{"vulnerability": "CVE-2024-1040", "sightings": [{"uuid": "317392ab-4c18-4d58-99c9-a0f71d186eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10400", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/113519815663706149", "content": "", "creation_timestamp": "2024-11-21T07:42:02.057927Z"}, {"uuid": "df6d149e-2db7-4dae-8594-baa34a1b1568", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10400", "type": "confirmed", "source": "https://github.com/projectdiscovery/nuclei-templates/tree/main/http/cves/2024/CVE-2024-10400.yaml", "content": "", "creation_timestamp": "2024-12-18T12:30:22.000000Z"}, {"uuid": "9cdfa4ec-2a16-4485-af28-a7c45706fedb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10401", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lftbeh5i5n2h", "content": "", "creation_timestamp": "2025-01-16T02:48:40.097204Z"}, {"uuid": "a62846be-2ebd-4f40-8203-5ac060602499", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10401", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3lft7jkh4tq2p", "content": "", "creation_timestamp": "2025-01-16T02:15:43.933564Z"}, {"uuid": "baa1fa74-29b1-466d-8e42-c9d0dcbb7ec8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10404", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114000102035246119", "content": "", "creation_timestamp": "2025-02-14T03:25:10.593933Z"}, {"uuid": "06301958-c68d-43df-b99f-bb1161b26e78", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10404", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li4dr4t54g2a", "content": "", "creation_timestamp": "2025-02-14T04:15:54.255851Z"}, {"uuid": "33d51ed0-70bc-410f-935e-22f9f6bf0b77", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10404", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li4ettfyap24", "content": "", "creation_timestamp": "2025-02-14T04:35:23.068892Z"}, {"uuid": "b8156532-a0db-480c-8bc5-f6d47ea03669", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://infosec.exchange/users/cve/statuses/114004829759031436", "content": "", "creation_timestamp": "2025-02-14T23:27:29.878286Z"}, {"uuid": "42e3ce23-fab2-499d-950d-9a14806a55be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3li6gsve2gt2y", "content": "", "creation_timestamp": "2025-02-15T00:15:53.886380Z"}, {"uuid": "c63bc4fa-afbd-48f7-b381-b639e9a19e9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3li6pyznkse2m", "content": "", "creation_timestamp": "2025-02-15T03:00:24.161035Z"}, {"uuid": "caf6de4d-2f5c-4ad2-84be-ae25d9a31a66", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10400", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3likodqwlz425", "content": "", "creation_timestamp": "2025-02-19T21:02:37.358798Z"}, {"uuid": "cb4f1a71-ccb8-4468-9f04-fc0ba17877de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10401", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/1906", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10401\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: N/A\n\ud83d\udccf Modified: 2025-01-16T01:03:45.973Z\n\ud83d\udd17 References:\nNo references available.", "creation_timestamp": "2025-01-16T01:55:17.000000Z"}, {"uuid": "cdbdbba1-99af-4d9f-85b2-cfc37b418306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10404", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4426", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10404\n\ud83d\udd25 CVSS Score: 5.2 (CVSS_V3)\n\ud83d\udd39 Description: CalInvocationHandler in Brocade \nSANnav before 2.3.1b logs sensitive information in clear text. The \nvulnerability could allow an authenticated, local attacker to view \nBrocade Fabric OS switch sensitive information in clear text. An \nattacker with administrative privileges could retrieve sensitive \ninformation including passwords; SNMP responses that contain AuthSecret \nand PrivSecret after collecting a \u201csupportsave\u201d or getting access to an \nalready collected \u201csupportsave\u201d. NOTE: this issue exists because of an incomplete fix for CVE-2024-29952\n\ud83d\udccf Published: 2025-02-14T06:30:35Z\n\ud83d\udccf Modified: 2025-02-14T06:30:35Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10404\n2. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25403", "creation_timestamp": "2025-02-14T07:10:12.000000Z"}, {"uuid": "ed3817e8-2755-4c95-87ef-c4c51ba474c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4517", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: No description available\n\ud83d\udccf Published: 2025-02-15T00:15:13.023\n\ud83d\udccf Modified: N/A\n\ud83d\udd17 References:\n1. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402", "creation_timestamp": "2025-02-15T01:10:33.000000Z"}, {"uuid": "80fbb8a1-b1f8-43a1-9636-be0a7872ce2d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/4521", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10405\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Brocade SANnav before SANnav 2.3.1b \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful\n exploit, an attacker can read Brocade SANnav data stream that includes \nmonitored Brocade Fabric OS switches performance data, port status, \nzoning information, WWNs, IP Addresses, but no customer data, no \npersonal data and no secrets or passwords, as it travels across the \nnetwork.\n\ud83d\udccf Published: 2025-02-15T00:32:47Z\n\ud83d\udccf Modified: 2025-02-15T00:32:47Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-10405\n2. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25402", "creation_timestamp": "2025-02-15T01:11:38.000000Z"}, {"uuid": "d4c8e701-aed4-4324-a486-16d5718ff722", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1040", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/15821", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-1040\n\ud83d\udd25 CVSS Score: 4.4 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N)\n\ud83d\udd39 Description: \n\n\nGessler GmbH WEB-MASTER user account is stored using a weak hashing algorithm. The attacker can restore the passwords by breaking the hashes stored on the device.\n\n\n\n\n\ud83d\udccf Published: 2024-02-01T21:41:08.954Z\n\ud83d\udccf Modified: 2025-05-09T19:11:33.939Z\n\ud83d\udd17 References:\n1. https://www.cisa.gov/news-events/ics-advisories/icsa-24-032-01", "creation_timestamp": "2025-05-09T19:26:16.000000Z"}, {"uuid": "eb7cc406-8af0-4328-8d21-96ae13df37cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10405", "type": "seen", "source": "https://t.me/cvedetector/18149", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10405 - Brocade SANnav Weak TLS Cipher Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10405 \nPublished : Feb. 15, 2025, 12:15 a.m. | 21\u00a0minutes ago \nDescription : Brocade SANnav before SANnav 2.3.1b   \nenables weak TLS ciphers on ports 443 and 18082. In case of a successful  \n exploit, an attacker can read Brocade SANnav data stream that includes   \nmonitored Brocade Fabric OS switches performance data, port status,   \nzoning information, WWNs, IP Addresses, but no customer data, no   \npersonal data and no secrets or passwords, as it travels across the   \nnetwork. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"15 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-15T01:49:12.000000Z"}, {"uuid": "e8b15608-3c3c-4e67-bd2a-f4d806bcaf65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10404", "type": "seen", "source": "https://t.me/cvedetector/18070", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10404 - Brocade SANnav Information Disclosure Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10404 \nPublished : Feb. 14, 2025, 4:15 a.m. | 1\u00a0hour, 39\u00a0minutes ago \nDescription : CalInvocationHandler in Brocade   \nSANnav before 2.3.1b logs sensitive information in clear text. The   \nvulnerability could allow an authenticated, local attacker to view   \nBrocade Fabric OS switch sensitive information in clear text. An   \nattacker with administrative privileges could retrieve sensitive   \ninformation including passwords; SNMP responses that contain AuthSecret   \nand PrivSecret after collecting a \u201csupportsave\u201d or getting access to an   \nalready collected \u201csupportsave\u201d. NOTE: this issue exists because of an incomplete fix for CVE-2024-29952 \nSeverity: 5.5 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"14 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-14T07:23:33.000000Z"}, {"uuid": "b32a5c58-68b9-491f-a744-3988520701a2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10402", "type": "seen", "source": "https://t.me/cvedetector/9032", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10402 - \"Forminator Forms Unauthorized Access and Form Escalation Vulnerability\"\", \n  \"Content\": \"CVE ID : CVE-2024-10402 \nPublished : Oct. 26, 2024, 12:15 p.m. | 24\u00a0minutes ago \nDescription : The Forminator Forms \u2013 Contact Form, Payment Form &amp; Custom Form Builder plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.35.1. This makes it possible for authenticated attackers, with Contributor-level access and above, and permissions granted by an Administrator, to create new or edit existing forms, including updating the default registration role to Administrator on User Registration forms. \nSeverity: 7.5 | HIGH \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-26T14:49:09.000000Z"}, {"uuid": "b2839e39-55c6-414f-83f5-e53b43db37c8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10408", "type": "seen", "source": "https://t.me/cvedetector/9047", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10408 - Blood Bank Management SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10408 \nPublished : Oct. 27, 2024, 3:15 a.m. | 44\u00a0minutes ago \nDescription : A vulnerability has been found in code-projects Blood Bank Management up to 1.0 and classified as critical. This vulnerability affects unknown code of the file /abs.php. The manipulation of the argument search leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-27T05:01:56.000000Z"}, {"uuid": "04c9b59b-887f-4d07-a287-72e113b6e9c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10409", "type": "seen", "source": "https://t.me/cvedetector/9046", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10409 - Code-Projects Blood Bank Management SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10409 \nPublished : Oct. 27, 2024, 3:15 a.m. | 44\u00a0minutes ago \nDescription : A vulnerability was found in code-projects Blood Bank Management 1.0 and classified as critical. This issue affects some unknown processing of the file /file/accept.php. The manipulation of the argument reqid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-27T05:01:55.000000Z"}, {"uuid": "51922f9c-397a-43bc-9f74-925a0baa5981", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10406", "type": "seen", "source": "https://t.me/cvedetector/9044", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10406 - SourceCodester Petrol Pump Management Software SQL Injection Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-10406 \nPublished : Oct. 26, 2024, 10:15 p.m. | 28\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, has been found in SourceCodester Petrol Pump Management Software 1.0. Affected by this issue is some unknown functionality of the file /admin/edit_fuel.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-27T00:51:12.000000Z"}, {"uuid": "be68195e-1bd5-43ca-9fa8-e1cec2cdbfa1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10407", "type": "seen", "source": "https://t.me/cvedetector/9045", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10407 - SourceCodester Petrol Pump Management Software SQL Injection\", \n  \"Content\": \"CVE ID : CVE-2024-10407 \nPublished : Oct. 27, 2024, 12:15 a.m. | 40\u00a0minutes ago \nDescription : A vulnerability, which was classified as critical, was found in SourceCodester Petrol Pump Management Software 1.0. This affects an unknown part of the file /admin/edit_customer.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"27 Oct 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-10-27T03:21:36.000000Z"}, {"uuid": "6d00d940-b194-4c5d-bd35-02fb37751f22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10404", "type": "seen", "source": "Telegram/sSrcbcylJp23hnyYvnw0YOhcvwnV2UH3BeMt5_kFVDtcB5aM", "content": "", "creation_timestamp": "2025-02-14T10:09:24.000000Z"}, {"uuid": "9e9922bd-dae6-4f80-b9fd-fece8ff0e299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1040", "type": "seen", "source": "https://t.me/ctinow/192524", "content": "https://ift.tt/6uXqyVS\nCVE-2024-1040 | Gessler WEB-MASTER 7.9 weak hash (icsa-24-032-01)", "creation_timestamp": "2024-02-24T10:11:21.000000Z"}, {"uuid": "74350cdd-19f8-48e5-8aa1-59090e611d7c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-1040", "type": "seen", "source": "https://t.me/ctinow/177825", "content": "https://ift.tt/p4TkCqO\nCVE-2024-1040", "creation_timestamp": "2024-02-01T23:26:37.000000Z"}]}