<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://vulnerability.circl.lu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-04T19:47:15.877670+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@circl.lu</email>
  </author>
  <link href="https://vulnerability.circl.lu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa5c080f-9392-4265-b3b3-cfad2ce1c00b/export</id>
    <title>fa5c080f-9392-4265-b3b3-cfad2ce1c00b</title>
    <updated>2026-05-04T19:47:16.192639+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa5c080f-9392-4265-b3b3-cfad2ce1c00b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/5245", "content": "#Malware_analysis\n1. Technical Analysis of the WhisperGate Malicious Bootloader\nhttps://www.crowdstrike.com/blog/technical-analysis-of-whispergate-malware\n]-&amp;gt; https://unit42.paloaltonetworks.com/ukraine-cyber-conflict-cve-2021-32648-whispergate\n2. MoonBounce: the dark side of UEFI firmware\nhttps://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468\n3. AVADDON Ransomware\nhttps://www.mandiant.com/resources/chasing-avaddon-ransomware", "creation_timestamp": "2022-01-21T11:01:01.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa5c080f-9392-4265-b3b3-cfad2ce1c00b/export"/>
    <published>2022-01-21T11:01:01+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/f876457f-d06c-4a46-b99b-563c767a52a7/export</id>
    <title>f876457f-d06c-4a46-b99b-563c767a52a7</title>
    <updated>2026-05-04T19:47:16.192517+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "f876457f-d06c-4a46-b99b-563c767a52a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/f876457f-d06c-4a46-b99b-563c767a52a7/export"/>
    <published>2023-06-14T21:10:04+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/495177d7-9de2-4776-aa84-148c2a19488a/export</id>
    <title>495177d7-9de2-4776-aa84-148c2a19488a</title>
    <updated>2026-05-04T19:47:16.192374+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "495177d7-9de2-4776-aa84-148c2a19488a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "https://t.me/arpsyndicate/1103", "content": "#ExploitObserverAlert\n\nCVE-2021-32648\n\nDESCRIPTION: Exploit Observer has 12 entries related to CVE-2021-32648. octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.\n\nFIRST-EPSS: 0.020640000\nNVD-IS: 5.2\nNVD-ES: 3.9", "creation_timestamp": "2023-12-04T03:29:58.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/495177d7-9de2-4776-aa84-148c2a19488a/export"/>
    <published>2023-12-04T03:29:58+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/fa66e6ba-a743-4406-a661-625a147a2db7/export</id>
    <title>fa66e6ba-a743-4406-a661-625a147a2db7</title>
    <updated>2026-05-04T19:47:16.192250+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "fa66e6ba-a743-4406-a661-625a147a2db7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "https://t.me/arpsyndicate/1582", "content": "#ExploitObserverAlert\n\nCVE-2021-32648\n\nDESCRIPTION: Exploit Observer has 12 entries related to CVE-2021-32648. octobercms in a CMS platform based on the Laravel PHP Framework. In affected versions of the october/system package an attacker can request an account password reset and then gain access to the account using a specially crafted request. The issue has been patched in Build 472 and v1.1.5.\n\nFIRST-EPSS: 0.020640000\nNVD-IS: 5.2\nNVD-ES: 3.9", "creation_timestamp": "2023-12-10T00:05:02.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/fa66e6ba-a743-4406-a661-625a147a2db7/export"/>
    <published>2023-12-10T00:05:02+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/d6c6017d-aaef-489c-830a-dd69094d75eb/export</id>
    <title>d6c6017d-aaef-489c-830a-dd69094d75eb</title>
    <updated>2026-05-04T19:47:16.192133+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "d6c6017d-aaef-489c-830a-dd69094d75eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971223", "content": "", "creation_timestamp": "2024-12-24T20:26:07.097697Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/d6c6017d-aaef-489c-830a-dd69094d75eb/export"/>
    <published>2024-12-24T20:26:07.097697+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/4f0c5ae0-4521-4819-81e9-beb3e007559f/export</id>
    <title>4f0c5ae0-4521-4819-81e9-beb3e007559f</title>
    <updated>2026-05-04T19:47:16.192017+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "4f0c5ae0-4521-4819-81e9-beb3e007559f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:30.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/4f0c5ae0-4521-4819-81e9-beb3e007559f/export"/>
    <published>2025-02-23T02:10:30+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/107e6ad0-4409-4a77-8ca9-c14c28441b12/export</id>
    <title>107e6ad0-4409-4a77-8ca9-c14c28441b12</title>
    <updated>2026-05-04T19:47:16.191906+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "107e6ad0-4409-4a77-8ca9-c14c28441b12", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/CVE-2021-32648.yaml", "content": "", "creation_timestamp": "2025-09-19T11:25:40.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/107e6ad0-4409-4a77-8ca9-c14c28441b12/export"/>
    <published>2025-09-19T11:25:40+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/9fc62444-90ea-4b8b-b56a-32be61cfe1cd/export</id>
    <title>9fc62444-90ea-4b8b-b56a-32be61cfe1cd</title>
    <updated>2026-05-04T19:47:16.191747+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "9fc62444-90ea-4b8b-b56a-32be61cfe1cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32648", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lzcbnp3p242g", "content": "", "creation_timestamp": "2025-09-20T21:02:28.405242Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/9fc62444-90ea-4b8b-b56a-32be61cfe1cd/export"/>
    <published>2025-09-20T21:02:28.405242+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/50e34261-0d70-4119-aefd-95e4ad3d9836/export</id>
    <title>50e34261-0d70-4119-aefd-95e4ad3d9836</title>
    <updated>2026-05-04T19:47:16.190655+00:00</updated>
    <author>
      <name>Cédric Bonhomme</name>
      <uri>http://vulnerability.circl.lu/user/cedric</uri>
    </author>
    <content>{"uuid": "50e34261-0d70-4119-aefd-95e4ad3d9836", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2021-32648", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3891c3ce-a7a3-432d-8cd5-85e8c19ac6a3", "content": "", "creation_timestamp": "2026-02-02T12:28:27.020902Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/50e34261-0d70-4119-aefd-95e4ad3d9836/export"/>
    <published>2026-02-02T12:28:27.020902+00:00</published>
  </entry>
  <entry>
    <id>https://vulnerability.circl.lu/sighting/cfb93d9e-e294-43cf-835f-c26bf7a7742d/export</id>
    <title>cfb93d9e-e294-43cf-835f-c26bf7a7742d</title>
    <updated>2026-05-04T19:47:16.186902+00:00</updated>
    <author>
      <name>Automation user</name>
      <uri>http://vulnerability.circl.lu/user/automation</uri>
    </author>
    <content>{"uuid": "cfb93d9e-e294-43cf-835f-c26bf7a7742d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-32640", "type": "seen", "source": "https://t.me/codeby_sec/9952", "content": "\ud83c\udf10STEWS \u2014 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0434\u043b\u044f \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u0438 \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u044f WebSockets.\n\n\ud83c\udfaf\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u0438\n\u23fa\ufe0f\u041d\u0430\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u0442\u043e\u0447\u0435\u043a WebSockets, \u043f\u0443\u0442\u0435\u043c \u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043f\u0435\u0440\u0435\u0447\u043d\u044f \u0434\u043e\u043c\u0435\u043d\u043e\u0432. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043c\u043e\u0434\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u0443\u044e \u0432\u0435\u0440\u0441\u0438\u044e ZGrab2 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 URL-\u0430\u0434\u0440\u0435\u0441\u043e\u0432 \u043d\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0443 WebSocket \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u043f\u0435\u0440\u0432\u043e\u0439 \u0447\u0430\u0441\u0442\u0438 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440\u044b \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f WebSocket.\n\n\u23fa\ufe0f\u041e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0438\u0435, \u043a\u0430\u043a\u043e\u0439 \u0441\u0435\u0440\u0432\u0435\u0440 WebSockets \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u043e\u0439 \u0442\u043e\u0447\u043a\u0435: \n\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0440\u0430\u0437\u043b\u0438\u0447\u0438\u044f \u043d\u0430 \u0443\u0440\u043e\u0432\u043d\u0435 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u043f\u043e\u043f\u0443\u043b\u044f\u0440\u043d\u044b\u0445 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u044f\u0445 WebSocket, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043f\u044b\u0442\u0430\u0442\u044c\u0441\u044f \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0437\u0430\u043f\u0443\u0449\u0435\u043d\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b WebSocket. STEWS \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u043a\u0430\u043a \u0432 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f WebSocket (\u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 HTTP), \u0442\u0430\u043a \u0438 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 WebSocket (\u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 WebSocket).\n\n\u23fa\ufe0f\u041f\u0440\u043e\u0432\u0435\u0440\u043a\u0430, \u043d\u0435 \u043f\u043e\u0434\u0432\u0435\u0440\u0436\u0435\u043d \u043b\u0438 \u0441\u0435\u0440\u0432\u0435\u0440 WebSockets \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c CVE \u0438\u043b\u0438 \u0434\u0440\u0443\u0433\u0438\u043c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c WebSockets: CSWSH (\u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442 \u043c\u0435\u0436\u0441\u0430\u0439\u0442\u043e\u0432\u044b\u0445 \u0432\u0435\u0431-\u0441\u043e\u043a\u0435\u0442\u043e\u0432), CVE-2020-27813,CVE-2020-7662 \u0438 CVE-2020-7663, CVE-2021-32640.\n\n\u0427\u0442\u043e \u0442\u0430\u043a\u043e\u0435 WebSockets\u2753\nWebSocket \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u043c\u0435\u0436\u0434\u0443 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u043c \u0438 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u043c. \u0414\u0430\u043d\u043d\u044b\u0435 \u043f\u0435\u0440\u0435\u0434\u0430\u044e\u0442\u0441\u044f \u0432 \u043e\u0431\u0435 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0431\u0435\u0437 \u0437\u0430\u0434\u0435\u0440\u0436\u0435\u043a - \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u044f \u0432 \u0447\u0430\u0442\u0435 \u043f\u0440\u0438\u0445\u043e\u0434\u044f\u0442 \u0441\u0440\u0430\u0437\u0443, \u0430 \u0438\u0433\u0440\u043e\u0432\u044b\u0435 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u044f \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438. \u041f\u043e\u044f\u0432\u043b\u0435\u043d\u0438\u0435 WebSocket \u0441\u0442\u0430\u043b\u043e \u043f\u0440\u043e\u0440\u044b\u0432\u043e\u043c \u0434\u043b\u044f \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432, \u0433\u0434\u0435 \u0432\u0430\u0436\u043d\u0430 \u043c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0440\u0435\u0430\u043a\u0446\u0438\u044f.\n\n\u27a1\ufe0f\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u044f. \u0421\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 WebSocket \u043d\u0430\u0447\u0438\u043d\u0430\u0435\u0442\u0441\u044f \u0441 \u043e\u0431\u044b\u0447\u043d\u043e\u0433\u043e HTTP-\u0437\u0430\u043f\u0440\u043e\u0441\u0430, \u0432 \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442\u0441\u044f \u0437\u0430\u0433\u043e\u043b\u043e\u0432\u043e\u043a Upgrade,\u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0449\u0438\u0439 \u043e \u0436\u0435\u043b\u0430\u043d\u0438\u0438 \u043f\u0435\u0440\u0435\u0439\u0442\u0438 \u043d\u0430 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b Websocket. \u042d\u0442\u043e\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u043d\u0430\u0437\u044b\u0432\u0430\u0435\u0442\u0441\u044f Websocket-handshake\n \n\u27a1\ufe0f\u041e\u0431\u043c\u0435\u043d \u0434\u0430\u043d\u043d\u044b\u043c\u0438. \u041f\u043e\u0441\u043b\u0435 \u0443\u0441\u043f\u0435\u0448\u043d\u043e\u0433\u043e \u201c\u0440\u0443\u043a\u043e\u043f\u043e\u0436\u0430\u0442\u0438\u044f\u201d \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043f\u043e\u0441\u0442\u043e\u044f\u043d\u043d\u043e\u0435 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0435 \u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u043c\u043e\u0433\u0443\u0442 \u043f\u0435\u0440\u0435\u0434\u0430\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0432 \u043e\u0431\u0435 \u0441\u0442\u043e\u0440\u043e\u043d\u044b \u0431\u0435\u0437 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e\u0441\u0442\u0438 \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u0442\u044c \u043d\u043e\u0432\u044b\u0439 \u0437\u0430\u043f\u0440\u043e\u0441.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\n1\ufe0f\u20e3\u041f\u043e\u0438\u0441\u043a \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0432\u044b\u0431\u043e\u0440 \u0438\u0437 \u0447\u0435\u0442\u044b\u0440\u0435\u0445 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0445 \u0442\u0435\u0441\u0442\u043e\u0432. \u041d\u0438\u0436\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d \u0432\u044b\u0431\u043e\u0440 \u0447\u0435\u0442\u0432\u0435\u0440\u0442\u043e\u0433\u043e \u0442\u0435\u0441\u0442\u0430 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 CVE-2020-27813. \npython3 STEWS-vuln-detect.py -4 -n -u 127.0.0.1:8084\n\n2\ufe0f\u20e3\u0417\u0430\u043f\u0443\u0441\u043a \u0432\u0441\u0435\u0445 \u0442\u0435\u0441\u0442\u043e\u0432\u044b\u0445 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0435\u0432 \u0441 \u0444\u043b\u0430\u0433\u043e\u043c -a \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u043e\u0447\u043d\u043e\u0435 \u0441\u043e\u043f\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u043e\u0432, \u0447\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u0437\u0430\u043d\u044f\u0442\u044c \u043c\u043d\u043e\u0433\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u0438 \u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043e\u0432\u0430\u0442\u044c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0431\u043e\u043b\u044c\u0448\u043e\u0433\u043e \u043e\u0431\u044a\u0435\u043c\u0430 \u0434\u0430\u043d\u043d\u044b\u0445 \u043d\u0430 \u043a\u043e\u043d\u0435\u0447\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443, \u0434\u043b\u044f \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0435\u0442\u0441\u044f \u0441\u043d\u044f\u0442\u0438\u0435 \u043e\u0442\u043f\u0435\u0447\u0430\u0442\u043a\u0430.\npython3 STEWS-fingerprint.py -1 -k -u streamer.finance.yahoo.com\n\n3\ufe0f\u20e3\u0414\u043b\u044f \u043d\u0430\u0445\u043e\u0436\u0434\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0435\u0447\u043d\u044b\u0445 \u0442\u043e\u0447\u0435\u043a WebSockets \u0432 \u0444\u0430\u0439\u043b\u0435 known-endpoints.txt \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u0443\u043a\u0430\u0437\u0430\u0442\u044c \u0446\u0435\u043b\u0435\u0432\u044b\u0435 \u0434\u043e\u043c\u0435\u043d\u044b \u0438 \u0437\u0430\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0439 \u0441\u0446\u0435\u043d\u0430\u0440\u0438\u0439.\nSTEWS-discovery.sh\n\n#tools #websockets #network\n\n\ud83d\udd17 \u0412\u0441\u0435 \u043d\u0430\u0448\u0438 \u043a\u0430\u043d\u0430\u043b\u044b \ud83d\udd01 \u0412\u0441\u0435 \u043d\u0430\u0448\u0438 \u0447\u0430\u0442\u044b \ud83e\udea7 \u0414\u043b\u044f \u0441\u0432\u044f\u0437\u0438 \u0441 \u043c\u0435\u043d\u0435\u0434\u0436\u0435\u0440\u043e\u043c", "creation_timestamp": "2026-04-07T15:02:10.000000Z"}</content>
    <link href="https://vulnerability.circl.lu/sighting/cfb93d9e-e294-43cf-835f-c26bf7a7742d/export"/>
    <published>2026-04-07T15:02:10+00:00</published>
  </entry>
</feed>
