{"vulnerability": "cve-2024-2898", "sightings": [{"uuid": "f1563a48-5772-4a2a-b4d3-6853fd4ef228", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113984042828183491", "content": "", "creation_timestamp": "2025-02-11T07:21:06.484719Z"}, {"uuid": "e8f7a466-231a-4885-a871-94c61e21e9a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lhv7rhnhtv2z", "content": "", "creation_timestamp": "2025-02-11T08:15:52.719506Z"}, {"uuid": "472ba9d6-aed3-4682-814c-730ef2978b74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lhvnfvyku72t", "content": "", "creation_timestamp": "2025-02-11T12:19:59.103330Z"}, {"uuid": "0544bd8f-6f38-476a-b9bc-3e5d39ea45bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:01.000000Z"}, {"uuid": "b267ad94-5f96-47b2-8f78-de2e491cbc1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lk34xuekbc23", "content": "", "creation_timestamp": "2025-03-11T03:32:14.135882Z"}, {"uuid": "c8f090ac-dc7f-4d22-a210-3baec9166048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lk3a75cdc22n", "content": "", "creation_timestamp": "2025-03-11T04:29:53.091498Z"}, {"uuid": "6e2144f8-5ad4-4a6e-9bdc-d0a08f87c742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://bsky.app/profile/buherator.bsky.social/post/3lk3ew42awy2v", "content": "", "creation_timestamp": "2025-03-11T05:54:18.123489Z"}, {"uuid": "1d00f0c9-e5e9-4d0d-8a7c-224f308d9b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:57.000000Z"}, {"uuid": "91ef3283-a35d-4b68-b2bb-1aab44fe5929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}, {"uuid": "16509289-9bd6-4ba2-a5e5-c4973c45419e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "c9b051b9-b7a7-407a-bfc3-d5f5709c2d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lzj3po2e222l", "content": "", "creation_timestamp": "2025-09-23T14:04:49.181558Z"}, {"uuid": "23612896-b4b9-4fe4-bb26-f6d21876f62e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/nihonmatsu.bsky.social/post/3lzj3po2e222l", "content": "", "creation_timestamp": "2025-09-23T14:04:49.283973Z"}, {"uuid": "52affdec-e8a1-4770-932c-2393b0993c37", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzjiejwmp342", "content": "", "creation_timestamp": "2025-09-23T17:51:28.195134Z"}, {"uuid": "93110d9e-d9bf-491f-9648-f97f33e3a93b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/2rZiKKbOU3nTafniR2qMMSE0gwZ.activitypub.awakari.com.ap.brid.gy/post/3lzjiejwmp342", "content": "", "creation_timestamp": "2025-09-23T17:51:28.297201Z"}, {"uuid": "2b0c0da6-feed-41d8-a009-51d23a4fe856", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/gather/solarwinds_webhelpdesk_backdoor.rb", "content": "", "creation_timestamp": "2024-10-31T16:42:23.000000Z"}, {"uuid": "b3824b92-7e04-42de-9c18-4e56d27e9c78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lxsuxgmwhj2n", "content": "", "creation_timestamp": "2025-09-02T00:40:07.520301Z"}, {"uuid": "8d2e0f0f-4099-45c2-8a9b-bd2c0e35b965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8c25169b-2933-442f-9966-61d3feb84bff", "content": "", "creation_timestamp": "2026-02-02T12:26:31.460022Z"}, {"uuid": "1c1557a9-849b-4e3b-aefb-b3d133e35182", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8d4b0c92-f560-441c-8fd5-f910d1539b64", "content": "", "creation_timestamp": "2026-02-02T12:26:25.966515Z"}, {"uuid": "2417b736-d895-4b4b-a877-b4c89510ebab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://vulnerability.circl.lu/comment/20187f45-138c-48ba-b11f-52dc3ddfd69e", "content": "", "creation_timestamp": "2024-10-18T22:23:39.387177Z"}, {"uuid": "3e8691b2-5ff3-405e-a9f7-a31b8f90c6f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://vulnerability.circl.lu/comment/f9ef410e-5884-4a57-a0d5-a3a16d9ff8fa", "content": "", "creation_timestamp": "2024-10-18T22:25:32.495082Z"}, {"uuid": "f6253472-fb3b-48cf-8dfc-dcd67bdfeef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/14736", "content": "\u200aCritical SolarWinds Flaw Exposes 827 Instances: PoC Exploit Unveiled for CVE-2024-28987\n\nhttps://securityonline.info/critical-solarwinds-flaw-exposes-827-instances-poc-exploit-unveiled-for-cve-2024-28987/", "creation_timestamp": "2024-09-30T18:09:40.000000Z"}, {"uuid": "291c36e5-071b-4639-9e26-5b8c6504a8cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "https://t.me/cvedetector/17683", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28989 - SolarWinds Web Help Desk Cryptographic Key Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28989 \nPublished : Feb. 11, 2025, 8:15 a.m. | 1\u00a0hour, 51\u00a0minutes ago \nDescription : SolarWinds Web Help Desk was found to have a hardcoded cryptographic key that could allow the disclosure of sensitive information from the software. \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T11:30:00.000000Z"}, {"uuid": "2c2a298d-db1d-45d0-98e1-de5a15a0ae51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://t.me/information_security_channel/54193", "content": "SolarWinds Makes Third Attempt at Patching Exploited Vulnerability\nhttps://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/\n\nCVE-2025-26399 is a patch bypass of CVE-2024-28988, which is a patch bypass of the exploited CVE-2024-28986.\nThe post SolarWinds Makes Third Attempt at Patching Exploited Vulnerability (https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-09-23T17:35:41.000000Z"}, {"uuid": "a46fdd9a-ec03-4627-885d-728f22fadd88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/information_security_channel/54193", "content": "SolarWinds Makes Third Attempt at Patching Exploited Vulnerability\nhttps://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/\n\nCVE-2025-26399 is a patch bypass of CVE-2024-28988, which is a patch bypass of the exploited CVE-2024-28986.\nThe post SolarWinds Makes Third Attempt at Patching Exploited Vulnerability (https://www.securityweek.com/solarwinds-makes-third-attempt-at-patching-exploited-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2025-09-23T17:35:41.000000Z"}, {"uuid": "90a7c510-d403-40a7-aef9-86849d6625b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/35936", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T20:40:06.000000Z"}, {"uuid": "8da28555-6bf2-468b-b462-d350bf1cfea9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/35519", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:30:08.000000Z"}, {"uuid": "0c7d5a00-ad0c-4a45-883f-f7a2794803ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/Celestial_Pulse24/7758", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-06T18:20:42.000000Z"}, {"uuid": "8d696c98-30f9-4626-a81c-c642ffedcb2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28981", "type": "seen", "source": "https://t.me/cvedetector/5415", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28981 - Hitachi Vantara Pentaho Database Password Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-28981 \nPublished : Sept. 12, 2024, 12:15 a.m. | 40\u00a0minutes ago \nDescription : Hitachi Vantara Pentaho Data Integration &amp; Analytics versions before 10.1.0.0 and 9.3.0.8, including 8.3.x, discloses database passwords when searching metadata injectable fields. \nSeverity: 8.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"12 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-12T03:04:22.000000Z"}, {"uuid": "ed6289bb-9c62-4154-8b4f-77e6052ed9e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/cvedetector/3846", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28987 - SolarWinds Web Help Desk Hardcoded Credential Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2024-28987 \nPublished : Aug. 21, 2024, 10:15 p.m. | 33\u00a0minutes ago \nDescription : The SolarWinds Web Help Desk (WHD) software is affected by a hardcoded credential vulnerability, allowing remote unauthenticated user to access internal functionality and modify data. \nSeverity: 9.1 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"22 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-22T00:57:11.000000Z"}, {"uuid": "5b92096c-87ab-4459-beda-0f470cc3cfb2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "Telegram/oWM9fnezygmM0nBmDkYfvHo-s6r1nbk8dRSo1QSJPgPFnA", "content": "", "creation_timestamp": "2024-10-16T11:03:56.000000Z"}, {"uuid": "ff64c81a-7b1d-4ec9-bda8-f9dffacb7fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/10126", "content": "\ud83d\udea8CVE-2024-28987 Scanner &amp; Exploiter - SolarWinds Web Help Desk\n\nhttps://darkwebinformer.com/cve-2024-28987-scanner-exploiter-solarwinds-web-help-desk/?v=1", "creation_timestamp": "2025-01-07T21:42:01.000000Z"}, {"uuid": "838355c3-0d91-4f07-b01b-9d98bb31b21a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/_f36eT9DDEkaZ8wfQGX3qCIkbSeLLRKrbtS_sNHN1aWzv9I", "content": "", "creation_timestamp": "2024-09-05T17:30:06.000000Z"}, {"uuid": "7ca7c958-0321-4e53-a1b5-46b126306b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "Telegram/4mlYzYWtNqMujb2J7zLhGZE1VQC4bytYTFTXTkH2HhyjdQ", "content": "", "creation_timestamp": "2024-10-16T11:01:42.000000Z"}, {"uuid": "138f309c-3d33-4316-9b8b-2335e3cec59c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/qyurz87mRVH7kvWTvRwWJRaZUZrXdLPGt4Uig9Hk07tWtBM", "content": "", "creation_timestamp": "2024-09-05T20:40:07.000000Z"}, {"uuid": "480858e7-d096-4440-898f-b48812a221b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/971", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\n#CyberDilara", "creation_timestamp": "2024-09-25T14:21:30.000000Z"}, {"uuid": "47895ddc-d8ca-4689-b8ab-6c207cdbb4a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/AnonymousEgypt/24053", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:30:04.000000Z"}, {"uuid": "da518aba-6a54-4d8f-a1f4-421b8fd6fb41", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/AnonymousEgypt/24470", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T20:40:02.000000Z"}, {"uuid": "042c330d-8cd9-4a12-b965-d3e3f098b515", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/3546", "content": "The Hacker News\nSolarWinds Releases Patch for Critical Flaw in Web Help Desk Software\n\nSolarWinds has released patches to address a critical security vulnerability in its Web Help Desk software that could be exploited to execute arbitrary code on susceptible instances.\nThe flaw, tracked as CVE-2024-28986 (CVSS score: 9.8), has been described as a deserialization bug.\n\"SolarWinds Web Help Desk was found to be susceptible to a Java deserialization remote code execution vulnerability", "creation_timestamp": "2024-08-15T17:16:42.000000Z"}, {"uuid": "3a944f9e-d4ac-4f65-bb78-8e2817ee9959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/67tsegYcQIUV7lyfyUyokIQvG0vHB8OXAelx-BGM_6cMQP8", "content": "", "creation_timestamp": "2025-04-22T05:00:08.000000Z"}, {"uuid": "13244680-919d-444d-a26b-5161b4a41fca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "published-proof-of-concept", "source": "Telegram/cNxbFZZdo4lIvFx4xvc0hLK4F8fRxTqcrmeBNIRfXm1RHD0", "content": "", "creation_timestamp": "2024-08-14T19:46:35.000000Z"}, {"uuid": "ca0514e4-d98e-4d56-ace2-77d7cea26512", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/9157", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\nhttps://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/", "creation_timestamp": "2024-09-25T13:54:41.000000Z"}, {"uuid": "cbf04acd-8dd6-4d1d-a193-e930734fbba3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-28987", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113789007928798122", "content": "", "creation_timestamp": "2025-01-07T20:41:10.105518Z"}, {"uuid": "230723a5-214e-4304-99e2-01fe31a53cb1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3lf6j3zch5t27", "content": "", "creation_timestamp": "2025-01-07T20:41:15.338353Z"}, {"uuid": "c990dada-a8e0-4d91-9674-24f14d0caf88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-28987", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113789012155295772", "content": "", "creation_timestamp": "2025-01-07T20:42:14.560507Z"}, {"uuid": "bf9fe343-21dc-495d-ba5c-3a43bc1505f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3lf6j5zepkl27", "content": "", "creation_timestamp": "2025-01-07T20:42:22.510854Z"}, {"uuid": "e9490268-e6d1-412d-99a2-dbf0fae6325d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "71af53f0-0b80-4df5-908e-8e3d9a74f46d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv6ndze6qu23", "content": "", "creation_timestamp": "2025-07-30T12:40:22.096244Z"}, {"uuid": "1253df68-81e9-4961-80e6-e857f34a42ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://bsky.app/profile/basefortify.bsky.social/post/3lzijsmzdwc2q", "content": "", "creation_timestamp": "2025-09-23T08:44:24.586840Z"}, {"uuid": "8e8ab2cd-6c67-4756-a386-70d18439a191", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://bsky.app/profile/infosecindustry.bsky.social/post/3lzjerbr2ua2a", "content": "", "creation_timestamp": "2025-09-23T16:46:47.189056Z"}, {"uuid": "4f0e0be8-3584-41d9-9545-cf2af2577a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/infosecindustry.bsky.social/post/3lzjerbr2ua2a", "content": "", "creation_timestamp": "2025-09-23T16:46:47.271907Z"}, {"uuid": "549b38fd-a6c0-434f-b64c-ffd94db9b29b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://gist.github.com/Darkcrai86/db3c374d3d3b7ce872319cce351bc7a7", "content": "", "creation_timestamp": "2025-09-23T16:59:31.000000Z"}, {"uuid": "43bfc72c-f735-4f24-986b-7cb4a6cda382", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://gist.github.com/Darkcrai86/db3c374d3d3b7ce872319cce351bc7a7", "content": "", "creation_timestamp": "2025-09-23T16:59:31.000000Z"}, {"uuid": "79e6f922-d074-43f9-9a50-0e844a92b2e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-df887e70-aaa85e643f2fa245", "content": "", "creation_timestamp": "2026-03-13T15:12:35.527481Z"}, {"uuid": "5d9d4277-d14d-4f37-92cb-d61675a698f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-df887e70-aaa85e643f2fa245", "content": "", "creation_timestamp": "2026-03-13T15:12:35.455085Z"}, {"uuid": "a4c81253-eb2e-4f6d-96e1-9afbd06b6929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/termsofsurrender.bsky.social/post/3meoqxa3x4u2h", "content": "", "creation_timestamp": "2026-02-12T19:45:27.275664Z"}, {"uuid": "e85853f2-7e0d-4724-a1a0-e0974f527888", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "4f29edb9-4c4b-44ca-b041-9b050656b6ae", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/termsofsurrender.bsky.social/post/3mfskdm6qkf2p", "content": "", "creation_timestamp": "2026-02-27T01:22:47.754691Z"}, {"uuid": "bf785b29-1643-48f8-a79d-122490ba3965", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8c25169b-2933-442f-9966-61d3feb84bff", "content": "", "creation_timestamp": "2026-02-02T12:26:31.460022Z"}, {"uuid": "b325cf6c-a1af-4b7e-acdf-9b4074b80d60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/8d4b0c92-f560-441c-8fd5-f910d1539b64", "content": "", "creation_timestamp": "2026-02-02T12:26:25.966515Z"}, {"uuid": "60437cbe-699b-42ee-8dae-5f2bfb64db29", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/10422", "content": "\u200aCVE-2024-28986: Critical RCE Vulnerability Impacting SolarWinds Web Help Desk\n\nhttps://malware.news/t/cve-2024-28986-critical-rce-vulnerability-impacting-solarwinds-web-help-desk/85377", "creation_timestamp": "2024-08-18T17:36:05.000000Z"}, {"uuid": "1074f072-3538-43e8-9a5c-947490f00768", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/14290", "content": "\u200aCVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive\n\nhttps://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/", "creation_timestamp": "2024-09-26T11:07:50.000000Z"}, {"uuid": "2890e5c8-1d0f-488e-860e-b1ccc543352a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8650", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-28987 Scanner &amp; Exploiter - SolarWinds Web Help Desk\nURL\uff1ahttps://github.com/PlayerFridei/CVE-2024-28987\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-30T16:37:25.000000Z"}, {"uuid": "bd1c4ec2-6efe-45c1-9c55-d89f7df4dd88", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/18440", "content": "https://github.com/fa-rrel/CVE-2024-28987-POC\n\nWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\n#github #exploit", "creation_timestamp": "2024-09-05T18:36:59.000000Z"}, {"uuid": "3967c371-30ae-41c4-8c49-6fdcb983896e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/HackingInsights/9834", "content": "\u200aCVE-2024-28986 (CVSS 9.8): SolarWinds Web Help Desk Users Must Patch Now!\n\nhttps://securityonline.info/cve-2024-28986-cvss-9-8-solarwinds-web-help-desk-users-must-patch-now/", "creation_timestamp": "2024-08-14T09:24:18.000000Z"}, {"uuid": "3676a1d3-b622-450d-b701-5a3cfb9f6b63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/pLNkfqG8edUJ5abgUQNUKdxcVYfg-V1lxeR0R01pgTi5TQ", "content": "", "creation_timestamp": "2024-09-06T05:11:52.000000Z"}, {"uuid": "e2390ac5-1dce-4f54-b386-5b8c2f13b670", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://t.me/cvedetector/3087", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-28986 - SolarWinds Web Help Desk Java Deserialization Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-28986 \nPublished : Aug. 13, 2024, 11:15 p.m. | 39\u00a0minutes ago \nDescription : SolarWinds Web Help Desk was susceptible to a Java Deserialization  Remote Code Execution that would allow access to run commands on the host machine. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Aug 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-08-14T02:19:45.000000Z"}, {"uuid": "2c57e1b6-1dfa-4da0-b7d6-078509f90f70", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/99569", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T20:40:06.000000Z"}, {"uuid": "07305fc8-8dcd-465a-a1d8-790dc9393861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/LockBitChannels/99147", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:30:08.000000Z"}, {"uuid": "fe47c69c-4cc9-472c-9388-15646dc9fcf1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/4TmRFK6d-0sBJMy5iC4u4LhacgPfrCXLnsJ7MWuL_wwwaKc", "content": "", "creation_timestamp": "2024-09-05T20:40:07.000000Z"}, {"uuid": "b13ad952-d964-4514-85d2-9fa484398933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "Telegram/cB5PXRJnltoIwSbVE1M1r6ouPORfG9ZbQci01_SlNoDOH70", "content": "", "creation_timestamp": "2024-09-05T17:30:06.000000Z"}, {"uuid": "42463c87-8df9-41c8-8a14-5cb3bbde9ca7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/23679", "content": "The Hacker News\nCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain", "creation_timestamp": "2024-10-16T11:03:56.000000Z"}, {"uuid": "ade712f1-3fcd-4288-83b1-e8f3b5f7e255", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/FIj90rbbw6DtYiRmutpPiZsfH3945UKxSF3eexJUzzPGSfGh", "content": "", "creation_timestamp": "2024-12-21T00:18:41.000000Z"}, {"uuid": "bf1502ce-283d-4361-bec5-00727572b282", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5138", "content": "The Hacker News\nCISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain", "creation_timestamp": "2024-10-16T11:03:56.000000Z"}, {"uuid": "228e9b30-5e07-4df1-be1d-bd84ab39349f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/23905", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\n#CyberDilara", "creation_timestamp": "2024-09-25T16:09:44.000000Z"}, {"uuid": "2f5561f3-b2dd-4c71-afa4-319360d19929", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/25875", "content": "\u26a1\ufe0fCritical SolarWinds Flaw Exposes 827 Instances: PoC Exploit Unveiled for CVE-2024-28987.\n\n#CyberBulletin", "creation_timestamp": "2024-09-30T11:01:23.000000Z"}, {"uuid": "1ea16dae-af1b-45a5-abb8-f3d30c60c87f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/InfoSecInsider/366", "content": "CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive \u2013 Horizon3.ai\n\n#CyberDilara", "creation_timestamp": "2024-09-25T16:09:48.000000Z"}, {"uuid": "ed7fb590-3ebd-4d33-85c2-72ecb4d959b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "", "content": "", "creation_timestamp": "2024-10-18T12:31:03.796404Z"}, {"uuid": "4f8768ff-9e63-4f3b-9b1a-a4d0abbce2e8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "confirmed", "source": "", "content": "", "creation_timestamp": "2024-10-18T12:31:04.918128Z"}, {"uuid": "f2877382-6a2a-401c-973c-48baa4c44c1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "", "content": "", "creation_timestamp": "2024-10-18T12:31:06.414769Z"}, {"uuid": "3327ceda-d516-4b81-8b18-eb8d7fec2f0f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "patched", "source": "", "content": "", "creation_timestamp": "2024-10-19T11:12:29.411464Z"}, {"uuid": "d087b42a-5409-42ad-bfe8-9cd7efa77fee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-10-15T21:10:02.000000Z"}, {"uuid": "15d6e4c4-05a3-4551-bbc5-9a960b73c5cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "cve-2024-28987", "type": "seen", "source": "https://infosec.exchange/users/DarkWebInformer/statuses/113788880410319227", "content": "", "creation_timestamp": "2025-01-07T20:08:44.376901Z"}, {"uuid": "dc76dfe1-164e-4ade-b269-628650c395c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://bsky.app/profile/darkwebinformer.bsky.social/post/3lf6hbzeybd27", "content": "", "creation_timestamp": "2025-01-07T20:08:49.725260Z"}, {"uuid": "a57aa333-7f10-42b4-9c0c-e2fae27f085d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-407/", "content": "", "creation_timestamp": "2025-06-17T03:00:00.000000Z"}, {"uuid": "257098a0-9555-4773-9e97-ace110007b1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://cert.europa.eu/publications/security-advisories/2025-034/", "content": "", "creation_timestamp": "2025-09-24T13:35:06.000000Z"}, {"uuid": "074348fa-fb02-4968-a0d9-77df5a9ae861", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://gist.github.com/Darkcrai86/90a29de635a75c3cd24c3ba2b1c551b7", "content": "", "creation_timestamp": "2025-09-30T15:07:22.000000Z"}, {"uuid": "24f6aeb9-0a2e-442d-8973-c68cdf7d768e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://gist.github.com/Darkcrai86/90a29de635a75c3cd24c3ba2b1c551b7", "content": "", "creation_timestamp": "2025-09-30T15:07:22.000000Z"}, {"uuid": "02b83174-b73f-4d1a-abf6-c2e6b2fc7458", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28988", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115255134365690405", "content": "", "creation_timestamp": "2025-09-23T18:56:24.199632Z"}, {"uuid": "94e6fb94-4642-4d6b-ad89-d779a63974b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://infosec.exchange/users/edwardk/statuses/115255134365690405", "content": "", "creation_timestamp": "2025-09-23T18:56:24.262229Z"}, {"uuid": "89ae4117-1bd1-4d0c-8aeb-023abfa4ddd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "MISP/3445a876-cced-4346-bf37-e276ba39cff4", "content": "", "creation_timestamp": "2025-09-02T18:30:14.000000Z"}, {"uuid": "81429e99-5bf6-402f-af9c-c506f89f88ff", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3mbcraildrn2g", "content": "", "creation_timestamp": "2025-12-31T21:03:10.802412Z"}, {"uuid": "cab67611-8c32-4347-8578-7dbbcc294ccc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8455", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\nURL\uff1ahttps://github.com/fa-rrel/CVE-2024-28987-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-09-05T09:09:47.000000Z"}, {"uuid": "610b20dd-36f5-48df-907e-74aa3abcc8a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "exploited", "source": "https://t.me/itsec_news/4630", "content": "\u200b\u26a1\ufe0fCVE-2024-28987: \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u0432 SolarWinds WHD \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0440\u043e\u0447\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439\n\n\ud83d\udcac\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0451\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Web Help Desk (WHD). \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-28987 \u0438 \u043e\u0446\u0435\u043d\u0451\u043d\u043d\u0430\u044f \u0432 9,1 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0435 CVSS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Horizon3 \u0417\u0430\u043a \u0425\u044d\u043d\u043b\u0438 \u0431\u044b\u043b \u043f\u0440\u0438\u0437\u043d\u0430\u043d \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e \u0434\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0430\u043b\u0438\u0447\u0438\u0435\u043c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0436\u0451\u0441\u0442\u043a\u043e \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 12.8.3 Hotfix 2. \u041e\u0434\u043d\u0430\u043a\u043e, \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u0438 Web Help Desk 12.8.3.1813 \u0438\u043b\u0438 12.8.3 HF1.\n\n\u042d\u0442\u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0440\u0443\u0433\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u043e\u043c \u0436\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 ( CVE-2024-28986, \u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9.8).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0421\u0428\u0410 (CISA), \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u0445\u043e\u0442\u044f \u0434\u0435\u0442\u0430\u043b\u0438 \u0435\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e CVE-2024-28987 \u043e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u043c \u043c\u0435\u0441\u044f\u0446\u0435. \u041a\u0440\u0430\u0439\u043d\u0435 \u0432\u0430\u0436\u043d\u043e \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e\u0431\u044b \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0440\u0438\u0441\u043a\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-08-23T14:53:04.000000Z"}, {"uuid": "607abf0f-44d4-4a85-b06a-ce82684a8057", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/itsec_news/4630", "content": "\u200b\u26a1\ufe0fCVE-2024-28987: \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u0433\u0440\u043e\u0437\u0430 \u0432 SolarWinds WHD \u0442\u0440\u0435\u0431\u0443\u0435\u0442 \u0441\u0440\u043e\u0447\u043d\u044b\u0445 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439\n\n\ud83d\udcac\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0432\u043e\u0451\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Web Help Desk (WHD). \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430, \u043f\u043e\u043b\u0443\u0447\u0438\u0432\u0448\u0430\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-28987 \u0438 \u043e\u0446\u0435\u043d\u0451\u043d\u043d\u0430\u044f \u0432 9,1 \u0431\u0430\u043b\u043b\u0430 \u043f\u043e \u0441\u0438\u0441\u0442\u0435\u043c\u0435 CVSS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u043c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u0430\u043c \u0441\u0438\u0441\u0442\u0435\u043c\u044b.\n\n\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Horizon3 \u0417\u0430\u043a \u0425\u044d\u043d\u043b\u0438 \u0431\u044b\u043b \u043f\u0440\u0438\u0437\u043d\u0430\u043d \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u043c \u0437\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u0435 \u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0435 \u043e \u0434\u0430\u043d\u043d\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0435. \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043a\u0430\u043a \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442\u0441\u044f, \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0430\u043b\u0438\u0447\u0438\u0435\u043c \u0432\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u0445 \u0436\u0451\u0441\u0442\u043a\u043e \u0437\u0430\u043a\u043e\u0434\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445.\n\n\u0414\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 12.8.3 Hotfix 2. \u041e\u0434\u043d\u0430\u043a\u043e, \u0434\u043b\u044f \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0433\u043e \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u044f \u044d\u0442\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043f\u0440\u0435\u0434\u0432\u0430\u0440\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0432\u0435\u0440\u0441\u0438\u0438 Web Help Desk 12.8.3.1813 \u0438\u043b\u0438 12.8.3 HF1.\n\n\u042d\u0442\u043e\u0442 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442 \u043f\u0440\u043e\u0438\u0437\u043e\u0448\u0451\u043b \u0432\u0441\u0435\u0433\u043e \u0447\u0435\u0440\u0435\u0437 \u043d\u0435\u0434\u0435\u043b\u044e \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a SolarWinds \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0434\u0440\u0443\u0433\u043e\u0439 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0442\u043e\u043c \u0436\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0433\u043b\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0434\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430 ( CVE-2024-28986, \u043e\u0446\u0435\u043d\u043a\u0430 CVSS: 9.8).\n\n\u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0410\u0433\u0435\u043d\u0442\u0441\u0442\u0432\u0430 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u043d\u043e\u0439 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0421\u0428\u0410 (CISA), \u044d\u0442\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0436\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445, \u0445\u043e\u0442\u044f \u0434\u0435\u0442\u0430\u043b\u0438 \u0435\u0451 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0441\u0442\u0430\u044e\u0442\u0441\u044f \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438.\n\n\u0422\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c, \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e CVE-2024-28987 \u043e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f \u0432 \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0435\u043c \u043c\u0435\u0441\u044f\u0446\u0435. \u041a\u0440\u0430\u0439\u043d\u0435 \u0432\u0430\u0436\u043d\u043e \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u0447\u0442\u043e\u0431\u044b \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0440\u0438\u0441\u043a\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-08-23T14:53:04.000000Z"}, {"uuid": "d92d44b0-5783-4ab7-858f-7cc55e70bb44", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28989", "type": "seen", "source": "Telegram/0S1LvqfOCYDpC9WoSzzTtRdy5QFxnEVzLS09OI03tPhSaejo", "content": "", "creation_timestamp": "2025-02-14T10:01:39.000000Z"}, {"uuid": "3c2c6d23-c345-4b93-9003-5a95265eeb3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "Telegram/8kmXPoK5fS_Y6NLNeYh_7fYapXPuZ9whEdBMRszaHJ77mg", "content": "", "creation_timestamp": "2024-08-15T17:16:41.000000Z"}, {"uuid": "a63badbc-7c3c-4d83-a399-b116e2c4301f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/1912", "content": "https://github.com/fa-rrel/CVE-2024-28987-POC\n\nWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\n#github #exploit", "creation_timestamp": "2024-09-05T11:48:17.000000Z"}, {"uuid": "969783ff-6a3d-443e-8338-ada625d4c5d9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CyberBulletin/986", "content": "\u26a1\ufe0fCritical SolarWinds Flaw Exposes 827 Instances: PoC Exploit Unveiled for CVE-2024-28987.\n\n#CyberBulletin", "creation_timestamp": "2024-09-30T09:53:18.000000Z"}, {"uuid": "69a74d74-55b4-418b-90b8-254901460820", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/2969", "content": "\ud83d\udea8CVE-2024-28987: Web Help Desk Hardcoded Credential Vulnerability\n\nhttps://darkwebinformer.com/cve-2024-28987-web-help-desk-hardcoded-credential-vulnerability/", "creation_timestamp": "2024-09-05T17:29:15.000000Z"}, {"uuid": "d6b19b18-1068-4787-b17d-93c87068762d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/HackingInsights/10924", "content": "\u200aSolarWinds Web Help Desk Hit by Critical Vulnerability (CVE-2024-28987)\n\nhttps://securityonline.info/solarwinds-web-help-desk-hit-by-critical-vulnerability-cve-2024-28987/", "creation_timestamp": "2024-08-22T12:21:40.000000Z"}, {"uuid": "6148cbbe-d73e-4e46-aa55-bf2611c42b5c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "Telegram/N4vlq_UQn_WycLzT3DCRhD-EMUoWfT9WjMekDM1sG6oTp-5B", "content": "", "creation_timestamp": "2024-12-21T00:18:44.000000Z"}, {"uuid": "ca10aa70-985e-4fb0-bf7a-39ac976912c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "Telegram/xXQF8FomX3CCIIL669vYPLe7wLqoolLX8vueau3hKomdbA", "content": "", "creation_timestamp": "2024-08-15T18:21:12.000000Z"}, {"uuid": "b010ea85-d78b-4d55-9adf-981bee209279", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/KomunitiSiber/2723", "content": "CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability\nhttps://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html\n\nThe U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a critical security flaw impacting SolarWinds Web Help Desk (WHD) software to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.\nTracked as CVE-2024-28987 (CVSS score: 9.1), the vulnerability relates to a case of hard-coded credentials that could be abused to gain", "creation_timestamp": "2024-10-16T11:52:05.000000Z"}, {"uuid": "5ca630ed-62d7-40cd-8c05-785609978fdf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "seen", "source": "https://t.me/thehackernews/5461", "content": "SolarWinds has released a critical patch for its Web Help Desk (WHD) software to fix a flaw (CVE-2024-28987) that could allow unauthorized remote access. \n \nIf you're using versions before 12.8.3 Hotfix 2, it's crucial to update immediately to avoid potential breaches. \n \nLearn more: https://thehackernews.com/2024/08/hardcoded-credential-vulnerability.html", "creation_timestamp": "2024-08-22T18:38:57.000000Z"}, {"uuid": "f177ba3b-50ed-40cd-80aa-4feca827a026", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "exploited", "source": "https://t.me/thehackernews/5736", "content": "\ud83d\udca5 A critical flaw in SolarWinds Web Help Desk (CVE-2024-28987) has been actively exploited, and it involves hard-coded credentials that allow attackers to access sensitive help desk tickets. \n \nLearn more: https://thehackernews.com/2024/10/cisa-warns-of-active-exploitation-in.html", "creation_timestamp": "2024-10-16T07:03:21.000000Z"}, {"uuid": "fc0b3ee3-5eca-4cba-bcb2-21a89e281638", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28987", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3120", "content": "https://github.com/fa-rrel/CVE-2024-28987-POC\n\nWeb Help Desk Hardcoded Credential Vulnerability (CVE-2024-28987)\n#github #exploit", "creation_timestamp": "2024-09-05T11:38:23.000000Z"}, {"uuid": "f1440858-5005-4a22-9247-7fe2e5fbdf50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28986", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-08-15T18:10:02.000000Z"}, {"uuid": "a926e8cd-3dc3-402c-813d-50194e96fbfd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-28980", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113647818140320427", "content": "", "creation_timestamp": "2024-12-13T22:14:44.988824Z"}]}