{"vulnerability": "CVE-2024-10441", "sightings": [{"uuid": "797bac39-db74-44df-9001-bc9738ec0344", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkrbxqgtbx27", "content": "", "creation_timestamp": "2025-03-19T23:00:06.109090Z"}, {"uuid": "7dfa68cb-2b57-443d-954b-4aa4c3836c5e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3lkpwvqdcm22j", "content": "", "creation_timestamp": "2025-03-19T10:09:28.810997Z"}, {"uuid": "d90cde5c-8fff-4834-baeb-48f08ae59169", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/vulnalerts.bsky.social/post/3lkpzqcmtv32r", "content": "", "creation_timestamp": "2025-03-19T11:00:09.632626Z"}, {"uuid": "83322f24-bfaa-4a00-acf2-3cdf28e7ed42", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114189084185897855", "content": "", "creation_timestamp": "2025-03-19T12:25:49.579657Z"}, {"uuid": "d997e788-db4f-4ade-a78a-3ecf2d0f4af1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lkqg253p6z2p", "content": "", "creation_timestamp": "2025-03-19T14:40:21.416341Z"}, {"uuid": "53c79460-cd2f-4a4d-879e-1a0e4040667f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lksixxolnl2m", "content": "", "creation_timestamp": "2025-03-20T10:38:09.517101Z"}, {"uuid": "44fe3856-3bf0-4ca2-9e41-6cc08a5228bc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114187049168233575", "content": "", "creation_timestamp": "2025-03-19T03:48:17.735919Z"}, {"uuid": "c261edf2-36c4-46ea-82e1-7cbf636cae10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lkpeyv35jk2u", "content": "", "creation_timestamp": "2025-03-19T04:49:09.021164Z"}, {"uuid": "21a33def-bed3-4ccb-b130-b660e1b6fe13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/cve.skyfleet.blue/post/3lkphjeey3s24", "content": "", "creation_timestamp": "2025-03-19T05:34:07.640797Z"}, {"uuid": "cab07b23-ebb3-4d3d-97a1-d92a2c8cac1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-214/", "content": "", "creation_timestamp": "2025-04-09T03:00:00.000000Z"}, {"uuid": "eba13f44-84a5-4c57-9b15-00a7b541fc30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://bsky.app/profile/beikokucyber.bsky.social/post/3lmuxxz4ls72e", "content": "", "creation_timestamp": "2025-04-15T21:02:21.811775Z"}, {"uuid": "4c3a66e7-0e3e-4d08-8ccd-1eecc376e4c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-12T13:33:28.000000Z"}, {"uuid": "c3f8b7e2-604c-4c53-9b9e-ec890dab3012", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "MISP/02fb130c-7874-4693-9b66-81ed91a2e996", "content": "", "creation_timestamp": "2025-08-21T03:19:27.000000Z"}, {"uuid": "a1db7a2a-55a9-4d34-a3bd-80e307dd92f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8012", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10441\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper encoding or escaping of output vulnerability in the system plugin daemon in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to execute arbitrary code via unspecified vectors.\n\ud83d\udccf Published: 2025-03-19T02:09:56.387Z\n\ud83d\udccf Modified: 2025-03-19T02:09:56.387Z\n\ud83d\udd17 References:\n1. https://www.synology.com/en-global/security/advisory/Synology_SA_24_20\n2. https://www.synology.com/en-global/security/advisory/Synology_SA_24_23", "creation_timestamp": "2025-03-19T02:49:23.000000Z"}, {"uuid": "422e7c5e-6910-43fc-a567-10b15a849c47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9038", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-10441\n\ud83d\udd25 CVSS Score: 9.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: Improper encoding or escaping of output vulnerability in the system plugin daemon in Synology BeeStation OS (BSM) before 1.1-65374 and Synology DiskStation Manager (DSM) before 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 allows remote attackers to execute arbitrary code via unspecified vectors.\n\ud83d\udccf Published: 2025-03-19T02:09:56.387Z\n\ud83d\udccf Modified: 2025-03-27T08:59:58.103Z\n\ud83d\udd17 References:\n1. https://www.synology.com/en-global/security/advisory/Synology_SA_24_20\n2. https://www.synology.com/en-global/security/advisory/Synology_SA_24_23", "creation_timestamp": "2025-03-27T09:27:00.000000Z"}, {"uuid": "240c1942-9bd5-4094-8802-30e9c38d53ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://t.me/cvedetector/20614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-10441 - Synology BeeStation Manager/DSM/DSMUC Unauthenticated Remote Code Execution\", \n  \"Content\": \"CVE ID : CVE-2024-10441 \nPublished : March 19, 2025, 2:15 a.m. | 34\u00a0minutes ago \nDescription : Improper encoding or escaping of output vulnerability in the system plugin daemon in Synology BeeStation Manager (BSM) before 1.1-65374, Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.1.1-42962-7, 7.2-64570-4, 7.2.1-69057-6 and 7.2.2-72806-1 and Synology Unified Controller (DSMUC) before 3.1.4-23079 allows remote attackers to execute arbitrary code via unspecified vectors. \nSeverity: 9.8 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-19T04:36:56.000000Z"}, {"uuid": "92e2b24c-0fe2-431a-9d7e-3f709637fb95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-10441", "type": "seen", "source": "https://t.me/suboxone_chatroom/7500", "content": "CVE-2024-10441: RCE in Synology products, 9.8 rating \ud83d\udd25\n\nSynology DSM and BSM are vulnerable to Improper Encoding or Escaping of Output, which could potentially lead to remote execution of arbitrary code.\n\nSearch at Netlas.io:\n\ud83d\udc49 Link: https://nt.ls/KOa1N\n\ud83d\udc49 Dork: http.favicon.hash_sha256:b8f4bb2e2ba81cb86875fb89db4571278d6e23fd888313d0f4152b1adbc8bd08\n\nVendor's advisory: https://www.synology.com/en-global/security/advisory/Synology_SA_24_20\n\n\nhttps://t.me/SuBoXoneSoCiety", "creation_timestamp": "2025-04-01T13:17:58.000000Z"}]}