{"uuid": "52f6db3a-3e4d-4a12-9118-765edfe336a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2019-5736", "type": "exploited", "source": "https://t.me/BleepingComputer/4566", "content": "Vulnerable Docker Hosts Actively Abused in Cryptojacking Campaigns\n\nHundreds of vulnerable and exposed Docker hosts are being abused in cryptojacking campaigns after being compromised with the help of exploits designed to take advantage of the CVE-2019-5736 runc vulnerability discovered last month. [...]\n\nhttps://www.bleepingcomputer.com/news/security/vulnerable-docker-hosts-actively-abused-in-cryptojacking-campaigns/", "creation_timestamp": "2019-03-05T02:03:48.000000Z"}