": "956a1494-e265-49fc-9793-e8a0c8b03601", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://t.me/information_security_channel/9421", "content": "RT @TheHackersNews: Hackers Exploiting Microsoft IIS Flaw (CVE-2017-7269) to Hijack Servers and Mine Monero - Makes $63,000 In 3 Months\u2026", "creation_timestamp": "2017-09-29T09:27:58.000000Z"}, {"uuid": "0f849cca-28ab-42fe-ad6f-0c7ca0dde512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://t.me/information_security_channel/9484", "content": "RT @TheHackersNews: Hackers Exploiting Microsoft IIS Flaw (CVE-2017-7269) to Hijack Servers and Mine Monero - Makes $63,000 In 3 Months\u2026", "creation_timestamp": "2017-10-01T12:22:35.000000Z"}, {"uuid": "f245bb6f-be95-4faf-a1f2-a09444e3dfd5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://t.me/information_security_channel/17072", "content": "Electroneum Cryptomining Targets Microsoft IIS 6.0 Vulnerability\nhttps://www.darkreading.com/partner-perspectives/f5/electroneum-cryptomining-targets-microsoft-iis-60-vulnerability-/a/d-id/1331752?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\n\nNew campaign shows that there are still systems exposed to the year-old CVE-2017-7269 vuln on an operating system that was declared end-of-life three years ago.", "creation_timestamp": "2018-05-10T15:16:03.000000Z"}, {"uuid": "1fd16278-ec15-4a1a-ad7d-52fa2ffb64b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-7269", "type": "exploited", "source": "https://t.me/canyoupwnme/1028", "content": "Buffer overflow in the ScStoragePathFromUrl function in the WebDAV service in Internet Information Services (IIS) 6.0 in Microsoft Windows Server 2003 R2 allows remote attackers to execute arbitrary code via a long header beginning with \"If: &lt;http://\" in a PROPFIND request, as exploited in the wild in July or August 2016. \nCVE-2017-7269 - https://nvd.nist.gov/vuln/detail/CVE-2017-7269\nPatch - https://0patch.blogspot.com.tr/2017/03/0patching-immortal-cve-2017-7269.html", "creation_timestamp": "2017-03-31T02:24:34.000000Z"}]}