{"vulnerability": "cve-2017-8464", "sightings": [{"uuid": "2cd17550-2280-4e77-a67b-5be15d61f622", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/39f3133c-25fe-4ac9-b1d6-0193f14f0e45", "content": "", "creation_timestamp": "2020-10-13T15:51:01.000000Z"}, {"uuid": "da7cb14a-e5aa-4aa5-b79f-f05d323e1705", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/b60ecd6e-648d-4bc4-a6ad-3527a2216be1", "content": "", "creation_timestamp": "2020-10-09T13:26:51.000000Z"}, {"uuid": "7b45e2b2-3bec-4834-a5bd-92fde45f4800", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/5e9bc178-87c4-4e6a-9108-45fd79f742e8", "content": "", "creation_timestamp": "2020-10-13T15:51:03.000000Z"}, {"uuid": "e8f876dc-8426-42d6-a4d2-bdd65d8ed809", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/b909d469-014d-4c2b-a989-4618f5a3a92b", "content": "", "creation_timestamp": "2020-10-16T03:00:22.000000Z"}, {"uuid": "94bdf850-e26f-4a8d-a9c3-97d598bd404f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/e6fe42d5-2d65-4430-a1f1-dc057b94d89e", "content": "", "creation_timestamp": "2020-10-09T13:23:54.000000Z"}, {"uuid": "2934c0c7-4e31-46a8-8639-01da5564c84c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/884ceafb-af27-42e9-8d79-e9b6ce930532", "content": "", "creation_timestamp": "2020-10-09T15:10:37.000000Z"}, {"uuid": "6d89593e-9a51-44b4-aee6-37e7aa368322", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/95706ca1-e4d5-4714-b130-7c78ea222049", "content": "", "creation_timestamp": "2020-11-12T03:00:10.000000Z"}, {"uuid": "2003779e-dc1d-4c6c-b4b1-c754cfa9d073", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/e1d58ad8-7800-491b-a63b-a03d081914d4", "content": "", "creation_timestamp": "2020-06-25T12:24:13.000000Z"}, {"uuid": "9c5f7f6c-9a62-4853-a376-7e65e21baabc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "d77caa0f-d926-4cf6-a0b3-3047e69ecc25", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971247", "content": "", "creation_timestamp": "2024-12-24T20:26:28.057845Z"}, {"uuid": "eb8f7d99-d4fe-4c3d-8604-5fa95dc89faf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:43.000000Z"}, {"uuid": "773df136-3832-42ea-a1cf-0fb79abbb134", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2017_8464_lnk_lpe.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "4bf7cc4c-df68-422d-9c79-ad64a9c764d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:10:00.000000Z"}, {"uuid": "7bce659e-7850-4bfa-af5a-f67e78f4fb78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:16.000000Z"}, {"uuid": "1e2b0d0b-d117-4bec-93cd-43dc2f5cf570", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-8464", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/ebc1fa19-60d6-49b6-8229-0ab4fe1c5cab", "content": "", "creation_timestamp": "2026-02-02T12:28:24.280986Z"}, {"uuid": "081f09ac-d0cf-4944-ad25-bdb33670822d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/fileformat/cve_2017_8464_lnk_rce.rb", "content": "", "creation_timestamp": "2018-05-29T15:50:33.000000Z"}, {"uuid": "b221e093-37e6-4062-b74b-840115ddafe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "https://t.me/arpsyndicate/1039", "content": "#ExploitObserverAlert\n\nCVE-2017-8464\n\nDESCRIPTION: Exploit Observer has 112 entries related to CVE-2017-8464. Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka \"LNK Remote Code Execution Vulnerability.\"\n\nFIRST-EPSS: 0.974560000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-12-03T22:00:19.000000Z"}, {"uuid": "85edebe4-17a6-4150-8fec-e08110af8286", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "published-proof-of-concept", "source": "https://t.me/linuxtnt/614", "content": "\u062f\u0633\u062a\u0631\u0633\u06cc \u06af\u0631\u0641\u062a\u0646 \u0627\u0632 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0641\u0642\u0637 \u0628\u0627 \u0628\u0627\u0632\u06a9\u0631\u062f\u0646 \u0641\u0644\u0634 \u062f\u0631\u0627\u06cc\u0648 \u06cc\u0627 \u06cc\u06a9 \u067e\u0648\u0634\u0647\nCve-2017-8464\n\u2796\u2796\u2796\u2796\u2796\n\ud83c\udd94 @PenetrationTest", "creation_timestamp": "2025-03-10T12:18:47.000000Z"}, {"uuid": "bdc72ee8-efbb-4110-a6ad-700427014d95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "published-proof-of-concept", "source": "https://t.me/linuxtnt/376", "content": "\u062f\u0633\u062a\u0631\u0633\u06cc \u06af\u0631\u0641\u062a\u0646 \u0627\u0632 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0641\u0642\u0637 \u0628\u0627 \u0628\u0627\u0632\u06a9\u0631\u062f\u0646 \u0641\u0644\u0634 \u062f\u0631\u0627\u06cc\u0648 \u06cc\u0627 \u06cc\u06a9 \u067e\u0648\u0634\u0647\nCve-2017-8464\n\u2796\u2796\u2796\u2796\u2796\n\ud83c\udd94 @PenetrationTest", "creation_timestamp": "2025-03-10T12:02:19.000000Z"}, {"uuid": "a5a4119a-92a5-490d-b40d-63811ac672c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "https://t.me/arpsyndicate/635", "content": "#ExploitObserverAlert\n\nCVE-2017-8464\n\nDESCRIPTION: Exploit Observer has 112 entries related to CVE-2017-8464. Windows Shell in Microsoft Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, Windows RT 8.1, Windows 10 Gold, 1511, 1607, 1703, and Windows Server 2016 allows local users or remote attackers to execute arbitrary code via a crafted .LNK file, which is not properly handled during icon display in Windows Explorer or any other application that parses the icon of the shortcut. aka \"LNK Remote Code Execution Vulnerability.\"\n\nFIRST-EPSS: 0.974560000\nNVD-IS: 5.9\nNVD-ES: 2.8", "creation_timestamp": "2023-11-28T12:21:22.000000Z"}, {"uuid": "735c272b-6d38-4e4d-bce5-5858a6088437", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "MISP/39f3133c-25fe-4ac9-b1d6-0193f14f0e45", "content": "", "creation_timestamp": "2026-05-07T22:15:09.000000Z"}, {"uuid": "e6359e0b-88a2-466a-afd6-08640a49a568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-8464", "type": "seen", "source": "Telegram/ejJ6m0dmSE_v_Vs27hZFWdg2FNnuQOFwbOL08u9kciis0c8", "content": "", "creation_timestamp": "2022-07-21T22:46:50.000000Z"}]}