{"vulnerability": "CVE-2016-3351", "sightings": [{"uuid": "c775bd4b-6479-4da5-bd58-3212fb5dfb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fe549506-0694-4d56-991f-52255778dc8a", "content": "", "creation_timestamp": "2026-02-02T12:27:40.498079Z"}, {"uuid": "abe1d726-1996-4813-af56-aa7803813b9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "Telegram/3XwXQUONqoYUrq3CNOYzVgysJvdF-fy3hJLlPpcQPyI85iJI", "content": "", "creation_timestamp": "2025-02-14T10:00:28.000000Z"}, {"uuid": "bb4a7b0e-3569-430b-8bbf-6d1e18938a0b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "https://t.me/arpsyndicate/1206", "content": "#ExploitObserverAlert\n\nCVE-2016-3351\n\nDESCRIPTION: Exploit Observer has 8 entries related to CVE-2016-3351. Microsoft Internet Explorer 9 through 11 and Microsoft Edge allow remote attackers to obtain sensitive information via a crafted web site, aka \"Microsoft Browser Information Disclosure Vulnerability.\"\n\nFIRST-EPSS: 0.135940000\nNVD-IS: 1.4\nNVD-ES: 1.6", "creation_timestamp": "2023-12-04T12:38:33.000000Z"}, {"uuid": "2fab7c18-3e08-4688-b2ac-19b2504ca55e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "exploited", "source": "https://t.me/xakep_ru/913", "content": "0-day \u0431\u0430\u0433 \u0432 IE \u0438 Edge, \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u044b\u0439 \u0434\u0432\u0430 \u0434\u043d\u044f \u043d\u0430\u0437\u0430\u0434, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0441\u044f \u0445\u0430\u043a\u0435\u0440\u0430\u043c\u0438 \u0441 2014 \u0433\u043e\u0434\u0430 https://xakep.ru/2016/09/15/cve-2016-3351/?amp", "creation_timestamp": "2016-09-15T14:32:32.000000Z"}, {"uuid": "3acdfbc3-218c-49ae-9dad-0d9d773b8254", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "92ea5b55-9f16-4b39-a4c7-6d5beab623d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:11.000000Z"}, {"uuid": "04047ac0-d098-4037-afeb-4290ddb68fb5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/fe549506-0694-4d56-991f-52255778dc8a", "content": "", "creation_timestamp": "2026-02-02T12:27:40.498079Z"}, {"uuid": "274f81f0-8f96-4238-b23f-bf51ca0e5cd3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "https://t.me/alexredsec/309", "content": "\u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u0432\u0440\u0435\u043c\u044f \u043f\u043e\u0447\u0442\u0438 \u043d\u0435 \u0447\u0438\u0442\u0430\u043b \u043e\u0442\u0447\u0435\u0442\u044b \u043f\u0440\u043e ransomware, \u043e\u0434\u043d\u0430\u043a\u043e, \u043d\u0430 \u0440\u0430\u0431\u043e\u0442\u0443 \"2023 Spotlight Report: Ransomware Through the Lens of Threat and Vulnerability Management\" \u043e\u0431\u0440\u0430\u0442\u0438\u043b \u0432\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u0442.\u043a. \u0432 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0438 \u0435\u0441\u0442\u044c \u0437\u0430\u043d\u0438\u043c\u0430\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 ransomware.\n\n\u041d\u0438\u0436\u0435 \u043f\u0440\u0438\u0432\u043e\u0436\u0443 \u0433\u043b\u0430\u0432\u043d\u044b\u0435 \u0432\u044b\u0432\u043e\u0434\u044b \u0441 \u043d\u0435\u0431\u043e\u043b\u044c\u0448\u0438\u043c\u0438 \u0432\u044b\u0434\u0435\u0440\u0436\u043a\u0430\u043c\u0438 \u0438\u0437 \u043e\u0442\u0447\u0435\u0442\u0430:\n\ud83d\udd38\u0412 2022 \u0433\u043e\u0434\u0443 56 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0431\u044b\u043b\u0438 \u0441\u0432\u044f\u0437\u0430\u043d\u044b \u0441 ransomware.\n\u0412\u0441\u0435\u0433\u043e\u00a0 - 344 (\u0441 2010 \u0433\u043e\u0434\u0430).\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c 180 \u0438\u0437 \u043d\u0438\u0445 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438.\n\ud83d\udd38\u0421 \u043f\u043e\u043c\u043e\u0449\u044c\u044e 57 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043c\u043e\u0436\u043d\u043e \"\u043f\u0440\u043e\u0431\u0435\u0436\u0430\u0442\u044c\u0441\u044f\" \u043f\u043e \u0432\u0441\u0435\u0439 \u0446\u0435\u043f\u043e\u0447\u043a\u0435 kill chain.\n49 \u0438\u0437 \u044d\u0442\u0438\u0445 57 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u044b \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 CISA KEV.\n\ud83d\udd3820 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 ransomware, \u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f \u0442\u0430\u043a\u0438\u043c\u0438 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u043c\u0438 \u0441\u043a\u0430\u043d\u0435\u0440\u0430\u043c\u0438 \u043a\u0430\u043a Nessus, Nexpose \u0438 Qualys.\n\u0422\u0443\u0442, \u043a\u043e\u043d\u0435\u0447\u043d\u043e, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438 \u0441\u043a\u0430\u043d\u0435\u0440\u043e\u0432 \u043c\u043e\u0433\u0443\u0442 \u0432\u043e\u0437\u0440\u0430\u0437\u0438\u0442\u044c, \u0447\u0442\u043e \u0438\u043c \u0442\u044f\u0436\u0435\u043b\u043e \u0432\u0435\u0441\u0442\u0438 \u0431\u0430\u0437\u0443 \u0434\u044b\u0440 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u041f\u041e \u0432 \u043c\u0438\u0440\u0435, \u043e\u0434\u043d\u0430\u043a\u043e \u0432 \u043f\u0435\u0440\u0435\u0447\u0435\u043d\u044c \"\u043d\u0435\u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445\" \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u043f\u0430\u043b\u0438 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u044b \u0442\u0430\u043a\u0438\u0445 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432 \u043a\u0430\u043a IBM, Gigabyte, D-Link, QNAP \u0438 \u0434\u0440.\n\ud83d\udd38\u0418\u0437 344 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 ransomware, \u0442\u043e\u043b\u044c\u043a\u043e 231 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 CISA KEV.\n\u0422\u043e\u043f-10 \u0432\u0443\u043b\u043d, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0441\u043a\u043e\u0440\u043e \u0434\u043e\u043b\u0436\u043d\u044b \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u0432 CISA KEV \u043f\u0440\u0438\u0432\u0435\u0434\u0435\u043d\u044b \u0432 \u043e\u0442\u0447\u0435\u0442\u0435.\n\ud83d\udd3876% \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 ransomware,\u00a0 - \u044d\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0434\u043e \u043d\u0430\u0447\u0430\u043b\u0430 2020 \u0433\u043e\u0434\u0430.\n\u0410 \u043d\u0435\u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0435\u0449\u0435 \u0438 \u0441\u043a\u0430\u043d\u0435\u0440\u0430\u043c\u0438 \u043d\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0432\u0430\u044e\u0442\u0441\u044f...\n\ud83d\udd3816% \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0445 \u0441 ransomware, \u0438\u043c\u0435\u044e\u0442 \u043d\u0438\u0437\u043a\u0438\u0439 \u0438 \u0441\u0440\u0435\u0434\u043d\u0438\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u043f\u043e CVSS.\n\u041d\u0430\u0448\u0435 \u0438\u0437\u043b\u044e\u0431\u043b\u0435\u043d\u043d\u043e\u0435 - \u0432\u0441\u0435 \u043f\u043e\u043d\u0438\u043c\u0430\u044e\u0442, \u0447\u0442\u043e \u043e\u0440\u0438\u0435\u043d\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043d\u0430 \u0441\u043a\u043e\u0440\u0438\u043d\u0433 CVSS \u0434\u043b\u044f \u0444\u043e\u0440\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0440\u0438\u043e\u0440\u0438\u0442\u0435\u0442\u0430 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e \u043f\u0440\u0430\u0432\u0438\u043b\u043e \u043f\u043b\u043e\u0445\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438.\n\u0412 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043f\u0440\u0438\u043c\u0435\u0440\u0430, \u0434\u044b\u0440\u0430 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Microsoft \u043f\u043e\u0434 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u043e\u043c CVE-2016-3351 \u0438\u043c\u0435\u044e\u0449\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0443 3.1 (\u043f\u043e CVSS 3.1), \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0434\u0435\u0432\u044f\u0442\u044c\u044e APT-\u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438. \u0412 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 CISA KEV \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0430 \u0432 2022 \u0433\u043e\u0434\u0443, \u0430 \u0435\u0441\u043b\u0438 \u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c \u0411\u0414\u0423 \u0424\u0421\u0422\u042d\u041a, \u0442\u043e \u043e\u043f\u0430\u0441\u043d\u043e\u0439 \u0435\u0435 \u043d\u0435 \u043f\u043e\u0441\u0447\u0438\u0442\u0430\u0435\u0448\u044c.\n\u0410 \u0435\u0441\u0442\u044c \u0435\u0449\u0435 \u043f\u0440\u0438\u043c\u0435\u0440\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 APT-\u0433\u0440\u0443\u043f\u043f\u0430\u043c\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0432 \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435 NVD \u0437\u043d\u0430\u0447\u0430\u0442\u0441\u044f \u043a\u0430\u043a \u043e\u0442\u043e\u0437\u0432\u0430\u043d\u043d\u044b\u0435. \u041d\u0430\u043f\u0440\u0438\u043c\u0435\u0440, CVE-2019-9081 \u0438\u043b\u0438 CVE-2015-2551.", "creation_timestamp": "2023-03-09T09:29:35.000000Z"}, {"uuid": "089f1d0b-4e73-4af0-84b7-fe572e0c8c55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "MISP/57dbde53-bfe8-4aaa-99b9-03ffbce2ab96", "content": "", "creation_timestamp": "2016-09-16T11:59:44.000000Z"}, {"uuid": "c06a1797-d1ba-4a35-b7de-94cebe6419da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "exploited", "source": "https://t.me/itsecalert/38", "content": "\u26a0\ufe0f IE9/IE10/IE10 - Microsoft Patches CVE-2016-3351 Zero-Day, Exploited By AdGholas and GooNky Malvertising Groups. (severity: \ud83d\udd38high) Further Information: https://technet.microsoft.com/en-us/library/security/ms16-104.aspx \n#alert #vulnerability #severityhigh #microsoft #internetexplorer #ie", "creation_timestamp": "2016-09-14T16:34:32.000000Z"}, {"uuid": "e8ecea0e-4fa9-429a-8db9-619047b45ef8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2016-3351", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971574", "content": "", "creation_timestamp": "2024-12-24T20:31:20.034742Z"}]}